Skip to Main Content
OS X Exploits and Defense
book

OS X Exploits and Defense

by Chris Hurley, Johnny Long, David Harley, Paul Baccas, Kevin Finisterre, Larry H., Gary Porteus
April 2011
Intermediate to advanced content levelIntermediate to advanced
352 pages
7h 51m
English
Syngress
Content preview from OS X Exploits and Defense

Chapter 2. Past and Current Threats

Before the Flood

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention; however, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and I cannot think of any notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. (See http://www.w3.org/Security/Faq/wwwsf3.html#Q20.)

In the late 1990s, the World Wide Web Consortium (W3C) stated that, “The safest ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Hacker's Guide to OS X

The Hacker's Guide to OS X

Alijohn Ghassemlouei, Robert Bathurst, Russ Rogers
Mac® OS X Security

Mac® OS X Security

Bruce Potter, Preston Norvell, Brian Wotring

Publisher Resources

ISBN: 9781597492546