Insanity's security config

LASER_oneXM

Level 37
Verified
Top Poster
Well-known
Feb 4, 2016
2,520
Last edited:

jamescv7

Level 85
Verified
Honorary Member
Mar 15, 2011
13,070
Nice configuration out there, as always having a backup is a must; it may take several hours to complete the operation but guaranteed it can revert changes immediately.
 
  • Like
Reactions: Cats-4_Owners-2

dbrisendine

Level 1
Jul 21, 2014
9
The system image backup is a little more important than most think; if one gets hit with a Rootkit / Bootkit, just restoring a conventional file based Data backup will not get the system back. An image restores the disk to a known state thus restoring the system to that time point.
 

Cats-4_Owners-2

Level 39
Verified
Honorary Member
Top Poster
Well-known
Dec 4, 2013
2,800
Hello @insanity. Your configuration appears quite secure & "sane",;) plus I like it, too!:)

For added privacy, Chromium sourced browsers on our systems are all set to block 3rd party cookies. Just follow the steps below:
  1. Click the Chrome menu
    tgmsrPRh34tM4q0WYv7l-NNXDz7dqm7ftk8TyCEguoY30xkEg8lcw_ULI23ki9Q=w18-h18
    on the browser toolbar.
  2. Select Settings.
  3. Click Show advanced settings.
  4. In the "Privacy" section, click the Content settings button. Select "Block third-party cookies and site data"
    • After this you will see
      chrome_95647_blocked_cookie.gif
      in the address bar whenever a cookie has being blocked.
    • Optionally, you may also mark the circle "Keep site data until you close the browser".
A free software that protects the system by preventing files not initiated by you from executing, is called Voodoo Shield.
You can read more about it, and also download the latest version here:
Thank you for sharing!:D
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top