Showing posts with label Secure PC Tricks. Show all posts
Showing posts with label Secure PC Tricks. Show all posts

Thursday, June 10, 2010

Best and fast way to Lock your computer

Lock My PC™ is an easy in use, powerful and compact tool to lock your computer from unauthorized use. When you leave your computer unattended, the program disables the hot keys (including Ctrl+Alt+Del), mouse, locks CD/DVD ROM doors and displays a lock screen. Nobody can access your system without providing the correct unlock password.


Unlike another similar computer lock software that cannot lock Ctrl+Alt+Del on a computer running Windows XP, our Lock My PC runs own keyboard driver to block such key combinations. Moreover, bulletproof startup lock guarantee that when your computer locaked at startup, this lock cannot be bypassed even in safe mode!

Why Lock My PC ?
You don't like snoopers. They are always prying into your e-mail messages, programs, data, files, etc. Lock My PC allows you to lock your computer with a password while you leave it unattended. You can lock your computer manually, with a menu or hotkey, or set up auto lock when your computer is idle.

Features and benefits:
  • Quick and safe computer lock by hot key, or mouse click
  • Autolock when computer is idle
  • Correct Ctrl+Alt+Del lock
  • Bulletproof startup lock (couldn't be bypassed in safe mode)
  • Different installation mode - setup for home or corporate use
  • CD/DVD-ROM doors lock
  • Multi-user support
  • Multimonitor support
  • Auto turnoff when computer is locked for a long time
  • Blind password option
  • Stealth mode
  • Windows XP x64 compatibility
  • Custom lock screens
  • Cycling lock screen images
  • Screen saving effects
  • Lock screen transparency - you can view movies under the locked screen
  • Password protected settings, quit and uninstall
  • Command line options
  • and many more ...

Difference from standard Windows XP computer lock feature
A lot of users believe that Lock My PC (as well as any other third party computer lock software) is useless because Windows XP has integrated computer lock feature. Well, indeed, you can simply press Win+L on Windows XP computer keyboard and your screen will be safely locked. What advantages Lock My PC has over Windows computer lock?

First of all, when your computer is locked by Windows Lock feature, anyone who has Windows Administrative privileges can unlock your computer. Such unlock will force to close your session (all unsaved changes will be lost). If Welcome screen option is enabled on your computer (the default settings for non-domain computer), Win+L doesn't lock the computer at all - it temporary switches the user off and displays the welcome screen - if you share your computer with others, they can logon with their usernames and use your computer. Moreover, if you share your account with other users (it's common for home PC), Windows XP lock feature is useless at all - your folks will unlock your computer without any problem.

Another benefits of Lock My PC in comare with Windows lock feature:
  • Custom lock screens and transparent lock screen options - your computer can be used as a presentation machine - the screen displays pictures or video, but nobody can touch your computer;
  • Secure Lock before Windows welcome/logon screen;
  • Displaying unsuccesfull unlock attempts - you will be notified if anyone tried to unlock your computer;
  • If Lock My PC is used in muilti-user mode, a supervisor can unlock the computer without closing user session;
  • You can lock CD/DVD ROM doors along with the desktop, keyboard and mouse - this can prevent CD media from being stolen while you are out;
  • Command line support allows you to use Lock My PC in Internet kiosks.

Safe and secure
Lock My PC provides reliable locking mechanism that impossible to bypass:
Keyboard driver installed with Lock My PC blocks different key combinations like Ctrl+Alt+Del, Alt+Tab, Ctrl+Esc and many others.
Booletproof startup lock ("Always lock at startup" option) displays password prompt box before Windows logon/welcome screen and (unlikle the most of desktop locking software) bannot be bypassed in Windows safe mode.

Easy to use
As soon as the installation completed, double click on the Lock My PC tray icon to lock the computer.
Right click on the tray icon to get access to the program settings. All settings are groupped by cathegoriies.

Autolock computer after certain time of inactivity
You can set up Lock My PC to lock your desktop automatically if the computer is idle during a certain period of time. Moreover you can set up Lock My PC to switch the computer off (Hibernate, Standby etc.) if your computer was locked during a certain period of time.

Stealth mode
Lock My PC can work in stealth mode. Stealth mode is a state when the program is running on your computer but does not show any sign of its presence in memory. To activate stealth mode, enable options "Do not show tray icon at startup" and "Hide Lock My PC from Task Manager".

Two installation modes
Lock My PC can be used both in single-user and multi-user environment. During the installation process, you will instruct Setup wehter to install Lock My PC in single-user mode or in multi-user mode.
In single-user mode, Setup will create Lock My PC shortcuts only for you. Locked computer can be unlocked only with your password. Some advanced options for corporate use will be blocked. This mode is ideal for home use.
In multi-user mode, Setup will create Lock My PC shortcuts for all user accounts. Each Lock My PC user will have their own password. The user who installed Lock My PC will be Lock My PC Administrator and his/her password - the administator's password. This mode is ideal for corporate use.

Custom Lock Screens
Lock My PC comes with a set of different lock screens. Lock screens are located in LockScreens subfolder of Lock My PC program folder.
You can create your own Lock Screen pictures and use them with Lock My PC. Your computer will look cool and unique when it is locked. You can use GIF, JPEG, BMP and animated GIF images as lock screens. Lock Screen transparency level option will allow you to vary the transparency from fully opaque to fully transparent. The latter allows you to lock keyboard and mouse only and may be helpful when you are watching videos or running presentations on your PC.

Monday, May 10, 2010

Secure Yourself from Hackers & Hijackers


1. Clearing the Page File at Shutdown

Windows 2000/XP paging file (Sometimes called the Swap File) can contain sensitive information such as plaintext passwords. Someone capable of accessing your system could scan that file and find its information. You can force windows to clear out this file.

In the registry navigate to HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management and add or edit the DWORD ClearPageFileAtShutdown. Set it to 1.

Note that when you do this, the system will take much longer to shut down: a system with a really big Page File (! Gig or more) may take a minute or two longer.

2. Disable the POSIX and OS/2 Subsystem.

Windows 2000 and XP come with little-documented subsystems it at allow compatibility with UNIX and OS/2 systems These rues systems are enabled by default but so rarely used that they are best off bring disabled completely to prevent possible service hijackings.

To disable these subsystems, open the registry and navigate to HKEY LOCAL MACHINESYSTEMCurrentControlSetControlSession ManagerSubSystems. Delete the subkeys Os2 and Posix. then reboot.

3. Never leave default passwords blank.
On installation, Windows 2000 sets up an Administrator account with total system access and prompts for a password. Guess what: by default, it allows that password to be blank. If a user doesn't want to type a password, he can simply click Next and the system will be an open door for anyone who wants to log on. Always opt for a password of some kind when setting up the default account on a machine.

4. Disable the Guest account
Windows XP comes with a Guest account that's used for limited access, but it's still possible to do some damage with it. Disable it completely if you are not using it. Under Control Panel, select User Accounts, click on Guest Account and then select Turn Off the Guest Account.

5. Install Windows In a different directory.
Windows usually installs itself in the WINDOWS directory.
Windows NT 4 0 and 2000 Will opt for WINNT. Many worms and other rogue programs assume this to be the case and attempt to exploit those folders files. To defeat this install Windows to another directory when you're setting it up - you can specify the name of the directory during setup. WINDIR is okay; so some people use WNDWS - A few (not that many) programs may not install properly if you install Windows to another folder but t hey are very few and they are far between

6. Fake out hackers with a dummy Administrator account
Since the default account in Windows 2000 is always named Administrator, an enterprising hacker can try to break into your system by attempting to guess the password on that account. It you never bothered to put a password on that account, say your prayers.

Rather than be a sucker to a hacker, put a password on the Administrator account it you haven't done so already. Then change the name of the Administrator account. You'll still be able to use the account under its new name, since Windows identifies user accounts by a back-end ID number rather than the name. Finally, create a new account named Administrator and disable it. This should frustrate any would -be break-ins.

You can add new accounts and change the names of existing accounts in Windows 2000 through the Local Users and Groups snap in. Right-click on My Computer, select Manager, open the Local Users and Groups subtree, look in the Users folder and right-click on any name to rename it. To add a new user, right-click on the containing folder and select New User. Finally, to disable an account, double-click it, check the Account is disabled box and click OK.

Don't ever delete the original Administrator account. Some programs refuse to install without it and you might have to log in under that account at some point to setup such
software. The original Administrator account is configured with a security ID that must continue to be present in the system.

7. Set the Hosts file to read-only to prevent name hijacking.

This one's from (and to a degree, for) the experts. The HOSTS file is a text file that all flavors of Windows use to hold certain network addresses that never change. When a network name and address is placed in HOSTS, the computer uses the address listed there for that network name rather than performing a lookup (which can take time). Experts edit this file to place their most commonly-visited sites into it, speeding things up considerably.

Unfortunately hijackers and hackers also love to put their own information into it - redirecting people from their favorite sites to places they don't want to go. One of the most common entries in HOSTS is local host which is set 1770.0.1. This refers to the local machine and if this entry is damaged the computer can behave very unpredictably.

To prevent HOSTS from being hijacked, set it to read-only. Go to the folder %Systemroot%system32driversetc, right-click on HOSTS, select Properties check the Read-Only box and click OK. If you want to add your own entries to HOSTS, you can unprotect it before doing so, but always remember to set it to read-only after you're done.


8. Turn off unneeded Services
Windows 2000 and XP both come with many background services that don't need to he running most of the time: Alerter, Messenger, Server (If you're running a standalone machine with no file or printer shares), NetMeeting Remote Desktop Sharing, Remote Desktop Help Session Manager (the last two if you're not using Remote Desktop or NetMeeting), Remote Registry, Routing and Remote Access (if you're not using Remote Access), SSDP Discovery Service, Telnet, and Universal Plug and Play Device Host.
A good resource and instruction on which of these services can be disabled go to /http://www.blkviper.com/WinXP/

9. Disallow changes to IE settings through IE
This is another anti hijacker tip. IE can be set so that any changes to its settings must be performed through the Internet icon in the Control Panel, rather than through IE's own interface. Some particularly unscrupulous programs or sites try to tamper with setting by accessing the Tools, Options menu in IE. You can disable this and still make changes to IE's settings through the Control Panel.

Open the Registry and browse to HKEY_CURRENT_USER SoftwarePoliciesMicrosoftInternet ExplorerRestrictions. Create or edit a new DWORD value named NoBrowserUptions and set it to 1 (this is a per-user setting). Some third-party programs such as Spybot Search And Destroy allow you to toggle this setting.

You can also keep IE from having other programs rename its default startup page, another particularly annoying form of hijacking. Browse to HKEY.CURRENT USERSoftwarePolicies MicrosoftInternet ExploreControl Panel and add or edit a DWORD, Homepage and set it to 1.


10. Disable simple File Shares.
In Windows XP Professional, the Simple File Sharing mode is easily exploited, since it抯 a little too easy to share out a file across your LAN (or the NET at large). To turn it off, go m My Computer, click Tools, Folder Option and the View tab, and uncheck Use Simple file sharing (Recommended). Click OK. When you do this you can access the Security tab in the Properties window for all folders; set permissions for folders; and take ownership of objects (but not in XP Home)

Friday, April 30, 2010

Secure Your Windows Xp Computer

With viruses, spyware and hackers round the corner, there could be many ways by which your PC would be prone to attacks. My PC, which is installed with XP, had to be formatted 2-3 times recently due to virus attack and I had to reinstall the XP on all the occasions. Here are few simple steps to make your Windows XP more secure.

Turn on Automatic Updates: Update is a Windows XP utility which helps to download the latest updates from Microsoft website. With this your PC will have the latest security updates. But one of the disadvantages of using Automatic updates is that it consumes a lot hard disk space.



Turn on Windows Firewall: If you have Service Pack 2 installed in your PC, you can turn on the free Firewall provided by Windows. Although the firewall will not give you a 100% protection, it does give some protection.
Install an Anti-virus Software: There are lot of anti-virus softwares available. Make sure you install one as viruses are the most common type of attack. Not only you install the anti-virus, update it with the latest security updates once in a while.
Protect from Spywares and Adwares: Spywares and Adwares are other common types of attacks on your PC. There are lot of free Spyware and Adware removal tools. Install one and scan your computer once in a while.
Be Careful while using Internet: Do not click on any malicious links and also do not download any attachments or softwares without scanning them. If you use a floppy drive or a CD drive, scan the files before you open or copy to the system.
These are fews steps to make your PC more secure. Although with these steps, it may not be 100% secure, but as wisely said-”Prevention is better than cure”



ADVANCED SECURITY

Do you work in a corporate environment where you don't appreciate your co-workers or boss having access to your comp and private files when you are not around?


You can provide added level of security to your WINDOWS XP System. This is called securing your Windows XP accounts database. You can store all information related to your accounts in a encrypted form on a floppy disk. What this would do is that if You do not have access to your floppy disk, You can not access the system. I am not sure You realized what I just said ! Even if You know your userid/password, You will not be able to access the system unless and until You have this startup disk.

The process of generating this secure startup floppy disk is simple. Go to START-RUN and type syskey. You will see a window come up. Click on Upgrade command button. You would see another window popping up which will give You the option of storing the encrypted accounts database either locally or on your floppy disk. Choose floppy disk and click OK and let the process complete. You are done.

Next time You reboot the computer and get to the logon prompt, make sure that You have the floppy disk available in A: drive else You can not log on.

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Best Web Hosting