OIT Tech 32px


Both Windows and Mac systems have built-in firewalls. For the majority of personal computer users, these firewalls represent a good compromise between easy to use and security.

To Ensure Your Windows Firewall is Active

  1. Go to your Control Panel.
  2. Click on System and Security.
  3. Click on Check Firewall Status.
  4. If it says On, the Firewall is already active

How to Enable Windows Firewall

  1. In the Control Panel, click System and Security.
  2. Choose Windows Firewall.
  3. In the Control Panel Home, choose Turn Windows Firewall on or off.
  4. Make sure they are set to On.
  5. Click Ok.


To Ensure Your Mac Firewall is Active

  1. Click on the Apple and select System Preferences.
  2. Double click on Sharing.
  3. Choose the Firewall tab.
  4. If it says On, the Firewall is already active.

Enabling Mac Firewall

  1. Go to the Apple menu and select System Preferences.
  2. Choose Sharing under Internet and Network.
  3. Choose Firewall.
  4. Click start to enable a new firewall.
  5. Place a check in boxes for any ports you wish to allow traffic from.

Close the window when you are finished.

Need Help?

Submit a work request to OIT

Internet Storm Center Infocon Status

Privacy settings on social networks have limited value. They are confusing to configure and change often. Ultimately, if you do not want your parents or boss reading it, do not post it.

Read More

SANS Institute Security Awareness Tip of the Day Aug 26

Original release date: July 05, 2016

Systems Affected

All Symantec and Norton branded antivirus products


Symantec and Norton branded antivirus products contain multiple vulnerabilities. Some of these products are in widespread use throughout government and industry. Exploitation of these vulnerabilities could allow a remote attacker to take control of an affected system.


The vulnerabilities are listed below:


  • Symantec Antivirus multiple remote memory corruption unpacking RAR [1]


  • Symantec antivirus products use common unpackers to extract malware binaries when scanning a system. A heap overflow vulnerability in the ASPack unpacker could allow an unauthenticated remote attacker to gain root privileges on Linux or OSX platforms. The vulnerability can be triggered remotely using a malicious file (via email or link) with no user interaction. [2]


  • Symantec: PowerPoint misaligned stream-cache remote stack buffer overflow [3]


  • Symantec: Remote Stack Buffer Overflow in dec2lha library [4]


  • Symantec: Symantec Antivirus multiple remote memory corruption unpacking MSPACK Archives [5]


  • Symantec: Heap overflow modifying MIME messages [6]


  • Symantec: Integer Overflow in TNEF decoder [7]

CVE-2016 -3646

  • Symantec: missing bounds checks in dec2zip ALPkOldFormatDecompressor::UnShrink [8]


The large number of products affected (24 products), across multiple platforms (OSX, Windows, and Linux), and the severity of these vulnerabilities (remote code execution at root or SYSTEM privilege) make this a very serious event. A remote, unauthenticated attacker may be able to run arbitrary code at root or SYSTEM privileges by taking advantage of these vulnerabilities. Some of the vulnerabilities require no user interaction and are network-aware, which could result in a wormable-event.


Symantec has provided patches or hotfixes to these vulnerabilities in their SYM16-008 [9] and SYM16-010 [10] security advisories.

US-CERT encourages users and network administrators to patch Symantec or Norton antivirus products immediately. While there has been no evidence of exploitation, the ease of attack, widespread nature of the products, and severity of the exploit may make this vulnerability a popular target.


Revision History

  • July 5, 2016: Initial Release

This product is provided subject to this Notification and this Privacy & Use policy.

Read More

US-CERT Alerts Jul 05