Major Desktop Security Wizard

Major

New Member
Thread author
Nov 1, 2012
2
System configuration and hardening:

User Account Control:'Always notify'.
Autorun / Autoplay:Both features are disabled. Everything that needs to be run is run manually.
Logon:Secure Logon is turned on. It prevents other programs from intercepting my login credentials.
Dep:ON
Sehop:ON
Emet 3.0 Max
Appaguard:Locked Down

_______________________________________________________________

Network
Three Linksys WRT54G Routers (DD-WRT Firmware)
Firewall:windows off and Kaspersky On(tweaked)
Dns:Opendns
Vpn:Securitykiss Pro

______________________________________________________________

Data security:
Acronis True Image :System image is created once a week to another HDD
Truecrypt :All sensitive data is stored in password protected encrypted conatiner.

_____________________________________________________________

Updating
Windows Update :Windows update is used to update system and other software from Microsoft.
Secunia Psi:Scan is run once a week

______________________________________________________________
Other Tools and software
Process Hacker : It is used as replacement for Windows Task Manager.
CCleaner :Cleans junks and temporary items
Revo Pro :Uninstall unused software completely
Defraggler :Defrag Disk once a month

__________________________________________________________________________________________________________________________
 

McLovin

Level 78
Verified
Honorary Member
Malware Hunter
Apr 17, 2011
9,228
Hello Major,
Real-time protection
I see that your using Kaspersky. What are your current settings for it?

Also just a heads up, if you practice a smart online behavior then you should dramatically decrees your chances of getting infected. You can read some tips on how to avoid infections here: http://malwaretips.com/blogs/how-to-easily-avoid-pc-infections/



Browser protection
Nice to see a LastPass Premium user. :) Have you ever tried Ghostery?

Ghostery (Free) - link
Ghostery™ sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity.



Virtualization:
Even if you submitted a file to virustotal.com and it said that it's clean , you'll need to run it in virtual environment because sometimes infection can be so new that security vendors don't have signs for it.

Virtualization software will allow you to browse the web or run another application in a completely safe environment. This is especially useful when visiting high-risk web sites, whether accidentally or deliberately, as the Web browser will be completely contained within the virtual enviroment, preventing any damage to your computer.
A sandbox can also be used to run any other applications which you think may be suspect - you can run the program inside the sandbox to determine whether or not it is safe while remaining completely protected against any malicious actions that it may try to carry out.
I strongly advise you to install Sandboxie and use it when you're browsing the Internet or running shady/unknown programs.
Alternately you can try BufferZone PRO (Free) , another great virtualization software.

Sandboxie (Free/Paid) - link
Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.




Always run suspicious of freshly downloaded files in a Sandboxie to verify that he download isn't compromised!Sandboxie will replicate perfectly your operating system so all the files should run without any problems in it.
 
Last edited by a moderator:

Malware Maniac

Level 1
May 14, 2012
673
Antivirus: Kaspersky IS -Good
On Demand Scanners: MBAM, EEK, HMP -Good
Add-ons: AdBlock Plus, WOT -Good
Virtualization: App Guard - Good
Updater: Secunia PSI - Good
Utilities: CCleaner and Revo Uninstaller -Good
I think you're good on your Config.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top