Also, once done, make sure the padlock icon at the bottom of the page is locked. ![]() when you try to access your web portal(SSL-VPN) the login page will not show. TIP: I’ve found that it's often required to click the box twice in order to deactivate the “Allow user to administer this computer” checkbox. Cisco Adaptive Security Appliance (ASA) 5500 series software version 8.0. When you are done making changes, the accountability partner will need to login and restore the users Standard mode by reversing the above steps. Then select primary the user account and check “Allow user to administer this computer”. To do this, click on the padlock icon at the bottom of the Users & Groups widow (in System Preferences), and enter the accountability partners name and password in order to unlock this section. Option B is to temporarily adjust the primary user's account level from Standard to Administrator. I tried forcefully uninstalling the application with a tool called Portable Uninstall Tool which can be found on another blog called FC Portables. Can you come over and stay for about 30 mins to help with this?" The K9 web filter was installed on an old system and the user had forgotten the password which led them to not being able to use it for browsing the Internet. "I need to update my Adobe Flash Player, install Microsoft Office, and make multiple adjustments to my K9. TIP: If you only have time-limited access to your accountability partner, it may be helpful to create a To-Do list in order to make sure you get it all done at once. Option A is to have the administrator enter their password whenever required. This eliminates the need to separately install K9 on the VM. Additionally, if you are using a VM, make sure the network configuration is set to “Shared” with the host OS. Make sure the padlock is closed when you are done. For example, using Parallels Desktop go to Preferences -> Security and select "Require a Password" to all options listed. This is a somewhat detailed process, so I have created a separate blog post for it.įifth (optional): If you are using a VM software (if you don’t know what this means then you probably don't have to worry about it), then you need to make changes there too. Goto System Preferences -> iCloud and then scroll towards the bottom of the list and make sure "Find My Mac" is NOT selected.įourth, Install and configure K9 Web Protection. Note that the above steps are basically the same for the latest versions of OS X (Mavericks, Yosemite, El Capitan), however the options are slightly different for Mountain Lion. Click here for detailed steps regarding configuring user accounts. Also make sure the guest user is disabled. There needs to be a minimum of two user accounts a STANDARD account for the primary user, and an ADMIN account for the accountability partner. Second, create properly leveled user accounts. Click here for detailed steps on how to do this. There are four key components to securing your Mac in regards to limiting access to web content:įirst, set a firmware password. Instead, I have developed the following solution for creating a secure, yet fully-functional, operating environment. Click on that and click 'Disabled' then 'Save'. At the bottom, you should see something that says 'Type' and next to it an option that says 'Automatic'. ![]() Right click that folder and go to 'Properties'. You should then see a folder labled 'bckd'. I do not use the Parental Controls features built-in to Mac OS X, as I have found them to be insufficient and unfortunately problematic. Go to view and click 'Show hidden devices'. The below is the first of a three part series on how to configure this combination. My experiences have yielded the Mac + iOS device (iPhone, iPad, iPod) combination as the optimum, if not only, solution. For example, machines running Microsoft Windows can be secured, however the Windows phone OS cannot be secured. The newer variable of smartphones made things even more complicated, as the solution had to be expanded to include coverage for both. It just disables it.As a long-time power user with a former professional career in IT (roles ranging from support to engineering to management), I have spent years testing and developing solutions to create an optimal environment to secure against unbridled access to the internet. Keep in mind this does not remove K9 from your system. I figured others might be in the same situation so I will share how I did it. So I remoted into his system and hacked the system to stop K9. Attempts to modify K9 at the system level will have the same effect. ![]() But he forgot that K9 limits what websites he can visit, and even worse he forgot his password for K9. By design, K9 will block all web access should anyone attempt to uninstall without using a password. One of my clients recently called me, and asked me how do I get rid of this K9 internet protection? Turns out his laptop was busted, so he took his kids laptop with him.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |