Hello All!
I am posting this because I have not seen an answer to this question yet.
I am a recent purchaser of Little Snitch. I am not and have never been well versed in hacking and computer programming and things of that nature so please be patient with me.
I am trying to use Little Snitch to keep anyone from being able to access my personal information through iCloud hacking or mounting (?) as I've had some problems in the past with this and I just want to secure my computer and be sure that it cannot happen again.
I tried to disable all the mounting features and then I "think" (because it is still difficult for me to decode computer phrases) I read that mDNSresponder can still allow programs to access your information through Bonjour? So I tried to disable this in Little Snitch and the software went crazy, new rules were being created by the second. Is there another way to navigate this.
I will attach some screen shots of what my program looks like now and if any one familiar with advanced *hacking* could tell me where possibility insecurities are and how I can guard them. Also If there are other ways a system could be compromised remotely I would love to know how to prevent it. I don't download torrent files and I own a Macbook Air running OSX 10.8.5
Thanks in advance.
I am posting this because I have not seen an answer to this question yet.
I am a recent purchaser of Little Snitch. I am not and have never been well versed in hacking and computer programming and things of that nature so please be patient with me.
I am trying to use Little Snitch to keep anyone from being able to access my personal information through iCloud hacking or mounting (?) as I've had some problems in the past with this and I just want to secure my computer and be sure that it cannot happen again.
I tried to disable all the mounting features and then I "think" (because it is still difficult for me to decode computer phrases) I read that mDNSresponder can still allow programs to access your information through Bonjour? So I tried to disable this in Little Snitch and the software went crazy, new rules were being created by the second. Is there another way to navigate this.
I will attach some screen shots of what my program looks like now and if any one familiar with advanced *hacking* could tell me where possibility insecurities are and how I can guard them. Also If there are other ways a system could be compromised remotely I would love to know how to prevent it. I don't download torrent files and I own a Macbook Air running OSX 10.8.5
Thanks in advance.