Skip to Main Content
OS X Exploits and Defense
book

OS X Exploits and Defense

by Chris Hurley, Johnny Long, David Harley, Paul Baccas, Kevin Finisterre, Larry H., Gary Porteus
April 2011
Intermediate to advanced content levelIntermediate to advanced
352 pages
7h 51m
English
Syngress
Content preview from OS X Exploits and Defense

Chapter 1. Macintosh OS X Boot Process and Forensic Software

Introduction

“The computer for the rest of us” was never considered much of a hacker’s platform. The original Mac didn’t even have arrow keys (or a control key, for that matter), forcing the user to stop what he was doing, take his hands off the keyboard, and use the mouse. The Mac’s case was sealed so tight, a special tool known as the “Mac cracker” was made to break it open. It was a closed machine, an information appliance. The expansionless design and sealed case of the Mac stood in ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Hacker's Guide to OS X

The Hacker's Guide to OS X

Alijohn Ghassemlouei, Robert Bathurst, Russ Rogers
Mac® OS X Security

Mac® OS X Security

Bruce Potter, Preston Norvell, Brian Wotring

Publisher Resources

ISBN: 9781597492546