Although the person sitting in front of the PC is crucial, it is not possible to include this choice in the poll.
Single choice.
Enjoy.
Single choice.
Enjoy.
but cannot protect against an infostealer.imaging & backups are essential
Freelancer? I don't think so; we are not a precious target; MI-5? may be.if a person is really intent on getting into my garage/house he/she will do that
I'm adopting the character of Mel Gibson in "Consipracy Theory"; not using online services or payment, unless obliged to (no alternative method); walking around with sack full of coins.For example: ten years ago I could walk into a shop & buy almost everything I wanted, I got a receipt, I likely would not have to interact with them again, now if I do that online or physically, I would have to register that product with name, address, blood group etc, then then be plagued for all eternity+ & beyond with what I may like, there isn't a way out of that, even explicitly telling them I don't want to hear from them OR their one billion trusted associates make no difference, SO we can only do our best - I signed for a trial yesterday with Paramount Plus as Netflix (the gits) are removing heaps of stuff I watch & with P+ & their trusted associates (to improve my experience with P+) run in to one hundred, more as I remember, its almost laughable![]()
I would say abnormal things is what I watch out for. But it is buried under a mountain of process creations etc.this specific service account shouldn't be touching this endpoint
This. First line of defense and most important layer: Application Control.App control, K app control or SAC/WDAC.
AV can miss zero-day sample easily.
Firewall can by bypassed by process injection into allowed one.
Browser G safesearch or SmartScreen are late behind blocking malicious websites.
DNS misses some malicious websites.
VPN has no role in security, only hides my location; useful when FBI is searching for me.
Well DNS works system wide, but yes, 99.99% infections come through the browser, even if it is a link in an email client or a web app or HTML content.I voted for browser
Can you enlighten me with browser attacks and coutnermeasures, I know very little about that side of things.I voted for browser, because
Can you enlighten me with browser attacks and coutnermeasures, I know very little about that side of things.
Because the title is "configuration", not "methods".Why brain isn't an option?