Internet has become the ultimate information resource. It allows both to reach information from the outside, as well as to share inside data. Yet, such power also involves potential weaknesses, in relation to security and privacy protection. Indeed, threats may come from malicious web sites, trying to steal user's data or install unwanted applications. Malware may include adware, Potentially Unwanted Applications (PUA) or Potentially Unwanted Programs (PUP), and even ransomware. Another menace may even come from otherwise bona fide applications installed by the user. Thus, such applications may send private data to external servers, without the user's consent and knowledge. Therefore, a proper firewall is required to protect the privacy of users. Indeed, they are built inside the operating systems, as basic security tools. Third party companies offer more comprehensive firewalls, including free and nonfree ones. This review analyzes the firewalls available for Mac (macOS) computers. As a practical example, applications in scientific research, in general, as well as bioinformatics, in particular, are described. Last but not least, Internet security and privacy protection is a work in progress, and as such, users should know about this critical fact, and take proper action, installing and updating appropriate firewalls.
Citation: Gabriel Dorado, Sergio Gálvez, María del Pilar Dorado. Computer firewalls: security and privacy protection for Mac—review[J]. Big Data and Information Analytics, 2021, 6: 1-11. doi: 10.3934/bdia.2021001
Internet has become the ultimate information resource. It allows both to reach information from the outside, as well as to share inside data. Yet, such power also involves potential weaknesses, in relation to security and privacy protection. Indeed, threats may come from malicious web sites, trying to steal user's data or install unwanted applications. Malware may include adware, Potentially Unwanted Applications (PUA) or Potentially Unwanted Programs (PUP), and even ransomware. Another menace may even come from otherwise bona fide applications installed by the user. Thus, such applications may send private data to external servers, without the user's consent and knowledge. Therefore, a proper firewall is required to protect the privacy of users. Indeed, they are built inside the operating systems, as basic security tools. Third party companies offer more comprehensive firewalls, including free and nonfree ones. This review analyzes the firewalls available for Mac (macOS) computers. As a practical example, applications in scientific research, in general, as well as bioinformatics, in particular, are described. Last but not least, Internet security and privacy protection is a work in progress, and as such, users should know about this critical fact, and take proper action, installing and updating appropriate firewalls.
[1] | Bazzell M and Carroll J, (2016) The Complete Privacy & Security Desk Reference: Digital. Scotts Valley, CA, USA: CreateSpace-Amazon. |
[2] | Bazzell M and Carroll J, (2018) The Complete Privacy & Security Desk Reference: Physical. Scotts Valley, CA, USA: CreateSpace - Amazon. |
[3] | Diaz D, Esteban FJ, Hernandez P, et al. (2011) Parallelizing and optimizing a bioinformatics pairwise sequence alignment algorithm for many-core architecture. Parallel Comput 37: 244–259. doi: 10.1016/j.parco.2011.03.003 |
[4] | Diaz D, Esteban FJ, Hernandez P, et al. (2014) MC64-ClustalWP2: a highly-parallel hybrid strategy to align multiple sequences in many-core architectures. Plos One 9: e94044. doi: 10.1371/journal.pone.0094044 |
[5] | Esteban FJ, Diaz D, Hernandez P, et al. (2013) Direct approaches to exploit many-core architecture in bioinformatics. Future Gener Comput Syst- Int J Esci 29: 15–26. doi: 10.1016/j.future.2012.03.018 |
[6] | Esteban FJ, Diaz D, Hernandez P, et al. (2018) MC64-cluster: many-core CPU cluster architecture and performance analysis in B-tree searches. Comput J 61: 912–925. doi: 10.1093/comjnl/bxx114 |
[7] | Gálvez S, Agostini F, Caselli J, et al. (2021) BLVector: Fast BLAST-like algorithm for manycore CPU with vectorization. Front Genet (Sect Comput Genomics) 12: 618659. doi: 10.3389/fgene.2021.618659 |
[8] | Galvez S, Diaz D, Hernandez P, et al. (2010) Next-generation bioinformatics: using many-core processor architecture to develop a web service for sequence alignment. Bioinformatics 26: 683–686. doi: 10.1093/bioinformatics/btq017 |
[9] | Galvez S, Ferusic A, Esteban FJ, et al. (2016) Speeding-up bioinformatics algorithms with heterogeneous architectures: Highly heterogeneous smith-waterman (HHeterSW). J Comput Biol 23: 801–809. doi: 10.1089/cmb.2015.0237 |
[10] | Redel-Macias MD, Pinzi S, Martinez-Jimenez MP, et al. (2016) Virtual laboratory on biomass for energy generation. J Cleaner Prod 112: 3842–3851. doi: 10.1016/j.jclepro.2015.07.075 |