Review

Computer firewalls: security and privacy protection for Mac—review

  • Received: 07 September 2020 Accepted: 08 January 2021 Published: 08 February 2021
  • Internet has become the ultimate information resource. It allows both to reach information from the outside, as well as to share inside data. Yet, such power also involves potential weaknesses, in relation to security and privacy protection. Indeed, threats may come from malicious web sites, trying to steal user's data or install unwanted applications. Malware may include adware, Potentially Unwanted Applications (PUA) or Potentially Unwanted Programs (PUP), and even ransomware. Another menace may even come from otherwise bona fide applications installed by the user. Thus, such applications may send private data to external servers, without the user's consent and knowledge. Therefore, a proper firewall is required to protect the privacy of users. Indeed, they are built inside the operating systems, as basic security tools. Third party companies offer more comprehensive firewalls, including free and nonfree ones. This review analyzes the firewalls available for Mac (macOS) computers. As a practical example, applications in scientific research, in general, as well as bioinformatics, in particular, are described. Last but not least, Internet security and privacy protection is a work in progress, and as such, users should know about this critical fact, and take proper action, installing and updating appropriate firewalls.

    Citation: Gabriel Dorado, Sergio Gálvez, María del Pilar Dorado. Computer firewalls: security and privacy protection for Mac—review[J]. Big Data and Information Analytics, 2021, 6: 1-11. doi: 10.3934/bdia.2021001

    Related Papers:

  • Internet has become the ultimate information resource. It allows both to reach information from the outside, as well as to share inside data. Yet, such power also involves potential weaknesses, in relation to security and privacy protection. Indeed, threats may come from malicious web sites, trying to steal user's data or install unwanted applications. Malware may include adware, Potentially Unwanted Applications (PUA) or Potentially Unwanted Programs (PUP), and even ransomware. Another menace may even come from otherwise bona fide applications installed by the user. Thus, such applications may send private data to external servers, without the user's consent and knowledge. Therefore, a proper firewall is required to protect the privacy of users. Indeed, they are built inside the operating systems, as basic security tools. Third party companies offer more comprehensive firewalls, including free and nonfree ones. This review analyzes the firewalls available for Mac (macOS) computers. As a practical example, applications in scientific research, in general, as well as bioinformatics, in particular, are described. Last but not least, Internet security and privacy protection is a work in progress, and as such, users should know about this critical fact, and take proper action, installing and updating appropriate firewalls.



    加载中


    [1] Bazzell M and Carroll J, (2016) The Complete Privacy & Security Desk Reference: Digital. Scotts Valley, CA, USA: CreateSpace-Amazon.
    [2] Bazzell M and Carroll J, (2018) The Complete Privacy & Security Desk Reference: Physical. Scotts Valley, CA, USA: CreateSpace - Amazon.
    [3] Diaz D, Esteban FJ, Hernandez P, et al. (2011) Parallelizing and optimizing a bioinformatics pairwise sequence alignment algorithm for many-core architecture. Parallel Comput 37: 244–259. doi: 10.1016/j.parco.2011.03.003
    [4] Diaz D, Esteban FJ, Hernandez P, et al. (2014) MC64-ClustalWP2: a highly-parallel hybrid strategy to align multiple sequences in many-core architectures. Plos One 9: e94044. doi: 10.1371/journal.pone.0094044
    [5] Esteban FJ, Diaz D, Hernandez P, et al. (2013) Direct approaches to exploit many-core architecture in bioinformatics. Future Gener Comput Syst- Int J Esci 29: 15–26. doi: 10.1016/j.future.2012.03.018
    [6] Esteban FJ, Diaz D, Hernandez P, et al. (2018) MC64-cluster: many-core CPU cluster architecture and performance analysis in B-tree searches. Comput J 61: 912–925. doi: 10.1093/comjnl/bxx114
    [7] Gálvez S, Agostini F, Caselli J, et al. (2021) BLVector: Fast BLAST-like algorithm for manycore CPU with vectorization. Front Genet (Sect Comput Genomics) 12: 618659. doi: 10.3389/fgene.2021.618659
    [8] Galvez S, Diaz D, Hernandez P, et al. (2010) Next-generation bioinformatics: using many-core processor architecture to develop a web service for sequence alignment. Bioinformatics 26: 683–686. doi: 10.1093/bioinformatics/btq017
    [9] Galvez S, Ferusic A, Esteban FJ, et al. (2016) Speeding-up bioinformatics algorithms with heterogeneous architectures: Highly heterogeneous smith-waterman (HHeterSW). J Comput Biol 23: 801–809. doi: 10.1089/cmb.2015.0237
    [10] Redel-Macias MD, Pinzi S, Martinez-Jimenez MP, et al. (2016) Virtual laboratory on biomass for energy generation. J Cleaner Prod 112: 3842–3851. doi: 10.1016/j.jclepro.2015.07.075
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4210) PDF downloads(158) Cited by(0)

Article outline

Figures and Tables

Figures(9)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog