Ask a Mac Question, Get an Answer ASAP!
But how do i tell if I am currently being compromised
There are two programs you can use that monitor but if you want to be really sure you will need a firewall. click go then applications click on the utilities folder select activity monitor and network monitor that will tell you whats currently running/ using the net. Your mac comes with a firewall below are steps to mac sure that it is on and how to limit application access. Click the apple icon Choose System Preferences from the Apple menu. Click Security. Click the Firewall tab. Unlock the pane by clicking the lock in the lower-left corner and enter the administrator username and password. Click Start to enable the firewall. Click Advanced to customize the firewall configuration. Application Firewall's three advanced settings 1. Block all incoming connections: Mac OS X v10.6 will block all connections except a limited list of services essential to the operation of your computer. The system services that are still allowed to receive incoming connections are: configd, which implements DHCP and other network configuration services mDNSResponder, which implements Bonjour racoon, which implements IPSec This mode will prevent all sharing services, such as File Sharing and Screen Sharing found in the Sharing System Preferences pane, from receiving incoming connections. To use these services, disable this option. 2. Automatically allow signed software to receive incoming connections Applications that are already signed by a valid certificate authority will automatically be added to the list of allowed applications rather than prompting the user to authorize them. For example, since iTunes is already signed by Apple, it will automatically be allowed to receive incoming connections through the firewall. 3. Enable stealth mode With stealth mode enabled, the computer will not respond to requests that probe the computer to see if it is there. The computer will still answer requests coming in for authorized applications, but other unexpected requests, such as ICMP (ping), will not get a response. Digitally-signed applications All applications not in the list that have been digitally signed by a Certificate Authority trusted by the system (for the purpose of code signing) are allowed to receive incoming connections. Every Apple application in Mac OS X v10.6 has been signed by Apple and is allowed to receive incoming connections. If you wish to deny a digitally signed application, you should first add it to the list and then explicitly deny it. If you run an unsigned application not in the Application Firewall list, you will be presented with a dialog with options to Allow or Deny connections for the application. If you choose Allow, Mac OS X v10.6 will sign the application and automatically add it to the Application Firewall list. If you choose Deny, Mac OS X v10.6 will sign the application, automatically add it to the Application Firewall list and deny the connection. Some applications check their own integrity when they are run without using code signing. If the Application Firewall recognizes such an application it will not sign it, but then it will re-present the dialog every time the application is run. This may be avoided by upgrading to a version of the application which is signed by its developer.
is there any other softwares which I can use to monitor hacking?
Are these two applications suffice to stop attacks and spot them ?
Also, is AVAST the best antivirus software for mac?
Is it very unlikely for one to be hacked?
Is it easy to hack a personal computer though?
Would IP Scanner Home be a useful tool?
You are very good in mac.
What are other good applications for mac/for security please?