Chapter 2
Protecting Your Mac against Local and Remote Threats
IN THIS CHAPTER
Locking your Mac
Adding passwords
Using Touch ID
Encrypting your documents with FileVault
Configuring Firewall and Privacy settings
Adding other users to your Mac
One of the Mac’s advantages is that it seems to be a minor target of viruses — but that certainly doesn’t make it immune. With the worldwide connectivity of the Internet, everyone is vulnerable to everything, including malicious software (malware) and people with above-average computer skills, particularly those who use those skills for evil (hackers). Worse are those hackers who like to use email and websites to steal your personal identity information, such as credit card accounts or Social Security numbers (phishing), or those who send out software masquerading as one thing but as soon as you open it, you discover it’s harmful (Trojan horses ...
Get Macs All-in-One For Dummies, 5th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.