Last week, in my entry, I offered instructions for removing Norton AntiVirus from a Mac. That entry appeared in this week’s and prompted a slew of messages along these lines: When I purchased my Mac I was told getting a virus on a Mac is unlikely and that I did not need protection. What do you recommend? Calm and care. By calm I mean that the Windows world is so rife with viruses, adware, spyware, and other varieties of malware, it’s a commonly held belief that all computers are susceptible to these kinds of cooties and one would be a fool to operate a computer without some kind of prophylactic utility. This belief is manifest in Windows users who move to the Mac and immediately purchase antivirus software in the belief that it’s a necessary part of owning a computer. And, on the Mac, it’s just not.

Do You Need Antivirus For Mac Os

A Rootkit is a tool used by different types of malware and will modify the operating system so that malicious activities do not show in your system processes list and keep its files from being read. And to avoid detection by the operating system or from a virus protection software. Last week, in my Norton AntiVirus Begone! Home business software for mac free online. Entry, I offered instructions for removing Norton AntiVirus from a Mac. That entry appeared in this week’s Macworld Weekly Newsletter and prompted a.

The hedge for those of us in the recommendation business is that while there may not be viable virus threats now, there could be one day. In order for us to cover our respective patoots, we must follow up our “Nah, you don’t really need antivirus software” suggestion with “—at the moment, but someday you might” and then we weasel and waffle in anticipation of the day when The Bad Thing Appears and the villagers appear at our gates with blazing torches and the more rustic form of pitchfork. And by care I mean that it’s worth your while to learn the difference between the various cooties that some people too-broadly define as viruses. As in: Virus This is a program that earns its name by its ability to replicate itself, locally and often across a network.

Many viruses attach themselves to other programs. When those programs are launched, the virus code is launched as well and the virus goes about its nefarious business. Viruses are commonly found in the Windows world. Not in the Mac world.

Viruses are where we most often employ the “not now, but maybe someday” antivirus weasel. Trojan A Trojan (shortened from Trojan Horse) is a kind of malware that promises one thing but delivers another.

For example, you’ve downloaded an application that promises to make you rich, cure male-pattern baldness, and double the size of your ring finger. Excel for mac power pc 2006. When you run this miracle worker the contents of your computer are, instead, beamed to an underground data center in Kamchatka. The greatest risk in this scenario is the person operating the computer.

If you obtain software from reliable sites such as and and resist the urge to open a file you receive in an anonymous email message, you’re unlikely to get one of these Trojans. If you’d like an extra measure of security should something rude find its way onto your Mac, consider purchasing a copy of Objective Development’s $30. This handy utility will alert you when an application attempts to send information out from your Mac.

You’re welcome to approve applications that are doing the right thing and apply the hairy eyeball to applications that appear to be up to no good. And if you’re also concerned about incoming traffic, enable your Mac’s firewall (found in Leopard’s Security system preference). Adware and spyware Adware is software that has an embedded advertising component—one that displays or downloads ads when you run the software. Some adware is legitimate—part of the price of using a “free” application such as or, for example. Spyware is malware that grabs data from your computer and often uses it for the purposes of evil—sending personal information to a baddie or, when using your web browser, redirecting you to sites you don’t want to visit. In order for the worst forms of this kind of malware to work, the operating system must allow unrestricted access to its more sensitive parts.