MacMost Q&A Forum • View All Forum QuestionsAsk a Question

Why Should I Leave My Computer On When I Am Done Using It?

Hi, Why I know you advocate leaving your Mac on when you are done, but why don’t you think that this is also an invite for hackers that scan networks?

I understand that off/on wears down functions, and that maintenance needs to be done. It just seems an inactive computer is just begging for someone to take advantage.
—–
Tom

Comments: 2 Responses to “Why Should I Leave My Computer On When I Am Done Using It?”

    3 years ago

    Yes, the main reason to just let your Mac sleep instead of shutting it down and starting it up every day is so it can perform system maintenance, indexing, backups, updates and other things while you are NOT using it, instead of while you are. Plus it saves all of that time for shutting down and starting up and allows you quick access if you need to check something even after you think you are done for the day.

    As for the idea that a "hacker" can get into your Mac while it is sleeping, that's just not possible without your password. Actually, first a malicious person would need to find your Mac. If you are connected to a Wi-Fi network in your house or at work then there is likely no direct way to access your Mac from the outside world. Your WI-Fi network would have to be set up to forward communication from outside to your Mac. And unless you have gone to a lot of trouble to set that up, then that isn't possible.

    Even then, you'd need to have something "open" on your Mac, like file sharing, screen sharing or remote management. Those are usually off in System Preferences, Sharing, though you could be using them, which fine.

    Even if someone knew where your Wi-Fi network was located on the Internet (your Wi-Fi's outside IP address) and then your Wi-Fi router was set up specially to direct traffic to your Mac (unlikely) and you had file some sort of sharing turned on, they would still need your user name and password.

    So it isn't the case where an "inactive computer is just begging for someone to take advantage." That just doesn't happen unless you are talking about a high-value server or spy stuff.

    What you should be concerned about is people breaking into online accounts (iCloud, Facebook, Amazon, your bank, etc) when you have a weak password and aren't using two-factor authentication. Or simply downloading something you shouldn't trust and you get malware. Or, being the victim of a phishing attack. Those are the main threats you face. Not cloak-and-dagger "someone trying to hack your computer" stuff.

    bob franklin
    3 years ago

    question very well explained.

Comments Closed.