How to Monitor Your Mac's Connections with Little Snitch


Your computer, regardless of if you're using it or not, is constantly communicating with the Internet. All of these conversations - held in the background - help keep your system and applications running at tip top shape. But some times there are some applications that just don't need to communicate with the Internet, or even worse, some apps that send information about your computer and how you use the app without your permission or even knowledge. Little Snitch is an advance firewall application exclusively for OS X that allows you to control where an application can communicate to on the Internet. You can get Little Snitch from Objective Development for $34.95.


A firewall is a virtual door controlled by an application on your computer that lies between your computer and the internet. Based on your rules, and its assumptions it will allow and deny connections through that door. This helps keep unwanted network connections from entering your computer, or in some cases, leaving it.

Testing for open ports in Terminal
Testing for open ports in Terminal

However, there isn't just one door for every single network connection to go through, there are hundreds! Each of these doors is called a port, and each port is used for different purposes. For example, normal web browsing is done through port 80, secure web browsing is done through port 443, and file transfer is done through 21.

Doesn't OS X have a firewall?

While it is true that OS X has a built in firewall, it's only half as good as Little Snitch. The default firewall only covers incoming connections, but allows all applications to make outgoing connections without restriction. This is where Little Snitch defines itself, by letting you control all connections, rather than half.

Setting up Little Snitch

It's not hard to set up Little Snitch, just a simple download and install. However, you will need to restart your system after installing. This is because Little Snitch replaces a program called iptables, which is used for system networking. Don't worry, Little Snitch doesn't overwrite that program, it just replaces it.

The Configuration Window

When you load up Little Snitch for the first time, you will see that there are already a lot of rules created for you. Most of these rules have a lock on them, and are required for normal system operation. while you can disable them, you cannot (and should not) delete them. Selecting a locked rule will show a description of why it's locked on the side.

The Rule list in Little Snitch
The Rule list in Little Snitch

On the left hand side of the Configuration Window, you will see the rule filters. Check these every now and again for redundant or invalid rules.

Creating Filters

By now, you've probably seen the Automatic Rule Creation dialog. This will come up every time a new application wants to make a connection, and there isn't a rule regarding it. The new rule dialog will show you the application's name, icon, and where it's trying to connect to. You can allow or deny the connection:

  • Forever
  • Once
  • Until you quit the application
  • Until you log out
  • Until you restart
  • For 15 Minutes
  • For 30 Minutes
  • For 1 Hour
  • For 2 Hours

You can go even further by controlling where the application can connect:

  • Any Connection
  • Only a specific port
  • Only a specific domain
  • Only a specific domain and port

With all of these controls, you can create a virtually unlimited number of rules for your apps.

Creating rules in Little Snitch
Creating rules in Little Snitch

When creating filters, ask yourself "What does this application need to do?". For example, a web browser like Google Chrome, Safari, or FireFox will need to connect to multiple domains and ports. Therefore, giving it a fully open rule would be the smart decision. From there, you can block specific domains if you need to. If you use any peer-to-peer applications like Transmission or uTorrent, you will need to allow it full network access for it to operate normally.

Manually Creating Rules

If you need a little more robust control when creating rules, or can't launch the application until a rule has been made, you can create rules manually through the Little Snitch Configuration Window. To do this, open Little Snitch and select New Rule. The New Rule sheet will drop down.

At the very top, you can control if you want to block or allow incoming or outgoing connections. You can then choose the application, or set a global rule that applies to all processes. Below that is the fine tuning controls for how you want this rule to work. You will notice that there are a lot more controls than the automatic rule sheet, so go ahead and play around with them!

Manually creating rules in Little Snitch
Manually creating rules in Little Snitch

Following Up

So now that you got the basics down of Little Snitch, you're all set to go out and take control of your privacy when using your Mac. There are plenty of programs out there that send tracking information without your consent. What are some applications that you discovered that are sending info back home?

Related Posts
  • Computer Skills
    OS X
    The System Preferences You Should Be UsingSp icon preview
    A good look at the system preferences panes you probably aren't using, but should be. Especially if you value your privacy or security.Read More…
  • Computer Skills
    How to Keep Your Information Safe on Public Wi-FiCoffee shop
    So there you are, browsing the vast Internet in a coffee shop on your travels abroad. You log in to Facebook, as usual, and continue to peruse the postings of the day. Unbeknownst to you, there might be someone stealing your login info right as you press the return key. After all, it’s an open network at a coffee shop—anyone has access to your information. The same goes for airport WiFi, and the library down the street. Luckily, there’s a way to protect yourself. In this tutorial, I’ll explain how people obtain your sensitive information on an unsecured network and how to prevent them from doing so.Read More…
  • Computer Skills
    How to Share Your Mac's Internet ConnectionNetwork icon
    It seems that you need the Internet to do anything productive these days. Sadly, many modern desktop computers don’t come with WiFi. Manufacturers expect you to either buy a wireless card after you find this out or share your wireless connection from another computer. The second method works well the other way, too: take a wired Internet connection and broadcast it with your integrated WiFi card. So how do you set up all these fancy features? In this tutorial, I’ll show you how to share an Internet connection from your Mac to any wired or wireless device, whether it be an Xbox or PC.Read More…
  • Computer Skills
    Installing OpenWRT on a Raspberry Pi as a New Home FirewallRapi400
    OpenWRT is an active and vibrant home firewall project that was born on the Linksys WRT54G line of home routers. It has grown and expanded to support an amazing array of old and new hardware alike. The list of compatible hardware is large enough to require its own index. With the recent interest in the Raspberry Pi there is of course is an OpenWRT build for it as well. In this tutorial I will show you how to install OpenWRT on a Raspberry Pi, add a second network interface, and replace your home firewall with your new OpenWRT firewall.Read More…
  • Code
    The Linux FirewallLinux firewall 400
    There are several firewall applications for Linux, but what you may not realize is that, at the heart of all these programs is a single all-mighty application that is built right into the Linux Kernel: iptables. This is the Linux firewall. No matter which program you use to configure your firewall under Linux, it ultimately all comes down to iptables. All that these other programs do is configure it. So, here comes the question: if those programs simply configure iptables, why not simply configure it directly yourself? Doing so is easier than you might think!Read More…
  • Computer Skills
    Firewalls: Your Mac's Security BlanketFirewall
    Today, we introduce you to your quiet defender. Diligent, adaptable, and powerful, your computer’s first line of defense against the wilds of the Internet is a technology that all computer users should have a passing familiarity with — let’s meet the firewall and find out how you can tune your Mac to protect you from threats.Read More…