@alegr said:
@Evo said:
A password on login is pretty fucking useless. If you get access to the hardware, you can read the harddisk, you can reset the password, thus bypassing itYou almost answered the question. File encryption keys and stored website passwords are usually encrypted with the account password. If one can boot to a logged-on session, the passwords and encrypted files can be retrieved. But they can't be retrieved by physical access to the system disk. This is why a password on login is useful.
You can set a keychain password that is different from your login password as well as set a firmware password so that you can't do the whole insert boot disc and reset password things. Lifehacker had a recent post on breaking into OSX with a few recs on how to prevent it. You may also want to get a copy of Onyx to deal with tweaking hidden system settings (like dock position and style) from a GUI if you don't like/want to do it from Terminal. There's a few apps out there to tweak the Dock's UI. I use Candybar, but there are many free one's (hit up iusethis and look around).
To compensate for FInder's lack of FTP: check out either transmit or Forklift. Transmit 4 and the Forklift 2 beta give you the ability to mount (S)FTP shares (and other protocols) as drives accessible via the Finder (as will a standalone app called ExpanDrive).
Also, depending on the editing you're doing you may want to check out TextMate, Coda or Pacu.OSX does have its WTFs; hopefully you'll find some of this helps make it a little more secure and usable.