HOW TO SECURE Windows 2000/XP/Server 2003 & even VISTA, + make it "fun to do"

Status
Not open for further replies.

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
IF YOU CANNOT REACH THE SITE TO CHECK YOURSELF vs. CONFICKER? CHECK THESE AREAS!

I HAD A GOOD QUESTION FROM A USER TODAY, & HERE WAS MY ANSWER, IN CASE YOU CANNOT REACH THIS SITE TO CHECK YOURSELF (as it may be blocked by a malware, or even yourself, via various means, instead of just being flooded by users requesting on it, effectively "slashdotting" (almost DOS/DDOS'ing) said site to check yourself vs. CONFICKER)

So... he we go as to the possibles!

FROM -> http://www.hftonline.com/forum/showthread....6049#post116049

--------------------

I did try, and failed to even generate a 404 ... so I'm happy that it wasn't something at my end.

P

HOPEFULLY, it isn't, because there IS A POSSIBILITY that the site to check yourself I noted? IS BLOCKED, & blocked in your HOSTS file (make sure this is ALWAYS "READ ONLY" (write protected) attributes applied) OR via bad browser addons, or in browser filtering lists (internal to individual browsers)...

So, check it for that site being in there/those, blocked as follows (a few possibles):

I strongly DOUBT you did any of these, yourself, but... one never knows, so, here goes:

=====

POSSIBLE #1 - That the site to check yourself, is actually BLOCKED in YOUR HOSTS FILE

That file typically found under %Windir%\System32\drivers\etc, or if you moved it, check the registry for the value here ->

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\Tcpip\Parameters & check the DataBasePath value

(That STRING VALUE SZ stores your HOSTS file location, TRUE ONE your system will be using & you CAN move it if you like... but, so can malwares):

0 www.confickerworkinggroup.org
0.0.0.0 www.confickerworkinggroup.org
127.0.0.1 www.confickerworkinggroup.org

(ANY OF THOSE WILL BLOCK OUT SITES, GOOD SITES, or KNOWN BAD ONES, so, check your HOSTS file, first! Conficker MIGHT ACTUALLY TRY TO PULL THIS LITTLE TRICK, mind you!)

=====

POSSIBLE #2 - bad "hardcode" of a site address (which a malware might do, or, it just 'went stale' & the website found a NEW "hosting provider" & their IP addy changed - & YES: Sites DO, do this, simply because they found better prices on hosting their sites for example, OR better services, but, they usually let you know when they do)

See if you, yourself, "hardcoded it as a favorite" (which you CAN DO, to speed up access to your fav sites by avoiding the 30-x ms traveltime for resolution of domainnames/hostnames to IP addresses with remote or local DNS servers)?

Your "hardcode for speed" (as well as reliability IF a dns server you use goes down OR is poisoned (see Dan Kaminsky on this online in regards to this)), well... it can 'go stale' or change (because the website found a new hosting provider for instance, because they're cheaper or better etc. et al as noted above earlier)...

(I.E.-> You CAN "mess this up", esepcially over time, with the wrong IP address (yours may vary on what you get as a return IP address from your DNS server too, than my example here is, be aware of that too)):

----

A.) E.G.-> RIGHT IP ADDRESS EQUATION FOR HARDCODE (for me, not same for you possibly - remove any hardcodes, if any in your HOSTS file, reload it (edit & save it in Windows XP/2000/Server 2003/VISTA/Server 2008/Windows 7 since they have a "dynamic PNP" loaded IP Stack) or reboot (you MUST in Windows 2000 - IP stack FULLY LOADED prior to bootup is why ONLY, not only when users request on it like in later Windows' versions)):

149.20.20.82 www.confickerworkinggroup.org

B.) E.G.-> WRONG IP ADDRESS EQUATION (something CONFICKER Might actually do in fact, IF you are "hit" by it/victim to it OR if the site you hardcoded changed hosting providers etc.):

10.1.1.1 www.confickerworkinggroup.org

(10.x.x.x, & iirc, 172.x.x.x ESPECIALLY WILL NOT GO "OUTBOUND" TO THE INTERNET, & ARE MUCH LIKE 192.168.x.x is... only for internal networks/LANS & DHCP on the last one, the others are for static internal addresses!)


HOW TO GET THE RIGHT IP ADDRESS FOR YOU, FROM YOUR DNS SERVERS YOU USE? PING THE SITE FROM A DOS CMD.EXE WINDOW PROMPT/TTY CONSOLE!

E.G.->

C:\> ping www.confickerworinggroup.org

BUT, only after you remove it from a HOSTS file & save it to reload it (or reboot after edit + save, on Windows 2000 & below). That command WILL return the correct IP address, once it is not found in your HOSTS file (IF it is @ all that is).

----

(These (POSSIBLE #1, & POSSIBLE #2A & #2B)? THEY are the ONLY 'downsides' of using a HOSTS file, it CAN be "used against you too", by malwares... so, be aware of this little tidbit too!)

=====

POSSIBLE #3 - in BROWSER INTERNAL BLOCKLISTS THEMSELVES (this too can be "misused" by malwares against you, OR, it can help you too (spybot s&d populates these along with HOSTS for example, for "the good"):

NOW, if it is NOT blocked there/THOSE above?

1.) Check your IE "restricted sites" list (IE 7-8 have easy facilities for this, in "INTERNET OPTIONS" or MSCONFIG (iirc on the latter here), & IE6 you have to search the registry for here -> HKCU,"Software\ Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4

2.) Opera has its FILTER.INI &/or URLFILTER.INI which can do the same (block sites, ONLY @ THE BROWSER (opera) level though, not globally like HOSTS do or can)

3.) FireFox/Mozilla variants also have "internal to FF/Mozilla only" blocked lists-restricted sites as well.

Any of these also can "go stale" due to sites changing hosting providers, OR, due to a malware 'bushwhacking' them...

4.) AND, CHECK YOUR IE "browser addons" (possibly even FF ones too) that are malwares possibly, because THEY CAN "intercept" calls to GOOD SECURITY SITES TOO, so check your addons for bogus ones in your webbrowsers too!

5.) ONCE ALL OF THAT IS CHECKED (hosts, browser addons, & browser block lists/restricted zones)?

CLEAR YOUR LOCAL WEBBROWSER CACHE, RELOAD YOUR HOSTS
(if you use it & editing it + saving it will do that on Windows XP/Server 2003/VISTA/Server 2008/Windows 7 or, a reboot after edit will on Windows 2000), & try the site again, once ALL OF THOSE AREAS "CHECK 'ALL CLEAR'"...

====

SO - be aware of ALL of the above, & their mechanics involved. Malware makers are, & so should you be, as a "security conscious" user of Windows systems @ least! With that all above? You SHOULD be, on this account.

Good luck!

APK

P.S.=> Odds are though, they've been "SLASHDOTTED" by too many users requesting on them, because /. is such a HEAVILY travelled/used website... especially if "NONE OF THE ABOVE", holds true... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Alternate tools to use to secure yourselves online (and, to speed you up too)

Srivas said:
Btw. CIS tool is not a freeware, is there any other program to benchmark your level of security?

It used to be free, I guess it's not now (I am taking this gent @ his word, I have not tested this by going to the download site in years, but still)... as alternates, you may use/can try:

====

1.) BELARC ADVISOR (free, & works VERY well) -> http://www.belarc.com/free_download.html

or

----

2.) "SCW" (security configuration wizard) which is an addon for Windows Server 2003, possibly VISTA, & for sure Windows 7 (you add it in CONTROL PANEL, Add-remove WINDOWS components).

OR

----

3.) Microsoft ALSO OFFERS "Microsoft Baseline Security ADVISOR" ->

For Windows 2000/XP/Server 2003 (32 & 64-bit downloads are there):

http://www.microsoft.com/downloads/details...;displaylang=en

For Windows 7 & Server 2008 R2 (32 &64-bit downloads are there):

http://www.microsoft.com/downloads/details...;displaylang=en

====


... but, iirc, the latter in #3 depends on various services running!

(I am no longer EXACTLY sure which services those are anymore, but iirc, they are one that use NTLM networking based or AD services based (e.g.-> lanman/netbios type sharing being working & Client for MS networks active in your network connection, + File & printer sharing AND server service + workstation service active & POSSIBLY the NetBIOS over TCP/IP helper service as well - but, don't "quote me" on this, I just know it will not run IF you trimmed off various services...))

APK

P.S.=> ALSO, IN THIS THREAD? Well - I believe I noted SCW, but only for Windows Server 2003 earlier in this post (I did) but it exists for Windows 7 now, standard, apparently (I installed it on Windows 7 64 bit pro so it does exist for it too)...

So, there are some "alternate options/tools" to use for better security online (and speed too, especially from SCW)... apk
 
Last edited:

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Srivas, sorry for late reply + rather "terse/brief" earlier one, but here goes... apk

Srivas said:

Hello!

Srivas said:
I really appreciate your work here,

Well, to quote one of my "intellectual heroes", in Mr. Anders Heijelberg (sp?) formerly of BORLAND (& inventor of my FAV dev tool, Delphi 1.0 for 16-bit - Delphi 7.x for Win32 + Kylix for Linux) & now, of MICROSOFT fame (inventor/architect of .NET, the tool I have utilized for programmatic development the most since around 2006)?

"We ALL 'stand on the shoulders of GIANTS' before us..."

(& THAT? That is just a fact... I couldn't have done this version, or the one from a decade++ prior that did well over @ NEOWIN when it was discovered by they in 2001 & rated well there, here -> http://www.neowin.net/news/main/01/11/29/apk-a-to-z-internet-speedup--security-text , which "began it's 'life'" circa 1997-2002 or so, @ NTCompatible.com, as their "Article #1")

See, WITHOUT my study of the work of others, ontop of my own researches + discoveries that actually WORK, if the user follows this TO THE LETTER & can "control themselves online" (yes, 'behavioural modification' in a way)?? I could NOT have done this, or as well, period... we again, ALL stand on the shoulders of giants before us, & Microsoft in their GOOD SENSE, made their OS "parameterizable" &/or flexible.

I say this all, because my pal Jack whom I mention here is an example thereof, a practical REAL one no less (from 200++ viruses etc. a week, down to maybe 1 a year now & he KNOWS how/where he gets them (javascript &/or malwares he downloads taking HIS chances on it, but he knows how to use ProcessExplorer + RECOVERY CONSOLE to remove them, himself, & he is NO "computer jock" either))

I only FURTHER IMPROVED THAT GUIDE around 2006 or so, when I had kept it private to myself + friends & family only (using us ALL, as "lab rats", essentially whilst I 'prototyped this' guide basically, lol)... & it works!

So, it's done well, & done well by others too (my bottom-line & goal here, as it was my New Year's Resolution in 2008 to "DO THE RIGHT THING" & "PAY IT FORWARD" basically, to others), & across the 20 forums it is currently on, has been rated "5/5 stars", or made an "Essential Guide", or "Sticky/Pinned Thread" and even got me PAID for winning PCPitStop's January 2008 "Article of the Month" no less for producing it.

Searching "HOW TO SECURE Windows 2000/XP" online @ GOOGLE can show ANYONE proof of THAT much, as it "owns" nearly the "TOP 30 SPOTS" consecutively there.

An example thereof? OK (this very site in fact, where it is the MOST popular):

http://www.tcmagazine.com/forums/index.php?showtopic=2662

Where it is over 53,750++ views currently, in less than 1.5 yrs.' time online... & over 250,000++ views strong, with folks saying "Good stuff" or finding them NOT SHOWING ANY VULNERABILITIES or PENETRATIONS by malware in general even, IF they followed my security guide for Windows 2000/XP/Server 2003 (even VISTA onwards, to an extent) to the letter!

----

People such as THRONKA @ XtremePCCentral.com here stated, verbatim by he:

http://www.xtremepccentral.com/forums/showthread.php?t=28430&page=3 [xtremepccentral.com]

"Its 2009 - still trouble free! I was told last week by a co worker who does active directory administration, and he said I was doing overkill. I told him yes, but I just eliminated the half life in windows that you usually get. He said good point. So from 2008 till 2009. No speed decreases, its been to a lan party, moved around in a move, and it still NEVER has had the OS reinstalled besides the fact I imaged the drive over in 2008. Great stuff!"

----

Anyways/anyhow, in regards to "standing on the shoulders of giants"? Well:

Over that timeframe, & into TODAY (regarding Windows 7 especially lately when I have time that is, currently back in "Academia" to further improve my OOP skills via JAVA), well... I did a LOT of research & testing (mainly on registry hacks for BOTH added speed, AND SECURITY, online).

ALL of that came from many others, & MAINLY Microsoft (after all, THEY invented this OS famly & its parameters) via technet + MSDN + the RFC's on the IP stack documentations!

However, a few ideas here I put out are mine & were "homegrown" & today + the past decade now? They've begun "gaining momentum" with others 'picking up on' some of them, such as the use of HOSTS files for both added speed + security online... & "others" being the good folks from "Spybot 'search & destroy'" + even Mr. Oliver Day of SECURITYFOCUS.COM fame, in his article here:

----

RESURRECTING THE KILLFILE:

(by Mr. Oliver Day)

http://www.securityfocus.com/columnists/491 [securityfocus.com]

PERTINENT EXCERPTS/QUOTES:

"The host file on my day-to-day laptop is now over 16,000 lines long. Accessing the Internet particularly browsing the Web is actually faster now."

"From what I have seen in my research, major efforts to share lists of unwanted hosts began gaining serious momentum earlier this decade. The most popular appear to have started as a means to block advertising and as a way to avoid being tracked by sites that use cookies to gather data on the user across Web properties. More recently, projects like Spybot Search and Destroy offer lists of known malicious servers to add a layer of defense against trojans and other forms of malware."

----

YES, I am truly a "HUGE fan" of HOSTS files, because as Mr. Tony Stark (one of my childhood comic book heroes as pictured above, lol) said in the HUGE HIT FILM "Iron Man", in regards to HOSTS files effectiveness? Well, quoting him:

"I think we should take another look into 'ARK REACTOR TECHNOLOGY'" & "ark reactor technology" being the HOSTS file in my case here... I am sort of 'big on analogies' from film, because they are a 'common-ground' others can relate to (better than quoting classical literature imo, because not all have backgrounds in that really)

&

"IT WORKS..." Mr. Tony Stark/IRON MAN

(Or, isn't security guru/security columnist Mr. Oliver Day not also seeing that above as well & for the SAME reasons?)

OR as "Ozymandias" said, in "The Watchmen":

"I decided to take antiquities teachings (which HOSTS files really are, per Mr. Day's article above + the fact they are from "the ancient days" in computing really) & apply them to the world, of today. And thus I began my conquest. Conquest NOT of men, but of the evils that beset them"

Evils being what you have been victimized yourself by, which I quote below later in my reply to you. Virus/Spyware/Rootkits/Trojans (malware in general really).

& his (Ozymandias') BEST STATEMENT FROM THAT FILM (& why I spread this idea around):

"But, if we, make resources infinite? We make war, obsolete... I would hope the other watchmen understand that - Wherever they may be: Thanks for your time"

(The "other watchmen" being computer scientists, specifically network engineers/techs + security people really)

AND

"We can SAVE THIS WORLD (with the RIGHT LEADERSHIP)"

& I tried to do so, & in an area I have a chance @ "making a dent in the universe", albeit a GOOD one - the arena of computing sciences, for the good of myself & others as well.

(Ah, anyhow - "Nuff said", on THAT account... proof's in the pudding!)

----

Srivas said:
this is just what I was looking for. Just encountered a crazy virus, Virut.NBP, in my friends computer, messed up everything, no antivirus can do anything against it, I have to reinstall the whole system as the best advice found on forums about it. So now I dont want to mess around, better build up a secure system to save time and trouble in the future.

You shouldn't have to, ESPECIALLY if you use a GOOD hosts file, AND, if you are very careful & discriminate on WHERE you allow scripting etc. @ websites online (this IS the "main delivery mechanism" by malware makers worldwide today, & not so much in binary executables as it was in the past). Limit that, & use a HOSTS file to 'blockout' known BAD SITE & botnet "COMMAND & CONTROL SERVERS"?

You are essentially QUITE safe, or rather MUCH safer... the rest? Up to you, & being SMART about not just 'downloading & executing' any old executable or email attachment you get or see online... always check them via antivirus first, or research them via GOOGLE etc. et al, first.

Also, & THIS IS IMPORTANT:

IF You checked out the "VIRUS/ROOTKIT/SPYWARE REMOVAL" post here? You, yourself, can "knock out" just about ANY KIND OF INFECTOR-INFESTOR... with free tools & ones you already HAVE (e.g. -> Recovery Console) or ProcessExplorer as just being SOME examples thereof (or automated ones like ComboFix).

----

Srivas said:
I wanted to ask you some questions.

I will TRY to answer.

Srivas said:
What would you say to be the first main steps to secure a vista or win 7 based home-user system, I mean most important?

USE OF:

secpol.msc

SCW

gpedit.msc

services trimmings (for both speed & security)

Filesystem ACL's (covered in this guide via explorer.exe SECURITYTAB on files/folders/drives)

Registry ACL's ("")

Trimmings away excessive LSP (layered service providers), &/or Network Clients + Protocols (e.g. if you dont have a HOME LAN or connect to a work or school WAN sharing drives? DUMP SERVER SERVICE, Tcp over NETBIOS service (both in services.msc), & stall out Client for Microsoft Networks + File & Print sharing in your LOCAL AREA CONNECTION).

AND WATCH IT WITH JAVASCRIPT + BROWSER ADDONS & ACTIVEX CONTROLS ONLINE (very important here, cannnot stress it enough) + what you download from online or in email.

& A GOOD HOSTS FILE: mvps.org, or these from WIKIPEDIA are good ones:

http://en.wikipedia.org/wiki/Hosts_file

You'll go FASTER (far faster, as my pal Jack the PI says "twice as fast" or as Mr. Oliver Day says even, faster) but. MOST IMPORTANTLY? FAR SAFER!

(& mine that I use? WELL, is a deduplicated "merged model" of ALL OF THOSE (via a program I wrote in Delphi no less, because it is proven FASTER than VC++ even in math + strings work, which EVERY PROGRAM DOES mind you but also for the fact that working with a HOSTS file is, indeed, HEAVY STRINGS COMPARISON WORK, when removing duplicated entries (plus, I also use the 0 or 0.0.0.0 blocking entries vs. the larger, slower & less efficient 127.0.0.1 blocking loopback adapter address (for many reasons, mainly speed & efficiency though)).

All have (including mine) have been tested by many online worldwide & mine is simply a more efficient GIANT COMPILATION of all of those & 660,000++ entries long)

A SOLID guide for SERVICES TRIMMINGS & such? Black Viper...

In fact, he & I have spoken before online (he started his site (albeit many year later after MY guide @ NTCompatible.com was put out as "Article #1" there as I mentioned in reply to you here earlier to give you some "historical backdrop" on the how/why of my doing this), & many others did as well later online, often QUOTING my words, such as here on the CISCO forums -> http://www.ciscoforums.net/thread-20-1-1.html, & out of the premise of my guide from NTCompatible.com above, from which this version "sprung" & evolved into).

Change... GOOD CHANGE? Starts with YOU (yourself, in other words) I figure, & if it is a GOOD IDEA??

It "radiates"...

Outwards, to others, & apparently?

Well - from my original "ARTICLE #!" @ NTCompatible.com (on how to speedup & secure a Windows NT-based OS, which I noted from Neowin & the year 2001 above here earlier in reply to you... well again, Tony Stark/Iron Man, in regard to HIS "ark reactor": "IT WORKS...") entire other sites have 'sprung up' on the premise of services trimmings + securings, such as Black Vipers, years afterwards... spreading that "good word".

That IS, the "real bottom-line" here... passing it around, freely, to others & maybe, JUST MAYBE, making a "better world" (well, @ least online) out of it, possibly.

----

Srivas said:
You already explained everything in your above posts in detail, but what are the main first steps before logging into the internet (I will download the required soft through another system, my friends computer was set up one week ago, without any security measures except windows firewall, and now it will not boot up even)?

Get yourself setup & secured, FIRST, prior to even establishing a connection to the internet really... I did this for my niece & a buddy of mine named Jack (a private investigator by trade) & he in particular used to LITERALLY get over 200++ infestations a week (only once before on the job did I meet a Policeman from New Jersey who was hit by as much)... lol, odd that law enforcement folks like they would get the most, but, there you are.

My Pal Jack no longer gets "WAILED ON" by such infestors anymore... it's great to see, & I have seen the same for paying clients as well (such as the policeman from N.J. who told me (nice Italan guy, I love Italian people really, they're great) "You're ever in Jersey? Look me up, I will give you a "free pass" in this city"... he was thankful in other words!)

----

Srivas said:
And then I will go through your posts in detail to figure out the rest.

Right, which is pretty much what I just stated (answering you "on the fly" from your quotes, point by point, which is "my way", ad-hoc/stream of consciousness as I go). This "posting style" of mine "bloats my posts" but, it helps NOT "miss a point" or question the user asks as well (trade offs abound is all).

----

Srivas said:
And is there any latest software updates, since your first posts were almost one and half years ago, any new stars on the market?

I listed a truckload of tools that aid in not only patching your OS, &/or drivers (both VERY important) but, also to check for the latest in applications too (the NEXT AREA that will need this type of guidance imo, because OS? Imo they are getting a LOT better this way, & I am guessing that within a 5++ yrs. timeframe, we WILL have absolutely secure OS!)

Taking a risk on that last statement, but... we'll see, yea?

----

Srivas said:
And what would be most carefree setup for a person who is not used to deal with all the antivirus/firewall alerts, to make it easier for him?

This guide. It's WHY I 'put it out' & with as much detail as I did... I "take a lot of slack" for my writing style & wordiness/verboseness, but I provide as much detail + examples as I can, for the "non-techies" especially really. It does help, analogies + examples & all.

---

Srivas said:
Thanks for your help and guide.

You're welcome for your reply, & sorry for my lag in reply... I have midterms this week (working on more current OOP training in JAVA especially, & earning multiple degrees around this "art & science"/field we're obviously BOTH interested in!)

APK

P.S.=> Trying to "better myself" & I learn more, everyday, which makes it more difficult + yet, MORE FUN too... anyhow, there ya are, & thanks for your reply + interest too! apk
 
Last edited:

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
The "dim beginnings" of how to SECURE Windows7... apk

OK, for those of you that have "moved on" to VISTA (or Windows Server 2008 & Windows 7), as I have recently, in my now using Windows 7 64-bit here?

(For around 2++ weeks now or so, in using Windows 7 here, & doing well thusfar, @ least)

WELL - here is what I have done so far to help secure Windows 7 more:

BACKGROUND: Since this guide was originally intended for folks with a SINGLE SYSTEM online (or many via a router, but NOT "networked together" via Active Directory (or, otherwise) for File/Folder & Print Sharing for example/for instance), this too is intended for that SAME kind of "audience", albeit, in regards to Windows 7 (again - I use the 64-bit model of Windows 7 here, but this ought to be fine for 32-bit users as well)

====

Start up SERVICES.MSC (You will need this for turning on/off various services is why)

1.) Turn off the SERVER service (this also aids in making you less vulnerable to the CONFICKER bug out there too, because this service "publishes" shares on your system) - in turn in making you more secure, this also lessens another service that you DO NOT NEED TO BE RUNNING, period, when you are a "standalone single machine @ home connected to the Internet" - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically

... I also run this .cmd "batch file" on Windows 7 @ my startup (via a shortcut that loads it & runs it minimized):

echo off
NET SHARE C$ /DELETE
NET SHARE B$ /DELETE
NET SHARE D$ /DELETE
NET SHARE E$ /DELETE
NET SHARE F$ /DELETE
NET SHARE G$ /DELETE
C:
NET SHARE ADMIN$ /DELETE
NET SHARE IPC$ /DELETE
NET SHARE DFS$ /DELETE
NET SHARE COMCFG$ /DELETE
NET USE * /DELETE :REM last line is to force complete read of HOSTS file into RAM, that domainname/hostname is the last line in it... apk
ping zzzz.hostindianet.com

That removes shares (just in case, overkill yes, but still, just being safe) & FORCES my system to load my HOSTS file in its entirety too (into my local diskcache kernel mode subsystem's arrays/buffers/structures, because that is the last entry in it & pinging it SHOULD force my system to look into that HOSTS file of mine (more on THAT below, lots more) & since it is the LAST ENTRY, it will read the entire file into RAM @ that point, to do so, effectively caching my HOSTS file, right then & there) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically

----

2.) Turn off the TCP/IP over NetBIOS service (this is not needed by a person who does not have a home LAN either, or needs to share his files/folders/disks out to others remote to the system in question also, much like SERVER service above) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically

----

3.) I have also been able to turn off the WORKSTATION service as well on Windows 7, albeit, ONLY AFTER I BOOTUP & LOGON in test so far, not sure if you can DISABLE it & still logon, so... keep that in mind!

(This service deals in SMB (server message block iirc) networking)

Turning it off, like any service you don't really need, results in YOUR saving more CPU cycles, RAM, & other forms of I/O also, + even electric power really... as you're not running a program & using power, just like ANY of the above or below recommendations for turning off programs of most anykind really do (albeit, this isn't as much of a "security gain" as the top 2 above are imo) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically.

----

4.) I have also turned off (set disabled) the SSDP Discovery Service (don't need it here is why)

----

5.) I have also turned off (set disabled) the Function Discovery Provider Host Service (don't need it here is why) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically (well, in this case, POSSIBLY only).

----

6.) I have also turned off (set disabled) the Net.Tcp Port Sharing Service (don't need it here is why & this MIGHT be somewhat of a 'security risk' too, imo @ least, in leaving it "on" & running 24x7) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically (well, in this case, POSSIBLY only).

----

7.) I have also turned off (set disabled) the SSDP Service (don't need it here is why & it "ties in" with UPnP below (read that one))

----

8.) I have also turned off (set disabled) the UPnP Service (don't need it here is why & UPnP has been KNOWN to have vulnerabilities over time, in OS & in routers even, which IS noted in this guide as to how/when/where/why/what can be 'dangerous' about it...)

----

9.) I have also turned off (set disabled) the WinHTTP Web Proxy Auto-Discovery Service (don't need it here is why) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically (well, in this case, POSSIBLY only).

----

* THAT'S THE END OF SERVICES TRIMMINGS (more on that & a GOOD SOLID CURRENT GUIDE FOR THAT? It's in my "P.S." below... for even more speed & possible security gains you get by turning off services you do NOT need possibly, running in the background when you really do NOT need them to be, soaking up CPU cycles, memory, & other types of I/O your programs you actually USE, could use, instead! Just common-sense, imo...)

ANYHOW - onto the LOCAL AREA NETWORK CONNECTION"

10.) Turn off Client for Microsoft Networking, QoS, + File & Print Sharing in your LOCAL NETWORK CONNECTION (avoiding the potential for shared disk/file/folder access even more, & do this ONLY IF YOU DO NOT HAVE TO CONNECT TO A LAN/WAN (local or remote) for disk/folder/file sharing only, or if you are NOT part of a HOME or WORK LAN/WAN)... & really, any others, other than TCP/IP (this you need for online access).

While you are there, in your LOCAL AREA CONNECTION?

Well - Additionally, You can DISABLE TCP over NETBIOS as well in the LOCAL AREA CONNECTIONS' properties for Tcp/IP, & the ADVANCED button, then click on the WINS tab & check "DISABLE NetBIOS over TCP/IP"
... &, there are a few more too, read on:

Extra protocols &/or services that Windows 7 has, such as "Link Layer Topology Discovery Mapper I/O Driver" &/or "Link Layer Discovery Responder" can also be "cranked off" & apparently to NO DETRIMENT EITHER (I have been running for weeks now without it & I am here posting, aren't I? If that doesn't say or prove it for me, not much will I guess... lol!)

I also add in OpenDNS' servers there in the DNS tab (advanced Tcp/IP properties) & their IP addresses are:

208.67.220.220
208.67.200.200

(They are a FASTER DNS system, & respond to fixes + patching faster than any other did when Mr. Dan Kaminsky found the holes & security vulnerabilities he did last yr. in the Domain Name System (DNS)).

LASTLY (though this is more of a "speedup" than a securing tip)? Try this:

Create/paste this into notepad.exe & save it with a .cmd extension (32/64-bit batchfile really, just ends in .cmd rather than .bat, as 16-bit command.com driven ones did in DOS & Windows too)

@echo off
echo Setting TCP/IP flags...
echo -----------------------
echo This only succeeds when run as an administrator,
echo when run as a user it only shows the current settings.
echo.
pause
echo.
netsh int tcp set global rss=enabled
netsh int tcp set global chimney=automatic
netsh int tcp set global netdma=enabled
netsh int tcp set global dca=enabled
netsh int tcp set global autotuninglevel=normal
netsh int tcp set global congestionprovider=ctcp
netsh int tcp set global ecncapability=enabled
netsh int tcp set global timestamps=disabled
pause
cls
echo Current settings:
echo -----------------
netsh int tcp show global
pause

Then, lastly, run it... (create a shortcut to it, & use the ADVANCED button in the shortcut to "RUN AS ADMINISTRATOR"). This is supposed to speed up & help your IPStack perform better/faster, in Windows 7. I just tried it today, seems to work ok (no detrimental effects so far @ least that is).

Anyhow: "Onwards & Upwards!"

----

11.) IF you use a "largish" custom HOSTS file? TURN OFF THE DNS CLIENT SERVICE (which is just like the ones in Windows 2000/XP/Server 2003, which this guide covered MOSTLY as to how to secure those)... - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically, especially on an "AD Network" on a LAN/WAN (Active Directory is HEAVILY dependent on DNS is why).

* NOW, if you do not do this (turn off the DNS cache local client service), & you use a larger HOSTS file? You will LAG, & badly... amazingly badly in fact!

(I have written MS on this, only to have it "fall on deaf ears" really, so this IS the 'workaround' for that, rather unfortunately, because I believe it can be fixed for larger HOSTS files too, by altering how much can go into the C/C++ structure for records that DNS uses, based on reference BSD designs @ least (I don't have MS' sourcecode so... well, I can only guess on their designs, though they, like most others, tended to use the BSD model to start from @ least for TCP/IP)).

----

12.) USE A CUSTOM HOSTS FILE (for BOTH added SPEED, but more importantly FOR BETTER SECURITY ONLINE):

Custom HOSTS files can literally double your speed online via blocking adbanners (good & bad ones) + having the option to "hardcode in" your favorite websites IP Addresses into a HOSTS file next to its HOSTNAME/DOMAINNAME, avoiding having to call out to remote DNS servers (many of which have been found exploitable, even the allegedly "invulnerable djbdns system", by Mr. Dan Kaminsky & others in case you are interested in specifics here on this note), saving a GOOD 30-N ms roundtrip traveltime per call to remote DNS server to resolve a URL to an IP address...

BUT, their best benefit? Even better than "double your normal internet surfing speed online" (it will get faster, read here in fact):

----

RESURRECTING THE KILLFILE:

(by Mr. Oliver Day)

http://www.securityfocus.com/columnists/491

PERTINENT EXCERPTS/QUOTES:

"The host file on my day-to-day laptop is now over 16,000 lines long. Accessing the Internet particularly browsing the Web is actually faster now."

"From what I have seen in my research, major efforts to share lists of unwanted hosts began gaining serious momentum earlier this decade. The most popular appear to have started as a means to block advertising and as a way to avoid being tracked by sites that use cookies to gather data on the user across Web properties. More recently, projects like Spybot Search and Destroy offer lists of known malicious servers to add a layer of defense against trojans and other forms of malware."

----

So reiterating this: Even BETTER THAN THE SPEED GAINS HOSTS FILES PROVIDE, ARE the SECURITY GAINS!

I.E./E.G.-> I have a pal named Jack, a PI by trade & license/degree, who used to get (no joke) 200++ viruses a week... NOT ANYMORE! He is CONVINCED, as am I, that a good current HOSTS file that blocks out known BAD SERVERS is the key here... as well as his saying literally "my intenet goes TWICE AS FAST with a HOSTS file"...

(FOR GOOD RELIABLE/REPUTABLE HOSTS FILES? There are many good ones!)

Try here ->


http://en.wikipedia.org/wiki/Hosts_file

& you can use sites like Mr. Dancho Danchev's security blog to update them even more for securiity (i.e. - for the latest in listings of botnet "Command & Control Servers" or bad sites with malware on them in general, here -> http://ddanchev.blogspot.com/ )

OR

Just use "Spybot 'Search & Destroy'" instead, as it updates your HOSTS vs. known bad websites (& your webbrowser of choice's private block lists, such as IE "Restricted Zones" here -> HKCU,"Software\ Microsoft\Windows\CurrentVersion\Internet Settings\Zones\4 or via Internet Options in CONTROL PANEL, & others like Opera maintain private .ini files (URLFILTER.INI &/or FILTER.INI) for the same general purpose))

E.G.-> Over the past 10 yrs. or so now, those sites have helped me build upt a custom HOSTS file version that has over 660,000++ entries in it, of KNOWN BAD SERVERS OF ALL KINDS...

Mine COMBINES mvps.org's & the one I built up myself since 1997, alongside all those @ the wikipedia site for HOSTS files above, that is completely free of duplicate entries (via a program I wrote & posted of here, "APK Hosts File Grinder 4.0++") & uses the SMALLEST + FASTEST POSSIBLE INTERNAL FORMAT for them on Windows 2000/XP/Server 2003 (0 blocking "ip address", e.g.-> 0 www.knownbadmalwaresite.com ) OR for Windows VISTA/Server 2008/Windows 7 (using 0.0.0.0 which though larger than 0, is the only thing that still works on those most modern versions of Windows)

(ODD THAT, that diff. in blocking IP address used, but the dual layer IPv4/IPv6 tcpip driver in VISTA onwards must have facilitated this, but it too, up until 12/09/2008 could ALSO USE THE SMALLER & FASTER 0 BLOCKING "IP ADDRESS", but after that "Patch Tuesday", even VISTA no longer could... so, I am not sure of WHY MS has pulled this though I have confronted them numerous times on it, repeatedly, & I noted it above also).

I mean, hey - Windows VISTA/Server 2008/& Windows 7?? They're ALL/EACHl based off Windows Server 2003 code, which still can use 0 though oddly, making for smaller & faster HOSTS files - so why doesn't MS allow this now?? Boggles my mind, but worse, is the fact they have evaded answering me on it several times (on their own forums, & on ones like SLASHDOT too + more).

----

PRACTICAL e.g. in the case of mine?

a.) Using 0 gets me a 14mb sized HOSTS file, same line entries as the ones below, just using 0 as "blocking IP address" (vs. 0.0.0.0 or 127.0.0.1 which ARE larger & thus, slower to read)...

Whereas, by way of comparison:

b.) Using 0.0.0.0 on Windows 7 is up to 18++mb in size...

c.) However, & WORST OF ALL for both speed & efficiency? 127.0.0.1, the default blocking address used, ends you up with a 22++mb sized HOSTS file!

So, as you can see? I save 30% or so using 0 vs. 0.0.0.0 (have to use THIS latter one though, on VISTA/WinSrv2k8/Windows 7 though, what a shame) in filesize & thus loadspeed of my HOSTS file, AND approximately ALMOST 50% in size vs. using 127.0.0.1 - to any "naysayers" on this account, I can only say:

"Argue with the numbers", & GOOD LUCK (you'll need it, more like a miracle really).

----

(This turning away of being able to use 0 in a HOSTS in VISTA onwards (again, wasn't always this way in VISTA mind you) is "bloated", because 0 &/or 0.0.0.0 do the same valuable blocking, & are smaller + faster to load because of the size diff.... so, "do the math" yourself, & realize also that smaller files load & parse faster (line by line, in a WHILE loop, with each line terminating in a CR+LF (carriage return + linefeed/enter keypress), & eventually when the "EOF" (end-of-file trailer record-marker) is hit signalling the end of the file & thus the read loop in the File Open/Read-Write/Flush-Close I-O cycle)...

Funniest part of all, is this: Windows 2000 didn't have 0 as a legit blocking IP address in its ORIGINAL DISTRO on CD from MS: They added it LATER... & kept it all the way into VISTA, until 12/09/2008 MS "patch tuesday"... why change it now, especially when it does a GOOD THING for a great thing (hosts files)? And, ping'ing a 0 blocked site from your HOSTS file, on Windows 2000/XP/Server 2003 gets back a 0.0.0.0, a legit IP address (proving this is indeed, LEGIT TO USE, period... so, why did MS remove it, if it makes a HOSTS file smaller & faster?)

----

13.) Look @ your TCP/IP rules "INBOUND" tables in the "ADVANCED FIREWALL CONNECTIONS" section of your Windows Firewall (Run this command for a quick link to it -> %windir%\system32\WF.msc )

There?

Well, I have personally successfully turned off /BLOCKED an ENTIRE ARRAY OF DEFAULT ALLOWABLE PROTOCOLS I JUST PERSONALLY DO NOT NEED & I am again, here posting, just fine (after reboots & all mind you).

(ALSO - this section here? WELL - This may vary by what you yourself need to do though, so bear that in mind)...

PERSONALLY - I only left the "Core Networking" sections/lines as ALLOWED IN (& I am certain I can block out a couple of those too, but this is all what I have done "so far", successfully, only... more will come in the future I am sure on this one from myself, or others too).

----

14.) A good run of secpol.msc (using its Account Policies &/or Local Policies Left-Hand Side tree items/folders).

(& on secpol.msc, I applied "AnalogX's IP Security Policy", in the IP Security Policies section also (which I mention in this guide here earlier, & in AnalogX, & WHERE TO GET IT, with directions to install it (cake-easy) & it works great still, too!)

PLUS I added myself as an ADMINISTRATOR user to nearly EVERY category in "User Rights Assignment"! I removed AND DENIED out the following users/groups in my DENY sections (the toughest ones really) in the secpol SECURITY OPTIONS section:

DIALUP
TERMINAL SERVER USER/GROUP (I don't use OR allow this here, you may)
GUEST
ANONYMOUS LOGON (especially this one)
Remote Desktop Users (I don't use OR allow that here either)
REMOTE INTERACTIVE LOGON
IIS Users (I don't host a website here is why on this note)

(STEER CLEAR OF THE DCOM RELATED SETTINGS GUYS - I DID THAT & CAUSED MYSELF A LOT OF "PAIN" (not really - Windows7 recovery bootup from install DVD or System Repair CD let me restore from a Restore Point perfectly once, & a System Image once, & those are the only other times I redid or had to redo this system on Windows 7, which happened the first day, while I was learning more (during tuning tests like these, or checking which boards/cards still worked for me here on Windows 7)... I'd try to help YOU avoid that, though it was not bad!

I do this, this way, here... simply because I have run for the past 15++ yrs. now that way (beyond "STD. ADMINISTRATOR" or "SYSTEM" level rights even)... I do so, successfully!

& despite the 'common belief' it's 'dangerous to do'? Well... I do that, & have not gotten infested/infected since, oh, around 1996-1997 that I know of @ least, but then I know to avoid using the "main malware delivery tools" in IFRAMES + JAVASCRIPT mostly, online, & also what sites I use that have proven reputable too (which some of you may or MAY NOT wish to elect to do on the elevated ADMIN/SYSTEM-LIKE rights assigned to yourself... &, epsecially if you believe in & espouse the UAC "least privelege principal", because its theory is SOUND, but it's not always that way in practice (per folks still getting infested in VISTA, & of course, the antivirus-antispyware test I note here in THIS POST, too))

E.G.-> There, in the I gave myself every right possible under the sun almost (those who believe in the principal of "least privelege is safer" disregard this, & it's so UAC keeps "protecting you" (though it's not that great vs today's threats, it did stop 3/10 of the ones thrown @ it here -> http://tech.slashdot.org/article.pl?sid=09/11/08/0233248 , it's still NO "Cure" for a user that does not give a hoot & just downloads + opens/runs any email attachment or binary executable from online that he finds, either)

----

15.) GET MICROSOFT SECURITY ESSENTIALS (especially if you do not have a Windows 7 compliant/compatible antispyware + antivirus program)... it has been rated + reviewed VERY WELL online in antivirus/antispyware competitions-contests/ratings, & I have been using it and it is fair FAST @ scanning files/folders plus, it is VERY LIGHT & operates QUITE "transparently" too... not much lag, IF any, is perceptiable from it & it updates, daily too AND IS 100% FREE and WORKS!

----

16.) Do the "FileSystem" & "Registry Hives" ACL security tip I noted here, adding yourself + SYSTEM (& any user groups YOU are part of, & removing other users that do NOT need to be there right out)... it works for security too.

----

17.) Doing the above, on Windows? Between ALL THAT ABOVE should "do the job" & between that + running a tool like Microsoft Baseline Security Analyzer 2.1.1 (there are 32 &/or 64 bit models out there now mind you too + I posted the download links to them above here earlier a couple posts up from this one)!

====

Doing ALL that to a Windows 7 System that is a "stand-alone" single system hooked to the internet only (not a LAN/WAN or home network)? You SHOULD be "OK"/Fine, for now @ least, on a secured Windows 7 setup...

(NICE PART IS, imo thusfar @ least? Well, that is that it really SEEMS you do not have to do NEARLY ANYWHERE AS MUCH as what you had to do for Windows 2000/XP/Server 2003 though really, for security)

... Especially since MS has really, REALLY done a GOOD JOB of securing services for instance, so you don't really have to do that step anymore as I outlined in this guide early on, for securing services & for Windows 2000/XP/Server 2003 for the "utmost in security" even @ the services level, like MacOS X has for example... especially since MS has even helped THOSE older models of Windows do better there, via service packs + hotfixes for them altering the "logon SID entity indentifier" services use (LOCAL SYSTEM, vs. LOCAL SERVICE or the least priveleged in NETWORK SERVICE).

ANYHOW/ANYWAYS: Well - That's my "Top 17", so far @ least, for Windows 7, for now... IF I find more?

I'll put them up for your reference (and do pay attention to points in this guide too, as more than a few STILL APPLY to Windows VISTA, Windows Server 2008, & yes, Windows 7 still too)...

APK

P.S.=> NOW - For even MORE "speed-enhancing" services tunings (the above are for SECURITY mostly, but also help you gain speed by plain jane just not running them (pretty common-sense nowadays, & generally accepted as OK, even since the days when I authored what is probably the FIRST publicly noted guide for "Speedup & Securing Windows NT-based OS'" over @ NTCompatible.com as their "Article #1", which Neowin noted back in 2001 when they finally "got wind of it", here -> http://www.neowin.net/news/main/01/11/29/apk-a-to-z-internet-speedup--security-text & they rated it very well also))?

Well, you may wish to check out "BLACK VIPER'S GUIDE", here:

http://www.blackviper.com/Windows_7/servicecfg.htm

It's GOOD, & VERY CURRENT + ACCURATE (& flexible)!

Amazes me, that ENTIRE SITES 'sprang up' out of the guide I did ages ago & based on the SAME PREMISE as my original guide was @ NTCompatible.com (circa 1997-2002) for NTCompatible.com as their "Article #1"....

... & I am glad because spreading good information around that makes the world a better place it is just fine by me @ least... (& Black Viper's is particularly OUTSTANDING in this regards, & he "kept up on it", keeping his website running & chock full of CURRENT INFORMATION on this topic, on more current OS (I stopped doing those around the time Windows VISTA came out is why, because it has a LARGELY "self-tuning IP stack" (when I did tunings for TCP/IP networking) & by that point, I had moved onto other areas (programming MOSTLY, vs. networking/tech stuff))... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
A new bug has surfaced on Windows 7 &/or Windows Server 2008: Here is a work-around

Per this security notification from SECUNIA.COM:

http://secunia.com/advisories/37347/

Microsoft Windows SMB Response Denial of Service Vulnerability

PERTINENT QUOTE/EXCERPT:

----

"Description:

Laurent Gaffié has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error when processing SMB packets received from an SMB server.

This can be exploited to hang an affected system by tricking a user into connecting to a malicious SMB server via e.g. a specially crafted web site opened in Internet Explorer.

The vulnerability is confirmed on a fully patched Microsoft Windows 7 and reported in Microsoft Windows Server 2008 R2."

AND:

'Solution:

Block outbound connections to untrusted SMB servers via a firewall."

----

So, that evidence as "said & aside"? Well...

THIS OUGHT TO SERVE, "in the meantime @ least" (until a patch from MS is issued next "Microsoft Patch Tuesday" I suppose) to "FIX" that problem:

(If it works, it's by pure luck & I posted it above as more of a "speed boost" by not running a service you do NOT really need (as a 'standalone single system logged into the internet only' but not attached to a home or work LAN/WAN), but the WORKSTATION service does function to provide SMB services, & cutting it off SHOULD technically "do the job here" to protect one's self vs. this "bug/possible exploit"....

So, quoting myself from above:

OK, for those of you that have "moved on" to VISTA (or Windows Server 2008 & Windows 7), as I have recently, in my now using Windows 7 64-bit here?

====

Start up SERVICES.MSC (You will need this for turning on/off various services is why)

3.) I have also been able to turn off the WORKSTATION service as well on Windows 7, albeit, ONLY AFTER I BOOTUP & LOGON in test so far, not sure if you can DISABLE it & still logon, so... keep that in mind!

(This service deals in SMB (server message block iirc) networking)

Turning it off, like any service you don't really need, results in YOUR saving more CPU cycles, RAM, & other forms of I/O also, + even electric power really...

As you're not running a program & using power, just like ANY of the above or below recommendations for turning off programs of most anykind really do (albeit, this isn't as much of a "security gain" as the top 2 above are imo) - do NOT do this if you are part of a LAN/WAN though, you need it in those environs typically.

I guess, now, in this case, vs. this "bug?" Well, it IS a security patch too, & not just a "speed booster"... per the bolding I just did above, where I said it's really only a 'speed boost'.

So give this a go, alongside the firewall rules table vs. outbound SMB connections, for now @ least until MS patches it, for securing AND SPEEDING UP, a Windows 7 system!

(Once more -I did WORKSTATION SERVICE stalling, albeit, only for speed, but I wager, again, by luck, it should work vs. this bug also, just because of what WORKSTATION service provides (i.e.- SMB services)).

APK

P.S.=> Some work in IE may be needed also, but, this is all I have, for now, vs. this exploit possibility thusfar, so 'turn off' WORKSTATION SERVICE (once you have logged on that is, because I am NOT 110% sure you can & still logon to your Windows 7 systems is all) & do a firewall rule for outbound SMB connectivity...

(Albeit @ this point, I am NOT sure if you can do that AND still LOGON to Windows, so only turn it off in services.msc once you have logged yourself in, & DO PAY ATTENTION TO CREATING A FIREWALL RULE FOR OUTBOUND SMB BASED CONNECTIONS, BLOCKING THEM FROM GOING "OUTBOUND" FROM YOUR SYSTEMS TOO)... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Good news on setting WORKSTATION SERVICE to manual, in SERVICE.MSC, vs. the SMB flaw

Good news on setting WORKSTATION SERVICE to manual, in SERVICE.MSC, vs. this new flaw in Windows VISTA/Server 2008/VISTA:

(Albeit @ this point, I am NOT sure if you can do that AND still LOGON to Windows, so only turn it off in services.msc once you have logged yourself in, & DO PAY ATTENTION TO CREATING A FIREWALL RULE FOR OUTBOUND SMB BASED CONNECTIONS, BLOCKING THEM FROM GOING "OUTBOUND" FROM YOUR SYSTEMS TOO)... apk

Well, good news:

Upon testing this here, & on Windows 7? You CAN still logon to your system, even IF WORKSTATION SERVICE is set to "MANUAL" startup type in SERVICES.MSC (this also holds true all the way down to Windows 2000 SP #4, as I had my pal Jack the PI test it for me upon my request, & he too can logon to his Windows 2000 rig no problems, with WORKSTATION effectively disabled (via MANUAL, not DISABLED setting, for startup type on said service)).

Thus, again, since WORKSTATION SERVICE provides & manages SMB (server message block iirc, as to this acronym's expansion) services, & the single flaw in Windows 7 &/or Windows Server 2008 are exploited thus by a flaw in SMB? This SHOULD "take care of that too", lickety-split, no "SHEET"...

APK

P.S.=> Well, now that that's been "said & aside"? 'Onwards & UPWARDS!"... OH - & again: This is for machines that are "standalone systems" hooked to the internet via a DSL or Cable router (or even dialup), or thru a home Router/modem, that are NOT "ACTIVE DIRECTORY" or otherwise (SMB/NetBIOS/LanMan networking or NetBEUI even (or otherwise)) system: You will need to keep WORKSTATION service up & running in those environs, especially for shared disk/folder/file access in LAN/WAN environs... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Credit goes where it's due (I "overlooked" a point 4 Win7 (sort of))

Another great point by another user from another forums today, for Windows 7 folks (VISTA too, & of course, Windows Server 2008), from a fellow named "AlphaAlien" here -> http://www.hardwaregeeks.com/board/showthread.php?p=410440#post410440

(LOL! Oddly, it's one I overlooked from my OWN GUIDE here, that I applied to Windows 2000/XP/Server 2003, but had "overlooked" in my tips about Windows 7 just above, specifically... &, it IS a good idea, + one I ended up "expanding on" so, I have to thank AlphaAlien for "getting the ball rolling" in my brain here, lol, once more so I could suggest his point (one I suggested here again, no less, for the OLDER MS' OS of Windows NT-based ancestry) & expand on it even more... probably wouldn't have done it w/out he, so, credit goes, where credit is due imo).

This is a good point too, so... here goes:

Open up gpedit.msc (you can do this from the "Windows Start button" (is it STILL called that now, in Windows 7/VISTA etc. I wonder?) & the RUN or search command). In it, follow its left-hand side pane's tree items down THIS path:

Computer Configuration
Administrative Templates
Network
Network Connections
Windows Firewall
Domain Profile (only use this one IF you are not part of a LAN/WAN or connect to them, & you don't need to do some of what is suggested to turn off there - & you can though, if you don't need to do the stuff we're going to 'crank off' here, especially if you are a single system home user)
Local Profile (this one users with a single system @ home that's not part of a home LAN should do)

NOW, once there? Use the RIGHT-HAND SIDE PANE items of (now quoting our exchange from the URL above, saves me time, & I have programming assignments in JAVA to do so, excuse the use of this DIRECT quote from the URL above):

Prevents administrative remote management services.


Looks good to me, especially for most folks (which, face it, most folks don't have home "LAN/WAN" setups (mainly people who are way, Way, WAY "into computing" do imo & experience)).

Since they're mainly single system users, & @ home (which I found professionally on a job in 2006 that they're the most "abused" typically as well by malware etc. et al) - they're the folks I put this out for mostly, if they want to take the initiative & time to do it is all. They need it the most, from what I've seen, so... here 'tis.

As long as you don't perform remote administration tasks? You should probably turn the ability for "remote administration" off as AlphaAlien points out.

I'd have to add this point of AlphaAlien's now though: This same idea/technique/tip/trick can also be done for the DOMAIN and LOCAL profiles there too, and, it also points out a couple others to remove, possibly too (such as UPnP, Remote File & Printer Access, Remote Desktop, setting them as DISABLED there, & possibly to even ICMP also (ping basically))

The PING & UDP ones may affect other wares though, so, test @ your leisure on those 2.

(Sounds like a good move, as imo @ least, it really supplements cutting off:

A.) Server (allows shares) + Workstation (provides SMB services, in services.msc (& an outbound BLOCK rule in the firewall vs. TCP/UDP for PORTS 139 & 445 (this one mainly, will stall this newly surfaced "bug" noted above in Windows 7 & Server 2008))
B.) Terminal Services/Remote Desktops
C.) Cutting out Client for MS Networks + File & Print Sharing in your local area network connection (clients & protocols sections) & also NetBIOS over TCP/IP in the WINS section of the local area connection too.
D.) Disabling TCP/IP over NetBIOS in services.msc as well
E.) "Stalling out share$", via a batch or .cmd file (possibly even a powershell script as well) & I mean, any shares: Even default ones like in the batch above
F.) Setting secured ACL's on the filesystem + registry as well via explorer.exe OR cacls possibly, & regedit.exe

(Then, your firewall can do the rest, as far as "inbound intrusion attempts" - I don't think there's much other than that to "get ahold of", & even a nullsession attempt ought to be stalled between this, & the secpol.msc work (plus HOSTS & AnalogX's IP Security Policy as well)))

Thanks for the solid point AlphaAlien: It got my "wheels rolling" on a couple of others in gpedit.msc (which I did suggest for Windows 2000/XP/Server 2003 already earlier in this guide), but, I overlooked here, so I added on the rest.

APK

P.S.=> Oh, AlphaAlien: I am going to credit you with this & put your points out, in your name of course, in regards to this setting in Group Policy Editor on the other 20 or so forums I can still edit this post on as well, hope you don't mind (it's a good solid point, & I do credit others where/when/how/why credit is due they, for solid points) - I am not sure if linking to your photo will work or not (depending on where YOU store it that is), so I may have to "expand" the tree items in gpedit.msc manually in text, so... in any event, there you are... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
New IE6/IE7 bug, & "workaround/fix"... apk

Microsoft Security Advisory: Vulnerability in Internet Explorer could allow remote code execution:

http://support.microsoft.com/kb/977981

The new bug in IE6 & IE7 can be patched above (allowing IE6/7 to "opt-in" to DEP (data execution prevention)) using the "FIX IT" button noted there (which applies a database of apps to support DEP apparently, inclusive of IE variants).

The original article explaining the nature of the attack is here:

http://www.microsoft.com/technet/security/advisory/977981.mspx

As well as it listing what Operating System versions are affected adversely thus, there.

APK

P.S. => This is the 2nd URL's list of affected IE versions, & on which Windows NT-based OS variants also:

PERTINENT EXCERPT:

Microsoft is investigating new public reports of a vulnerability in Internet Explorer. This advisory contains information about which versions of Internet Explorer are vulnerable as well as workarounds and mitigations for this issue.

Our investigation so far has shown that Internet Explorer 5.01 Service Pack 4 and Internet Explorer 8 on all supported versions of Microsoft Windows are not affected, and that Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4, and Internet Explorer 6 and Internet Explorer 7 on supported editions of Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 are affected.

The vulnerability exists as an invalid pointer reference of Internet Explorer. It is possible under certain conditions for a CSS/Style object to be accessed after the object is deleted. In a specially-crafted attack, Internet Explorer attempting to access a freed object can lead to running attacker-supplied code.

At this time, we are aware of no attacks attempting to use this vulnerability against Internet Explorer 6 Service Pack 1 and Internet Explorer 7. We will continue to monitor the threat environment and update this advisory if this situation changes. On completion of this investigation, Microsoft will take the appropriate action to protect our customers, which may include providing a solution through our monthly security update release process, or an out-of-cycle security update, depending on customer needs.

We are actively working with partners in our Microsoft Active Protections Program (MAPP) and our Microsoft Security Response Alliance (MSRA) programs to provide information that they can use to provide broader protections to customers. In addition, we’re actively working with partners to monitor the threat landscape and take action against malicious sites that attempt to exploit this vulnerability.

Microsoft continues to encourage customers to follow the "Protect Your Computer" guidance of enabling a firewall, applying all software updates and installing anti-virus and anti-spyware software. Additional information can be found at Security at home.

Mitigating Factors:

• Internet Explorer 8 is not affected.
• Protected Mode in Internet Explorer 7 in Windows Vista limits the impact of the vulnerability.
• In a Web-based attack scenario, an attacker could host a Web site that contains a Web page that is used to exploit this vulnerability. In addition, compromised Web sites and Web sites that accept or host user-provided content or advertisements could contain specially crafted content that could exploit this vulnerability. In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to convince users to visit the Web site, typically by getting them to click a link in an e-mail message or Instant Messenger message that takes users to the attacker’s Web site.
• An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate with administrative user rights.
• By default, Internet Explorer on Windows Server 2003 and Windows Server 2008 runs in a restricted mode that is known as Enhanced Security Configuration. This mode sets the security level for the Internet zone to High. This is a mitigating factor for Web sites that you have not added to the Internet Explorer Trusted sites zone.
• By default, all supported versions of Microsoft Outlook, Microsoft Outlook Express, and Windows Mail open HTML e-mail messages in the Restricted sites zone. The Restricted sites zone helps mitigate attacks that could try to exploit this vulnerability by preventing Active Scripting and ActiveX controls from being used when reading HTML e-mail messages. However, if a user clicks a link in an e-mail message, the user could still be vulnerable to exploitation of this vulnerability through the Web-based attack scenario.

General Information
Overview

Purpose of Advisory: To provide customers with initial notification of the publicly disclosed vulnerability. For more information see the Mitigating Factors, Workarounds, and Suggested Actions sections of this security advisory.

Advisory Status: The issue is currently under investigation.

Recommendation: Review the suggested actions and configure as appropriate.References Identification

CVE Reference
CVE-2009-3672

Microsoft Knowledge Base Article
977981

----

This advisory discusses the following software.Affected Software

Windows XP Service Pack 2

Windows XP Service Pack 3

Windows XP Professional x64 Edition Service Pack 2

Windows Server 2003 Service Pack 2

Windows Server 2003 x64 Edition Service Pack 2

Windows Server 2003 with SP2 for Itanium-based Systems

Windows Vista

Windows Vista Service Pack 1 and Service Pack 2

Windows Vista x64 Edition

Windows Vista x64 Edition Service Pack 1 and Service Pack 2

Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service pack 2

Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2

Internet Explorer 6 Service Pack 1 on Microsoft Windows 2000 Service Pack 4

Internet Explorer 6 for Windows XP Service Pack 2, Windows XP Service Pack 3, and Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 6 for Windows Server 2003 Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, and Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 7 for Windows XP Service Pack 2 and Windows XP Service Pack 3, and Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 7 for Windows Server 2003 Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, and Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 7 in Windows Vista, Windows Vista Service Pack 1 and Windows Vista Service Pack 2, and Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 7 in Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2

Internet Explorer 7 in Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2

Internet Explorer 7 in Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2

Non-Affected Software:

Internet Explorer 5.01 Service Pack 4 for Microsoft Windows 2000 Service Pack 4

Internet Explorer 8 for Windows XP Service Pack 2 and Windows XP Service Pack 3, and Windows XP Professional x64 Edition Service Pack 2

Internet Explorer 8 for Windows Server 2003 Service Pack 2 and Windows Server 2003 x64 Edition Service Pack 2

Internet Explorer 8 in Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2, and Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2

Internet Explorer 8 in Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2

Internet Explorer 8 in Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2

Internet Explorer 8 in Windows 7 for 32-bit Systems

Internet Explorer 8 in Windows 7 for x64-based Systems

Internet Explorer 8 in Windows Server 2008 R2 for x64-based Systems

Internet Explorer 8 in Windows Server 2008 R2 for Itanium-based Systems

----

... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
NEW PATCH EXISTS for yet another IE 5-8 bug (serious NEW one)

I picked up on some information that you guys MAY wish to know about (especially IF you use Internet Explorer (all models/versions)):

GET THE PATCH FOR IE 5.01 - IE 8.0 (on ALL Windows versions of NT-based origins (2000/XP/Server 2003/Server 2008/VISTA/Windows 7)) FOLKS!

It was issued "Out-Of-Band" (meaning MS didn't wait for "Patch Tuesday" to roll around again (2nd Tuesday of every month)).

(&, you can do that via "Windows Update" of course, but that takes MORE TIME for that to "take" typically, than nabbing it directly, here would do for you, since you can install it yourselves, directly & immediately):

http://www.microsoft.com/technet/security/bulletin/ms10-jan.mspx

:)


This isn't a joke people & it's NOT THE SAME BUG IN MY LAST POST ABOUT IE EITHER!

So, please... See here:

Widespread attacks exploit newly patched IE bug:

http://www.itworld.com/security/93670/widespread-attacks-exploit-newly-patched-ie-bug

It's seriously being exploited, & that's only what they KNOW about.

APK

P.S.=> AND, "there ya are" - Enjoy!... So, after all? It's YOUR MONEY & TIME folks! (that's all)... apk
 

floppybootstomp

sugar 'n spikes
Moderator
Joined
Mar 5, 2002
Messages
20,281
Reaction score
1,794
I notice Microsoft have thanked the French Goverment, amongst others, for helping them with this.

Try as I might, APK, I couldn't find a link for the IE patch in your link.

I use Win 7 and have auto-updates enabled for important updates only.

Today I received an update for IE8 'for all 64 Bit based systems'.

Hopefully, that was it.
 

floppybootstomp

sugar 'n spikes
Moderator
Joined
Mar 5, 2002
Messages
20,281
Reaction score
1,794
Downloaded it, ran it, got this:

attachment.php


It's only 3.16Mb and not zipped.

Possibly corrupt I suppose.
 

Attachments

  • storage.PNG
    storage.PNG
    14.6 KB · Views: 631

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
That type of err/abend is typically indicative of short diskspace for say, %TEMP% etc

floppybootstomp said:
Downloaded it, ran it, got this:

attachment.php


It's only 3.16Mb and not zipped.

Possibly corrupt I suppose.

Per my subject-line above:

Are you out of OR nearing/on the way to being out of diskspace possibly?

(I say this, because of the nature of the err/abend being displayed is all & many times, installations use the %TEMP% &/or %TMP% environmental variable values to do their jobs, as a place to do their temporary ops like extracts etc./ et al)

... so, other than that??

Well - You might be correct - because corrupt executables spit back that SAME message many tiems also... try to "haul it in again" I guess & to reinstall it!

:)

* GOOD LUCK!

APK

P.S.=> I wouldn't be surprised @ a corrupted patch on download, because MS' servers are being HIT HARD by the sheer #'s of folks that have been "nailing them" for download for this patch since Mid-Thursday 01/21/2010 (lol, I almost typed 2009, still donig that here... don't you HATE that?)... apk
 
Last edited:

floppybootstomp

sugar 'n spikes
Moderator
Joined
Mar 5, 2002
Messages
20,281
Reaction score
1,794
Thanks for the good luck wish.

Don't think I'm short of space:

attachment.php
 

Attachments

  • disks.PNG
    disks.PNG
    30.2 KB · Views: 459

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
This is even for folks that DO NOT use IE as their default webbrowser & WHY... apk

floppybootstomp said:
Thanks for the good luck wish.

Don't think I'm short of space:

attachment.php

Again: Good luck & I'd still try to "snag" it IF you can, or just let Windows Update "do its thing" to do so, even though sometimes it takes longer than doing it manually yourself.

AND?

This is pretty good advice, even if you folks don't use IE as your "default browser", it may be a GOOD idea to get this anyhow... why?

Well, because SOME apps force the use of it on users is why... w/ out them knowing @ first (& there is no TRUE guanrantee of "absolute safety" on ANY website really).

Example? MS even has been "HIT" by adbanners carrying malicious payloads (because the adbanners that come from other servers are NOT being checked for 1 thing -> http://it.slashdot.org/story/09/06/15/2056219/The-Next-Ad-You-Click-May-Be-a-Virus ), so even if say an app directs you there, as SOLID as the talent they get usually is? It's possible to get "hosed".

Examples of apps that do so, are here:

http://tech.slashdot.org/comments.pl?sid=1519842&threshold=-1&commentsort=0&mode=thread&cid=30854906

Perhsaps an "interesting read" for those of you interested in PC Security & how apps work this way @ times (even GOOD apps).

APK

P.S.=> Others @ /. liked it, you may also, as it was "modded up" etc. et al there... again, good luck too! apk
 
Last edited:

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Newly discovered security issue in 32-bit Windows NT-based OS' 16-bit DOS emulation

A security vulnerability exists in, and has existed in since 1992-1993, the emulation subsystems for DOS &/or Win16 applications under 32-bit versions of Windows NT-based OS:

Microsoft Security Advisory (979682)

Vulnerability in Windows Kernel Could Allow Elevation of Privilege:


http://www.microsoft.com/technet/security/advisory/979682.mspx

----

THE "FIX":

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\SubSystems

(via removing support for said subsystems by blanking out the files they point to.)

These excerpts will help you identify each component used:

The NTVDM:

16 bit DOS and older 16 bit windows applications are supported by the NT virtual DOS machine (NTVDM) which runs in the Client/Server Runtime (CSR) subsystem. Since each copy of the NTVDM is given its own thread of execution, if it fails, it will not affect the operating system or other programs.

The following components support the NTVDM:

NTVDM.EXE - Starts the NTVDM and emulated the DOS environment.

NTIO.SYS - Emulates the DOS IO.SYS system file.

NTDOS.SYS - Emulates the DOS.SYS file.

Virtual Device Driver (VDD) - Used to allow DOS to interface with system devices on various ports such as the mouse, keyboard, serial ports, parallel ports, and video devices. This component is required since DOS expects to access hardware devices directly, but cannot do so when running on Windows NT.

VDMREDIR.DLL - Redirects file system input/output requests to the Win32 subsystem.

AUTOEXEC.NT - Replacement for AUTOEXEC.BAT.

CONFIG.NT - Replacement for CONFIG.SYS.

NT always loads a PIF for MS-DOS based applications. You can create a PIF to define requirements of the DOS application such as memory needs. In Windows NT 4.0, the PIF settings can be accessed by right clicking on the DOS executable file and selecting properties. On RISC based systems, an instruction execution unit (IEU) works with the NTDVM to emulate I383 Intel processor instruction sets.

----

What this "fix" (hopefully only needed temporarily) does, is remove the subsystem for DOS/Win16 applications.

It is the ONLY "work-around" I am aware of for this until it is fixed, IF ever, and it is very similar to a recommendation that others "tear out" the POSIX subsystem for the same potential reasons: Security vulnerabilities issues.

(The only people that need to be concerned here, are those running 32-bit versions of Windows NT-based OS (NT 3.x, NT 3.5x, NT 4.0, Windows 2000/XP/Server 2003/VISTA/Server 2008/7), because 64-bit versions of Windows OS do not have a 16-bit subsystem emulator present in them)

APK

P.S.=> Many, if not MOST, people today can do without these entries, UNLESS they have legacy applications from DOS or 16-bit Windows applications they need for "mission critical" purposes... those folks will have to leave these in place until a fix is created by Microsoft (the same can go for those who don't need this as well, but you "take your chances" until MS fixes this)... apk
 
Last edited:

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Easier/Faster way of fixing the NTVDM security issue

To help users automate this fix for the security issue in the NTVDM DOS 16-bit emulation subsystem present in 32-bit Windows NT-based OS (all of them & since 1992-1993 no less) that was noted in my last post above, You can do this far faster/easier/simpler, by using something Microsoft themselves devised to make it easier & simpler than registry editing, see the URL below:

http://support.microsoft.com/kb/979682

(It's easier/faster/simpler than wholesale disabling via renames or deletions of the files the NTVDM DOS 16-bit emulation subsystems components as shown above OR via registry edits, & thus, you can use what's in that URL above instead (and enable it again easily enough when a fix arrives IF you choose to do so as well)).

APK
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
IF A WEBSITE PROMPTS YOU TO PRESS THE "F1" KEY? DON'T!

IF A WEBSITE PROMPTS YOU TO PRESS THE "F1" KEY? DON'T!

Here is why:

http://secunia.com/advisories/38727/

Secunia Advisory SA38727

Microsoft Windows "MsgBox()" HLP File Execution VulnerabilitySecunia Advisory SA38727
Track and eliminate the complete Vulnerability threat lifecycle

Release Date 2010-03-01

Criticality level Moderately critical

Impact System access

Where From remote

Solution Status Unpatched

Operating System(s):

Microsoft Windows 2000 Advanced Server
Microsoft Windows 2000 Datacenter Server
Microsoft Windows 2000 Professional
Microsoft Windows 2000 Server
Microsoft Windows Server 2003 Datacenter Edition
Microsoft Windows Server 2003 Enterprise Edition
Microsoft Windows Server 2003 Standard Edition
Microsoft Windows Server 2003 Web Edition
Microsoft Windows Storage Server 2003
Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Description

Maurycy Prodeus (my fellow "polish person") has discovered a vulnerability in Microsoft Windows, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to the VBScript "MsgBox()" function allowing the execution of arbitrary HLP files. This can be exploited to execute an HLP file from e.g. an SMB share by tricking a user into pressing F1 when viewing a specially crafted website.

Successful exploitation allows execution of arbitrary commands via HLP macros.

The vulnerability is confirmed with Internet Explorer 7 on a fully patched Windows XP SP3, and additionally reported in Windows 2000 and Windows Server 2003.

Solution

Avoid pressing F1 on untrusted websites. Disable Active Scripting support.

APK

P.S.=> I was a "wee bit" slow on posting this one, but, here tis (around 28 days later than I ordinarily would, sorry about that, "busy boy" here is all)... apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
Microsoft issues "Out-of-Band" emergency Internet Explorer updates... apk

MS Issues Emergency IE Security Update:

http://www.microsoft.com/technet/security/bulletin/ms10-018.mspx

----

Microsoft has issued an emergency patch for 10 IE security holes. 'The cumulative update, which Microsoft announced on Monday, resolves nine privately reported flaws and one that was publicly disclosed. Software affected by the cumulative update addressing all the IE vulnerabilities includes Windows 2000, Windows XP, Windows Server 2003 and Server 2008, Vista, and Windows 7.

----

:)

* This one closes a LOT of "security holes" in Internet Explorer, through ALL of Microsoft's 32 & 64 bit Windows NT-based Operating Systems of "modern variety"...

APK

P.S.=> Well, "have @ it folks", & that's "hot off the presses"... enjoy! apk
 

APK

Joined
May 15, 2008
Messages
83
Reaction score
0
For those of you that use a CUSTOM HOSTS FILE for ADDED SPEED & SECURITY online

For those of you who are aware of the advantage of using a custom HOSTS file, for both noticeable added speed, AND NOTICEABLE ADDED SECURITY ONLINE (this latter being via the SIMPLE PRINCIPLE of "You can't get burned, if you can't go into the 'malscripted site kitchen'")?

I have just edited my post point #5 here with the list below (of reputable & updated sites that keep lists of KNOWN BAD SITES &/or SERVERS, or entire HOSTS files too) so you can integrate their entries into YOUR CUSTOM HOSTS FILE (as I have been doing for years now, with approximately 828,342 entries of known bad sites &/or servers in it):

RESULTS USERS WHO HAVE USED MY HOSTS FILE ARE SEEING? OK - THIS TESTIMONIAL SHOULD SERVE THE PURPOSE AS A "NUFF SAID":

----

http://forums.theplanet.com/index.php?showtopic=89123&st=60&start=60

"the use of the hosts file has worked for me in many ways. for one it stops ad banners, it helps speed up your computer as well. if you need more proof i am writing to you on a 400 hertz computer and i run with ease. i do not get 200++ viruses and spy ware a month as i use to. now i am lucky if i get 1 or 2 viruses a month. if you want my opinion if you stick to what APK says in his article about securing your computer then you will be safe and should not get any viruses or spy ware, but if you do get hit with viruses and spy ware then it will your own fault. keep up the good fight APK."

- Kings Joker, user of my guide @ THE PLANET

----

So, as you can see?

Someone who used to get HUNDREDS of malware infestations a month, by stumbling into bad malscripted websites or those that serve up malware executable downloads, etc./et al, is now FAR BETTER PROTECTED by the version of my HOSTS file I use, & NO LONGER SEES THAT LEVEL OF INFESTATION, no less!

(He gets it each day from me, via email, because I keep up on it everyday via the lists below (And, via a program I wrote to integrate the entries, alphabetize them (helps with DNS client cache loads, or B-Tree populations in diskcache), & lastly, to "normalize it" via duplicated entries removal (so file is smaller & faster to load/read too))

It just works!

Additionally, it works SO WELL, that Kings Joker above runs Windows 2000, no service packs, no hotfixes, no antivirus, no antispyware programs (he just installed them recently to check his infestations levels in fact, but for 1/2 a year++ or more, he did not to test this, acting as my "Lab Rat #1 in fact)... And, his results? NO SPYWARE/MALWARE/TROJANS/VIRUSES/WORMS (NO malware-in-general):

For direct reply on his findings & results? Write he here -> (e-mail address removed)

He can "fill you in" on the rest, as to his results &/or findings (which basically state that all you need, is to run a protective custom HOSTS file that's kept current, & be judicious about your usage of javascript (both points are covered in this article/guide, extensively, AND THEY WORK!)

----

ADVANTAGES OF HOSTS FILES OVER BROWSER ADDONS ALONE, & EVEN DNS SERVERS:

1.) HOSTS files eat A LOT LESS CPU cycles than browser addons do no less (since browser addons have to parse each HTML page & tag content in them, while HOSTS files only really consume "CPU cycles" during their loads (a programming data storage construct, which is an analog to a PASCAL record). Then, the IP stack uses the DNS client C/C++ structure, or possibly an object (not sure anymore, I'd have to see the BSD reference code again to be sure) to do the rest (that, or the local diskcache, because if you have a LARGE hosts file, you have to turn off the DNS Client Cache service, or your system will lag badly (I have notified Microsoft of this occurrence in fact, directly))!

2.) HOSTS files are also NOT severely LIMITED TO 1 BROWSER FAMILY ONLY... browser addons, are. HOSTS files cover & protect (for security) and speed up (all apps that are webbound) any app you have that goes to the internet (specifically the web).

3.) HOSTS files allow you to bypass DNS Server requests logs (via hardcoding your favorite sites into them to avoid not only the TIME taken roundtrip to an external DNS server, but also for avoiding those logs OR a DNS server that has been compromised (see Dan Kaminsky online, on that note)).

4.) HOSTS files will allow you to get to sites you like, via hardcoding your favs into a HOSTS file, FAR faster than DNS servers can by FAR (by saving the roundtrip inquiry time to a DNS server & back to you).

5.) HOSTS files also allow you to not worry about a DNS server being compromised, or downed (if either occurs, you STILL get to sites you hardcode in a HOSTS file anyhow in EITHER case).

6.) HOSTS files are EASILY user controlled, obtained (for reliable ones -> http://en.wikipedia.org/wiki/Hosts_file ) & edited too, via texteditors like Windows notepad.exe or Linux nano (etc.)

7.) HOSTS files aren't as vulnerable to "bugs" either like programs/libs/extensions of that nature are, OR even DNS servers, as they are NOT code, & because of what's next too

8.) HOSTS files are also EASILY secured well, via write-protection "read-only" attributes set on them, or more radically, via ACL's even.

9.) HOSTS files are a solution which also globally extends to EVERY WEBBOUND APP YOU HAVE - NOt just a single webbrowser type (e.g. FireFox/Mozilla & its addons exemplify this, such as ADBLOCK)

10.) AND, LASTLY? SINCE MALWARE GENERALLY HAS TO OPERATE ON WHAT YOU YOURSELF CAN DO (running as limited class/least privlege user, hopefully, OR even as ADMIN/ROOT/SUPERUSER)? HOSTS "LOCK IN" malware too, vs. communicating "back to mama" for orders (provided they have name servers + C&C botnet servers listed in them, blocked off in your HOSTS that is) - you might think they use a hardcoded IP, which IS possible, but generally they do not & RECYCLE domain/host names they own, & this? This stops that cold, too! Bonus...

(Still - It's a GOOD idea to layer in the usage of BOTH browser addons for security like adblock, &/or NoScript (especially this one, as it covers what HOSTS files can't in javascript which is the main deliverer of MOST attacks online & SECUNIA.COM can verify this for anyone really by looking @ the past few years of attacks nowadays), for the concept of "layered security")

APK

P.S.=> To keep "ontop of the latest known malicious sites" online? See these sites (1 I mentioned here already, this is the rest of the list I use, & others too):

START OF WEBSITES & SOURCES + TOOLS I USED TO POPULATE THIS LIST + MY ORIGINAL LIST OF BLOCKED ADBANNERS SERVERS

http://ddanchev.blogspot.com/
http://www.malwareurl.com/listing-urls.php
http://www.malware.com.br/lists.shtml
http://securitylabs.websense.com/content/alerts.aspx
http://www.stopbadware.org
http://blog.fireeye.com/
http://mtc.sri.com/
http://www.scansafe.com/threat_center/threat_alerts
http://news.netcraft.com
http://www.shadowserver.org/
https://zeustracker.abuse.ch/monitor.php?filter=online
http://en.wikipedia.org/wiki/Hosts_file
http://www.mvps.org/
http://someonewhocares.org/
http://hostsfile.mine.nu/hosts0
http://hosts-file.net/?s=Download
http://www.stopbadware.org/home

Between they, & SpyBot "Search & Destroy"? You have most of, if not ALL of what a "body needs" for these purposes. if you know of others? Please list them, & thanks! apk
 
Last edited:
Status
Not open for further replies.

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top