O'Reilly logo

Mac® OS X Security by Brian Wotring, Preston Norvell, Bruce Potter

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Installation

 

“A bad beginning makes a bad ending.”

 
 --Euripides, Aegeus

There are many steps on the path to creating a secure host. Some steps, like those discussed in the previous chapter, happen prior to our having to touch the software. Years of development and maturation have brought the securability of UNIX to Mac OS X. Thousands of man-hours of design and implementation have created Apple’s Security Framework and the applications that use it. But all this work simply provides a way for we users and administrators to create a measure of security for our Macs. The remaining steps in creating a secure host are left to us, who use these systems on a daily basis, using the tools given to us by those who walked the first, few paces ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required