Solved

What steps do you experts take in securing XP Professional and Vista?

Posted on 2009-05-11
1
248 Views
Last Modified: 2012-05-06
What steps do you experts take in securing XP Professional and Vista?
0
Comment
Question by:victor2008
1 Comment
 
LVL 27

Accepted Solution

by:
Tolomir earned 500 total points
ID: 24363310
I can only answer for xp, since I avoid vista ;-)

Use restricted user accounts for daily work.
Apply windows updates (at work via wsus)
Use antivirus (1) & antimalware (2): gdata antivirus 2010 / prevx edge 3.0
Bi-weekly backup of the the userdata (at work: store all userdata on netdrives) with acronis trueimage (3)
You can scan the system with Secunia Personal Software Inspector (PSI) (4) to scan for insecure programs.
You can scan the system additionally with Belarc Advisor (5) a free Personal PC Audit tool.

Firewall: I recommend to use a hardware based firewall in front of your computer(s) in general, there is no software firewall needed, since a malware trying to get out can always do so. Rather keep your windows system clean then try to prevent an outbreak....

Still if you want extra protection for your browser you can use sandboxie (6) or Zonealarm ForceField (7)

If you want to tuneup your windows systems additionally please take a look at Tuneup Utilities 2009 (8)

If hard disk encryption you can use the free truecrypt 6.2 (9) full disk encryption.

--

This should give a good idea what you can do with windows.


Tolomir

--

(1) http://www.gdatasoftware.com/online-shop/anti-virus-produkte/shop/23-private-user/928-g-data-antivirus-2010.html
(2) http://www.prevx.com/freescan.asp
(3) http://www.acronis.com/homecomputing/products/trueimage/
(4) http://secunia.com/vulnerability_scanning/personal/
(5) http://www.belarc.com/free_download.html
(6) http://www.sandboxie.com/
(7) http://www.zonealarm.com/security/en-us/zonealarm-forcefield-browser-security.htm
(8) http://www.tune-up.com/products/tuneup-utilities/
(9) http://www.truecrypt.org/
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How do we balance the user experience (UX) with reasonable security measures? It can be done, if you keep these fundamentals in mind.
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question