Your Mac is a Net whisperer; a sleep talker; a teller of tales; a spreader of information. It's always sending messages to unseen servers while you go about your daily work. How do you keep tabs on and take control of what your Mac is talking to? Objective Development's $45 Little Snitch is the ticket to truly understanding and managing who your Mac makes contact with.
Little Snitch is not available for Windows but there are plenty of alternatives that runs on Windows with similar functionality. The most popular Windows alternative is GlassWire, which is free.If that doesn't suit you, our users have ranked 25 alternatives to Little Snitch and 13 are available for Windows so hopefully you can find a suitable replacement. I would like some assistance on how to understand why this has happened and what to do with my version 32 - do I reset it or trash it and download it again? I use these older versions for testing webpages. I have attached the screenshot - to make clear this is the FIRST dialogue that appears when Firefox 32 starts with Little Snitch enabled.
Little Snitch
Price: $45+ for a new copy; $25+ for an upgrade
Bottom line: Little Snitch is not only a great firewall application, it's educational and fun to use.
The Good
- Does more than the built-in firewall
- Has three different modes for more specific controls
- The Map lets you see where all the traffic is coming to and going from.
- Customizable features
The Bad
- Buying more than one license can get pricey.
Mind this chatter
Little Snitch is a firewall application and, as you may know, your Mac has a built-in firewall that you can turn on and use to quietly block unauthorized incoming network connections. So why buy a separate app if you already have something built-in? The answer is simple: Little Snitch does more than just block or allow incoming network connections. It gives you detailed information on all your network communication, whether it's from the outside world coming into your Mac or it's being sent from your Mac to anywhere on the internet.
Chatter from your Mac isn't all bad. In fact, most of it is good and necessary. Your Mac regularly checks the App Store to make sure your apps and OS are up to date. You stream music and movies from iTunes, Netflix, Hulu, and Pandora. You send and receive email, messages, and files all as a part of your normal work and play.
However, every web page you connect to also talks to ad servers and every app you open may also send information about you, your Mac, and about the app itself back to the company that created it. Little Snitch logs all this information and lets you look at it, see what the communication is about, and choose when or whether you want to allow your Mac to make that communication in the future.
Simple is as simple does
Little Snitch offers three modes of operation:
- Alert Mode
- Silent Mode—Allow Connections
- Silent Mode—Deny Connections
By default, Little Snitch uses Silent Mode—Allow Connections, which behaves just like Apple's built-in firewall does, which is to say that it assumes any application on your Mac that is properly signed is allowed to send and receive data at will. It also tracks every connection, while allowing all network traffic to freely enter and exit your Mac, so you can look at those connections and decide whether or not you want to make that connection in the future. This mode is the best choice for most users.
Alert Mode asks you to make a choice each time an application attempts to make a connection to the Internet. Once you make a choice, Little Snitch remembers your choices and allows or denies that connection in the future. Initially, if you're just starting to use Little Snitch, this can feel more like Annoying Mode, as you'll need to approve or deny every network connection attempt.
Silent Mode—Deny Connections is designed for situations where you want to create specific rules about which connections you will allow. Any connections you have not created an explicit rule for will be denied without asking for your approval.
The all seeing eye
The fun begins once Little Snitch is installed. A small menu item appears on the top of your screen and displays a small gauge setting so you know when you're sending and receiving network traffic. Click that menu and you'll see options to change modes and items for Little Snitch's Network Monitor, Rules, and Preferences.
Open the Network Monitor and a new window will open displaying a map of the world centered on your current location with arcs of network traffic traveling from your Mac to various locations throughout the world. A sidebar displays a list of applications sending and receiving traffic. Selecting one of those apps highlights where your traffic is going on the map. Another sidebar on the right displays a Connection Inspector which you use to view general and detailed information about data being sent with specific information about the application selected and why it might be sending or receiving information.
While viewing the Map or using Little Snitch's rules window you can select different apps and processes and use a small switch to allow or deny network traffic by flipping a small Rule Management switch.
Lockdown by location
Little Snitch has a multitude of customizable features, but one of my favorites is Automatic Profile Switching (APS), which allows you to create filtering profiles based on the network you're connected to. Want to be invisible when you're at Starbucks? No problem, you can create a profile for that. Not as worried when you're on your home network? You can create a profile for that. When you hop on a network APS detects where you are and automatically changes your Little Snitch profile to match your settings for the network you're on.
The ultimate lockdown
I wouldn't normally think of a firewall as something fun. It's business, pal. Just business. But that's not true of Little Snitch. Not only is it a great firewall application, it's educational and super fun to use. If you need something more than Apple's built-in firewall or if you need better insight into which applications are sending information from your Mac to servers on the Internet, Little Snitch is the best app I've seen, which makes it the best app for you.
Who goes there?
Little Snitch For Pc
Hardware? Software? No-ware? How do you make sure your Mac's locked down and keeping your secrets to itself? Sound off in the comments below.
Keep yourself secure on the web
Main
We may earn a commission for purchases using our links. Learn more.
❤️ healthA story about me, two Apple Watches, and five lost years
So I bought another Apple Watch. Here’s the story!
According to ObDev developers, it is crucial for Little Snitch to avoid unnoticed ruleset changes. Little Snitch therefore has numerous mechanisms to detect whether it is using the exact same ruleset file, as in, on the same volume and at the same physical address on that disk. This sort of mechanism makes it impossible for Little Snitch to use the ruleset on the booted backup volume without physical intervention from a user at the system (thus the dialog asking if it's OK to use the current version of rules or to use a default ruleset).
In cases where you have physical access to your computer while booting from the backup, the solution is straightforward — simply click the button to use the current rule set and everything behaves as normal.
Little Snitch Windows
In cases where you do not have physical access to the system, e.g. you have a server in a colocation facility, there is a logistical challenge. While Little Snitch is reporting that the ruleset doesn't match, it's also preventing network connectivity to and from the server. If you rely on VNC screen sharing to access the system, you will be unable to access the system to accept the current version of the Little Snitch ruleset.
According to ObDev developers, you can avoid this logistical lockout by removing the following two items from your backup volume before rebooting from it:
/Library/Extensions/LittleSnitch.kext
/Library/Little Snitch
Once rebooted, reinstall Little Snitch to regain the application firewall and all is well.
While that method works fine for cases in which you plan to reboot from the backup volume, you're potentially in a lurch if you have an unplanned incident, e.g. the server's hard drive fails. To avoid encountering this problem altogether, you can exclude those files from your backup task:
CCC does not delete files from the destination that are excluded from the backup task, so be sure to remove those items from your destination if you have already established your backup.