Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Operating Systems
Windows 11
Worth Upgrading to Win 11 Pro for Security Reasons?
Message
<blockquote data-quote="Victor M" data-source="post: 1076743" data-attributes="member: 96560"><p>The reason I started spewing out technobabble was because from what you explained, you do have some security in place, like Hard Configurator and SpyShelter, as you explained below.</p><p></p><p>But you also explained that you had a hacker for a long time.</p><p></p><p>What I forgot to point out, is that hackers do return. They had privileged access, and it is normal hacker practice to establish means of guaranteed re-entry, should you do something funny like re-install Windows. They return for various reasons, to 'check up' on you, to see what new defenses you have put up, to see what new data is now available to exfiltrate, or just to satisfy their curiosity.</p><p></p><p>So I elaborated on what are the established ways to ensure proper security. And I went a bit overboard in the technical description of our current technical control. Operationally, I actually works quite simply.</p><p></p><p>Here's what I should have focused on first: Prevent the hacker from coming back.</p><p></p><p>There exists hacker tools that write to the boot sectors of a drive. This lies outside of Windows. They start when you start your pc and because it starts up outside of Windows before Windows loads, no Windows based anti-malware tool can find them. And when you re-install Windows, and use the Custom option to Delete every partition, their code stays intact.</p><p></p><p>There is a disk utility called Parted Magic. It has a feature called Erase Disk. It works on hard drives, SSDs, NvMEs. What it can do is securely wipe a disk by filling it with 0 and 1's, or invoke a NvME drive's built in secure erase process. It also can verify the job is done properly. The latest version is Not free, but the older versions are. You google for 'Parted Magic old version' and you will find it. It downloads as an ISO file, which is a disk image file. You then use the freeware Rufus program to write this ISO to a USB stick. Then you boot your pc using this USB stick and invoke the Erase Disk. Optionally you can checkmark Verify.</p><p></p><p>Then, you can re-install Windows onto the now fully erased disk. This 2 step process guarantees that the hacker's tools are gone from your system. He will have to re-attack you from scratch if he decides to revisit you. Since you no longer use Remote Desktop, you have eliminated one of his options.</p><p></p><p>Back to Comodo Internet Security. The program automatically virtualizes all new programs that does not currently reside on your drive. So that would include legitimate programs you are installing, malware, ransomware, hacking tools, whatever. This it calls 'Auto-Containment'. A contained program installer will not install properly, so you simply turn off Auto Containment temporarily from the main menu when you need to install something. And remember to re-activate it afterwards. A contained/virtualized program will have a green windows border. That's how you tell the difference.</p><p></p><p>We have an expert on Comodo Internet Security and Comodo Firewall (a free product without anti-malware) in the forum by the username 'cruelsister'. She has laid out a fool proof setup procedure for setting this up. Simply do a message search and you will find it. She has also recently made a video demoing the latest beta version of CIS 2024. Actually there is another demo of CIS beta 2024 by Shadowra. Both videos demonstrate CIS's strong protection capability.</p><p></p><p>But as I mentioned, technical defenses all have a limited life time. Please remember that. Employ all 3 categories of defenses or it will be flawed.</p></blockquote><p></p>
[QUOTE="Victor M, post: 1076743, member: 96560"] The reason I started spewing out technobabble was because from what you explained, you do have some security in place, like Hard Configurator and SpyShelter, as you explained below. But you also explained that you had a hacker for a long time. What I forgot to point out, is that hackers do return. They had privileged access, and it is normal hacker practice to establish means of guaranteed re-entry, should you do something funny like re-install Windows. They return for various reasons, to 'check up' on you, to see what new defenses you have put up, to see what new data is now available to exfiltrate, or just to satisfy their curiosity. So I elaborated on what are the established ways to ensure proper security. And I went a bit overboard in the technical description of our current technical control. Operationally, I actually works quite simply. Here's what I should have focused on first: Prevent the hacker from coming back. There exists hacker tools that write to the boot sectors of a drive. This lies outside of Windows. They start when you start your pc and because it starts up outside of Windows before Windows loads, no Windows based anti-malware tool can find them. And when you re-install Windows, and use the Custom option to Delete every partition, their code stays intact. There is a disk utility called Parted Magic. It has a feature called Erase Disk. It works on hard drives, SSDs, NvMEs. What it can do is securely wipe a disk by filling it with 0 and 1's, or invoke a NvME drive's built in secure erase process. It also can verify the job is done properly. The latest version is Not free, but the older versions are. You google for 'Parted Magic old version' and you will find it. It downloads as an ISO file, which is a disk image file. You then use the freeware Rufus program to write this ISO to a USB stick. Then you boot your pc using this USB stick and invoke the Erase Disk. Optionally you can checkmark Verify. Then, you can re-install Windows onto the now fully erased disk. This 2 step process guarantees that the hacker's tools are gone from your system. He will have to re-attack you from scratch if he decides to revisit you. Since you no longer use Remote Desktop, you have eliminated one of his options. Back to Comodo Internet Security. The program automatically virtualizes all new programs that does not currently reside on your drive. So that would include legitimate programs you are installing, malware, ransomware, hacking tools, whatever. This it calls 'Auto-Containment'. A contained program installer will not install properly, so you simply turn off Auto Containment temporarily from the main menu when you need to install something. And remember to re-activate it afterwards. A contained/virtualized program will have a green windows border. That's how you tell the difference. We have an expert on Comodo Internet Security and Comodo Firewall (a free product without anti-malware) in the forum by the username 'cruelsister'. She has laid out a fool proof setup procedure for setting this up. Simply do a message search and you will find it. She has also recently made a video demoing the latest beta version of CIS 2024. Actually there is another demo of CIS beta 2024 by Shadowra. Both videos demonstrate CIS's strong protection capability. But as I mentioned, technical defenses all have a limited life time. Please remember that. Employ all 3 categories of defenses or it will be flawed. [/QUOTE]
Insert quotes…
Verification
Post reply
Top