Tag Archives: technique

Learn to Hide Annoying MacOS Update Notifications

It is really annoying if you log into your MacOS Yosemite and Sierra systems and you quickly hit with an Apple notification that says “You have updates”. It seems a pain if you are in the middle of something and you need to get your work done and your computer screen keeps on displaying notifications about updates. It not only disturbs you while interacting with your device, but also wastes time and create nuisance. It is really distracting to get updates that you don’t care about.

This guide will help you in learning the ways to hide some updates which may be annoying you:

pctech24comau

Get rid of a few unwanted MacOS update notifications

Though you cannot hide all update notifications, but a few of them, you can hide for sure. You can hide at least a few of update notifications that Apple doesn’t think are important. To get rid of a few of those updates follow the steps given below:

  • Head to the MacOS App Store
  • Click the “Updates” tab (icon)
  • Right-click in the area next to an update when your updates are shown and then select the option “Hide Update” from the popup menu

About a few of other update notifications

Below given tricks will work only for selected update notifications. It is not known how Apple has decided which updates are necessarily important and which are not. This T may not work out for all the Mac users and all updates. Some of you may find these tricks helpful and some of them may not. This technique doesn’t work on Keynote, Pages, Numbers, Xcode, iPhoto, iMovie, etc.

You may follow these steps to hide their notifications, but it is not necessary that they will work for you:

  • Open the MacOS App Store app
  • Click the Purchased tab (icon)
  • There will be bit open area next to an app, right-click there and choose the option “Hide Purchase”

These steps don’t work on Apple apps, but may work on third-party.

MacOS App Store Preferences

Many of the Mac users want that they get notifications if there is any update available rather than it get installed automatically. It is better to get notification about available updates as there may be updates to update those programs that you are not going to use for a long time and there may be crucial updates like security updates that you need to install immediately.

It would be better if there will be more granular notification of updates, but as of now, you can only put them off for a day at a time.

Is it Possible to stop IP-spoofing in the Internet?

IP-spoofing is a severe enough problem that requires serious attention. Cyber criminals have developed inexpensive IP-spoofing techniques to mount reflector attack which significantly causes and contributes to large volume DDoS attacks against various Internet infrastructure and resources. This document explains the required measures to stop IP-spoofing and the massive Distributed Denial-of-Service (DDoS) attacks that you continue to see on the Internet and why these measures are useful, what network operators, enterprises and others can do to reduce and prevent DDoS attacks and other similar threats. To prevent “spoofing” of IP addresses, there is one mechanism called anti-spoofing technologies” that network operators can implement. This article explains how you can make Internet faster and more secure so some of the tools, technologies, and reasons are covered here for implementing anti-spoofing.

pctech24comau

DDoS attacks are executed by trading on the vulnerabilities like malware and “bots” running on unsuspecting computers. Attackers use malware and “bots” running on a targeted computer to execute a DDoS attack. To perform a DDoS attack, attackers send large number of requests at a target server which make it busy and unresponsive.  All requests typically have “spoofed” and bogus source IP addresses and when the server tries to revert on these requests it gets stuck and wait to open connections to the non-existent requesting servers.  As the attack use spoofed source IP addresses, it gets extremely difficult to track down the sources of the attacks from where they are coming.

In this scenario what seems to be an easy solution is just don’t allow packets to leave your network and travel the rest of the Internet with a spoofed IP source address.  At the very edge of the Internet, a home network or an enterprise can know precisely the range of IP addresses on its network to allow only those addresses as source addresses for outgoing packets. However, it gets very complicated and challenging in larger network but it is still very effective approach. In general, this approach is called Best Current Practice. Some people also call this approach “network ingress filtering” or “source address validation“.

Volumes of DDoS attacks are continuously growing. The real problem is ISPs don’t want to bear exceeded costs and take risks associated. They also don’t see instant benefits from deploying anti-spoofing measures. Your network is not completely secure even if your network hosts anti-spoofing measures like using ingress filtering or taking any other similar action. But you still need to deploy ingress filtering and need for better documentation and practical use cases to make risks, costs, and benefits more clear. It is also about the awareness of ISPs. They need to think if they are part of problem or victim of attack in a recent amplification reflector attack. However, this is definitely not evident and it is very difficult to track back the culprit, but there is way out to address these challenges and make visible improvements in all directions.

It is a difficult task to make a good anti-spoofing business case as it increases a sense of collective responsibility. Though anti-spoofing technique doesn’t necessarily protect a network’s own resources, but it provides benefit for the Internet as a whole. On a network it is implemented, it makes sure that the same network does not work as a launch pad for “spoofed” attacks.

In many cases, applying ingress filtering is easy and simple filters work perfectly well. However, this may not be true in case of more complex setups. There more care should be taken and detailed descriptions of pitfalls and corrective measures instructions could certainly help to overcome doubt and fear of implementing various solutions appropriately. You need t o think as a network user and find out the points where the anti-spoofing measures can be implemented more effectively. Besides that promoting egress filtering, users need to apply and follow security protocols. They should apply anti-spoofing tools and technologies. They need to install programs like AVG Internet security that can filter out malware and infectious contents to leave vulnerabilities on your network and make it safe. For more help you can ask pctech24.com.au experts to get AVG Support.