Hacking into a ibook G4 with Tiger

Is it possible for someone to hack into my ibook and gain access to the Trash Can files? FireWall is on, sharing is off, FTP sharing is off, and no third party remote control software exists on my iBook.

But I have heard that hackers dont need sharing on to hack and get files. Or do they?


John

ibook 12 G4 1.2 ghz (512MB RAM) (UPGRADED 5/25/05 FROM PERFORMA 6360), Mac OS X (10.4.7), Also own Zire 72, Compaq Armada 1700, HP Jornada 720

Posted on Jan 17, 2007 10:10 PM

Reply
18 replies

Jan 18, 2007 1:16 AM in response to John Wolf

Short answer : no it is not possible.
But some pirate could use an hypothetical security flow in MacOS X to gain access to your hard drive.
If every service is disabled (especially remote session — SSH server —) you have less chances to be hacked.
Anyway, if someone has local access to your computer, it is quite easy to reset a password using the Tiger installer disk.

Jan 18, 2007 7:42 AM in response to John Wolf

Hack is kind of a broad term. If you put me alone in a room with your computer, and I guessed your password, that would be hacking it. If I called you up posing as a technician from your ISP and convinced you to give me shell access to your computer, that would be hacking as well. So would be using a buffer overflow exploit in (insert application) to execute malicious code. There are many ways to hack a computer. So ideally, the best way to keep your files safe is to keep the computer locked in a windowless room with no outside connection to the internet.

Now, unless your computer contains highly sensitive information that would be desirable to hackers (like say, thousands of credit card numbers or proof of alien life), the chance that someone would go through the effort to rifle through your trash can is probably close to zero.

The average computer user should probably be more concerned about not sending personal data over unencrpyted connections, not falling for phishing scams, and not having their name pop up on an RIAA lawsuit list.

And if you're really worried about people getting access to your trash can, why not just empty the trash?

Jan 19, 2007 9:57 PM in response to Yann Bizeul

I would have to agree with Yann on this point. I get kernel panics like this regularly on the same build. Personally I liked the little "fatal error" message from days of old.

Further, any credibility of anything on that site got flushed immediately upon seeing the composite sketch that was part of one of the most expensive and failed manhunts in US history. Has kind of that y2k err about it.

If one has real security issues and concerns about hackers in particular they may wish to reconsider what type of information they post to public forums on the www. Posts can be edited by the original author by clicking the edit button next to the reply button in one's own reply/post.

"One man's trash is another man's treasure"

FWIW

Jan 21, 2007 12:29 AM in response to John Wolf

This is hilarious. In Australia we all roll on the floor laughing when we read about CIA plots and hacking into peoples home computers. I mean if you do stuff that arouses suspicion then you would expect some attention from the authorities. I had someone tell me that they used to say words like guns, murder, terrorist, bomb etc etc etc over the phone and reckoned they could hear clicks during the call suggesting that they were being listened to. Yeah right.

My advice is to take a Bex (aspirin for those who've never heard of Bex) and have a lie down.

Jan 21, 2007 2:14 AM in response to John Wolf

Theoretically, any Mac could be cracked/hacked. If you use common sense the odds against it happening are long.

You can protect yourself by using your firewall and/or a hard wired router, downloading only from "trusted" sites, installing all security updates and being careful about what you give administrative power to.

Don't use Limewire or any other P2P service to download your software, get it from reputable sources. In addition, always keep at least your users backed up, preferably a clone of your entire system on a separate disk. And put your sensitive passwords, bank accounts, credit card numbers in a "secure note" in a new keychain or in an encrypted folder.


User uploaded file
-mj
macjack@gmail.com

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Hacking into a ibook G4 with Tiger

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.