{"id":62,"date":"2008-09-09T11:16:52","date_gmt":"2008-09-09T18:16:52","guid":{"rendered":"http:\/\/blog.intego.com\/2007\/11\/14\/stop-applications-from-phoning-home-with-netbarrier\/"},"modified":"2012-11-14T17:41:14","modified_gmt":"2012-11-15T00:41:14","slug":"stop-applications-from-phoning-home-with-netbarrier","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/","title":{"rendered":"Stop Applications from Phoning Home with NetBarrier"},"content":{"rendered":"<p>While you use the Internet with lots of programs &#8211; your web browser, e-mail program and chat client &#8211; you may have other programs that access the Internet for various reasons. The most common is to check for updates; you&#8217;ll have lots of programs that do this automatically every day, or every week. You can usually choose whether these programs check for updates, and at what frequency.<\/p>\n<p>But other programs may also phone home, for a variety of reasons. They may send their developers data about who&#8217;s using their software. Or, if you happen to have installed any malicious software that may want to send more information to a remote server, this could happen as well. And there&#8217;s no way to know when programs are doing this; at least not through Mac OS X.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/netbarrier\/\">Intego NetBarrier<\/a>, however, has an Anti-Spyware feature that allows you to block network access for applications you have added to a list, or to get alerts whenever an application tries to access the Internet. You can set NetBarrier to alert you whenever a program tries to phone home, and you can then choose to allow it or to block it. Once you allow or block an application, it gets added to a list so you can see all the programs that access the Internet. You also see the port numbers they attempt to access; you can block specific ports and allow others, if you wish.<br \/>\n<center><br \/>\n<img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg\"><br \/>\n<\/center><br \/>\nAn option allows you to trust system processes, so you&#8217;re not alerted by such background applications as Software Update, .Mac syncing, and other OS X features.<\/p>\n<p>With this feature, you can be sure that the only applications that use the Internet are the ones you allow. And NetBarrier can alert you whenever any other programs try to phone home.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While you use the Internet with lots of programs &#8211; your web browser, e-mail program and chat client &#8211; you may have other programs that access the Internet for various reasons. The most common is to check for updates; you&#8217;ll have lots of programs that do this automatically every day, or every week. You can [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stop Applications from Phoning Home with NetBarrier - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-09-09T18:16:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-15T00:41:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/\",\"name\":\"Stop Applications from Phoning Home with NetBarrier - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage\"},\"datePublished\":\"2008-09-09T18:16:52+00:00\",\"dateModified\":\"2012-11-15T00:41:14+00:00\",\"description\":\"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stop Applications from Phoning Home with NetBarrier\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Stop Applications from Phoning Home with NetBarrier\",\"datePublished\":\"2008-09-09T18:16:52+00:00\",\"dateModified\":\"2012-11-15T00:41:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage\"},\"wordCount\":305,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg\",\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/","og_locale":"en_US","og_type":"article","og_title":"Stop Applications from Phoning Home with NetBarrier - The Mac Security Blog","og_description":"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet","og_url":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-09-09T18:16:52+00:00","article_modified_time":"2012-11-15T00:41:14+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/","name":"Stop Applications from Phoning Home with NetBarrier - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage"},"datePublished":"2008-09-09T18:16:52+00:00","dateModified":"2012-11-15T00:41:14+00:00","description":"While you use the Internet with lots of programs - your web browser, e-mail program and chat client - you may have other programs that access the Internet","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Stop Applications from Phoning Home with NetBarrier"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Stop Applications from Phoning Home with NetBarrier","datePublished":"2008-09-09T18:16:52+00:00","dateModified":"2012-11-15T00:41:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#webpage"},"wordCount":305,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/stop-applications-from-phoning-home-with-netbarrier\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/appblock.jpg","articleSection":["Intego"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-10","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=62"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62\/revisions"}],"predecessor-version":[{"id":7270,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/62\/revisions\/7270"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=62"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=62"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=62"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}