The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.
 Next page →

    How paranoid are you about security?

    Discussion in 'Security and Anti-Virus Software' started by noobpad, Feb 22, 2011.

  1. noobpad

    noobpad Notebook Consultant

    Reputations:
    13
    Messages:
    116
    Likes Received:
    0
    Trophy Points:
    30
    On a scale of 1 to 10, 10 being most paranoid borderline OCD borderline certifiable, how paranoid r u about your computer's security?

    e.g. are you afraid of worms and viruses? afriad of hackers? afriad of tracking cookies? afraid of flash sites? do you turn off javascript? do you use firefox instead of IE? etc etc etc.

    What measures do you take to this end in feeding to your OCD in security?

    e.g. do you install antiviruses with software firewall and hide behind a router's NAT? do you install noscript on firefox? do you use bitlocker? do you spend a few hours a day searching sites on hardening your rig? do you configure group policy settings to lock ur system down? etc etc etc.

    Tell us about it. Be comprehensive too so us noobs can learn the ways of the master.

    ______

    I myself am prob on a lvl 2-3. I have free avast and thats about it. I even use IE sometimes I dont care. I also use administrator account only.
     
  2. JOSEA

    JOSEA NONE

    Reputations:
    4,013
    Messages:
    3,521
    Likes Received:
    170
    Trophy Points:
    131
    Great Q, I would rate myself a 10. I will start with choice of browsers, I am an IE guy and to beef up security much can be done. set security level to high, turn off the save passwords feature, use phishing filter, never turn off pop up blocker, never type in url's directly , use a search engine such as bing to verify url's . don't use trusted sites feature. Delete browsing history on exit.. I could go on.
    Also do a regular full system image and frequent incremental backups. I even store my external hard drive with images off site. (in my bomb shelter) :D
    Last article I read on tracking cookies is that they do their dirty work before you can delete them...
    I also do not install java. I come from a company where I could get around almost every wall they raised so I learned from their mistakes.
    Also I use a spoof email account for many sites that I am not certain are legit.
     
  3. weinter

    weinter /dev/null

    Reputations:
    596
    Messages:
    2,798
    Likes Received:
    1
    Trophy Points:
    56
    I use Free Microsoft AntiVirus, Windows Firewall and Dual Boot Fedora.
    I do not encrypt my harddisk.
    I do lock down my gpedit to require authentication when some program require low level privileges.
    I use https everywhere and google SSL to encrypt packet when possible.
    I use firefox because of the numerous extension add ons.
    Not afraid of worms, viruses and etc as long as you know what you are doing and how computers work.
     
  4. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    -> I don't think paranoia will help here, the risk of viruses/hackers to the individual is far less than the risk of the capitalist Stasi 2.0 (Facebook, Google who datamine for your personal information).

    What kind of hacker will attempt to try and attack some personal computer? Maybe a hobbyist will try, but he change that this will happen is very, very low.
    If, however, you are a public agency or corporation then the risk is significantly higher.

    For personal use a Router with an activated Firewall should be standard - also because even the cheapest ones come with one. One should ask the other way round - why switch it off? If some program is written badly and needs an open port, or you want to do something not allowed by default - forward the port.
    No paranoia there at all - just common sense.

    Firewall on a computer - standard again -> also, why switch it off?

    Antivirus software - with the great free programmes "out there" (Microsoft Security Essentials for example) the question is rather why not use it?

    -> With this done, you're pretty much set.

    Ok, I like my ads blocked in FF as well - they would drive me off the web.

    NoScript - you can use it, I never found a use for it - it seems more like a plague to me (considering Scripts are used on plenty of sites nowadays... although it would help against google analytics...)

    On this note, your chances of "catching" malware are significantly higher when you download files - either from unknown websites or torrents of any sort - if you don't use torrents at all, that's one significant attack vector less.

    Then just download every piece of software that comes your way and your set I'd say.
     
  5. Matt is Pro

    Matt is Pro I'm a PC, so?

    Reputations:
    347
    Messages:
    2,169
    Likes Received:
    0
    Trophy Points:
    55
    I install MSE, do Windows Updates regularly, and just watch how I browse and what I download.

    I'm not really worried as long as Windows + MSE are up-to-date.
     
  6. gerryf19

    gerryf19 I am the walrus

    Reputations:
    2,275
    Messages:
    3,990
    Likes Received:
    0
    Trophy Points:
    105
    I m paranoid of people who use letters instead of words in sentences so I cannot answer this post....
     
  7. KSD

    KSD Notebook Consultant

    Reputations:
    38
    Messages:
    120
    Likes Received:
    0
    Trophy Points:
    0
    i care more about hackers and the NSA than viruses ^^ so 1 on virus and an 8-10 on hackers and 25 for NSA
     
  8. hakira

    hakira <3 xkcd

    Reputations:
    957
    Messages:
    1,286
    Likes Received:
    0
    Trophy Points:
    55
    Paranoid, afraid? No.
    Aware, alert? Absolutely.

    Despite what the general public thinks, hackers have better things to do than break into your home computer; they (poorly) write software such as keyloggers and botnet rootkits that unaware net users (read: idiots) freely download themselves, they are often disguised as other programs like keygens. Then the rootkit phones home when required, or worse, lies dormant until a master call is initiated and your computer is revealed as a zombie in a large botnet.

    Sometimes hackers will set traps in free unsecure wifi zones to catch idiots who transmit personal or financial data, again easily avoided. If a hacker is specifically targeting you, you've done something to royally tick one off and you might have had it/seen it coming. They don't do random targeted attacks. It's either random, or targeted.

    @josea
    I do that too, it's actually really good practice. You wouldn't believe how much spam my spoof accounts get, though it's a tad embarassing that nbr points to one of them (don't get any spam from nbr though :D )

    As far as my own awareness goes... it's up there. While I don't encrypt my HD (what's the point? if someone steals your drive the sucker is going to be decrypted or trashed no matter what, and it's probably your own fault for letting your stuff get jacked) or use crazy addons like https everywhere for my home usage, when I'm mobile or on a network that has an ounce of untrustworthiness (like a public net) I will use a customized live linux USB for pretty much anything I need to do. Though I still won't do transactions and the like at anywhere but home.

    @ksd: "and 25 for NSA"
    I lol'd, because they NSA really doesn't have better things to do sometimes and really does do random peekjobs in the interest of "national security". Because your grandmother's secret pie recipe is a danger to the USA.
     
  9. MidnightSun

    MidnightSun Emodicon

    Reputations:
    6,668
    Messages:
    8,224
    Likes Received:
    231
    Trophy Points:
    231
    Relatively paranoid, although there are better ways of ensuring secure computing than installing tons of security addons, firewalls, and AVs. I have only MSE and a few other run-on-demand tools that I use maybe every other month.
     
  10. decaPODA

    decaPODA Notebook Evangelist

    Reputations:
    12
    Messages:
    323
    Likes Received:
    0
    Trophy Points:
    30
    I would rate myself 10 outta 10 :)

    I do my best not to get stampped while surfing / downloading.
    Using Avast, malwarebytes and Defender. (Still got some crazy stuff happening in my system.)
    I go crazy when i see some friend of mine suddenly mailed me a link, be it on email or FB wall.. i open my incognito n paste it there, delete the last few character talking about some ID numbers and then hit the go :)
    I dont EVER click the sites from google search [or somewhere else ;)] which got even a orange warning from WOT.
    I cross check any USB thumb drive with Malwarebytes and then Panda USB vaccine.

    I think my case would warrant for a cyber-psychiatrist ;)
     
  11. Cin'

    Cin' Anathema

    Reputations:
    14,217
    Messages:
    15,406
    Likes Received:
    87
    Trophy Points:
    466
    ^^That. MSE & Updates & Windows Firewall.

    I will still use SAS every so often.
     
  12. atbnet

    atbnet Notebook Prophet

    Reputations:
    5,868
    Messages:
    5,889
    Likes Received:
    2
    Trophy Points:
    206
    Just cover all the exploits that you can and keep your OS and security software up to date. Most people just try to get into home PCs to add them to their botnet so they can go after larger targets. If you are too much hassle to get into, they will just move on to the next target.
     
  13. Kamin_Majere

    Kamin_Majere =][= Ordo Hereticus

    Reputations:
    1,522
    Messages:
    2,680
    Likes Received:
    0
    Trophy Points:
    55
    Maybe a 2

    I have 12 different partitions to each and every hard drive i have with each partition getting a different manufactuers AV/Firewall/Malware program and i constantly have these backed up into image drives that are then scanned with yet another AV program. The information is then reimaged on different partitions than original so the process can start anew. After my default is reloaded into partition 1 i then allow myself to access the internet with all sites blocked except wikipedia, yahoo and NBR (and settings to high in all net browsing). After 5 minutes of internet time i have it set to force log off and repeat the 12 step process again so i'm sure no one has snuck anything in while i was carelessly browsing and maybe not paying attention.

    After i finish my daily browsing i have the process repeat once more than imaged into a totally clean drive and then have all "used" drives secure erased 10 times to make sure nothing is left.

    See not paranoid at all :D :p

    Just kidding... Basically i just install Microsoft Security Essentials and watch what i do online (i.e no funny sites, no random email attachements, etc) and have a strong password on my routers firewall. Just the basics
     
  14. erig007

    erig007 Notebook Evangelist

    Reputations:
    249
    Messages:
    318
    Likes Received:
    0
    Trophy Points:
    30
    12 different partitions? backing up? looks like virtualization to me
    with still some weakness...
    13 different partitions ... that's better
    two separate computers with no link what so ever could do the job as well, one for browsing only.
    Entering a code in a hardware device every minute in order the computer not be distroyed.
    kidding too
    I'm pretty sure no one here reach the level 10 as writing here would be pretty much risky already for a level 10
     
  15. Thaenatos

    Thaenatos Zero Cool

    Reputations:
    1,581
    Messages:
    5,346
    Likes Received:
    126
    Trophy Points:
    231
    Depending on my mood I sit between a 8 and 10. Now with linux and encryption Im more of a 4-6.
     
  16. J&SinKTO

    J&SinKTO Notebook Deity

    Reputations:
    107
    Messages:
    767
    Likes Received:
    0
    Trophy Points:
    30
    SpywareBlaster for prevention in the first place
    Malwarebytes paid version
    MSE (before MSE was Avast)
    Windows firewall and Router
    Use common sense and watch what you're doing - been solid for well over 3 years with this configuration on all my systems
     
  17. Koshinn

    Koshinn Notebook Deity

    Reputations:
    171
    Messages:
    1,146
    Likes Received:
    11
    Trophy Points:
    56
    My win7 install has chrome, mse, ccleaner, vlc, and virtualbox. Oh and games.
    I only use chrome when watching netflix; that's literally the only site I visit.

    Besides games and netflix, I do all web browsing, office stuff, and work on a virtual machine or two.

    Malware? Bring it! I have snapshots.

    Oh and all my passwords are randomly generated mixes of letters, numbers, and symbols at least 16 characters long. To access my pw database requires 3 factor authentication (smart card, fingerprint scan, and easier to remember 16 character mix of letters, numbers, and symbols password).

    But I do have some malware on one of my vms. Intentionally. My host system's av kept destroying them, so I had to hide them in a vm. Sticking them in an encrypted .rar works too, but is a hassle to add more stuff to the .rar.

    As far as connectivity... Everything is wired, no wireless. Ssl is used where available, as is tor if needed. Vpn tunneling is also an option. It depends on what I'm doing.
     
  18. Hungry Man

    Hungry Man Notebook Virtuoso

    Reputations:
    661
    Messages:
    2,348
    Likes Received:
    0
    Trophy Points:
    55
    I'm on windows 7. I use Chrome as a browser and no antivirus. Up until recently I used MSE. I have ads blocked as well as a malicious list blocked all via DDWRT in my router.

    I'm really not worried at all.

    edit: I'm reading a lot of people who are really paranoid and I don't really "Get it." It's not difficult to be safe...
     
  19. Koshinn

    Koshinn Notebook Deity

    Reputations:
    171
    Messages:
    1,146
    Likes Received:
    11
    Trophy Points:
    56
    It depends who you are. As a random person, you might get hit by drive-bys, worms, or chain mails. But some people have jobs that make them targets. Infecting a home computer can often lead to infecting an enterprise network; people transfer stuff all the time.
     
  20. Hungry Man

    Hungry Man Notebook Virtuoso

    Reputations:
    661
    Messages:
    2,348
    Likes Received:
    0
    Trophy Points:
    55
    I'm confident that drive-bys won't really do much to me with just the simple steps I've taken.
     
  21. Hungry Man

    Hungry Man Notebook Virtuoso

    Reputations:
    661
    Messages:
    2,348
    Likes Received:
    0
    Trophy Points:
    55
    Also, an important note to some of you. Having multiple antiviruses won't help and in fact it will HURT your security. If you have two realtime antiviruses running at the same time they will interfere with each other and not only will it hurt performance it will hurt your security.

    Stick to one realtime antivirus and if you're super paranoid a "scanner" only antivirus such as SUPERAntiSpyware (my personal favorite.)
     
  22. Hungry Man

    Hungry Man Notebook Virtuoso

    Reputations:
    661
    Messages:
    2,348
    Likes Received:
    0
    Trophy Points:
    55
    Oh and if you've managed to off a decent hacker don't expect any of the things I've seen listen in this topic to do anything. Protection from malware is not even close to being related to defense against a hacker.
     
  23. bryneb

    bryneb Notebook Consultant

    Reputations:
    9
    Messages:
    256
    Likes Received:
    44
    Trophy Points:
    41
    At home not very, maybe a 2. AV and windows updated. Decent router and pay attention to what I'm downloading online.
    At work, a 10. Corporate firewall, 2 AV scans a day(one on boot up and 2nd after work day), restrict browsing access and limit users to no admin privledges.
     
  24. bryneb

    bryneb Notebook Consultant

    Reputations:
    9
    Messages:
    256
    Likes Received:
    44
    Trophy Points:
    41
    Doh...double post.
     
  25. Christoph.krn

    Christoph.krn Notebook Evangelist

    Reputations:
    263
    Messages:
    423
    Likes Received:
    0
    Trophy Points:
    30
    Maybe the following link is helpful for you: It's your mindset that sets you apart (especially the link entitled " Security is not a solution, it' a concept", which might give you / some/ starting points to consider). Generally speaking, it's important to realize your own stupidity.


    "Hackers" is a term that refers to the good guys. By definition, someone who breaks into machines (unless / maybe/ if it served some REALLY good superordinate purpose, depending on who you ask) is not a hacker, but a "cracker".

    The term "hack" is more of an artistic nature than anything else. The Great Beanie is one example of a hack that doesn't really have anything to do with IT. You may be able to get a more detailed idea of the term "hacker" by visiting the so-called Jargon File, which attempts to reflect a typical hacker.


    Theoretically, it is often possible to break out of virtual machines.

    Here is just one example of security holes in virtual machines: Real Holes in Virtual Machines - The H Security: News and Features
     
  26. Koshinn

    Koshinn Notebook Deity

    Reputations:
    171
    Messages:
    1,146
    Likes Received:
    11
    Trophy Points:
    56
    That was VMWare 4 years ago. Every program that connects to the network probably has had a vulnerability at some point.
     
  27. Christoph.krn

    Christoph.krn Notebook Evangelist

    Reputations:
    263
    Messages:
    423
    Likes Received:
    0
    Trophy Points:
    30
    Yes. Like I said, just one example. I've encoutered quite a few people who just didn't want to believe that virtual machines are NOT magic bullets, so I provided an example.
     
  28. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    An example with a problem -> while there most likely is a weak point in a virtual machine, a weak point from even just 1 year ago is ancient in the computing world.

    On that note though - if there is a weak point, it would rather be an interface between the hosting OS and the Virtual Machine than the internet connection...
     
  29. Koshinn

    Koshinn Notebook Deity

    Reputations:
    171
    Messages:
    1,146
    Likes Received:
    11
    Trophy Points:
    56
    Your provided example doesn't prove your point. If you want to say that virtual machines are full of holes, you need to provide recent examples to show a trend of security holes or an actual vulnerable hole.

    Your example is like saying SSH isn't secure because in SSHv1 there was a buffer overflow that granted you root access.

    You're right, nothing is fool proof. Nothing. But you have to realize that the company patches their programs. Sometimes it takes a month or so, but it doesn't take 4 years. And as VMWare is an extremely important program for a large number of enterprises, you can bet that it's constantly tested for vulnerabilities and fixed.

    Right now, using a virtual machine is pretty much as close as you can get to a "magic bullet" while staying on the same hardware. The concept is sound, but the programmers are human. They make mistakes, and mistakes are found and fixed until there are none. Then of course the company releases new features and you have to start all over again.
     
  30. Joel

    Joel coffeecoffeecoffeecoffee

    Reputations:
    1,059
    Messages:
    1,663
    Likes Received:
    0
    Trophy Points:
    55
    I'm a 2. I'm not concerned at all really.
     
  31. Christoph.krn

    Christoph.krn Notebook Evangelist

    Reputations:
    263
    Messages:
    423
    Likes Received:
    0
    Trophy Points:
    30
    So if I show you a hole in a virtual machine monitor or hypervisor then it's a valid argument, but if some days later the vendor would have fixed the hole the argument would become invalid? Isn't that a bit short-sighted?

    The biggest problem with this is that the rate of zero day vulnerabilities which are found by different people during the same timeframe increases. In consequence, it gets more and more likely that there are zero day vulnerbilities that few have heard of yet but are being exploited by some malware, because the rate of people who decide to not disclose information about the vulnerability to people who do exploit it changes. Of course this is true for all software, but the problem with it is that from my experience, people sometimes just won't belive that this also applies to the concept of a virtual machine and that it is not automagically secure at all times - which is the reasoning for why it doesn't matter that the example is old. For those like you who already knew that nothing is fool proof, it's nothing new, but there are two reasons why I provided an example:
    • There are various kinds of readers on this forum, and I'm trying to keep my posts understandable
    • I couldn't estimate what amount of knowledge you might have about virtualization, but you statement of "Malware? Bring it! I have snapshots." made me believe that you might just have started to use virtual machines.

    It seems to me that you felt offended by that, which was not my intention.


    A more recent example of someone relying on a virtualization software and paying a high price for it was when the root keys for the Sony PS3 and PSP gaming consoles became compromised. And when the security system of Microsoft's Xbox360 gaming console got compromised for the first time. And these virtualization systems are VERY important to the respective enterprises. The difference between them is that when the Xbox360 got compromised for the first time, it practically had no effect on Microsoft, because they had good plans for that. They released an update that was being installed by many people because it was required for Xbox live, which Microsoft made a central experience of the Xbox360. That update burned a fuse on the processor which made downgrades impossible because the previous firmware would not have understood the "new" processor. Sony's only plan seems to be "If a feature becomes a security risk, remove it." (they removed "Other OS"). You probably know how that turned out.

    So what I'm saying is: yes, right now there may not be any known vulnerabilities in whatever virtualization software it is that you're using, but if you don't have plans for worst-case scenarios and procedures that help protect you then that might change faster than you want it to. So my argument is indeed like saying "SSH isn't secure because in SSHv1 there was a buffer overflow that granted you root access", which is exactly what I wanted to make clear in the context of virtualization in order to prevent that someone believes that virtual machines are armor plated. Quite a few people who don't have much experience with vitualization solutions believe that they are.


    Relying on virtual machines is not enough. For instance, the concept of a virtual machine is not taking into account the varios threats by insufficient physical security. What about access to firewire? HDDs that don't use good low-level encryption, lost laptops? Data left in spare areas of erased SSDs? Hardware keyloggers? It's not just potential access from the internet that's an attack vector, and at the same time on the other extreme, virtual machines can't do anything against attacks that mainly take place outside of the host, such as Koobface, or router DNS manipulation through XSRF.

    Another question is: yes, virtual machines give you the ability to use snapshots, but do you actually make use of that feature in a way that would increase security? Do you have updating automatisms for the virtual machines which will return them to an up-to-date state after you wipe them regularly, and do you even wipe them regularly?

    There are also known succesful attacks on a Harvard Architecture system through buffer overruns.

    Yes, again these are just examples, but they explain the most important thing about security: that there's an endless number of things that have to be considered, of which you have to find the relevant ones. It's not a GOOD THING™ to say that virtual machines are "magic bullets" - people may misinterpret that if they don't have as much experience and/or knowledge about security.



    PS: Am I the only one to think it's funny how everyone in here saying that he/she isn't concerned about security automatically verifies that statement by disclosing the information that he/she is not concerned about security? :)
     
  32. Pecka-

    Pecka- Notebook Guru

    Reputations:
    0
    Messages:
    53
    Likes Received:
    0
    Trophy Points:
    15
    Reasonable paranoid I guess. No automatic log in on my computers. Windows firewall on, latest updates from MS, antivirus and a hardware firewall. Stopped using wireless in my apartment. Regularly run spyware detectors.
     
  33. agusman

    agusman when the going gets weird

    Reputations:
    440
    Messages:
    794
    Likes Received:
    0
    Trophy Points:
    30
    I don't feel paranoid, but I do:
    update AV defs daily,
    block autoruns on everything,
    don't access a site chrome tells me I shouldn't...
     
  34. masterchef341

    masterchef341 The guy from The Notebook

    Reputations:
    3,047
    Messages:
    8,636
    Likes Received:
    4
    Trophy Points:
    206
    I always use ssl, even with google, and block pretty much the entire web. firefox.
     
  35. tentails

    tentails Newbie

    Reputations:
    0
    Messages:
    4
    Likes Received:
    0
    Trophy Points:
    5
    9

    the usual, antivirus, firewall...also may be a blocker...

    encryption for sensitive data..
     
  36. maheshpatel

    maheshpatel Notebook Consultant

    Reputations:
    10
    Messages:
    120
    Likes Received:
    0
    Trophy Points:
    30
    i am using MSE and i update it regular . as long as it works fine for me i don't care much
     
  37. Steven

    Steven God Amongst Mere Mortals

    Reputations:
    705
    Messages:
    986
    Likes Received:
    4
    Trophy Points:
    31
    I'm not afraid to surf the web but I am constantly alert and aware.
    My AV has real-time protection shields and updates itself each and everyday.
    I scan usually 5 times a week (full scans, I like to switch between full scans with Avast and Malwarebyte's)
    I have Ad-Block Plus
    I have Spyware Blaster
    And good ol' windows firewall from Windows 7 :)
    I feel protected and safe
     
  38. olyteddy

    olyteddy Notebook Deity

    Reputations:
    468
    Messages:
    1,369
    Likes Received:
    0
    Trophy Points:
    55
    Not at all paranoid. In fact, here's my password: ****************
     
  39. jonnybearback

    jonnybearback Notebook Guru

    Reputations:
    0
    Messages:
    52
    Likes Received:
    0
    Trophy Points:
    15
    i wasn't paranoid until reading some of the lengths other people go to...
    perhaps i should reassess my browsing habits and pc protection.
     
  40. Patrck_744

    Patrck_744 Burgers!

    Reputations:
    447
    Messages:
    1,201
    Likes Received:
    41
    Trophy Points:
    66
    Add NoScript there.
     
  41. Rodster

    Rodster Merica

    Reputations:
    1,805
    Messages:
    5,043
    Likes Received:
    396
    Trophy Points:
    251
    Disabling Javascript has saved me several times.
     
  42. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,134
    Trophy Points:
    681
    Well, I suppose I am careful with my files and online security.

    To login into my laptop, you would need one of my ten fingers (and no, fingerprint scanners don't work with dead, cut-off fingers :p ). Otherwise, it's a long, long password of all sorts of characters.

    On my hard drive, I have a 8GB TrueCrypt file, protected by AES+Twofish and Whirpool hash. To generate its password (as well as all my other passwords), I used a randomly-generated 32-character password with all possible characters (or, for websites that don't accept 32 characters or special characters, whatever is the highest and most secure). My Keepass is AES protected with a long, but easy to remember password (though most people don't know much about what I like in my private life, so it's easy for me to remember a password based on something other people wouldn't know about me). Keepass-stored passwords are mostly used for secure websites, like email and online banking; for online forums, I still type in my username/password.

    I use Microsoft Security Essentials for real-time virus protection, and Malwarebyte's Anti-Malware free version for more in-dept scanning.

    With Firefox, I have Adblock-Plus, NoScript (I have to admit that this is annoying when you first use it, but most of my most-visited sites are white-listed), HTTPS-Everywhere, and BetterPrivacy. Sure, my internet performance is slowed down on an already slow connection (1.5Mbps DSL), but I don't game online, nor stream video, nor use torrents very often.

    And, probably the most important security feature in my opinion, is that I never allow anyone other than myself to use my laptop. Nobody. Period. No ifs, ands, or buts. Another common sense idea is that I don't post personal contact information on my Facebook account (or anywhere else, for that matter), except for the required email address (one that I don't use often). No phone number, no address, and obviously no other information that I am not 100% comfortable with sharing with the rest of the internet.

    Another practice I have, though not strictly a security feature, is to have multiple backups of everything information (school work, legal, photos of things dear to me, etc). Aside from my laptop's drive, I have another two laptop drives laying around that I can attach via a hard drive dock, and I have a portable hard drive and flashdrive as well, plus a Dropbox account (with my data encrypted, of course). Each solution has its own TrueCyrpt file

    Paranoid? Maybe, but I feel safe that it's next to impossible for anyone in the world to harm my data or myself using technology as an attack vector (I'm still suspect to someone physically attacking me, but there's not a lot anyone could do about that).
     
  43. Steven

    Steven God Amongst Mere Mortals

    Reputations:
    705
    Messages:
    986
    Likes Received:
    4
    Trophy Points:
    31
    @privatejarhead Your security setup is quite impressive. However, you resurrected a dead thread. I would add Sandboxie and Comodo Firewall and Defense+ and you might want to consider Mamutu.

    As for me, As long as I have brains in my head, MBAM, and a firewall , I'm safe.
     
  44. thetoast

    thetoast Notebook Evangelist

    Reputations:
    70
    Messages:
    364
    Likes Received:
    0
    Trophy Points:
    30
    I just set up my fingerprint scanner today, and can't help but wonder why you would scan all ten fingers as options. Seems to me that picking only one or two would be a more prudent option, given the ability to choose a timeout period after x attempts. I scanned two fingers (and certainly not the index fingers, and not only using one hand).

     
  45. Jarhead

    Jarhead 恋の♡アカサタナ

    Reputations:
    5,036
    Messages:
    12,168
    Likes Received:
    3,134
    Trophy Points:
    681
    Idk, I just did. Didn't really think about it until later.
     
  46. Steven

    Steven God Amongst Mere Mortals

    Reputations:
    705
    Messages:
    986
    Likes Received:
    4
    Trophy Points:
    31
    I find using anything but your index finger to scan with the fingerprint scanner is uncomfortable. How do you do it? lol
     
  47. Voodooi

    Voodooi AFK for a while...

    Reputations:
    1,850
    Messages:
    2,874
    Likes Received:
    1
    Trophy Points:
    55
    I assume they require all your fingers because if something were to happen to your idex (broken, burnt, cut, swollen, chopped off, etc.) you could use your other fingers to gain access to folders/logins/files, etc.

    It would be really annoying to remove a bandaid from your cut finger, scan it, and then put the bandaid back on for example.

    Scanning all fingers took me 5 minutes, so it's not like you'd be going out of your way to enter them all :p
     
  48. thetoast

    thetoast Notebook Evangelist

    Reputations:
    70
    Messages:
    364
    Likes Received:
    0
    Trophy Points:
    30
    Hehe... well, isn't there the option to fall back on the password, anyway?

    But to answer the OP, I'm probably about a 9.x.

     
  49. Simplified

    Simplified The Most Awesome

    Reputations:
    428
    Messages:
    766
    Likes Received:
    0
    Trophy Points:
    30
    10 out of 10.

    I virus scan my pc once a week, and I have the firewall on at all times.
     
  50. sandrodz

    sandrodz Notebook Consultant

    Reputations:
    3
    Messages:
    121
    Likes Received:
    0
    Trophy Points:
    30
    I'm super paranoid, I even do format/win7 clean install every now and than.
     
 Next page →