BASIC COMPUTER SECURITY -BCS-


Publicado el: Sunday April 28th, 2024
JBCreationes / Sin categoría / BASIC COMPUTER SECURITY -BCS-

Basic computer security for any user and/or worker.

(All free for Windows 10).

First of all, it is notified that this security suite is for normal users, small SMEs and/or companies that do not deal with sensitive data.

INFORMATIC SECURITY:

Firewall

Comodo Firewall: a very complete firewall, (deactivate viruscope).
Tiny Firewall: Great firewall, consume little and you have to configure it, (it is easy).
Zone Alarm: One more protection layer, (usually request permission for access).
Private Firewall: It is old, but detects execution of services, which others do not.

These are the firewalls, (Firewalls), recommended, urge to install three, if any conflict, uninstall and replace it with another. I also recommend putting passwords to the firewalls, so they do not deactivate them.

Antivirus

360 Total Security: a great antivirus with many options to use

SEVERAL

Screenwings: prevents screenshots.
Netcut defender: Monitors connections in a Wi -Fi and/or LAN network, being able to cut the connection of unwanted intruders.
Keyscrambler: Encryptation of keys when writing.
Iobit uninstall: clean uninstallations of any program.
IOBIT UNLOCKER: Deletion of files and/or aggressively.
Wise Disk Cleaner: erasure of very complete unusable files.
CCleaner: Disregard of unusable files, including Windows records.
Kiwiguard: For reception attacks of too many requests, (DDOS).
Simple DNSCryPT: encrypt the DNS so that our data is protected.
Insert Windows Registry: for DDOS attacks, (denial of service).
Bitlocker: system encryption and Windows files, (AES 256bit encryption).
Install OpenSSL with CYGWIN: Installation of SSL/TLS security certificates.
Important: Install VPN! There are some free, and good such as: “Proton VPN”, with Wireguard encryption, (the last protocol created, but OpenVPN is still very good and the main competitor of Wireguard), we also include: “Hotspot Shield”, although its encryption is less , (128 bit). A VPN application, it is recommended to buy per year of use, every little time there are offers.
Use TCP instead of UDP: This means that, if you give us to choose, we will use mainly TCP because there is no loss of data from the “A” point to point “B”.
Avoid data leaks on IPV6: if you do not use this service, and continue using IPV4 as most Internet users, it is recommended to have it deactivated.

Browsers

To have an experience without dangers and with the slightest probability of hackeos in browsers, I recommend a series of browsers and their extensions.

Google Chrome: the most compatible, with some safety and speed, to perform simple things, the use of password is not recommended.
Epic: privacy, robustness, includes proxy to ocular our IP, (does not keep history when closing it). I recommend, with some search engine like Startpage.com
UNGOOGLED Chromium: Open source chrome version, more emphasized in safety and privacy, (some things must be configured), but, it is good.
Brave: Improved protection and privacy browser, with the possibility of integrating tor into the same browser, its use is recommended.
Opera: Good browser, something heavy, but with many options and improved in protection and safety. It is recommended with the “Duckduckgo” search engine.
Tor: The anonymous browser by antonomasia. If you need a browser to skip “certain protections” or vice versa, “to be very protected”, Tor is recommended, because the information is enrich through three IPs.

Navigators extensions

Smart HTTPS: Force to show safe navigation: HTTPS (SSL) on websites.
KBL SSL Enforcer: Use the TLS 1.3 encryption protocol on websites.
Adobe Acrobat: You have to see PDF files, without downloading them to the computer.
Ghostery: eliminates annoying ads, blocks trackers, gives privacy.
360 Total Security: Safe navigation, against malware and viruses.
Webrtc: Prevents the fact that they see their private IP from the Internet

RECOMMENDATIONS

This is a list of free programs that can be found on legal download pages, and can be used, including downloading Windows 10 for free. For example: Do not save sensitive/important files in the cloud, on a web server or simply in a folder on your computer, as you risk someone malicious seeing them and trying to steal them. This small security suite will not change the fact that a hacker with advanced knowledge enters and even modifies a file (if the antivirus and/or firewall allows it), but it is much safer, because it can be guaranteed in To the extent that they cannot “remove” anything, I advise saving important files on an external hard drive and/or a pendrive with good capacity.

Another very important thing is the use of passwords, please do not use a password manager, first generate free secure passwords like on the website: LastPass, and save it in a .doc file on the removable hard drive or Pendrive, on this website You will be able to generate passwords of up to 50 characters, including symbols.

CONCLUSION

There is no better security than prevention, and I also recommend that if you are writing any important writing, be disconnected (either by activating the firewall option in blocking and/or deactivating the network card and/or Wi-Fi in device manager), and then after sending it to where you want, activate a cleaning program like the ones mentioned above, so as not to leave a trace on your computer and they can compose an archive from temporary files. When using a password, make it as strong as possible, even on the Wi-Fi network, and if you have Firewall options, activate it, and if you know how to use it well, you can set it to only enter one or certain MAC addresses (identifier). of the Wi-Fi and/or Lan network card), so you will be safe from intrusions, but the safest thing is an external firewall, but for the use I am talking about, a brand router: Asus, DLink, TPLink, and some other brands If you are versed in connectivity devices, consult a network expert.

If you have two routers, you can use them as a “bridge”, this means that you can activate security on the first router, and then on the second, having an extra layer of extra protection, (not all routers support it), You could also use only one router, but leaving only the ports you use open and all the others closed, although you would have to know which port each program uses for this, it is an alternative.

Of course, have your system updated with “Windows Update”, (In this case I am talking about Windows), and install a program to deactivate telemetry, and data that is sent to Microsoft servers, there is for Windows 7 and Windows 10.

Another solution is to install Linux and Windows, and a program that gives you the choice of which operating system you want to start, because Linux has many fewer security holes, but is much less compatible with programs of any kind.

Configure browsers so that they do not save passwords, debit/credit cards, use alternative DNS such as OpenDNS, or else Google, deactivate the information sending options, and ultimately do not let the browser store any data, and delete: EVERYTHING THE BROWSING HISTORY, of course, erases what has been stored on the computer, because the internet trace cannot be deleted, and a cleaning program (mentioned before) can be used after each use.

Another recommendation is to “Create a restore point”, at least once a month, having saved the important files created and/or downloaded to an external device, to restore the system and it is not advisable to reinstall the operating system again. several reasons, unless there is no remedy.

You can chain several Routers together with yellow RJ45 cable, and create additional security layers and/or use as a Wifi signal repeater.

And if you notice that the operating system does not have “power”, or is saturated without doing anything that represents an effort for the power of your computer, use Ctrl + Alt + Del., to find out if there is a process that is consuming the power. computer performance in %, (one of the basic techniques used to damage your computer), and closing that process solves it, even if a program bothers you because it activates itself, the Firewall: “Comodo”, has an option to can never be activated again.

 

ADDED

In the same Fiber Optic/Adsl router or mobile phone Sim card connection, you can use the “Allow” option: Allow, and enter the Mac addresses of the devices and computers you want, giving permission to those devices only. , also deactivate the “Guests” option: Guests, so as not to have an open gap that they take advantage of to enter the Wifi network, and deactivate the WPS system, because it is another way used to enter the router, you can also

Deep browser configuration, this means deleting any password reminders, history, payment methods, adding a secure DNS, putting it in “strict” mode, choosing the search engine: DuckDuckGo and the home page: StartPage.com

In each browser, use some extensions, you can also use a free VPN, such as: Hotspot Shield, or another free one, to encrypt browsing data.

An alternative to Microsoft Office is: LibreOffice, which is more compatible with the Microsoft Office package, against its also free competitor: OpenOffice.

Of the best email managers, it has Microsoft Outlook, eMClient, Mailbird, Thunbderbird, (If you have a VPN application installed, use it when you open the email).

If you prefer to use email in the browser, I recommend using Gmail with double authentication and/or ProtonMail, with two passwords.

If you use your mobile phone to connect via USB, do not activate the mode: “File transfer” and/or data transfer with the computer, use the option: “Battery charging only”.

Review the security of the “Windows” operating system, in case you want to use Microsoft Defender, and have the system fully updated, up to the latest patch.

Use the “Defragment” option, at least once a month, this helps improve file loading when you use the system, and have the desktop with few icons.

If you want the computer to boot faster, use the command: “msconfig”, and in the advanced options set the maximum number of processors to boot.

Another tip is to use the same antivirus “360 Total Security” or “Ctrl+Alt+Del”, in the “Task Manager” option and then in the “Start” tab.

Do not log in to any browser, it is better to take a little longer to access your account than to have your access data taken and enter without you knowing.

To add some entertainment programs: VLCPlayer is very well known and quite good for any type of video, for music in various formats, use: Winamp and to listen to music online, you can use Spotify for free, (with ads).

A plugin in the Microsoft “Store” (online store) to increase the volume is: EarTrumpet, in the taskbar on the right, you will see a drop-down menu to adjust it.

For any questions, please use the contact form or use email: info@jbcreationes.com. It is a pleasure to help have a safe environment.