When the computer is connected to Internet, the installed
applications will communicate with outside, to exchange information in an
invisible way. The user will not be able to verify the data passing
through his network.
These exchanges can be made for the proper functioning of the
application, but can sometimes bring malicious software.
That's why it is very important to have an operational firewall that
filters the transfers from outside
Little Snitch is part of this software, it will make visible the
incoming and outgoing connections and let the user regain control of
How does Little Snitch work?
The software will communicate with the user in various ways.
The first is to display a pop-up window when an application tries to
connect to the Internet.
In this case, the user will have the choice to allow the connection
or not. This choice can be ephemeral or memorize for all future
The second option is to use the silent mode.
This option gives the user the choice to stop pop-up notifications
for a moment and decide later what will become the rule.
How to examine the network?
Little Snitch incorporates a window that allow to view the latest
It contains the softwares that communicates with the Internet, the
connection servers and the network throughput that they use for their
The strategy for the first utilization
The recommended strategy for new users is to launch Little Snitch in
silent mode for a few days, this allows the user to continue his tasks
without being interrupted repetitively.
Then it will be possible to discover all the connections that have
caused a connection alert.
They are found in the Network Monitor with a blue button, with the
It will be easy then to create rules that match for each of the
What's new in Little Snitch 4:
In the new version, the Network Monitor is fully redesigned.
It now integrates a world map to view network connections according
to their geographical location. It provides powerful filtering and
selection options for evaluating specific connections based on the
location of the server.
The interface is modernized, in relation with the design of the new
Apple operating system.
The research Assistant has undergone improvements and is now also
accessible from the Network Monitor.
The creation and modification of the rules is now done with a simple
click from the Network Monitor.
The connection alert can be minimized to defer the decision to allow
or deny a connection.
There are many other improvements to be noted especially at the