Changes

Windows Security Page

3,613 bytes added, 16:43, 5 December 2018
The following lines were added (+) and removed (-):
== Anti Spyware and Spyware Removal ==== Spyware and Junkware == [https://www.malwarebytes.org/products/ Malwarebytes Anti-Malware] has become very popular among PC service technicians and end users alike.  It detects and removes many known malware programs.  The free version does not offer real-time protection.  It does allow you to conduct a manual scan whenever you want and definition updates are free. Three useful tools for removing PUP and junkware programs, including marginal malware:*[http://www.bleepingcomputer.com/download/adwcleaner/ AdwCleaner.exe] - Xplode Adware Cleaner*[http://thisisudax.org/ JRT.exe] - thisisu Junkware Removal Tool*[http://www.bleepingcomputer.com/download/rkill/ rkill.exe] - RKill terminates and removes malware infectionsRootkit detection and removal *[http://usa.kaspersky.com/downloads/TDSSKiller tdsskiller.exe] - Kaspersky Lab, TDSSKiller can detect and remove many rootkits.Track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.A key component of [[Microsoft Windows Registry Security]] is the ability to track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.[http://www.top-registry-cleaner.org/ Registry Cleaner]:* Ethereal <BR>:* [[Ethereal]] / [[Wireshark]] - packet sniffer:* [[TCPView]] - Part of Microsoft Sysinternals Monitoring traffic from the infected host machine itself my not be helpful as the traffic might be hidden.  The traffic needs to be intercepted from a healthy node along the way.  Use a smart switch, or smart router.  Another option is to route traffic though a hardened Linux machine between the infected host and the router.  A router running aftermarket firmware such as [[OpenWRT]], just like using a Linux PC, allows access to powerful tools such as: wireshark, tcpdump, and snort.== Securing Files ==If your PC or network storage is compromised it means hackers could gain access to sensitive data such as financial data or bank documents.  Although securing your network is wise, you can add an additional layer of security by encrypting files.  A strong encrypted file with a random key can make the difference from the hacker reading your bank account details or spending hours trying to open an encrypted file without success.  If files get stolen, make them useless to the hacker by encrypting them using non-dictionary based password keys.You can add encryption to your most important or sensitive files on a file by file basis.  There are different software to allow for this. An Open Source file encryption software for Microsoft Windows that is gaining a lot of praise is AxCrypt by Axantum software.  It integrates with Windows to compress, encrypt, decrypt, and store files. You can password Protect any number of files using strong encryption.  AxCrypt is free and Open Source, however, the primary download installer has OpenCandy, the developer offers several alternative download options that are OpenCandy free, and free of any other adware/spyware/malware (as of this writing).  To access the versions without OpenCandy you must register with an email address on the site.  The .msi installers do not have OpenCandy.AxCrypt is password based and uses a 128-bit key.  Although the developer promises 256 bit encryption in the future, it is explained on the site why [https://www.axantum.com/AxCrypt/faq.html#why_128bit 128 bit is enough].  AxCrypt is superior to Windows Compressed Folder password protection in many ways.  Windows Compressed Folders in Windows XP uses a WinZip compatible extension of the Windows Shell with the same weak algorithm in WinZip.  WinZip encryption has been compromised and there are multiple documented examples.  * [https://www.axantum.com/AxCrypt/faq.html#why_128bit AxCrypt FAQ - Frequently Asked Questions] * [https://www.axantum.com/Xecrets/LoggedOff/Register.aspx AxCrypt Registration] and [https://www.axantum.com/Xecrets/LogOn.aspx Login Page].{{:Template-windowssecuritymenu}}
Bureaucrat, administrator
16,192
edits