SlideShare a Scribd company logo
1 of 5
Download to read offline
A GUIDE TO UNDERSTANDING AND
IMPLEMENTING MICROSOFT WINDOWS SECURITY
Today, Information Security is the most important thing to be taken care of while using the Internet.
Internet, Being a source of knowledge, learning and entertainment, it is also something that can be
misused for malicious and destructive intent.
Learn more about configuration settings that could potentially help to improve your Windows Security,
protecting and defending your data from malicious actors.
So what do I mean by "Securing Windows"?
Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity
theft and cracking. By taking some precautions and a few good practices, you can secure your Windows
computer, easily and effectively.
Security is a big field altogether in the world of computers, there are huge corporations that only
specialize in security. This article is for the type of security you can use for your home computer and not
it is not for huge corporate setups, since they have a much larger perspective.
To begin with, let me summarize the points that I am going to cover in this article
1. Understanding Windows processes that run in the background.
2. Antivirus software, and sources of viruses
3. Firewall
4. Security tips and tricks
Understanding Windows Processes
Every software, application we install in our computer runs as a "process", it is a way that the computer
can keep track of running software, close it, or even modify it in some cases.
So where can you see them?
You can see the processes by following these steps -
1. Right-click the taskbar down below, select "Task Manager"
2. Select the "Processes" tab
Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC)
Once you get there, you can see all the processes that are currently running on your computer. This
gives you a detailed overview of what exactly is going on in your computer. You can see what process is
running, and how much of your system memory are they using.
Here is a list of common Windows system processes that can be found there,
Ctfmon.exe
This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
put itself back into the system startup when you run the MS-Office apps as long as the Text Services and
Speech applets in the Control Panel are enabled.
Explorer.exe
This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is
controlled by this process
Svchost.exe
Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be
stopped or restarted manually. This process manages system services that run from dynamic link
libraries (files with extension.dll). Examples for such system services are: "Automatic Updates",
"Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.
Winlogon.exe
This controls the authentication of Windows users. It is one of the most important system processes.
Rundll32.exe
This program is part of Windows, and is used to run program code in DLL files as if they were within the
actual program. DLL files are a part of the Windows programming.
Csrss.exe
This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss
stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all
times.
When looking at the processes, you can also see the memory they are consuming, using the task
manager process list, you can also close a non-responsive program.
From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that
you can use when you feel you have a virus or a spyware installed on your computer.
Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will
just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses
designed to evade from being manually removed.
Antivirus Software
Antivirus software is one of the first and foremost thing that you must install after getting a new system,
or after you have re-installed your operating system.
Choosing the right anti-virus software is very important; it is very much dependent how fast your
computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent
any threats. With thousands of viruses releasing every day, here are some things to note -
Prevention is better than cure, right?
1. Antivirus software priority - it should be the first thing you must install after getting a computer.
2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser
features. The problem with trial version is, that once it is expired, it will stop protecting your
system and trouble you with constant security alerts, which means, your computer is at risk
while you are battling with security alerts.
3. Always keep your antivirus software updated, most of the antivirus softwares update
automatically. However for some reason if they are not able to, update manually.
So why does it needs to be updated?
Companies that make these softwares release new virus Signatures or 'patterns' every week and in
some cases even daily. The antivirus on your computer must learn about those new threats, so it
downloads the new patterns from the server, while ensuring that you are protected from the latest
viruses.
Virus Sources
There is no prime source of viruses, they can come up from just anywhere. However, here are some
things you should be aware of -
1. EXE Files- Exe files are executable files that windows uses to execute or start any program,
application or even a software.
2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before
opening it
3. Websites - Never accept a link from anyone whom you don't know. There are websites on the
internet specially designed to compromise your computer, they may be in a form of internet
chat, a forum, a game, or even music.
4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use
your disk on an infected system, your disk will catch that virus, and will begin infecting every
computer you insert it in. Always scan a USB flash drive before opening it.
Firewall
So what is a firewall?
In simple terms, It is an application that is designed to control and analyze the network traffic coming in
and out of your computer.
It is like your pet dog that only allows certain people into your house, while preventing unauthorized
people or intruders, at the same time alerting you at various occasions.
So why is a firewall important?
Everything that is in your computer needs to be protected. Your personal documents, photos, financial
information, even your passwords. When your computer is connected to the internet, your data is
susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent
news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company
millions of dollars.
Taking little bit of care about your computer security and escalating it, can be very beneficial.
Does Windows have an in-built firewall?
For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known
as the windows firewall, It allows granular control over your systems' networking, even defining rules for
applications that are installed in your computer.
Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy
one click configuration, wherein you change the settings depending on the location you are using.
When you're connected to a public network like a library or a coffee shops' wireless network, you may
want to block all incoming connections and can select the public network profile.
At home or work, where you may be sharing files over the network, you can easily switch to the home
network profile.
You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security,
and then clicking Windows Firewall.
Make sure that your firewall is set to 'ON'
For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of
the most advanced, and free firewalls that I have encountered and the one I personally use. This is
however not recommended for basic users, since its configuration requires a very good understanding
of the windows operating systems and its architecture, and about TCP/IP.
Security tips and tricks
1. Be cautious with your computer Administrator passwords, never store them anywhere, always
memorize them, they are the key to your system. Someone who is trying to gain remote access
to your system won't get through if he cannot guess your password. Try to include a
combination of special characters, numbers and letters for your password.
2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com,
Soft32.com.
3. These websites never host malicious softwares, and always scan them with an antivirus before
hosting them.
4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your
disk in My computer, and select 'Scan with' - your antivirus
5. Run a full system scan every month. This will help removing any viruses that have crawled in.
6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning
them off.
7. If possible, get a security expert to analyze your computer once a month. A security expert will
check your computer in great detail and will suggest you to remove any programs that
may compromise your computer.
8. Windows update - Always use windows update and set it to automatic. Windows updates are
critical system patches that escalate your system security or patch any vulnerability that was
otherwise found by Microsoft security experts. Many people don't realize the significance of
Windows Update,until they are infected.
9. User account control - User account control is a security feature in windows that should always
be 'ON', it prevents the execution of malicious code.
10. Web Browser - Always update to a newer version of a web browser, they are better, faster and
more secure. Because everything today is web-based, security of your web browser is the most
important thing.
11. User Accounts - Always keep the guest account disabled, and create a new administrator
account for yourself. Never use the default administrator account.
These are the basic steps that you can use to secure your Windows computer.

More Related Content

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virusAbrish06
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfEric Selje
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay SaferOklahoma Dept. Mental Health
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Securityvenkasureantivirus
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureUltraUploader
 

Similar to A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf (20)

Defensive measure of virus
Defensive  measure of virusDefensive  measure of virus
Defensive measure of virus
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Virus
VirusVirus
Virus
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Virus project
Virus projectVirus project
Virus project
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Cyber security
Cyber securityCyber security
Cyber security
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
SELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdfSELJE - VFP and IT Security.pdf
SELJE - VFP and IT Security.pdf
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Microsoft Office How The 2007 System Helps You To Stay Safer
Microsoft  Office  How The 2007 System Helps You To Stay SaferMicrosoft  Office  How The 2007 System Helps You To Stay Safer
Microsoft Office How The 2007 System Helps You To Stay Safer
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
Venkasure Antivirus + Internet Security
Venkasure Antivirus + Internet SecurityVenkasure Antivirus + Internet Security
Venkasure Antivirus + Internet Security
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
A bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cureA bit of viral protection is worth a megabyte of cure
A bit of viral protection is worth a megabyte of cure
 

More from MuhammadWaqas779561

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfMuhammadWaqas779561
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...MuhammadWaqas779561
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...MuhammadWaqas779561
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfMuhammadWaqas779561
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfMuhammadWaqas779561
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMuhammadWaqas779561
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMuhammadWaqas779561
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfMuhammadWaqas779561
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfMuhammadWaqas779561
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfMuhammadWaqas779561
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfMuhammadWaqas779561
 

More from MuhammadWaqas779561 (20)

UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdfUNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
UNE FENÊTRE OUVERTE SUR LE MONDE DE L'ART, DU CINÉMA ET DE LA MUSIQUE.pdf
 
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
PSYCHOPASS RESONANCE A SONIC AND VISUAL EXPLORATION OF THE UNDERGROUND RAP MA...
 
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
Educazione Scolastica Esaminare lo Stato Attuale dei Sistemi Educativi Global...
 
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdfBREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
BREAKING DOWN BARRIERS CONNEKTON'S AFFORDABLE FREELANCE PLATFORM FOR ALL.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdfWHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
WHY FREEDOM REQUIRES RESPECTING ALL RIGHTS.pdf
 
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdfMIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
MIHAI EMINESCU BIOGRAPHICAL DATA THE LIFE AND WORK OF THE NATIONAL POET.pdf
 
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdfMICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
MICHELE TECCHIA LEFT LONDON FOR MONACO.pdf
 
MICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdfMICHELE TECCHIA BIOGRAPHY.pdf
MICHELE TECCHIA BIOGRAPHY.pdf
 
INDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdfINDIAN FASHION TRENDS FOR WOMEN.pdf
INDIAN FASHION TRENDS FOR WOMEN.pdf
 
ROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdfROMANIA TOURS AND VACATIONS.pdf
ROMANIA TOURS AND VACATIONS.pdf
 
PATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdfPATH TO PERMANENT RESIDENCE.pdf
PATH TO PERMANENT RESIDENCE.pdf
 
BIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdfBIOGRAPHY OF PAUL LIGNIERES.pdf
BIOGRAPHY OF PAUL LIGNIERES.pdf
 
MICHELE TECCHIA.pdf
MICHELE TECCHIA.pdfMICHELE TECCHIA.pdf
MICHELE TECCHIA.pdf
 
Jean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdfJean-Pierre Valentini.pdf
Jean-Pierre Valentini.pdf
 
The black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdfThe black legend of Jean Pierre Valentini.pdf
The black legend of Jean Pierre Valentini.pdf
 
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdfBOIGRAPHY OF PAUL LIGNIÈRES.pdf
BOIGRAPHY OF PAUL LIGNIÈRES.pdf
 
Paul Ligniere.pdf
Paul Ligniere.pdfPaul Ligniere.pdf
Paul Ligniere.pdf
 
Criminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdfCriminal Defence Lawyer Role and Responsibilities.pdf
Criminal Defence Lawyer Role and Responsibilities.pdf
 
Yassine Yakouti.pdf
Yassine Yakouti.pdfYassine Yakouti.pdf
Yassine Yakouti.pdf
 

Recently uploaded

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGpr788182
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecZurliaSoop
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...NadhimTaha
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...meghakumariji156
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfbelieveminhh
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptxRoofing Contractor
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165meghakumariji156
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challengeshemanthkumar470700
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Recently uploaded (20)

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdfTVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
TVB_The Vietnam Believer Newsletter_May 6th, 2024_ENVol. 006.pdf
 
Pre Engineered Building Manufacturers Hyderabad.pptx
Pre Engineered  Building Manufacturers Hyderabad.pptxPre Engineered  Building Manufacturers Hyderabad.pptx
Pre Engineered Building Manufacturers Hyderabad.pptx
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow ChallengesFalcon Invoice Discounting: Aviate Your Cash Flow Challenges
Falcon Invoice Discounting: Aviate Your Cash Flow Challenges
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY.pdf

  • 1. A GUIDE TO UNDERSTANDING AND IMPLEMENTING MICROSOFT WINDOWS SECURITY Today, Information Security is the most important thing to be taken care of while using the Internet. Internet, Being a source of knowledge, learning and entertainment, it is also something that can be misused for malicious and destructive intent. Learn more about configuration settings that could potentially help to improve your Windows Security, protecting and defending your data from malicious actors. So what do I mean by "Securing Windows"? Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity theft and cracking. By taking some precautions and a few good practices, you can secure your Windows computer, easily and effectively. Security is a big field altogether in the world of computers, there are huge corporations that only specialize in security. This article is for the type of security you can use for your home computer and not it is not for huge corporate setups, since they have a much larger perspective. To begin with, let me summarize the points that I am going to cover in this article 1. Understanding Windows processes that run in the background. 2. Antivirus software, and sources of viruses 3. Firewall 4. Security tips and tricks Understanding Windows Processes Every software, application we install in our computer runs as a "process", it is a way that the computer can keep track of running software, close it, or even modify it in some cases. So where can you see them? You can see the processes by following these steps - 1. Right-click the taskbar down below, select "Task Manager" 2. Select the "Processes" tab Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC) Once you get there, you can see all the processes that are currently running on your computer. This gives you a detailed overview of what exactly is going on in your computer. You can see what process is running, and how much of your system memory are they using. Here is a list of common Windows system processes that can be found there, Ctfmon.exe This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to
  • 2. put itself back into the system startup when you run the MS-Office apps as long as the Text Services and Speech applets in the Control Panel are enabled. Explorer.exe This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is controlled by this process Svchost.exe Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension.dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more. Winlogon.exe This controls the authentication of Windows users. It is one of the most important system processes. Rundll32.exe This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. DLL files are a part of the Windows programming. Csrss.exe This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times. When looking at the processes, you can also see the memory they are consuming, using the task manager process list, you can also close a non-responsive program. From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that you can use when you feel you have a virus or a spyware installed on your computer. Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses designed to evade from being manually removed. Antivirus Software Antivirus software is one of the first and foremost thing that you must install after getting a new system, or after you have re-installed your operating system. Choosing the right anti-virus software is very important; it is very much dependent how fast your computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent any threats. With thousands of viruses releasing every day, here are some things to note - Prevention is better than cure, right? 1. Antivirus software priority - it should be the first thing you must install after getting a computer. 2. Never opt for 'Trial version', either purchase a full version, or use the free version with lesser features. The problem with trial version is, that once it is expired, it will stop protecting your system and trouble you with constant security alerts, which means, your computer is at risk while you are battling with security alerts.
  • 3. 3. Always keep your antivirus software updated, most of the antivirus softwares update automatically. However for some reason if they are not able to, update manually. So why does it needs to be updated? Companies that make these softwares release new virus Signatures or 'patterns' every week and in some cases even daily. The antivirus on your computer must learn about those new threats, so it downloads the new patterns from the server, while ensuring that you are protected from the latest viruses. Virus Sources There is no prime source of viruses, they can come up from just anywhere. However, here are some things you should be aware of - 1. EXE Files- Exe files are executable files that windows uses to execute or start any program, application or even a software. 2. Exe can contain viruses, even spyware designed to track your system, Always scan a file before opening it 3. Websites - Never accept a link from anyone whom you don't know. There are websites on the internet specially designed to compromise your computer, they may be in a form of internet chat, a forum, a game, or even music. 4. USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use your disk on an infected system, your disk will catch that virus, and will begin infecting every computer you insert it in. Always scan a USB flash drive before opening it. Firewall So what is a firewall? In simple terms, It is an application that is designed to control and analyze the network traffic coming in and out of your computer. It is like your pet dog that only allows certain people into your house, while preventing unauthorized people or intruders, at the same time alerting you at various occasions. So why is a firewall important? Everything that is in your computer needs to be protected. Your personal documents, photos, financial information, even your passwords. When your computer is connected to the internet, your data is susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company millions of dollars. Taking little bit of care about your computer security and escalating it, can be very beneficial. Does Windows have an in-built firewall? For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known as the windows firewall, It allows granular control over your systems' networking, even defining rules for applications that are installed in your computer.
  • 4. Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy one click configuration, wherein you change the settings depending on the location you are using. When you're connected to a public network like a library or a coffee shops' wireless network, you may want to block all incoming connections and can select the public network profile. At home or work, where you may be sharing files over the network, you can easily switch to the home network profile. You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security, and then clicking Windows Firewall. Make sure that your firewall is set to 'ON' For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of the most advanced, and free firewalls that I have encountered and the one I personally use. This is however not recommended for basic users, since its configuration requires a very good understanding of the windows operating systems and its architecture, and about TCP/IP. Security tips and tricks 1. Be cautious with your computer Administrator passwords, never store them anywhere, always memorize them, they are the key to your system. Someone who is trying to gain remote access to your system won't get through if he cannot guess your password. Try to include a combination of special characters, numbers and letters for your password. 2. Download softwares only from reputed websites, these include Cnet.com, FileHippo.com, Soft32.com. 3. These websites never host malicious softwares, and always scan them with an antivirus before hosting them. 4. Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your disk in My computer, and select 'Scan with' - your antivirus 5. Run a full system scan every month. This will help removing any viruses that have crawled in. 6. Never turn off your anti-virus software or your firewall. Many a times people suggest turning them off. 7. If possible, get a security expert to analyze your computer once a month. A security expert will check your computer in great detail and will suggest you to remove any programs that may compromise your computer. 8. Windows update - Always use windows update and set it to automatic. Windows updates are critical system patches that escalate your system security or patch any vulnerability that was otherwise found by Microsoft security experts. Many people don't realize the significance of Windows Update,until they are infected. 9. User account control - User account control is a security feature in windows that should always be 'ON', it prevents the execution of malicious code. 10. Web Browser - Always update to a newer version of a web browser, they are better, faster and more secure. Because everything today is web-based, security of your web browser is the most important thing.
  • 5. 11. User Accounts - Always keep the guest account disabled, and create a new administrator account for yourself. Never use the default administrator account. These are the basic steps that you can use to secure your Windows computer.