Glad to see there are reasonable people not only lurking but occasionaly responding as well.
Here is a helpfull and informative?39?page OSX security checklist
Mac users?should cross the Ts and dot the Is.
I admire Mike's evolving struggle at becoming an insolent and indolent cognitive scientist.
It was particularly entertaining to see a link to a blog ran by another ardent apple fanatic, who took?statements made by the hacker and created a misleading headline (past which Mike clearly didn't bother reading) to cajole traffic to the blog.
In Mike's defense?Apple, weilds persuasive marketing machine. Mike is a victim.