I'm setting up a computer for my paranoid father. An example of the precautions he takes is to shut down the modem/router when not in use and disconnect the DSL phone line. Also unwilling to use wireless mice or keyboards lest his password keystrokes be logged by rogue hackers in the neighbourhood.
I've taken some notes of posted security configurations on this forum however I initially came here with questions on the following general points:
- Are pi-holes attached to router worth considering?
- What software firewalls are recommended? Is there a better physical alternative for purchase or creation from old computer?
- What's a good VPN either paid or free? The TOR browser is considered but my father would never trust it's nature
- What anti-virus programs are worth considering? Avast had a virtualized environment in the past I recall but I never tested it's efficacy.
- How's Malwarebytes considered these days? I've used it for scans before but how would it's live protection mesh in a good protection scheme?
Let me know what your entry and mid level security recommendations may be please. I'm not well versed in networking but technical enough to implement most things.
Thanks.
I've taken some notes of posted security configurations on this forum however I initially came here with questions on the following general points:
- Are pi-holes attached to router worth considering?
- What software firewalls are recommended? Is there a better physical alternative for purchase or creation from old computer?
- What's a good VPN either paid or free? The TOR browser is considered but my father would never trust it's nature
- What anti-virus programs are worth considering? Avast had a virtualized environment in the past I recall but I never tested it's efficacy.
- How's Malwarebytes considered these days? I've used it for scans before but how would it's live protection mesh in a good protection scheme?
Let me know what your entry and mid level security recommendations may be please. I'm not well versed in networking but technical enough to implement most things.
Thanks.