11.4. Summary

In this chapter, I covered the three main ways in which you might interact with another computer over the Internet and how to do so without any information being intercepted along the way. I first looked at ways to upload and download files securely using any of a variety of protocols. Then I provided an overview of secure screen sharing — using either the tools built into Mac OS X or third-party software. And, finally, I discussed the use of SSH for secure communications between computers, including how to use SSH to protect otherwise insecure types of data transfer.

Get Mac® Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.