5
509322
Thread author
I tweak the OS - for example, disable IPv6\Teredo, block incoming network traffic, disable remote assistance including firewall rules, disable all the unneeded services, uninstall unneeded softs shipped with Windows, etc.
Generally, I don't use most of the often-targeted software such as Adobe products, Oracle Java, and Microsoft Office except for testing purposes. This reduces my attack surface and, by keeping browsers up-to-date, eliminates the need for an anti-exploit soft.
When I have a VPN installed on the system I use it 24\7. I use IVPN which provides always-on firewall and multi-hop options. I don't use a VPN for privacy or anonymity, but instead to ensure full-time encrypted network traffic.
I have multiple personal and test machines. The security configuration shown above is representative of what is typically installed on both my personal and test machines. Depending upon what and how I am testing, sometimes I will substitute SpyShelter Firewall for Windows Firewall Control. If I have need of an antivirus\internet security suite for a particular project or set of circumstances, generally I will install either Webroot or Emsisoft (depends upon system specs). For my most-used personal system, the above security configuration is its current one.
I test malware on a host PC using Rollback RX Pro in a malware test lab with its own dedicated networking. This is to eliminate any virtual machine introduced anomalies into the testing and results. Also, it isolates the test systems from production machines and the production network. While Rollback RX is a capable product, using it to test malware is not recommended for the home-tester; use a virtual machine instead.
Generally, I don't use most of the often-targeted software such as Adobe products, Oracle Java, and Microsoft Office except for testing purposes. This reduces my attack surface and, by keeping browsers up-to-date, eliminates the need for an anti-exploit soft.
When I have a VPN installed on the system I use it 24\7. I use IVPN which provides always-on firewall and multi-hop options. I don't use a VPN for privacy or anonymity, but instead to ensure full-time encrypted network traffic.
I have multiple personal and test machines. The security configuration shown above is representative of what is typically installed on both my personal and test machines. Depending upon what and how I am testing, sometimes I will substitute SpyShelter Firewall for Windows Firewall Control. If I have need of an antivirus\internet security suite for a particular project or set of circumstances, generally I will install either Webroot or Emsisoft (depends upon system specs). For my most-used personal system, the above security configuration is its current one.
I test malware on a host PC using Rollback RX Pro in a malware test lab with its own dedicated networking. This is to eliminate any virtual machine introduced anomalies into the testing and results. Also, it isolates the test systems from production machines and the production network. While Rollback RX is a capable product, using it to test malware is not recommended for the home-tester; use a virtual machine instead.
Last edited by a moderator: