contents | software | |||||||
| Spyware Protection Software for Mac OS X MacScan 2.0 now protects users running Mac OS X from spyware, keystroke loggers and trojan horses. SecureMac, a software company creating security solutions for Apple Macintosh computers, just released MacScan 2.0. The second generation software is designed to shield computers running Mac OS X in regular and classic environments from spyware. SecureMac released the original version in 2002 for Mac OS 9, and it was the first software of its kind available for Macs. Mac users can become complacent in the face of a steady stream of computer security alerts aimed at Windows users, but this is a false sense of security. Cyberspace is full of threats to Apple computers, despite the fact that these threats generally don't make front page news. MacScan identifies and isolates potential threats, such as keystroke logging programs that hackers use to record passwords and bank account information, or malicious programs that are capable of taking over entire computer systems. MacScan will find, isolate, and remove spyware, keystroke loggers, and trojan horses as well as detect whether remote administration applications have been installed on a computer. By scanning files received as e-mail attachments or downloaded from the web, MacScan can proactively protect computers from inadvertently accepting new spyware. MacScan's spyware definitions are constantly being updated, letting users keep pace with the hackers. The software is especially important in multi-user environment, such as a school or a workplace. Where multiple users have access to the same computer, a single spyware program can put all of them at risk. MacScan also allows users to thoroughly clean web browsers of all personal information, ensuring that it is protected from both other users as well as hackers. Users are able to choose between a full system scan, a scan of their Home folder, or a scan of a selected folder or device. This way, users can scan a CD, DVD or external hard drive before using them to ensure no spyware is present. write your comments about the article :: © 2005 Computing News :: home page |