Changes

Windows Security Page

2,083 bytes added, 16:43, 5 December 2018
The following lines were added (+) and removed (-):
== Anti Spyware and Spyware Removal ==== Spyware and Junkware == [https://www.malwarebytes.org/products/ Malwarebytes Anti-Malware] has become very popular among PC service technicians and end users alike.  It detects and removes many known malware programs.  The free version does not offer real-time protection.  It does allow you to conduct a manual scan whenever you want and definition updates are free. Three useful tools for removing PUP and junkware programs, including marginal malware:*[http://www.bleepingcomputer.com/download/adwcleaner/ AdwCleaner.exe] - Xplode Adware Cleaner*[http://thisisudax.org/ JRT.exe] - thisisu Junkware Removal Tool*[http://www.bleepingcomputer.com/download/rkill/ rkill.exe] - RKill terminates and removes malware infectionsRootkit detection and removal *[http://usa.kaspersky.com/downloads/TDSSKiller tdsskiller.exe] - Kaspersky Lab, TDSSKiller can detect and remove many rootkits.Track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.A key component of [[Microsoft Windows Registry Security]] is the ability to track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.:* Ethereal <BR>:* [[Ethereal]] / [[Wireshark]] - packet sniffer:* [[TCPView]] - Part of Microsoft Sysinternals Monitoring traffic from the infected host machine itself my not be helpful as the traffic might be hidden.  The traffic needs to be intercepted from a healthy node along the way.  Use a smart switch, or smart router.  Another option is to route traffic though a hardened Linux machine between the infected host and the router.  A router running aftermarket firmware such as [[OpenWRT]], just like using a Linux PC, allows access to powerful tools such as: wireshark, tcpdump, and snort.If your PC or network storage is compromised it means hackers could gain access to sensitive data such as financial data or bank documents.  Although securing your network is wise, you can add an additional layer of security by encrypting files.  A strong encrypted file with a random key can make the difference from the hacker reading your bank account details or spending hours trying to open an encrypted file without success.  If files get stolen, make them useless to the hacker by encrypting them using non-dictionary based password keys.{{:Template-windowssecuritymenu}}
Bureaucrat, administrator
16,192
edits