Changes

Windows Security Page

1,536 bytes added, 16:43, 5 December 2018
The following lines were added (+) and removed (-):
== Anti Spyware and Spyware Removal ==== Spyware and Junkware == [https://www.malwarebytes.org/products/ Malwarebytes Anti-Malware] has become very popular among PC service technicians and end users alike.  It detects and removes many known malware programs.  The free version does not offer real-time protection.  It does allow you to conduct a manual scan whenever you want and definition updates are free. Three useful tools for removing PUP and junkware programs, including marginal malware:*[http://www.bleepingcomputer.com/download/adwcleaner/ AdwCleaner.exe] - Xplode Adware Cleaner*[http://thisisudax.org/ JRT.exe] - thisisu Junkware Removal Tool*[http://www.bleepingcomputer.com/download/rkill/ rkill.exe] - RKill terminates and removes malware infectionsRootkit detection and removal *[http://usa.kaspersky.com/downloads/TDSSKiller tdsskiller.exe] - Kaspersky Lab, TDSSKiller can detect and remove many rootkits.Track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.A key component of [[Microsoft Windows Registry Security]] is the ability to track file and registry changes made by software you are installing.  Spybot Search and Destroy has registry monitoring capabilities.  However, it is ideal to have an application watch and log every registry key modified in every hive by the software you are running or installing.:* Ethereal <BR>:* [[Ethereal]] / [[Wireshark]] - packet sniffer:* [[TCPView]] - Part of Microsoft Sysinternals Monitoring traffic from the infected host machine itself my not be helpful as the traffic might be hidden.  The traffic needs to be intercepted from a healthy node along the way.  Use a smart switch, or smart router.  Another option is to route traffic though a hardened Linux machine between the infected host and the router.  A router running aftermarket firmware such as [[OpenWRT]], just like using a Linux PC, allows access to powerful tools such as: wireshark, tcpdump, and snort.{{:Template-windowssecuritymenu}}
Bureaucrat, administrator
16,192
edits