Status
Not open for further replies.
Latest changes
Dec 26, 2019
Operating system
Not listed
System type
32-bit operating system; x86-based processor
Update and Security
No security updates
User Access Control
Notify me only when programs try to make changes to my computer
Firewall and Network protection
Microsoft Defender Firewall is active
User permissions
Administrator account
User account
Local account only
Sign-in options
  • Account Password
  • Malware exposure
    No malware samples are downloaded
    Real-time Malware protection
    • Windows Firewall
    • Firewall Hardware on router
    • 1° AdGuard DNS / 2° CloudFlare DNS
    • MBAE Premium - Custom Setting
    • OSA - Custom Setting
    • Black Viper's List - Some services Disabled/Manual
    Modified security settings
    • Trick POS Ready 2009 + KB4500331.
    • PsExec - Run browsers + email client with limited rights - Exceptions (OSA) for Interlink Mail News and New Moon.
    • DEP Always ON
    • SMB Protocol Disabled
    • No NET Framework Installed
    • I.E.8 No Flash + Trick 1803 (Block the downloadable executable files) + Disable script (F12 - on/off) + block execution I.E.8.
    Periodic scanners
    Hitman Pro,McAfee Stinger,HijackThis Portable,Adwcleaner v.6.0.4.7
    Browser and Extensions
    New Moon 28 - (Pale Moon fork for Windows XP) Custom Setting about:config

    • Noscript
    • U.B.O.Legacy
    • Decentraleyes
    • No Resource URI Leak
    • Canvas Blocker Legacy 0.2 - Only to pass the ClientRects Fingerprint test
    Privacy tools and VPN
    • 1° AdGuard DNS / 2° CloudFlare DNS
    • W.M.P. off
    • O.E. off
    • New Moon Home page = DuckDuckGO - Custom settings saved via URL no cookies
    Password manager
    My Memory
    Search engine
    DuckDuckGo
    Maintenance tools
    • CCleaner - Many custom rules created by me
    • RegSekeer
    • Process Explorer
    • SigcheckGUI
    • Dependency Walker
    • CFF Explorer
    • Currports
    • WWDC
    • IobitUnistaller Portable
    • Speedyfox -Custom Rule for Interlink Mail News
    • SUMo Portable
    • JKDefragGUI
    Photos and Documents backup
    Pen Drive
    Data Backup Schedule
    Once or multiple times per month
    Backup and Restore
    Acer System Backup
    Backup Schedule
    Once or more per year
    Computer Activity
  • Online banking
  • Browsing the web and checking emails
  • Office and other work-related software (Work from Home)
  • Learning computer languages or creating apps
  • Computer Specifications
    Acer Intel Celeron M380 1.60 GHz 1GB RAM
    Your changelog
    1. Added some custom rules in OSA for Mimikatz Dump Lsass.exe mitigation.
    2. Added "sc" command rule block in OSA.
    3. Added rule to block execution of I.E.8 in OSA.
    4. Added rule to block msbuild.exe in OSA and the same rule on the Registry Key.
    5. Blocking rule in host file for CCleaner.
    Staff notes

    This setup configuration may put your device at risk .
    We don't recommend that other members use this security setup. We cannot be held responsible for problems that may occur to your device by using this security setup.

    This computer configuration is using an unsupported operating system. If possible, we recommend to upgrade to an operating system that is supported by its developers.

    bribon77

    Level 32
    Verified
    Thank you for registering, I have read you in the other forum.
    Well, regarding XP, we all know that there are no updates and therefore it is vulnerable, but a person with your experience, I think so, in addition Vladimir putin uses XP.
    Thanks for sharing.(y)
     

    harlan4096

    Moderator
    Verified
    Staff member
    Malware Hunter
    Also, probably there is a good amount of malware out there still running fine in XP and in general in x86 systems... apart from that, your config is very complete... but it's an unsupported system any more and We must tag is as danger and not recommend config, even with the mitigations You applied...
     
    Last edited:

    Sampei Nihira

    Level 6
    Verified
    Also, probably there is a good amount of malware out there still running fine in XP and in general in x86 systems... apart from that, your config is very complete... but it's an unsupported system any more and We must tag is as danger and not recommend config, even with the mitigations You applied...
    Can you explain to me why the configuration of Ichito with an OS Vista received a "Secure: Complete" rating?
    Vista is also an OS no longer supported.
     

    Lenny_Fox

    Level 11
    Why not buy a cheap digital Windows 10 license or switch to Manjaro linux? Manjaro runs great on my 10 year old laptop and you get rolling updates (even smoother than Windows 10 updates).

    With an Android emulator on Manjaro, you get access to all Apps you like (e.g Outlook and Netflix).
     
    Last edited:

    Sampei Nihira

    Level 6
    Verified
    Why not buy a cheap digital Windows 10 license or switch to Manjaro linux? Manjaro runs great on my 10 year old laptop and you get rolling updates (even smoother than Windows 10 updates).

    With an Android emulator on Manjaro, you get access to all Apps you like (e.g Outlook and Netflix).
    I already have a Windows 10 PC:


    and unfortunately linux bores me.
    My daughter was the first child in my city to use a linux distro from middle school to high school.

    But there is no such need, my PC with Windows XP is perfectly safe.
    And surpass Windows 10 in privacy.

    So as long as it is "alive" I will continue to use it with satisfaction.
     

    Sampei Nihira

    Level 6
    Verified
    Can you explain to me why the configuration of Ichito with an OS Vista received a "Secure: Complete" rating?
    Vista is also an OS no longer supported.
    @ to all Security Staff

    There is someone from the staff who can explain to me this disparity of judgment regarding the security configuration that I mentioned in the example?
    TH.

    @ to all Security Staff

    Well you have changed the rating of the security configuration of Ichito.
    I sincerely hope that you have done this NOT to avoid an obvious disparity, and above all NOT because the PC with Windows Vista of Ichito is "dead".
     

    Jack

    Administrator
    Verified
    Staff member
    @ to all Security Staff

    There is someone from the staff who can explain to me this disparity of judgment regarding the security configuration that I mentioned in the example?
    TH.
    Hello @Sampei Nihira,
    We've decided a while ago that if a user is running an operating system that doesn't receive security updates, it will be marked as a dangerous security configuration. If new configs are created with an operating system that isn't supported, it will receive the red "Danger" tag.

    We do understand that you've taken all the steps to secure your operating system, and most likely you're 100% safe, however, this is basically not related to the config itself but to the operating system.
    You clearly know what you are doing and how to stay safe, and your system specs won't allow you to install Windows 10, so you can ignore that red tag.
     

    Sampei Nihira

    Level 6
    Verified
    Hello @Sampei Nihira,
    We've decided a while ago that if a user is running an operating system that doesn't receive security updates, it will be marked as a dangerous security configuration. If new configs are created with an operating system that isn't supported, it will receive the red "Danger" tag.

    We do understand that you've taken all the steps to secure your operating system, and most likely you're 100% safe, however, this is basically not related to the config itself but to the operating system.
    You clearly know what you are doing and how to stay safe, and your system specs won't allow you to install Windows 10, so you can ignore that red tag.
    Hi Jack, so you're telling me that if I published this security configuration in March 2019 I would have obtained the "Secure:complete" rating "? :unsure:
    Let me doubt .....
    OS Windows Vista can receive monthly KB of Windows Server 2008 and have an OS updated to the present.
     
    Last edited:

    Sampei Nihira

    Level 6
    Verified

    valvaris

    Level 3
    Verified
    Hello @Sampei Nihira

    thank you for sharing your topic / config. found some interesting programs and extensions you use. ;)

    In terms of Network security I would go a step farther and try to segment the network (Example):

    Old Windows 192.168.0.1 /30 if there is only one PC that subnet allows a range of two IPs (PC NIC and Router Interface)
    New Windows/Linux 192.168.1.1 /30 and up if you have more then one device try to keep the subnet as small as possible
    IoT/WiFi Devices 192.168.2.1 /30 and up

    That is basic subnet segmentation and adds a good amount of protection on the network side. Of course you can add another layer on top VLAN IDs. Easiest way is port based VLAN Example:

    VLAN: 100 Old Windows 192.168.0.2 /30 for Router Interface LAN 1
    VLAN: 200 New Windows 192.168.1.2 /30 for Router Interface LAN 2
    VLAN 300 IoT / WiFi Devices 192.168.2.2 /30 for Router Interface LAN3 / WiFi

    What segmentation does in that way is that you can setup a Rule-Set on the Router Firewall for each individual segment and makes maintaining it easier. The other part is that you can Route Traffic to specific Hosts in your network -Example: PC1 to PC2 and not PC3

    Another side effect is performance - Since you have segments of enclosed networks the broadcast overhead is smaller and gains more responsiveness. The other part is if one is infected it can not reach the others that easily!

    If you need more assistance in networking ill be glad to help you out and develop a schismatic for your needs.

    Another part is a Firewall appliance on that part ill recommend Sophos XG Home (easy to setup and very powerfull) -> Free Firewall - Home Edition | Sophos Firewall for Home

    Best regards
    Val.
     

    Sampei Nihira

    Level 6
    Verified
    Hello @Sampei Nihira

    thank you for sharing your topic / config. found some interesting programs and extensions you use. ;)

    In terms of Network security I would go a step farther and try to segment the network (Example):

    Old Windows 192.168.0.1 /30 if there is only one PC that subnet allows a range of two IPs (PC NIC and Router Interface)
    New Windows/Linux 192.168.1.1 /30 and up if you have more then one device try to keep the subnet as small as possible
    IoT/WiFi Devices 192.168.2.1 /30 and up

    That is basic subnet segmentation and adds a good amount of protection on the network side. Of course you can add another layer on top VLAN IDs. Easiest way is port based VLAN Example:

    VLAN: 100 Old Windows 192.168.0.2 /30 for Router Interface LAN 1
    VLAN: 200 New Windows 192.168.1.2 /30 for Router Interface LAN 2
    VLAN 300 IoT / WiFi Devices 192.168.2.2 /30 for Router Interface LAN3 / WiFi

    What segmentation does in that way is that you can setup a Rule-Set on the Router Firewall for each individual segment and makes maintaining it easier. The other part is that you can Route Traffic to specific Hosts in your network -Example: PC1 to PC2 and not PC3

    Another side effect is performance - Since you have segments of enclosed networks the broadcast overhead is smaller and gains more responsiveness. The other part is if one is infected it can not reach the others that easily!

    If you need more assistance in networking ill be glad to help you out and develop a schismatic for your needs.

    Another part is a Firewall appliance on that part ill recommend Sophos XG Home (easy to setup and very powerfull) -> Free Firewall - Home Edition | Sophos Firewall for Home

    Best regards
    Val.
    Thank you very much for your considerations.
    It will probably amaze you but I would be very interested in a better explanation of:

    ....Another side effect is performance - Since you have segments of enclosed networks the broadcast overhead is smaller and gains more responsiveness.....
    You can write comfortably, after this post unfortunately I have to unplug until almost certainly Sunday afternoon.
    The usual commitments, the family, wife .....:cautious::)

    Thanks a lot again.
     
    Status
    Not open for further replies.
    Top