Logo
latest

Accounts and authentication

  • Introduction
  • More secure login
    • Switch to a local login account
    • Set password if not exists
    • Add Secure Sign-In
  • Require a password when resuming from a stand-by mode
    • Screensaver
    • Sleep/stand-by
  • Make that more secure passwords
  • Use a password manager
    • Managers
    • It does not protect from keyloggers
  • Use multifactor authentication (MFA)
  • Use a standard user account
    • Create a new administrator account
    • Change your user account type
  • Protect SSH access with MFA

Services and applications

  • Introduction
  • Start, stop, restart, enable, and disable services
    • “Startup Type” for Service
    • Examples
      • Services window
      • Using net Command
  • Restricting access to applications
    • Examples
      • Program Blocker
      • Restrict application access to email application
      • Any application to users using Group Policy Editor
  • Block internet access to specific apps
    • Examples
  • Maximise user account control (UAC)
  • Unwanted application suggestions
    • Tools
  • Secure browsers that protect your privacy
  • Use a secure messaging service
  • Use secure email services
    • Articles
  • Use SSH tunnels
    • Tunnelling with local port forwarding
    • Reverse tunnelling with remote port forwarding
    • Dynamic port forwarding
  • Use a VPN service
    • No logs policy
    • Logs timestamps and bandwidth
  • Make a VPN killswitch using routes
  • Use alternative DNS servers
    • Alternative DNS servers
    • Use Wireshark to check for leaks
  • Use a Tor proxy
    • Tor proxy
    • Notes
  • Change MAC address
    • Device Manager
    • Control Panel
  • Renew IP lease
    • Windows
  • Edit hosts file
    • Windows

Data

  • Introduction
  • Create a restore point
  • Enable full disk encryption using BitLocker
    • Requirements
    • Enable via Control Panel
    • Encrypt a drive
  • File encryption
    • EFS
    • VeraCrypt
  • Enable controlled folder access (CFA)

Privacy

  • Introduction
  • Disable location tracking
  • Disable Ad tracking by Microsoft Ad partners
  • Turning devices on and off
    • Examples
      • Turning cam off/on
  • Remove metadata from files
    • Techniques for metadata removal
  • Edit exif metadata in images
    • Native
    • Using IrfanView
  • Remove metadata with hex editors
    • Usage in general
    • Native
    • Using software
  • Clean machine with BleachBit

Malware

  • Introduction
  • Malware detection and removal
    • Automagically
    • Manually
      • Switch to Safe Mode
      • Check for and remove unwanted applications
      • Delete temporary files
    • Fail
    • Related
  • Catch and remove malicious registry entries
    • Automagically
    • Manually
    • Related
  • Analysing trojans
    • Related

Operations security

  • Introduction
    • Fail
  • Use email securely
  • Detecting fake emails and phishing
    • Fake emails
    • Phishing
    • Related
  • Browse more safely
  • Check integrity of downloads
    • Verifying downloaded software
  • ‘;–have i been pwned?

Guards! Guards!

  • Introduction
    • Choosing a firewall for a Windows PC
    • Choosing a HIDS for a Windows PC
  • Alphabet soup
    • Firewall
    • IDS
    • IPS
  • Windows intrusion detection systems
    • Host intrusion detection systems
    • Network intrusion detection systems
Hardening Windows
  • Hardening Windows
  • Blue Team
  • Improbability Blog
  • About the UU
  • Register

Introduction

  • Enable full disk encryption using FileVault

  • File encryption

  • Enable Controlled Folder Access

  • Create a restore point

Previous Next

Unseen University, 2023, with a forest garden fostered by /ut7.
Read the Docs v: latest
Versions
latest
Downloads
On Read the Docs
Project Home
Builds