Hey everyone, I was just reading a whitepaper on securing OS X, and that got me thinking. How likely is a home user to be attacked? I currently have a webserver in my dorm that is only able to be accessed by people inside of the Temple network.
But regardless, I only allow HTTP requests, SSH shell logins, iTunes sharing, and windows file sharing. I'm slightly concerned about the windows file sharing (because it's windows, and we all know anything with windows in it has to have a hole somewhere) but frankly the permissions only allow public read, and no write cababilities.
Are most of the security threats based on user error? meaning that a program or virus is installed?
I guess the best way to find out if my security is tight is go find some script kiddies and get their scripts that they (didn't) write and attempt to do some cracking against my dorm computer. I'm already looking into some SSH v1 exploits, because my dorm computer I believe allows SSH 1 connections.
Sorry for the stream-of-consciousness of this post. It basically boils down to how likely am I to get attacked, and what is the most that they can do.
Basically, if I lock down my SSH (if not outright disable it) and only allow HTTP, how badly can I be attacked? I mean, I guess the worst is a DNS attack (but basically I can stop that by changing the apache config)?
EDIT: Links for my own reference
http://users.tkk.fi/~kalyytik/hacker/ssh-crc32-exploit_Korpinen_Lyytikainen.html#3.1 First incidents
http://www.macgeekery.com/tips/security/basic_mac_os_x_security
http://www.zone-h.org/en/index
But regardless, I only allow HTTP requests, SSH shell logins, iTunes sharing, and windows file sharing. I'm slightly concerned about the windows file sharing (because it's windows, and we all know anything with windows in it has to have a hole somewhere) but frankly the permissions only allow public read, and no write cababilities.
Are most of the security threats based on user error? meaning that a program or virus is installed?
I guess the best way to find out if my security is tight is go find some script kiddies and get their scripts that they (didn't) write and attempt to do some cracking against my dorm computer. I'm already looking into some SSH v1 exploits, because my dorm computer I believe allows SSH 1 connections.
Sorry for the stream-of-consciousness of this post. It basically boils down to how likely am I to get attacked, and what is the most that they can do.
Basically, if I lock down my SSH (if not outright disable it) and only allow HTTP, how badly can I be attacked? I mean, I guess the worst is a DNS attack (but basically I can stop that by changing the apache config)?
EDIT: Links for my own reference
http://users.tkk.fi/~kalyytik/hacker/ssh-crc32-exploit_Korpinen_Lyytikainen.html#3.1 First incidents
http://www.macgeekery.com/tips/security/basic_mac_os_x_security
http://www.zone-h.org/en/index