Check Failed Password Attempts
Check Failed Password Attempts
0.1.9

4.5

Check Failed Password Attempts free download for Mac

Check Failed Password Attempts

0.1.9
02 November 2005

Displays /var/log/secure.log file.

Overview

Check Failed Password Attempts is a small application that parses the /var/log/secure.log file looking for failed authorization attempts. It presents a summary of the total number of failed attempts (and successes) per user. It will also optionally display the full log listing of each failed attempt, each successful attempt, and SSH information from the /var/log/system.log (see the preferences to enable/disable these options).

This application is based on tips submitted to www.macintouch.com. See the MacInTouch report on Security: Access Monitoring and SSH (http://www.macintouch.com/security-mon.html) for a discussion of what these results mean and how to better protect your system.

What's new in Check Failed Password Attempts

Version 0.1.9:
  • Improved compatibility with Mac OS X 10.4.3 (Tiger).
  • Minor interface adjustments.

Join over 500,000 subscribers.

Subscribe for our newsletter with best Mac offers from MacUpdate.

10 Check Failed Password Attempts Reviews

Rate this app:

Smactron
14 December 2006

Most helpful

Will this ever be updated as a universal binary? I hope so! Also, is there a way to get it to show what the incorrect password attempts were? I'd like to see what others tried as my password and what I typed when I mis-typed my password.
Like (1)
Version 0.1.9
Smactron
14 December 2006
Will this ever be updated as a universal binary? I hope so! Also, is there a way to get it to show what the incorrect password attempts were? I'd like to see what others tried as my password and what I typed when I mis-typed my password.
Like (1)
Version 0.1.9
Anonymous
02 April 2005
Same mac mini user 10.3.8 version 0.1.7 now works thank you very much
Like
Version 0.1.7
Anonymous
30 March 2005
mac mini os x 10.3.8 gets an error variable 0 not defined then quits.....
Like
Version 0.1.6
Anonymous
30 March 2005
No, this says it is related to what's on Macintouch, which is specifically discussing remote attacks and attempts to compromise the machine that way. There is NO security if someone can sit at the computer. They can reboot and use single user mode if you don't have an open firmware password set (the vast majority don't), or they can simply take the drive - easy in most towers. No, tools like this are only useful for remote security, and there is no point to this if root is disabled.
Like
Version 0.1.5
2 answer(s)
Anonymous
Anonymous
30 March 2005
I call BS on you. Just because root is disabled doesn't mean there aren't 20 or so other user accounts on the machine that can't be attacked, most of which could be used maliciously if compromised. Heaven forbid anyone would try to do the general ignorant masses a service, though. Of course, you probably like the security-through-obscurity paradigm, as it placates the ignorant masses while allowing you to crack their computers. cl
Like
Version 0.1.6
Anonymous
Anonymous
30 March 2005
I call BS *and* flat-out ignorance on you. None of the other accounts have shell access, so they aren't vulnerable to attempted logins. The only account other than root that has a shell is your user account. User accounts cannot be easily predicted and thus are not generally subject to attack. So, root is disabled, user accounts are unpredictable, and all other users have no shell access. This is NOT about security through obscurity, this is simply called "no avenues to attack". What's next, ports that aren't opened are subject to attack? "Oh no, there's over 65,000 holes that attackers could use RIGHT NOW! Run for the hills!" This makes just as much sense. Go read the post on www.unsanity.org and educate yourself about the issue.
Like
Version 0.1.6
Anonymous
29 March 2005
I like it, the name "Herr Anonymous". Some folks just do not get it. They smell stupidity in their own socks. have a day. Bob.
Like
Version 0.1.5
Anonymous
29 March 2005
Herr Anonymous says the computer is safe as long as root is not enabled. What if someone were to sit at the keyboard and attempt to type in one's password. The failed attempts would show. That's the goal of this program
Like
Version 0.1.5
Anonymous
27 March 2005
Program failed with "Can't make word 2 of " 1 " into a Unicode text." 10.3.8 - dual 800MHz Quicksilver Hmm...
Like
Version 0.1.1
Anonymous
26 March 2005
This is a cool app and perhaps some form of secure.log should be included in Console by Apple. You get the feeling that Apple want to pretend that nothing untoward ever happens to Macs, for instance the lack of logging by ipfw in it's default state and no way of adequately configuring it via Apple's sharing GUI. You can find out the hard way that enabling AFP file sharing or remote login also makes your computer available across the entire internet not just your local network. Very uncool Apple not to be able to change that via the GUI. Anyway, this app is interesting, I don't know the security implications of being able to view secure.log, although it didn't show actual passwords themselves via this app just login names and times (they all seemed to be my own anyway when I mistyped a password), but I think this is quite handy.
Like
Version 0.1
2 answer(s)
Anonymous
Anonymous
26 March 2005
You can view security.log in console.app
Like
Version 0.1
Anonymous
Anonymous
27 March 2005
It's not in Console's var/log for me (10.3.7), if I find secure.log in the Finder then specify I want to open it in Console it just comes up blank, presumbably because I don't have permissions to view it.
Like
Version 0.1.1
Anonymous
26 March 2005
i like the program, but could it have a slightly more interesting name?
Like
Version 0.1
2 answer(s)
Anonymous
Anonymous
26 March 2005
Any suggestions?
Like
Version 0.1
Anonymous
Anonymous
27 March 2005
'Unauthorized'?
Like
Version 0.1.2
Anonymous
26 March 2005
Fun to see what people think your password is.
Like
Version 0.1
2 answer(s)
Anonymous
Anonymous
26 March 2005
At least my /var/log/secure.log doesn't contain any passwords listed, not even for failed attempts, which is only logical because if this log showed it, it would also show small typos of real password, and all the big attempts of making it secure in /etc/passwd and through shadow passwords etc. would be void. So please tell me how to get the fun to know what other people think my password is???
Like
Version 0.1
Anonymous
Anonymous
29 March 2005
I would like to know, too.
Like
Version 0.1.5