Little Snitch 3.6 4

Free to Try
macOS
39.5 MB

Choose to allow or deny connections, or define a rule how to handle similar, future connection attempts. Little Snitch runs inconspicuously in the background and it can even detect network-related activity of viruses, trojans, and other malware. Little Snitch 3.6: Little Snitch 3.6 is ready for OS X El Capitan. Version 3.6.4: Added IKEv2 VPN support to Automatic Profile Switching detection. Fixed: A critical bug enabling potential attackers to circumvent the Little Snitch network filter (thanks to @osxreverser for the report). Fixed: Under rare circumstances Fast User Switching causes all connection without rules to be denied without showing an alert. Mar 31, 2020  Despite fewer malware threats to Mac systems, there is still a need for data protection. With Little Snitch for Mac, users can prevent personal information from.

18,635

You start an application that tells you that a new version is available. You suddenly realize that with every start this application connects to the developer's server. Even statistics information about your computer may be sent this way. Little Snitch helps you avoid this situation.

Trojan horses - i.e. programs transmitting unconsciously data stored on your computer - can be detected by Little Snitch and prevented on the transmission of data.

Features:

  • Prevents applications from 'phoning home'.
  • Protects you from trojans, worms, and other network parasites.
  • Shows which applications send information over the internet.
  • Provides a higher level of security for the paranoid.

What's New:

  • Little Snitch 3.6 is ready for OS X El Capitan.
  • Added support for watchOS and tvOS simulator apps.
  • Other improvements and bugfixes.

Popular apps in System Information

Little Snitch 3.6.4

Little

Little Snitch 3.6 4 Motion

Little Snitch 3.6 4
  • Latest Version:

  • Requirements:

    Mac OS X

  • Author / Product:

    Objective Development Software GmbH / Little Snitch for Mac

  • Old Versions:

  • Filename:

    LittleSnitch-3.6.4.dmg

  • MD5 Checksum:

    7f8121e5125d969076bec92e15e8d7c7

Snitch
A firewall protects your computer against unwanted guests from the Internet. But who protects your private data from being sent out? Little Snitch does!
Little Snitch informs you whenever a program attempts to establish an outgoing Internet connection. You can then choose to allow or deny this connection, or define a rule how to handle similar, future connection attempts. This reliably prevents private data from being sent out without your knowledge. Little Snitch for Mac runs inconspicuously in the background and it can also detect network related activity of viruses, trojans and other malware.
Features and Highlights
Silent Mode – Decide Later
There are times where you don’t want to get interrupted by any network related notifications. With Silent Mode you can quickly choose to silence all connection warnings for a while. You can then later review the Silent Mode Log to define permanent rules for connection attempts that occurred during that time.
Research Assistant
Have you ever wondered why a process you’ve never heard of before suddenly wants to connect to some server on the Internet? The Research Assistant helps you to find the answer. It only takes one click on the research button to anonymously request additional information for the current connection from the Research Assistant Database.
Automatic Profile Switching
Rules can be arranged in different profiles like “Home”, “Office” or “Mobile Internet”. This allows you to use different sets of filter rules depending on the network you are currently connected to. Profiles can be activated either manually from the status menu, or automatically, whenever you join a network that’s associated with one of your profiles.
Firewall for incoming connections
Little Snitch for macOS not only reveals any outgoing network connection attempt to make sure that sensitive data doesn’t leave your computer without your consent. The inbound firewall in LittleSnitch provides you with the same level of control for incoming connections.
Note: Requires 64-bit processor. The demo runs for three hours, and it can be restarted as often as you like. The Network Monitor expires after 30 days.