Cover image for Mac OS X security
Mac OS X security
Potter, Bruce.
Personal Author:
First edition.
Publication Information:
Indianapolis, Ind. : New Riders, [2003]

Physical Description:
xx, 385 pages : illustrations ; 24 cm.
Title Subject:
Format :


Call Number
Material Type
Home Location
Item Holds
QA76.76.O63 P667 2003 Adult Non-Fiction Central Closed Stacks

On Order



This text shows you how to prepare to defend and audit your Mac OS X network as well as avoid common mistakes that increase system vulnerability to attack.

Author Notes

Bruce Potter, Senior Software Security consultant at Cigital, Inc., is the founder of The Shmoo Group, an organization of security and cryptography professionals. He is also the founder and president of Capital Area Wireless Network, a nonprofit community wireless initiative based in Washington, DC. He has spoken at the Black Hat and DefCon conferences.

Preston Norvell is a long-standing member of the Shmoo group and the originator of, a Shmoo Group-sponsored organization specializing in Mac OS security. By day he is a Project and Security Engineer for Mercury Data Group.

Brian Wotring is an independent software engineer and founder of, an online database of file signatures. He is also the author of Osiris, a host integrity management application. An active member of The Shmoo Group, Brian has authored and ported many security related applications to Mac OS X and Mac OS X Server.

Table of Contents

Part I The Basics
1 Security Foundations
2 Installation
Part II System Security
3 OS X Client General Practices
4 What's This UNIX Thing?
5 User Applications
Part III Network Services
6 Internet Services
7 File Sharing
8 Network Protection
Part IV Enterprise Security
9 Enterprise Host Configuration and Integration
10 Enterprise Directory Integration
Part V Auditing and Forensics
11 Auditing
12 Forensics
13 Incident Handling
Appendix A SUID and SGID Files
Appendix B CDSA
Appendix C| Further Reading