"louise" <louise@invalid.invalid> wrote in message
news:68pt0bF2tnktkU1@mid.individual.net...
> Kayman wrote:
>> On Fri, 09 May 2008 21:58:57 GMT, Poky wrote:
>>> On Fri, 09 May 2008 04:30:45 GMT, Straight Talk
>>> <b__nice@hotmail.com>
>>> wrote:
>>>> Better to avoid installing malware in the first place (it's
>>>> actually
>>>> not that hard).
>>> So how do you post here since you unplugged your PC from the
>>> internet?
>> It's not to difficult to do, Poky
>> Security software manufacturers tend to overstate their product
>> description
>> to instill fear and uncertainty; After all it's all about the $
>> almighty.
>> Please step back and try to remove the advertisement hype from your
>> mind.
>> In WinXP the most dependable defenses are:
>> 1. Do not work as 'Administrator'; For day-to-day work routinely use
>> a
>> Limited User Account (LUA).
>> 2. Secure (Harden) your operating system (OS).
>> 3. Keep your OS and all software on it updated/patched.
>> 4. Reconsider the usage of MSIE and MSOE.
>> 5. Review your installed 3rd party software applications/utilities;
>> Remove clutter.
>> 6. Don't expose services to public networks.
>> 7. Activate the in-build firewall and configure Windows not to use
>> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus
>> leaving TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
>> networking weak point) closed. 7a. If on high-speed internet use a
>> router as well.
>> 8. Routinely practice safe-hex.
>> 9. Regularly back-up data/files.
>> 10. Familiarize yourself with crash recovery tools and re-installing
>> your OS.
>> 11. Utilize a real-time anti-virus (AV) application and vital system
>> monitoring utilities/applications.
>> 12. Keep abreast of latest developments - Sh!t happens...you know.
>> The least preferred defenses are:
>> Myriads of popular anti-whatever things and staying ignorant.
>> Educational Reading: Security @ home
>> http://home20.inet.tele.dk/b_nice/index.htm
> I'm running XP SP2, using cable internet access with a router.
> Could you explain how to do: "configure Windows not to use
> TCP/IP as transport protocol for NetBIOS, SMB and RPC, thus leaving
> TCP/UDP ports 135,137-139 and 445 (the most exploited Windows
> networking weak point) closed. "
> I don't know how to go about making the above happen.
Seconfig XP:
* A free tool to close (not just shield) most exploited Windows security
holes.
* Can close ports 135, 137-139, 445, 1025 (used by file and printer
sharing, Windows domains, other Microsoft Networks access and widely
exploited by worms, hackers etc.), 1900, 5000 (used by UPnP) and
other...
* Can disable most dangerous Windows services.
* Can protect Windows side against most ARP spoofing/poisoning attacks.
* Can configure many other hidden security related Windows TCP/IP
settings.
* Works only with registry (no files, services, drivers etc.).
* Includes three easy to use presets for average home (standalone)
computers, Microsoft Networks members and standalone computers with VPN
client access to Microsoft Networks.
* Certified to be malware free by Softpedia.
http://seconfig.sytes.net/
-jen



Reply With Quote