IT tutorials
 
Windows
 

Windows Vista : Secure Your Networked PC (part 1) - Close Vista's Backdoors, The Security Center and the Firewall

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
2/7/2013 11:15:55 AM

Security is a very real concern for any computer connected to a network or the Internet. There are three main categories of security threats:


A deliberate, targeted attack through your Internet connection

Ironically, this is the type of attack most people fear, but realistically, it's the least likely to occur, at least where home and small-office networks are concerned. It's possible for a so-called hacker to obtain access to your computer, either through your Internet connection or from another computer on your local network; it's just not terribly likely that such a hacker will bother.


An automated invasion by a virus, worm, Trojan horse, or robot

A virus is simply a computer program that is designed to duplicate itself with the purpose of infecting as many computers as possible. If your computer is infected by a virus, it may use your network connection to infect other computers; likewise, if another computer on your network is infected, your computer is vulnerable to infection. The same goes for Internet connections, although the method of transport in this case is typically an infected email message. 

There also exist so-called robots, programs that are designed to scan large groups of IP addresses, looking for vulnerabilities. The motive for such a program can be anything from exploitation of credit card numbers or other sensitive information to the creation of a "zombie," a PC that has been hijacked for the purpose of distributing spam, viruses, or extreme right-wing propaganda.

Finally, a Trojan horse is a program that works somewhat like a virus, except that its specific purpose is to create vulnerabilities in your computer that can subsequently be exploited by a hacker or robot. For example, a program might open a port on your computer and then communicate with a remote system to announce its presence.


A deliberate attack by a person sitting at your computer

A person who sits down at your computer can easily gain access to sensitive information, including your documents, email, and even various passwords stored by your web browser. An intruder can be anyone, from the jerk who has just stolen your laptop, to a coworker casually walking by your unattended desk, to your eight-year-old niece. Naturally, it's up to you to determine the actual likelihood of such a threat and to take the appropriate measures (such as password-protecting your screen saver, or hiding your keyboard in the closet).

Defending your computer (and your network) against these attacks essentially involves fixing the vulnerabilities they exploit.

1. Close Vista's Backdoors

Windows Vista includes several features that will enable you to implement a reasonable level of security without purchasing additional software or hardware. Unfortunately, few of these features are in effect by default.

The following steps will help you close some of these "backdoors":


Sharing Wizard bad.

One of the main reasons to set up a workgroup is to share files and printers with other computers. But it's wise to share only those folders that need to be shared, and disable sharing for all others. A feature called Simple File Sharing, which might allow anyone, anywhere, to access your personal files without your knowledge, is turned on by default. In Control Panel, open Folder Options, choose the View tab, and turn off the Use Sharing Wizard (Recommended) option. 


UPnP bad.

Another feature, called Universal Plug-and-Play (UPnP), can open additional vulnerabilities on your system. UPnP could more aptly be called Network Plug and Play, since it only deals with network devices. UPnP is a collection of standards that allow such devices to announce their presence to UPnP servers on your network, much in the same way as your PnP sound card announces its presence to Windows when you boot your system.

Windows supports UPnP out of the box, which, on the surface, sounds like a good idea. However, UPnP is a service that most users don't need, and unless you specifically need to connect to a UPnP device on your network, you should disable UPnP on your system immediately. Leaving a service like UPnP running unnecessarily exposes your system to several security threats.

To disable UPnP, open the Services window (services.msc). Find the SSDP Discovery Service in the list and double-click it. Click Stop to stop the service and change the Startup type to Disabled to prevent it from loading the next time Windows starts. Click OK and then do the same for the UPnP Device Host. Close the Services window when you're done.


Remote Desktop good, but only when you need it.

The Remote Desktop feature,  is enabled by default in the Windows Vista Business and Ultimate editions. Unless you specifically need this feature, it should be disabled. In Control Panel, open System and then click the Remote settings link on the left. In the Remote tab of the System Properties window, turn off the Allow Remote Assistance connections to this computer option, and select the Don't allow connections to this computer option, beneath it.


Passwords good.

Make sure each and every user account on your system has a unique password. Even though you may not be concerned about security among users, unprotected accounts can be exploited by an attack over a network. 


Firewall good, sometimes.

Set up a firewall, as described in the next section, to further protect your computer by strictly controlling network traffic into and out of your computer.


Open ports bad.


2. The Security Center and the Firewall

The Windows Security Center, shown in Figure 1, is a central page in Control Panel used to keep tabs on the Windows Firewall, Windows Defender, User Account Control, and automatic updating. It also monitors your antivirus software, but for purely political and marketing reasons, Windows Vista includes no antivirus functionality of its own.

Figure 1. The Windows Security Center goes a long way to make Windows appear safer


There are two problems with the Windows Security Center. First, its alerts can be particularly repetitive and annoying (this is intentional). Second, it doesn't actually do that much to protect your PC (unfortunately, this is also intentional).

Above all, the Security Center is a monitoring tool. If it sees that a particular feature is turned on (whether or not it's doing its job), the Security Center is happy, and you won't see any options in that section. Otherwise, you'll have the option of fixing the "problem" by clicking a big, friendly button (e.g., Turn on now). Or, to stop monitoring a specific feature, click the Show me my available options link.

Click the Change the way Security Center alerts me link to the left to choose what happens when the Security Center finds a problem. To effectively turn off the Windows Security Center (or more accurately, take away its only power), click Don't notify me and don't display the icon here. Or, if you feel that's too severe, click Don't notify me, but display the icon; that way, you'll know if there's a problem, but Security Center won't interrupt you to tell you. See the "Disable the Security Center" sidebar, next, for another solution.


Disable the Security Center

If you find that the Security Center is hassling you with unnecessary scans and warning messages, despite the fact that you've asked it not to, your only resort may be to disable it completely. Here's how to do it:

  1. Open the Services window (services.msc).

  2. Locate Security Center in the list, double-click it, and change the Startup type to Disabled.

  3. Click OK and close the Services window when you're done.

Note that this doesn't actually disable the firewall, antivirus, or automatic update features you may have employed, only the "monitoring" effects of the Windows Security Center.


Click the colored ribbons to expand or collapse each section:


Firewall

You can't actually change any firewall settings here; click the Windows Firewall link on the left to configure Windows' built-in firewall feature, discussed in the next section.


Automatic updating

The Automatic Updates feature is responsible for periodically contacting Microsoft to see whether new updates to Windows (and optionally, other installed Microsoft products) are available. Open Windows Update in Control Panel to change this setting.

In its most automated mode (Microsoft's recommended setting), Windows downloads and installs so-called "high priority" updates automatically. 


Malware protection

This section actually monitors two areas: Virus protection, which is the only feature not included with Windows Vista, and Spyware and other malware protection, which is handled by Windows Defender (and turned on by default).

The Security Center has been known to initiate virus scans unnecessarily, including—for some users—every time Windows starts. Even if you already have Security Center-aware antivirus software installed, you may wish to disable monitoring for this reason. Click the Show me my available options link and then click I have an antivirus program that I'll monitor myself, and the antivirus status will change to Not monitored.



Other security settings

This section also includes two entries: Internet security settings (despite the name, these only apply to Internet Explorer; click the Internet Options link on the left to change them) and User Account Control.

Now, if you're the forgetful type, it's best to leave all of the alerts and warnings in the Windows Security Center intact. But if you're annoyed by all the messages, and have taken the time to secure your PC yourself, then you may feel safe scaling back the Security Center's reach.
 
Others
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us