Chapter 2. Installation


“A bad beginning makes a bad ending.”

 --Euripides, Aegeus

There are many steps on the path to creating a secure host. Some steps, like those discussed in the previous chapter, happen prior to our having to touch the software. Years of development and maturation have brought the securability of UNIX to Mac OS X. Thousands of man-hours of design and implementation have created Apple’s Security Framework and the applications that use it. But all this work simply provides a way for we users and administrators to create a measure of security for our Macs. The remaining steps in creating a secure host are left to us, who use these systems on a daily basis, using the tools given to us by those who walked the first, few paces ...

Get Mac® OS X Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.