On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
wrote:
>Better to avoid installing malware in the first place (it's actually
>not that hard).
So how do you post here since you unplugged your PC from the internet?
On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
wrote:
>Better to avoid installing malware in the first place (it's actually
>not that hard).
So how do you post here since you unplugged your PC from the internet?
On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
> wrote:
>
>>Better to avoid installing malware in the first place (it's actually
>>not that hard).
>
> So how do you post here since you unplugged your PC from the internet?
It's not to difficult to do, Poky
Security software manufacturers tend to overstate their product description
to instill fear and uncertainty; After all it's all about the $ almighty.
Please step back and try to remove the advertisement hype from your mind.
In WinXP the most dependable defenses are:
1. Do not work as 'Administrator'; For day-to-day work routinely use a
Limited User Account (LUA).
2. Secure (Harden) your operating system (OS).
3. Keep your OS and all software on it updated/patched.
4. Reconsider the usage of MSIE and MSOE.
5. Review your installed 3rd party software applications/utilities;
Remove clutter.
6. Don't expose services to public networks.
7. Activate the in-build firewall and configure Windows not to use
TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
networking weak point) closed.
7a. If on high-speed internet use a router as well.
8. Routinely practice safe-hex.
9. Regularly back-up data/files.
10. Familiarize yourself with crash recovery tools and re-installing
your OS.
11. Utilize a real-time anti-virus (AV) application and vital system
monitoring utilities/applications.
12. Keep abreast of latest developments - Sh!t happens...you know.
The least preferred defenses are:
Myriads of popular anti-whatever things and staying ignorant.
Educational Reading:
Security @ home
http://home20.inet.tele.dk/b_nice/index.htm
Good luck
On Sat, 10 May 2008 08:00:48 +0700, Kayman
<kaymanDeleteThis@operamail.com> wrote:
>Good luck
Yea, you'll need luck everytime you connect your computer to the
internet. No one is ever 100% secure as soon as you connect to the
internet, and I mean no one, no matter how much you "harden" your PC.
On Sat, 10 May 2008 08:00:48 +0700, Kayman
<kaymanDeleteThis@operamail.com> wrote:
>7. Activate the in-build firewall and configure Windows not to use
> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
> networking weak point) closed.
I use a router so ports are only opened as needed. I do disable
netbios but if you don't it is no big deal if you have a router.
Kayman wrote:
> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
>
>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk <b__nice@hotmail.com>
>> wrote:
>>
>>> Better to avoid installing malware in the first place (it's actually
>>> not that hard).
>> So how do you post here since you unplugged your PC from the internet?
>
> It's not to difficult to do, Poky
> Security software manufacturers tend to overstate their product description
> to instill fear and uncertainty; After all it's all about the $ almighty.
> Please step back and try to remove the advertisement hype from your mind.
>
> In WinXP the most dependable defenses are:
> 1. Do not work as 'Administrator'; For day-to-day work routinely use a
> Limited User Account (LUA).
> 2. Secure (Harden) your operating system (OS).
> 3. Keep your OS and all software on it updated/patched.
> 4. Reconsider the usage of MSIE and MSOE.
> 5. Review your installed 3rd party software applications/utilities;
> Remove clutter.
> 6. Don't expose services to public networks.
> 7. Activate the in-build firewall and configure Windows not to use
> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
> networking weak point) closed.
> 7a. If on high-speed internet use a router as well.
> 8. Routinely practice safe-hex.
> 9. Regularly back-up data/files.
> 10. Familiarize yourself with crash recovery tools and re-installing
> your OS.
> 11. Utilize a real-time anti-virus (AV) application and vital system
> monitoring utilities/applications.
> 12. Keep abreast of latest developments - Sh!t happens...you know.
> The least preferred defenses are:
> Myriads of popular anti-whatever things and staying ignorant.
> Educational Reading:
> Security @ home
> http://home20.inet.tele.dk/b_nice/index.htm
>
> Good luck
>
I'm running XP SP2, using cable internet access with a router.
Could you explain how to do: "configure Windows not to use
TCP/IP as transport protocol for NetBIOS, SMB and RPC,
thus leaving
TCP/UDP ports 135,137-139 and 445 (the most exploited
Windows
networking weak point) closed. "
I don't know how to go about making the above happen.
Thanks
Louise
"louise" <louise@invalid.invalid> wrote in message
news:68pt0bF2tnktkU1@mid.individual.net...
> Kayman wrote:
>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
>>> <b__nice@hotmail.com>
>>> wrote:
>>>> Better to avoid installing malware in the first place (it's
>>>> actually
>>>> not that hard).
>>> So how do you post here since you unplugged your PC from the
>>> internet?
>> It's not to difficult to do, Poky
>> Security software manufacturers tend to overstate their product
>> description
>> to instill fear and uncertainty; After all it's all about the $
>> almighty.
>> Please step back and try to remove the advertisement hype from your
>> mind.
>> In WinXP the most dependable defenses are:
>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
>> a
>> Limited User Account (LUA).
>> 2. Secure (Harden) your operating system (OS).
>> 3. Keep your OS and all software on it updated/patched.
>> 4. Reconsider the usage of MSIE and MSOE.
>> 5. Review your installed 3rd party software applications/utilities;
>> Remove clutter.
>> 6. Don't expose services to public networks.
>> 7. Activate the in-build firewall and configure Windows not to use
>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>> networking weak point) closed. 7a. If on high-speed internet use a
>> router as well.
>> 8. Routinely practice safe-hex.
>> 9. Regularly back-up data/files.
>> 10. Familiarize yourself with crash recovery tools and re-installing
>> your OS.
>> 11. Utilize a real-time anti-virus (AV) application and vital system
>> monitoring utilities/applications.
>> 12. Keep abreast of latest developments - Sh!t happens...you know.
>> The least preferred defenses are:
>> Myriads of popular anti-whatever things and staying ignorant.
>> Educational Reading: Security @ home
>> http://home20.inet.tele.dk/b_nice/index.htm
> I'm running XP SP2, using cable internet access with a router.
> Could you explain how to do: "configure Windows not to use
> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
> networking weak point) closed. "
> I don't know how to go about making the above happen.
Seconfig XP:
* A free tool to close (not just shield) most exploited Windows security
holes.
* Can close ports 135, 137-139, 445, 1025 (used by file and printer
sharing, Windows domains, other Microsoft Networks access and widely
exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
other...
* Can disable most dangerous Windows services.
* Can protect Windows side against most ARP spoofing/poisoning attacks.
* Can configure many other hidden security related Windows TCP/IP
settings.
* Works only with registry (no files, services, drivers etc.).
* Includes three easy to use presets for average home (standalone)
computers, Microsoft Networks members and standalone computers with VPN
client access to Microsoft Networks.
* Certified to be malware free by Softpedia.
http://seconfig.sytes.net/
-jen
jen wrote:
> "louise" <louise@invalid.invalid> wrote in message
> news:68pt0bF2tnktkU1@mid.individual.net...
>> Kayman wrote:
>>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
>>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
>>>> <b__nice@hotmail.com>
>>>> wrote:
>>>>> Better to avoid installing malware in the first place (it's
>>>>> actually
>>>>> not that hard).
>>>> So how do you post here since you unplugged your PC from the
>>>> internet?
>>> It's not to difficult to do, Poky
>>> Security software manufacturers tend to overstate their product
>>> description
>>> to instill fear and uncertainty; After all it's all about the $
>>> almighty.
>>> Please step back and try to remove the advertisement hype from your
>>> mind.
>>> In WinXP the most dependable defenses are:
>>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
>>> a
>>> Limited User Account (LUA).
>>> 2. Secure (Harden) your operating system (OS).
>>> 3. Keep your OS and all software on it updated/patched.
>>> 4. Reconsider the usage of MSIE and MSOE.
>>> 5. Review your installed 3rd party software applications/utilities;
>>> Remove clutter.
>>> 6. Don't expose services to public networks.
>>> 7. Activate the in-build firewall and configure Windows not to use
>>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
>>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>>> networking weak point) closed. 7a. If on high-speed internet use a
>>> router as well.
>>> 8. Routinely practice safe-hex.
>>> 9. Regularly back-up data/files.
>>> 10. Familiarize yourself with crash recovery tools and re-installing
>>> your OS.
>>> 11. Utilize a real-time anti-virus (AV) application and vital system
>>> monitoring utilities/applications.
>>> 12. Keep abreast of latest developments - Sh!t happens...you know.
>>> The least preferred defenses are:
>>> Myriads of popular anti-whatever things and staying ignorant.
>>> Educational Reading: Security @ home
>>> http://home20.inet.tele.dk/b_nice/index.htm
>> I'm running XP SP2, using cable internet access with a router.
>> Could you explain how to do: "configure Windows not to use
>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
>> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>> networking weak point) closed. "
>> I don't know how to go about making the above happen.
>
> Seconfig XP:
> * A free tool to close (not just shield) most exploited Windows security
> holes.
> * Can close ports 135, 137-139, 445, 1025 (used by file and printer
> sharing, Windows domains, other Microsoft Networks access and widely
> exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
> other...
> * Can disable most dangerous Windows services.
> * Can protect Windows side against most ARP spoofing/poisoning attacks.
> * Can configure many other hidden security related Windows TCP/IP
> settings.
> * Works only with registry (no files, services, drivers etc.).
> * Includes three easy to use presets for average home (standalone)
> computers, Microsoft Networks members and standalone computers with VPN
> client access to Microsoft Networks.
> * Certified to be malware free by Softpedia.
> http://seconfig.sytes.net/
>
> -jen
>
>
Thanks - I'm looking at it right now.
Louise
jen wrote:
> "louise" <louise@invalid.invalid> wrote in message
> news:68pt0bF2tnktkU1@mid.individual.net...
>> Kayman wrote:
>>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
>>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
>>>> <b__nice@hotmail.com>
>>>> wrote:
>>>>> Better to avoid installing malware in the first place (it's
>>>>> actually
>>>>> not that hard).
>>>> So how do you post here since you unplugged your PC from the
>>>> internet?
>>> It's not to difficult to do, Poky
>>> Security software manufacturers tend to overstate their product
>>> description
>>> to instill fear and uncertainty; After all it's all about the $
>>> almighty.
>>> Please step back and try to remove the advertisement hype from your
>>> mind.
>>> In WinXP the most dependable defenses are:
>>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
>>> a
>>> Limited User Account (LUA).
>>> 2. Secure (Harden) your operating system (OS).
>>> 3. Keep your OS and all software on it updated/patched.
>>> 4. Reconsider the usage of MSIE and MSOE.
>>> 5. Review your installed 3rd party software applications/utilities;
>>> Remove clutter.
>>> 6. Don't expose services to public networks.
>>> 7. Activate the in-build firewall and configure Windows not to use
>>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
>>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>>> networking weak point) closed. 7a. If on high-speed internet use a
>>> router as well.
>>> 8. Routinely practice safe-hex.
>>> 9. Regularly back-up data/files.
>>> 10. Familiarize yourself with crash recovery tools and re-installing
>>> your OS.
>>> 11. Utilize a real-time anti-virus (AV) application and vital system
>>> monitoring utilities/applications.
>>> 12. Keep abreast of latest developments - Sh!t happens...you know.
>>> The least preferred defenses are:
>>> Myriads of popular anti-whatever things and staying ignorant.
>>> Educational Reading: Security @ home
>>> http://home20.inet.tele.dk/b_nice/index.htm
>> I'm running XP SP2, using cable internet access with a router.
>> Could you explain how to do: "configure Windows not to use
>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
>> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>> networking weak point) closed. "
>> I don't know how to go about making the above happen.
>
> Seconfig XP:
> * A free tool to close (not just shield) most exploited Windows security
> holes.
> * Can close ports 135, 137-139, 445, 1025 (used by file and printer
> sharing, Windows domains, other Microsoft Networks access and widely
> exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
> other...
> * Can disable most dangerous Windows services.
> * Can protect Windows side against most ARP spoofing/poisoning attacks.
> * Can configure many other hidden security related Windows TCP/IP
> settings.
> * Works only with registry (no files, services, drivers etc.).
> * Includes three easy to use presets for average home (standalone)
> computers, Microsoft Networks members and standalone computers with VPN
> client access to Microsoft Networks.
> * Certified to be malware free by Softpedia.
> http://seconfig.sytes.net/
>
> -jen
>
>
Looking at the program. I use gotomypc.com which
essentially allows me to access my pc from any computer
anywhere in the world as long as it is turned on.
Do you know whether one or more of the settings in seconfig
would affect this?
Thanks again.
Louise
louise <louise@invalid.invalid> wrote in
news:69105gF2pmui8U2@mid.individual.net:
> Looking at the program. I use gotomypc.com which
> essentially allows me to access my pc from any computer
> anywhere in the world as long as it is turned on.
>
> Do you know whether one or more of the settings in seconfig
> would affect this?
>
> Thanks again.
>
> Louise
>
Probably. Do you have a router? If you do then you don't need to go go
closing ports etc. Ports are closed on the router and opened as needed.
Doing all that stuff listed is for the paranoid and not rational human
beings.
> Do you know whether one or more of the settings in seconfig would affect
> this?
>
No it won't. Just follow instructions.
BTW, in relation to surfing the internet, being paranoid is good.
There are currently 1 users browsing this thread. (0 members and 1 guests)