Search:

Type: Posts; User: ghostinshell; Keyword(s):

Search: Search took 0.13 seconds.

  1. Replies
    0
    Views
    10,334

    NATO websites DDOS'd

    http://www.dailymail.co.uk/news/article-2582071/Several-NATO-websites-hacked-cyber-attack-linked-crisis-Crimea.html

    Looks like cyberspace is abuzz with crimea issues spilling over into NATO. going...
  2. Replies
    13
    Views
    48,928

    the way to proper lock up files is with...

    the way to proper lock up files is with truecrypt:
    http://www.truecrypt.org/
  3. Replies
    8
    Views
    41,016

    yea, ahh no a home user cant do this. you can do...

    yea, ahh no a home user cant do this. you can do something like have your wired on one connection and your wireless on another tho.....
  4. don't... I have good encrypted backups, and an...

    don't... I have good encrypted backups, and an encrypted local drives. make sure you dont or make sure you have it somewhere hidden away where you can get to it just in case.......
  5. Replies
    5
    Views
    16,024

    fusiomax20; I am not sure, this thread is the...

    fusiomax20;

    I am not sure, this thread is the right place for that post. maybe open a new thread...

    We (those in the IT ind) have known for many years the NET is the wild west. the only...
  6. Replies
    0
    Views
    17,457

    Hi All.....

    I was a member and visited a lot way..... back when AO was a Full site, somewhere along the way I am not
    sure what happened or what my other account was or even if it would still work.

    anyways,...
  7. you have done the basics the big thing is a...

    you have done the basics the big thing is a strong wireless key:

    https://www.grc.com/passwords.htm

    -GhostInShell
  8. I am not going to regurgitate what the others...

    I am not going to regurgitate what the others have written. but; its a 3 step process:

    step 1; up to date software, and software/OS hardening
    step 2; decent Antivirus, if your pretty savy you can...
  9. couple of things; yes check out the icon...

    couple of things;

    yes check out the icon clean, and other profile stuff and make sure your profile is setup the way you want it to be.

    now, to protect your computer well that's a huge subject...
  10. NTFS does support large drives, both boot (not...

    NTFS does support large drives, both boot (not sure why you would want to) and 2ndary data drives. most of the "ransomware" types of malware infection vectors are mostly via pdf, or URL links.
    ...
  11. Replies
    7
    Views
    49,169

    go get a autoruns over at Microsoft sysinternals...

    go get a autoruns over at Microsoft sysinternals site. it will help you, it will tell you if something exists. some applications are terrible at cleaning up after themselves.....
  12. encryption is your friend.... I use full disk...

    encryption is your friend.... I use full disk encryption, EFS and truecrypt....
  13. backup your data, that's it; and, lock things...

    backup your data, that's it; and, lock things down. but its mostly a usability issue cryptolocker, etc infection vectors are via pdf, flash or links. making sure everything is fully patched, and...
  14. Replies
    4
    Views
    41,283

    UAC is not considered a security boundary. but it...

    UAC is not considered a security boundary. but it is a very import part of defense in depth. I actually turn it to the highest level and run with only user rights......
  15. if its running, at the same level then by default...

    if its running, at the same level then by default they can kill it. try either running it as another user, or mess with the integrity levels....
  16. Replies
    5
    Views
    16,024

    yea, for home get a router they all have a built...

    yea, for home get a router they all have a built in firewall. and for your laptop just make sure the firewall is on....
  17. no; generally anything above vista most of the...

    no; generally anything above vista most of the services you need. why do you want to disable them?
  18. Replies
    4
    Views
    12,343

    having the firewall on, and if your using windows...

    having the firewall on, and if your using windows pro or above. then there is a local right called "access this computer from the network". there is also a ton, of RDP related
    security stuff you can...
Results 1 to 18 of 18