2.8. Validating the Authenticity of Applications and Services

We've spent much of this chapter describing how to categorize processes, how to identify information about a process, and how to interact with the processes. Finally, it's important to look at which processes should and should not be running on your systems. Every process should be reviewed for merit, either by running a quick search through sites you trust on the Internet or consulting trusted publications for validation. If a process is found not worthy it should be removed. Those processes that are worthy should also be authentic.

What do we mean by authentic? Virtually any application or service can be plucked from an operating system, altered, then put back into the OS, and run. ...

Get Enterprise Mac Security: Mac OS X Snow Leopard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.