O'Reilly logo

Mac® Security Bible by Joe Kissell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11.4. Summary

In this chapter, I covered the three main ways in which you might interact with another computer over the Internet and how to do so without any information being intercepted along the way. I first looked at ways to upload and download files securely using any of a variety of protocols. Then I provided an overview of secure screen sharing — using either the tools built into Mac OS X or third-party software. And, finally, I discussed the use of SSH for secure communications between computers, including how to use SSH to protect otherwise insecure types of data transfer.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required