	{"id":58,"date":"2007-11-06T11:01:18","date_gmt":"2007-11-06T09:01:18","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/11\/06\/leopards-firewall-not-tip-top\/"},"modified":"2007-11-06T11:01:18","modified_gmt":"2007-11-06T09:01:18","slug":"leopards-firewall-not-tip-top","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/","title":{"rendered":"More on Leopard&#8217;s Firewall"},"content":{"rendered":"<p>In a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-a-bust\/\">previous article<\/a>, I pointed out how Leopard&#8217;s built-in firewall &#8220;failed every test&#8221;. An <a href=\"http:\/\/db.tidbits.com\/article\/9294\">article in TidBITS<\/a> looks more closely at the Leopard firewall, and specifically its application blocking features that, well, don&#8217;t work as expected. <\/p>\n<p><a href=\"https:\/\/www.intego.com\/netbarrier\/\">Intego NetBarrier, the first personal firewall for Mac<\/a>, offers a fully understandable interface, and, yes, application blocking that works with no surprises. While Apple tries to help users by providing security features, such as their new firewall, the lack of clarity around this feature make it something to avoid. NetBarrier is much easier to understand, and, in advanced mode, gives you more control than the Leopard firewall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a previous article, I pointed out how Leopard&#8217;s built-in firewall &#8220;failed every test&#8221;. An article in TidBITS looks more closely at the Leopard firewall, and specifically its application blocking features that, well, don&#8217;t work as expected. Intego NetBarrier, the first personal firewall for Mac, offers a fully understandable interface, and, yes, application blocking that [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In a previous article, I pointed out how Leopard&#039;s built-in firewall &quot;failed every test&quot;. An article in TidBITS looks more closely at the Leopard\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More on Leopard&#039;s Firewall - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In a previous article, I pointed out how Leopard&#039;s built-in firewall &quot;failed every test&quot;. An article in TidBITS looks more closely at the Leopard\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2007-11-06T09:01:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/\",\"name\":\"More on Leopard's Firewall - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2007-11-06T09:01:18+00:00\",\"dateModified\":\"2007-11-06T09:01:18+00:00\",\"description\":\"In a previous article, I pointed out how Leopard's built-in firewall \\\"failed every test\\\". An article in TidBITS looks more closely at the Leopard\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More on Leopard&#8217;s Firewall\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"More on Leopard&#8217;s Firewall\",\"datePublished\":\"2007-11-06T09:01:18+00:00\",\"dateModified\":\"2007-11-06T09:01:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage\"},\"wordCount\":108,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In a previous article, I pointed out how Leopard's built-in firewall \"failed every test\". An article in TidBITS looks more closely at the Leopard","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/","og_locale":"en_US","og_type":"article","og_title":"More on Leopard's Firewall - The Mac Security Blog","og_description":"In a previous article, I pointed out how Leopard's built-in firewall \"failed every test\". An article in TidBITS looks more closely at the Leopard","og_url":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/","og_site_name":"The Mac Security Blog","article_published_time":"2007-11-06T09:01:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/","name":"More on Leopard's Firewall - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2007-11-06T09:01:18+00:00","dateModified":"2007-11-06T09:01:18+00:00","description":"In a previous article, I pointed out how Leopard's built-in firewall \"failed every test\". An article in TidBITS looks more closely at the Leopard","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"More on Leopard&#8217;s Firewall"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"More on Leopard&#8217;s Firewall","datePublished":"2007-11-06T09:01:18+00:00","dateModified":"2007-11-06T09:01:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/leopards-firewall-not-tip-top\/#webpage"},"wordCount":108,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-W","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}