Mac Security Freeware: Password Manager, Screen Locker and MD5 Checksum Checker
by James Hicks - Thursday, 4 October 2007.
In a series of articles on Mac security freeware I will be covering a number of newly released security tools for Mac OS X. This time I am taking a look at KeyMaster 1.0.1 password manager, Utility Lock 1.0.3b screen locking mechanism and MD5 2.6 checksum checker.

KeyMaster 1.0.1

Keymaster is a very simple application that is used for storing passwords. It works by allowing the user to setup a master password which unlocks the password repository.

Keymaster uses Blowfish encryption technology to encrypt all of the password list information. Because all of the data is encrypted, no clues can be gathered from the file. The key is generated each time you enter your passphrase. The passphrase is never stored in any form on the hard drive. Keymaster also uses the SQLite database engine to store and retrieve data. This provides more control and future OS independence.

The software was recently updated to 1.0.1 version which fixed a couple of smaller bugs. Looks like 1.0.2 is on the way, as I came across a iritating bug. When you unlock the software the passwords become visible. Now you can add new user/pass combinations, search the existing ones and afterwards you can once again lock the software by clicking the padlock. The following scenario will crash Keymaster - unlock the software and then click on one of the passwords (don't double click it, just select it). Now, try to lock the software and the software will crash.

Utility Lock 1.0.3b

Utility Lock is a custom built Screen Locking mechanism, it was designed after the Apple lock that is available in Apple Remote Desktop. Its prime purpose is to allow for a greater customization in how the screen is locked.

When the software is started you must setup its password and afterwards its icon gets integrated into status bar. With a click of a button Utility Lock offers customization of different time intervals for locking, as well as possibility of doing further makeup to the actual screen that takes over when the screen gets locked.

MD5 2.6

MD5 (Message-Digest algorithm 5) is a widely used cryptographic hash function with a 128-bit hash value. As an Internet standard, MD5 has been employed in a wide variety of security applications, and is also commonly used to check the integrity of files. An MD5 hash is typically expressed as a 32-character hexadecimal number.


What's the real cost of a security breach?

The majority of business decision makers admit that their organisation will suffer an information security breach and that the cost of recovery could start from around $1 million.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Feb 12th