Seeking additional profit and invading new niches for their foul business, cybercriminals have ventured to target the traditionally deemed virus-proof Mac OS X. The malicious instrument being utilized for this campaign is called the FBI Cyber Department MoneyPak virus which hijacks Safari browser and displays false accusations in an attempt to extort a fine from victims. This article provides tips on how to avoid paying the ransom and get rid of this particular malware.
In this final section of his class on Mac Repair basics, Eli outlines a number of essential things, including System Preferences and ways to go about those as well as precautions to keep in mind when changing things that way. Furthermore, you get to learn about nuances of network settings on Macs in detail. And finally, he provides a summary on the topic and shares some of his real life stories on fixing Mac computers.
On covering overall peculiarities, technical specifications and warranty details for Macs, Eli the Computer Guy makes an emphasis in this entry on software updates for this operating system, and lists all the various types of information you can learn by appropriately utilizing Mac Finder, Activity Monitor and Disk Utility.
Having previously provided general information on Mac computers and what is most likely to go wrong with those, Eli now does a step-by-step overview of how to find out specific details about the hardware and software configuration of one’s machine as well as the serial number, dwelling in particular on what the latter can be used for. In addition to technical specifications, you learn how to look up warranty data online.
Various nuances of dealing with Mac computers in terms of troubleshooting and repair are being scrutinized and explained by Eli the Computer Guy in this entry. Here the tech expert provides a comparison of Windows workstations and Macs with regard to complexity of fixing and typical issues that are most likely to occur. Furthermore, Eli gives a walkthrough on some of the essential properties of Mac user interface.
Providing a yet deeper insight into methods for avoiding forensics while using Mac OS X, the Grugq enumerates several more attack vectors, including those associated with zero width Unicode, application file formats, browser cookies and SQLite. In conclusion, the researcher highlights some essential anti-forensics recommendations overall, and answers a few questions from the HIRBSecConf attendees on the topic.