- Kernel Weakness
- Firewall and Bon Jour Problems
- Wireless Weaknesses
- Threat-Prevention Techniques Not Used in Mac OS X
- Other Vulnerabilities
- More Secure at Install
- Root Is Disabled
- Apple and Open Source Response
- Optional Security
- Is It a Myth?
- Further Resources
Threat-Prevention Techniques Not Used in Mac OS X
There are some threat-prevention techniques that have not, as of yet, been used in developing Mac OS X. One of them is the use of stack canaries, which can prevent buffer overflow threats and has been used in Windows since Windows XP Service Pack 2. Another is secure heap implementation, which has been used in Windows Vista. Address space layout randomization, currently used only in limited capacity in Windows XP, would significantly strengthen security because it would prevent malicious code writers from being able to assume where specific data is stored in memory. Although these techniques would not resolve any vulnerabilities, they would make it more difficult to exploit them.