Sunday, 8 January 2017

 Most administrators and security officers are well aware of the necessity of system hardening for corporate systems. Hardening is the process of securing a system by reducing its surface of vulnerability. By the nature of operation, the more functions a system performs, the larger the vulnerability surface.
System hardening is a step by step process of securely configuring a system to protect it against unauthorized access, while taking steps to make the system more reliable. Generally anything that is done in the name of system hardening ensures that the system is both secure and reliable. Since most systems are dedicated to one or two functions, reduction of possible vectors of attack is done by the removal of any software, user accounts or services that are not related and required by the planned system functions. System hardening is vendor specific process, since different system vendors install different elements in the default install process.
System hardening is necessary since "out of the box", some operating systems tend to be designed and installed primarily to be easy to use rather than secure. Most but not all systems can have security measures enabled that will make them suitable for high security and high reliability environments.

Desktop Hardening Checklist –Windows 7
Windows 7 comes with a more tight security model than previous versions of Microsoft’s client operating systems, but there are a couple of things you can do to tighten down the security of your Windows computer even more.
1. First of all, you should make sure that the user account you use for day to day work is not member of the Administrators local group. This is because an administrative user account poses security vulnerability in itself as the administrators on the local machine have access permissions to change system settings.
In Windows 7, the old RunAs command – which could be quite annoying to use in earlier versions of Windows as not all applications supported this, has been integrated more tightly.
Now, whenever you choose to do an administrative Windows task, Windows will prompt you for credentials for an account with administrative permissions eliminating the need to right click and choose RunAs. The less privileges you have as a user, the less damage you will be able to do to the system by mistake so running the most tasks as a User will improve the overall security of your system.
 2. Change your network type to ‘Public’.
When setting up a new network connection, for instance to your newly created wireless network, Windows 7 will prompt you to choose a network type for the network connection. You will have options to choose:
a. Home Network
b. Office Network
c. Public Network Home network will be more ‘Open’ than Office network as Windows will treat all computers on the network as ‘Good’ and the network type allows for sharing of personal folders and files with all other computers on this network.
Windows will create a home group for all computers on the network and will enable network discovery and File and Printer Sharing on the computer. Office Network is a little bit more strict, while the Public network type is the most strict. The Public network type will simply disable Network discovery – which will simply hide your computer on the network and File And Printer Sharing will be disabled by default. If you want a more secure computer and do not need to share your files and do not wish to be part of a Home Group, simply choose the Public network type. Go to Control Panel\Network and Internet\Network and Sharing Center: Change network type to 'Public'.
 3. Enable Windows Updates.
Windows Updates are enabled per default. Make sure the ‘Recommended settings’ are chosen or set it to download and notify for install.
Keeping up with the latest updates can significantly help protect you Windows installation.
4. Enable Windows Firewall and make sure all inbound connections are automatically dropped.
The firewall is enabled per default. If you do not need to share anything with other people and computers, you can safely choose to drop all inbound connections to make sure no one can access anything on your computer from the network.It is possible to filter on the outgoing traffic in the Windows firewall as well. If you are really up to protecting your personal files, it can be a good idea to filter outgoing traffic and application access as well.
5. Data Execution Prevention (DEP)
Data Execution Prevention (DEP) is a security feature that can help prevent damage to your computer from viruses and other security threats. Harmful programs can try to attack Windows by attempting to run (also known as execute) code from your computer's memory reserved for Windows and other authorized programs. These types of attacks can harm your programs and files. DEP can help protect your computer by monitoring your programs to make sure that they use computer memory safely. If DEP notices a program on your computer using memory incorrectly, it closes the program and notifies you. Go to system/ advanced system settings/ performance/ settings/ data execution prevention : Set to all programs Turn On DEP for all Programs and services except those I select
6. Disable remote assistance and remote desktop connections
If you do not want to allow people messing with your system remotely – that is, if you do not want to give other people the option to connecting to your precious Windows 7 box and playing around with it, you can specify that this will not be an option. Go to Control Panel\System and Security\System\Advanced System Settings\Remote and uncheck ‘Allow remote assistance connections to this computer’ and ‘Dont allow connections to this computer’.
7. Change User Account Control Settings to highest level
You might get prompted a bit more, but the overall security is raised a bit as you will get prompts for more common administrative system tasks, enabling you to take a stand on whether you will actually allow the specific task to run. Go to Control Panel\User Accounts and Family Safety\User Accounts\ Change User Account Control Settings = Set to highest level
8. Disable sharing and the NetBios protocol
If you are pretty sure you will not need to share your files over the network, you can go further and completely remove the option to share files.
Disable Netbios over tcp/ip on the network adapters on the computer. Remove check mark on Network and sharing, so that the machine is not using the 'File And Printer Sharing For Microsoft Networks' protocol. Go to Control Panel\Network and Internet\Network Connections
Right click the adapter of your choice (if you have more than one) and choose Properties.
Double click the ‘Internet protocol version 4 (TCP/IPv4)’. Navigate to ‘Advanced’ and choose ‘Wins’.
Check ‘Disable NetBios over TCP/IP’. This will block connections to some of the most insecure ports on a Windows operating system – or some of the most exploited.
9. Disable unnecessary services
You can stop for now, but if you are sure exactly what your computer will be used for. You can go any further and disable some of the many services Windows 7 runs, but probably won’t need.
Examples of those services are:
a. TCP/IP Netbios helper
b. Server Service
c. Computer Browser
d. Remote Registry
e. HomeGroup Listener (If you are not intenting to use the homegroup features)
f. HomeGroup Provider (If you are not intenting to use the homegroup features) There might be many more but I have chosen some of the services used for sharing files and if you do not want your Windows computer to be every man’s property, you can safely disable these services to secure your box even more.

Desktop Hardening Checklist –Windows
Desktop computer security is very important to ITS. To better protect our systems and information, we are asking all ITS employees to run through a short checklist of items based on the Information Security Office Desktop and Laptop Computer Standard.
1. Computer Name Please list all desktop or laptop machines for which you are the primary user, or for which you have assumed primary responsibility. (List the Computer Name of each machine. If you have more than one machine, please list on an additional attached page.) To find the computer name for your computer: For Windows XP: - Click on the Start menu, choose Control Panel (or Start _ Settings _Control Panel) - Open the System control panel, click on the Computer Name tab - The “Full Computer Name” is listed in the middle of the window
 2. Use Antivirus Software Most viruses will be caught by antivirus as long as the antivirus software is kept up to date. It is absolutely crucial that users run antivirus software on their computers. It is mandatory to have Antivirus installed on every system in the network.
 3. Install and Run an Anti-Spyware Program The ISO Desktop Standard requires that all desktop users run an anti-spyware program to search for and clean unwanted spyware programs from your system. Spyware is software that collects information about your system without your knowledge Anti-spyware software is only recommended if the system is: a) Used to browse the internet and b) If the potential exists for a user of the system to use the internet for other than business purposes and c) The system will be used to access, store, or process protected information.
 4. Make sure your operating system is patched Many of the exploits circulating through the Internet take advantage of unpatched systems. Keeping your system fully patched is one of the most important security steps you can take, and is easy to do. The easiest way to keep your system patched is to set it to automatically download and install critical patches. To do this: For Windows XP: - Click on the Start menu, choose Control Panel (or Start _ Settings _ Control Panel) - Open the Automatic Updates control panel - Click the Automatic radio button As an additional measure to ensure that all critical patches have been applied, you should also run a check of your operating system. To do this: For all Windows systems:  New security bugs are discovered almost every day. In order to keep your system secure it is critical that it be kept up to date with recent patches and software upgrades. Microsoft provides patches to fix these security bugs, but expects you to download and install these patches. By applying these patches regularly, you have much lower chances of getting a virus, trojan, or worm as most of these exploit common known security holes in unpatched systems Microsoft commonly releases patches on a regular schedule of the 2nd Tuesday of every month. Other critical patches may be released at any time during the month due to their severity and importance. It is important to be aware that Service Packs and Security Updates are not just applicable to operating systems. Individual applications have their own Service Pack and Security Update requirements. The total security of the system requires attention to both Operating System and application levels. Use Synechron Patch Management Procedure to push patches to the Systems thru WSUS server on regular basis. 
5. Set Strong Passwords Many systems are compromised as a result of weak or non-existent passwords on accounts. Setting strong passwords that are difficult to guess is important for the security of your system. A strong password is one that: - Is at least 8 characters long, - Contains upper and lower case letters, - Contains at least one number, - Is changed every 120 days, - Does not contain your username Most RIT users log onto their computer system with a username that matches their RIT computer account. To change the password on this account, please visit http://start.rit.edu and click on “Change you password.” This password will be synchronized through your RIT computer account, the Exchange mail system, and your computer. In addition to the account that matches your RIT computer account, your computer system may have additional accounts. Most systems have a default “Administrator” account. These should have strong passwords as well. To check for additional local accounts and change passwords: For Windows XP: - Click on the Start menu, choose Control Panel (or Start _ User Accounts) - Check the accounts that are listed and change the passwords as necessary. - Click on the account, and click the “Reset Password” button Password Policy Settings: The following table shows password policy settings to enable and enforce through your server group policy settings.
Setting Domain controller default
Enforce password history 10 passwords
Maximum password age 40 days
Minimum password age 1 day
Minimum password length 8 characters
Password must meet complexity requirements Enabled
Store password using reversible encryption for all users in the domain Disabled
Account LockOut Policy Settings:
Setting Domain controller default
Account Lockout Duration 60 minutes (minimum)
Account Lockout Threshold 5 attempts
Reset Account Lockout After 30 minutes (minimum)
6. Make sure you are running an up to date anti-virus program For Windows systems: - Right-click the VirusScan icon in your system tray on the bottom right hand corner of your screen, and click on “VirusScan Console”. Make sure the following options are set: o Buffer Overflow protection should be “enabled” o On-Delivery Email Scanner should be “enabled” o On-Access Scanner should be “enabled” o AutoUpdate should occur daily, and the Last Result should indicate that “The Update Succeeded”.
7. Run a Desktop Firewall The desktop standard requires you to run a firewall on your desktop computer. Firewall.
8. Remove or Delete Software
If existing software isn't needed by any user, uninstall it, delete it, or rename it. As discussed earlier in this book, even when software isn't used, it can make a computer vulnerable. If possible, uninstall or delete the software or service. Using the program's official uninstall program is preferred, as it should remove associated files, folders, and registry entries. Unfortunately, many uninstall routines still leave unneeded files and registry entries even when they claim to be removing them. If the software being removed is high-risk, be sure to manually inspect the related files, folders, and registry keys, and delete if needed. Renaming the software executable or folder to something Windows or the end user doesn't expect can be useful when the software is difficult to remove. It's security-by-obscurity, but it can work in preventing easy execution. Be aware that Windows will sometimes track name changes and update the pointers, icons, and shortcuts to the new name. Unfortunately, this method doesn't prevent re-installation. For example, if a network administrator removes America Online's Instant Messaging (AIM) client, there is little to prevent an end user from re-installing it if they have the appropriate admin permissions. Also, you cannot remove, delete, or rename Windows File Protection (WFP)—protected files. If you do any of the preceding, Windows just replaces them in a few seconds. Still, if you can successfully remove unneeded software, it is one of the best ways to strengthen the security of any computer system. 9. All partitions use NTFS Reason: NTFS supports security properties and auditing. FAT16/32 does not.
Use NTFS Permissions
You can use NTFS permissions to prevent the execution of existing installed software, and in some limited cases, prevent the installation of new software. NTFS permissions are the number one most secure way to prevent the unauthorized execution of existing software. If appropriately used, NTFS is hard to get around or trick. Determine what software most normal users should be able to execute, and if the software cannot be removed completely (e.g., needed for admin purposes or other users on a shared computer), then use appropriately set NTFS permissions to secure it. In most cases, an administrator wants to take away a normal user's Read & Execute permission. As Figure 9-1 shows, a common decision would be to set permissions at the application's folder level and let the resulting permissions be inherited downward. In this case, Figure 9-1 shows the Everyone group's permissions being set to none (as if it had previously had permissions set). Administrators, System, and Service have the expected default Read & Execute permissions.
Figure 9-1 Remove any other groups that should not have permissions. There is no need to add the Everyone group (or any other group) and then remove the permissions if the group does not already have permissions. When Windows realizes that a listed security principal has no permissions set on a protected resource, it will remove it from the access control list completely. Be careful. Do not set Read & Execute-Deny permissions for the Everyone or Authenticated Users group unless that is your true intent. Administrators and other privileged accounts belong to the larger groups as well and any permissions you set will also apply to the more privileged user accounts. Doing so could result in Read & Execute permissions unintentionally being taken away for the more specific groups. The key here is to remove Read & Execute permissions from groups that do not need access.
Preventing New Installs Using NTFS Permissions
The easiest way to prevent new installs using NTFS permissions is to not allow non-admin users to be logged in with admin credentials. Outside of that effort, another way to prevent new installs using NTFS permissions is to remove all permissions on the folders where the software is likely to be installed. Essentially, you want to take away the Read permissions from even the Administrators group, if end users are normally logged on with admin credentials. The true administrator can always take ownership and add back permissions if they are really needed. 10. Use Microsoft Baseline Security Analyzer This is a free host-based application that is available to download from Microsoft. In addition to detailing missing patches, this tool also performs checks on basic security settings and provides information on remediating any issues found. It is mandatory to scan each server thru MBSA and take appropriate action on all the reported issues, before putting it into production 11. Restricting physical and network access to critical or highly sensitive systems Allow only trusted personnel to have access to critical systems. Establish security practices for users to ensure that only authorized personnel have access to systems that access protected information. If RDP is used set the encryption level to high. 12. Enable Internet Connection Firewall (ICF) or any Third Party Firewall Windows Firewall is a software-based, state full filtering firewall for Windows PCs and it should be enabled on every system or the system should have any other third party firewall program. 13. Windows Explorer Configure Windows to always show file extensions. In Windows, this is done through Explorer via the Tools menu: Tools/Folder Options/View – and uncheck "Hide file extensions for known file types". This makes it more difficult to for a harmful file (such as an EXE or VBS) to masquerade as a harmless file (such as TXT or JPG). 14. Configure the Device Boot Order Configure the device boot order to prevent unauthorized booting from alternate media. It is recommended that the boot order of the system be set to boot from the Hard Disk first followed by other media such as the CD Drive. This will prevent an unauthorized user from inserting bootable media into the available drives or ports and taking control of the system. 15. Configure services on all the desktops as following
Service Startup Type
Alerter Automatic
Automatic Update Automatic
BITS Automatic
Messenger Automatic
Windows Firewall Automatic
Windows Event Log Automatic
Remote Registry Disabled
SMTP Disabled
Server Disabled
Secondary Logon Disabled
Windows Installer Disabled
Computer Browser Disabled
Routing and Remote Access Disabled
Encrypting File System Disabled
SNMP Service Disabled
Telnet(Server) Disabled
16. Use Windows software restriction policy thrugh Group Policy Use Group Policy to block all extensions related to scripts and disallows execution of programs like cmd.exe and Regedit.exe. 17. Create regular backups There is the potential that files may be lost or corrupted due to hardware and/or software failures, and/or human errors (e.g., unintentionally deleting the file), and having another copy of critical data prior to such catastrophe will alleviate the burden of recreating the lost or corrupted files to their original form. Perform regularly scheduled (e.g., daily and/or weekly) backup of servers according to Synechron Data Backup Procedure. The backup frequency should be based on the importance of the data and the frequency of change to the data. 18. Sanitize your computer before donating and/or disposal Before selling, donating, or discarding old computers, make sure that sensitive data is removed. Files that are simply deleted can be easily recovered. To sanitize your hard drives, use a program designed to overwrite the drive in a secure manner, formatting your drive does not remove the data effectively. 19.Attack surface must be reduced Reason: In order to mitigate the risk of compromise, you should only install the components explicitly requested by the customer. Services that should not be used by default:
  • Help and Support
  • IPSEC Services
  • Print Spooler
  • Windows Firewall/Internet Connection Sharing (ICS)
  • Wireless Configuration
(Some of those services can be needed. If you need to print from this server or print over this server, the print spooler must be running) Please note any other service that you chose to run / not to run. 20.No extra components Reason: Unless needed, no extra components should be installed by Add/Remove programs. If you need to install e.g. IIS, then note it under “” hereunder. A complete list of components that should be installed on ALL baseline servers can be found in “ Baseline for Windows 2003 Serverd.doc”
21. Don't Let End Users Be Logged In As Admin
One of the single best things you can do to prevent unauthorized software installation is to prevent non-admin users from being logged in as administrators. Non-admin users cannot install most software, modify the HKLM registry key, or add programs to most Windows auto-start areas. Non-admin users normally cannot install programs from the Internet or modify existing program configuration information. Unfortunately, this recommendation doesn't prevent normal users from running already installed software. Unless the user is restricted from running a program using permissions or some other method, Windows allows users to run most programs without administrative access. 22.Lock down the filesystem Reason: Note: %SystemRoot% is the directory that holds the currently running installation of Windows. Normally it is c:\windows. Remove "Everyone" and "All Users" from the root of the System disk. Change the permissions on %SystemRoot%\repair and set that only Administrators and Systems have access (full access). Create a new directory that only Administrators and SYSTEM have full access to called %SystemRoot%\dump. Enable auditing for everyone on this folder and check all checkboxes under Failed and the “Change Permissions” checkbox under Successful. Then goto the Control Panel - System - Advanced - Startup and Recovery settings. Change the path at “Dump File” to %SystemRoot%\dump\MEMORY.DMP. (It must end with a filename.) Then run drwtsn32.exe and change the path ”Crash Dump” to %SystemRoot%\dump\user.dmp. 23.Lock down the registry Reason: Disable AutoRun for CD-ROM drives.
Find this key key: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\CDRom\AutoRun
Change the value to : 0 (REG_DWORD) Secure registry keys for the SNMP service. Only allow these accounts to access the keys: Administrators – Full Control
System – Full Control HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SNMP\Parameters\PermittedManagers
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\SNMP\Parameters\ValidCommunities Secure the registry keys below with this access: Administrators and System - Full Control Authenticated Users – Read Also set auditing for Everyone on these keys; check all checkboxes under Failed and the “Set Value” checkbox under Successful.
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnceEx
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall
HKEY_LOCAL_MACHINE\Software\Microsoft\DrWatson (Leave the permissions for Terminal Server User, if exists)
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg Select "winreg". Click Security and then click Permissions. Only those system, administrators and backup operators should have permissions. This is setup like this default on a Windows 2003 Server, but it’s worth checking this out anyway. Navigate to Start / Control Panel / Administrative Tools / Local Security Policy”. Expand “Security Settings” and “Local Policies”. Choose "Security Options” and set ”Network security: Do not store LAN Manager hash value on next password change” to Enabled. 24.Other settings that must be checked Reason: Load ”Event viewer” into the MMC. Right click on each log and choose ”Properties”. Set the following values: Application Log: 16384 kb / Overwrite events as needed
Security Log: 16384 kb / Overwrite events as needed
System Log: 16384 kb / Overwrite events as needed Navigate to Start / Control Panel / Administrative Tools / Local Security Policy”. Expand “Security Settings” and “Local Policies”. Choose "Security Options”, “Local Policy” and “Auditing Policy”. Set it up as follows: Audit Account Logon events Success, Failure
Audit Account Management Success, Failure
Audit Logon Events Success, Failure
Audit Object Access Failure
Audit Policy Change Success, Failure
Audit Privilege Use Failure
Audit System Events Success, and Failure Remove unnecessary software - all systems come with a predefined set of software packages that are assumed to be useful to most users. Depending on your target use of the system, you should remove all software that is not to be used like graphics and office packages on a web server. Disable or remove unnecessary usernames and passwords - most systems come with a lot of predefined user accounts for all kinds of purposes - from remote support to dedicated user accounts for specific services. Remove all remote and support accounts, and all accounts related to services which are not to be used. For all used accounts, ALWAYS change the default passwords. Disable or remove unnecessary services - just as the two previous points, remove all services which are not to be used in production. You can always just disable them, but if you have the choice remove them altogether. This will prevent the possible errors of someone activating the disabled service further down the line. Apply patches - after clearing the 'mess' of the default install, apply security and functionality patches for everything that is left in the system - especially the target services. Run Nessus Scan - update your Nessus scanner and let her rip. Perform a full scan including dangerous scans. Do the scan without any firewalls on the path of the scan. Read through the results, there will always be some discoveries, so you need to analyse them.If no Vulnerabilities are discovered, use system - after the analysis of the results, if there is nothing significant discovered, congratulations! You have a hardened system ready for use. Professional Windows Desktop and Server Hardening
Hardening Recommendation

Description

Criticality

Don’t give non-admin users administrator privileges Will prevent 70-90% of malware today High
Keep patches updated Will prevent many attacks High
Use a host-based firewall   High
Use antivirus software with an updated signature file   High
Use anti-spam software   Medium
Use anti-spyware software   High
Enable boot-up passwords on portable computers   Medium
Enable booting from primary boot drive only To prevent bypassing of Windows security, password cracking, and boot viruses Medium on workstations, High on servers
Password protect the BIOS To prevent resetting of boot drive Medium on workstations, High on servers
Harden TCP/IP stack To prevent DoS attacks Low on most computers, high on Internet servers
Rename Administrator and other highly privileged accounts; create bogus accounts   Medium/High
Highly privileged account names should not reflect their roles in the organization For example, an Exchange Administrator account should not be called ExchAdmin. Better calling it something like PTravers, or some other less notable name Medium
Run services on non-default TCP/IP ports   High
Install high-risk software to non-default folders May defeat scripted attacks Low
Institute Logon and Account Logon auditing for highly-privileged accounts, consider Per-User Auditing, as well.   Medium
All highly privileged accounts should have long (15 characters or longer), complex passwords. To defeat password cracking High
Security must be automated Or it won’t be consistently applied High
Disable delegation on highly-privileged users (and any computers) not needing delegation Can prevent malicious programs from impersonating users to remote services and computers Low
On Windows Server 2003 servers required to use delegation, enable constrained delegation.

Minimizes a hacker’s attack space on a server enabled with delegation Medium
Make sure SID History filtering is enabled in your environment, which it is by default Or else, hackers might be able to elevate their privileges Low
Use the AGULP method to assign security permissions Not using it means you don’t really understand what security is set in your environment. High
Always assign permissions to groups and never to individual users Or else control becomes problematic and unmanageable Medium/High
Use Advanced Security Settings dialog box when setting NTFS permissions It will display “true” permissions. Sometimes Windows doesn’t display correct permissions on permissions summary screen. Medium
Set Share and NTFS permissions as tight as you can to meet least-privilege principle. Don’t make Share permissions Everyone Full Control as recommended by many documents. Medium
Use Share Change permissions instead of Full Control. That’s all people need most of the time anyway Medium
Use NTFS Modify permission instead of Full Control unless user really needs Full Control Most non-admin users never need Full Control to a file or folder. High
Decrease Number of previous logons to cache to 0-3 versus the default of 10. By default Windows stores 10 user profiles worth of previous logon names and passwords that may be extracted with admin access and the right tools (e.g. Cachedump.exe) Low/Medium
Do not save passwords with your RDP connection objects They can easily be revealed using Cain & Able and a locally logged on admin Medium
Disable the storage of LM password hashes and force users to change their passwords after LM hash storage is disabled. Most password cracking programs rely on the existence of LM password hashes High
Minimum password size should be 15 characters long. Disables LM hash storage and presents complexity to password crackers High/Medium
Minimum password age should be set to any value above 0. Prevents password re-use or circumventing Enforce Password history rules. Medium
Require long, complex passwords Prevents password crackers from being successful High
Enable Account Lockouts. Set the Account lockout threshold to a certain number of acceptable bad password attempts, say 3 to 5. Set the Reset account lockout counter after to 1 minute (the smallest it can be). Set Account lockout duration to 1 minute. Stops password guessers High
Force password changes every 90 days or less Stops password guessors, crackers, and rainbow table programs High/Medium
Periodically re-create Windows trusts and put in new trust passwords Needed only in high-security environments Low
Consider requiring smart cards or biometrics for highly-privileged accounts To add extra security Medium
Consider only using your most highly-privileged accounts on trusted computers. You want to ensure that a hardware keyboard logger or trojan isn’t intercepting the password. Low
Separate domain admin and enterprise and schema admin roles (don’t give both to same user account). To prevent island hopping Medium
Use different passwords for your different administrative accounts. To prevent island hopping High/Medium
Don’t forget to change passwords on Directory Services Restore Mode admin account occasionally. To prevent local admin account cracking Low
Do periodic password audits using password crackers To audit the strength of user passwords and monitor compliance. High
Enable logon screen warning messages To defeat many brute force tools High/Medium
Consider randomly generating passwords Would defeat many password cracking tools. This is a good idea, but users are highly resistant to it. Low (ranking offset by other non-technical issues)
Disable Autorun.inf feature using registry edit or SRP To prevent autorun programs from removable media from running malicious commands or programs Low
Prevent users from running high-risk files and programs To prevent malicious use Medium
Turn off file extension hiding in Windows Explorer Malware can use double-naming tricks to confuse users into executing malware. High
Disable “Super Hidden” file extensions for high-risk file associations Else malware can trick users into executing malware by accident High
Uninstall, disable, remove, delete, and rename unneeded high-risk files and programs To prevent malicious exploitation using those same files. High
Use NTFS permissions to prevent non-admin users from running high-risk files and folders. To prevent malicious use High
Use GPOs when possible to push NTFS security on high-risk files, folders, and registry keys. Security permissions will re-apply even if file gets replaced. Make sure to also enable Security policy processing and Process even if Group Policy objects have not changed for the GPO carrying the NTFS permission settings. High
Create a LeastPrivilegedUsers _Grp and highly-restrict its members To give them access to only the exact resources they need access to. High
Enable Object Access auditing for high-risk critical files. To monitor unauthorized requests Medium
Use Software Restriction Policies to deny all software except that which is specifically allowed. To prevent unauthorized software execution. One of the single best things you can do to your system. High
Block non-admin access to high-risk registry keys Block non-admin write access to registry “run” keys, and block al non-admin access to high-risk file associations. High
Block non-admin access to high-risk URI handlers To prevent malware execution that depends on rarely used URI handlers. Examples include telnet://, rlogin://, news://, tn3270://;and aim:// if you don’t allow AIM. Medium
Enable the Confirm open after download file type option for potentially dangerous file types To prevent automatic malware execution High
Make lesser-privileged custom service account for non-default services Reduce attack surface if service account is compromised High
Make custom service account passwords long and complex, and change more frequently than normal accounts Service account passwords can be extracted in plaintext by an admin user High
Use lesser privileged service accounts (LocalService, NetworkService, and custom) when possible instead of LocalSystem or admin-level accounts. To decrease risk of successful exploit from direct use or buffer overflows Medium/High
Prevent unneeded services from executing Use ACLs, SRP, etc. High
Disable services in hardware profiles not needing them Reduces attack surface area Medium
Lock custom service account to the local PC Prevents island hopping attacks. Medium
Consider configuring high-risk services to alert users/administrators when they have stopped (e.g. from a buffer overflow attack), instead of automatically restarting. Can be configured on the services’ Recovery tab on the Services console. Medium
Environments with high-security requirements or expecting attacks against its IPSec infrastructure should enable Perfect Forward Secrecy. Prevents an attacker cracking one IPSec secret key from easily brute forcing the others Low
Use IPSec to create network security domains, VPNs, and to filter host connections. Prevents many types of attacks. Medium/High
Use latest versions of IE and keep patched Most resistant version of IE High
Use Killbit to stop risky ActiveX controls without easier alternate defenses Stop malicious ActiveX use Medium
Don’t surf untrusted web sites Avoid malicious code Medium/High
Customize and tighten IE’s Internet security zone Minimize malicious browser attacks Medium/High
Use 3rd party tool to protect IE If additional protection is needed Medium/High
Block High-Risk File Attachments As recommended High
Disable HTML Content in e-mail clients One of the single best things you can do to protect users High
Use Software That Authenticate E-mail Links Hopefully your email or browser client does this Medium
Run Anti-virus software that scans e-mail Run on client and email gateway High
Block Unmanaged E-mail Connections (over SMTP, HTTP, etc.) Unmanaged email provides high-risk opportunities for internal network compromises High
Block Spam Implement at least one non-client-side solution (i.e. on gateway or prior to network perimeter) High
Block e-mail clients from using port 25 Outlook/Exchange clients on the internal LAN use RPC, not SMTP to communicate. By only allowing email servers to use port 25, you will catch SMTP worms and bots with their own email engines High
Implement authenticated e-mail protocols Consider implementing a PKI hierarchy on the LAN, Sender ID (or other anti-spam protocol) to fight spam, and use S/MIME or PGP to authenticate sensitive emails Medium
Securely configure email client To minimize the chances of exploitation High
Secure DNS services To prevent DNS poisoning that can redirect users to bogus web sites High
IIS: Only allow the bare minimum of TCP/IP ports to and from the web server Usually the only ingress filters that should be allowed are 80, maybe 443, and whatever the remote management port requirement is. There should be no egress filters allowed, unless external communications is an authorized component of the server. Do not allow port 80 and 53 outbound all the time. High
IIS: Unless otherwise contraindicated IIS should always be installed on a dedicated computer To prevent exploitation from other services. High
IIS: Check for and install updated hardware drivers To prevent hardware exploitation. Medium
IIS: IIS should be installed on a system with two separate, clean hard drives, each formatted with NTFS To prevent directory traversal attacks. Medium/High
IIS: Install in stand-alone, workgroup mode unless domain authentication is needed. Less information to be protected if Active Directory is not needed High
IIS: Specifically denied access to IIS anonymous user and anonymous null session Add accounts to \Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Deny logon through Terminal Services Medium
IIS: Enabled High level encryption on any Terminal Services connections. Set under \Computer Configuration\Administrative Templates\Terminal Services\Encryption and Security\Set client connection encryption level Medium
IIS: If you use Remote Desktop to administer web server, change RDP port to something random and high To prevent easy RDP port enumeration and remote password guessing attacks High
IIS: Structure web site content directories to maximize security.   High
Disable EFS until an EFS recovery policy is defined Otherwise encrypted files could be lost High
Encrypt confidential and sensitive files To prevent information theft Medium
Encrypt sensitive information stored on laptops and other computer assets subject to high-risk of theft To prevent information theft Medium/High
Ensure that a data recovery agent (DRA) is defined on stand-alone XP Pro machines To prevent EFS-encrypted data from becoming unrecoverable Medium/High
Create a custom DRA account to replace the default DRA selection of Administrator To give added protection to EFS-protected files. Disable the custom DRA account until needed. Medium/High
After using or creating a DRA account, export and remove the DRA’s recovery certificate from the system You can import when needed. Gives added protection to the DRA account and EFS. Medium/High
Consider implementing Syskey protect (mode 2 or 3) on computers using EFS to protect local credentials against password attacks trying to recover EFS keys Low
Use GPO software publishing to install and update software If not other automated software install tool is in use, especially for common Internet Explorer browser add-on programs, like Sun’s Java VM, Adobe’s Acrobat Reader, RealPlayer, etc. High/Medium
Modify the Access this computer from the network right. Should be set to Authenticated Users and Administrators, not Everyone, in most environments. Must Allow Enterprise Domain Controllers group on Domain Controllers; and add Backup Operators, Everyone, and Pre-Win 2K Compatible groups if they are used. Early versions of OWA required remote users have this right Low/Medium
Modify the Add workstations to the domain right. By default all Authenticated Users have this right, consider only granting this right to the Administrators group. Low/Medium
Enable the Require Domain Controller authentication to unlock workstation security option

Determines whether or not a domain controller is required to unlock a locked workstation, or whether cached credentials will work. Default is disabled. Should be enabled to prevent timing issues and other types of hacks involving locked screen savers. Medium
Use the Restricted Group GPO feature to control the membership of highly-privileged groups Prevents unauthorized users from remaining in highly-privileged groups for long High
Use role-based security in designing your AD structure Make role-based security templates, role-based OUs, role-based GPOs, etc. High
Create and use Local Computer Policy To prevent users from circumventing GPOs Medium
Create and apply a one-time uber-security template to each new or existing PC that fully reflects (as best as possible) your company’s security policy To make sure all computers meet the defined security policy. High
If a cross-forest trust is used, enable selective authentication. To prevent remote forest users from automatically being added to local forest’s Authenticated Users group upon connection. High
Trust passwords should be long and complex To prevent unauthorized recovery during initial setup. Overall risk is low because attackers haven’t attacked trust passwords much and after the initial setup, Windows frequently changes the password and makes it long and complex. Low/Medium
Use Gpresult.exe /V to report effective GPO policy settings instead of RSoP Gpresult.exe /v can report the affects of Local Computer Policy, while RSoP cannot. Medium if Local Computer Policy is used, otherwise Low
Ensure that GPOs get applied during the refresh interval even if the GPO settings did not change Each GPO category can be disabled or enforced under \Computer Configuration\Administrative Templates\System\GroupPolicy. Medium/High
Other than domain-level policies, each GPO should be applied to a computer or user object, but not both at the same time. Disable the Computer Configuration or User Configuration option when not used This will speed up GPO application significantly Medium
Make sure administrators are not exempt from GPO settings Some sources tell you remove all GPOs from applying to Admin accounts, which is the wrong advice. Medium

 

0 comments:

Post a Comment

About

Privacy Policy

ShortNewsWeb

Blog Archive

Categories

10 Hacks Every Student Should Know (1) 10 Shows Like 'A Knight of the Seven Kingdoms' You Should Watch Next (1) 10 Shows Like 'Boots' You Should Watch Next (1) 10 Shows Like 'The Last of Us' You Should Watch Next (1) 11 of the Best Tech Gifts for Teens Still on Sale After Cyber Monday (1) 15 Shows Like 'The Night Manager' You Should Watch Next (1) 21 of the Weirdest Things You Can Bring on an Airplane (1) A Four Pack of These TSA-Approved Luggage SmartLocks Is on Sale $80 Right Now (1) Actually Fake? (1) After 90 Days on a Vibration Plate (1) an Impact Driver (1) and a Hammer Drill (1) and Artists Love It (1) and Here's the Gear That Made My Apartment Into a Video Studio on a Budget (1) and Here's What I Love (and Hate) About Walking Pads (1) and I Can't Recommend the Kindle Colorsoft (1) and I'm Eyeing These AirPods Max on Sale for $120 Off (1) and It’s 30% Off for Memorial Day (1) and It's Half Off for Prime Day (1) and More (1) and Peloton’s Stretching Classes Are a Huge Help (1) and These Are 30% Off for Prime Day (1) and These Are the Top 10 Tech Sales This Week (3) and This Is My Favorite Stair Stepper Workout (1) and You Should Turn It Off (1) Android 16 Is Now Officially Available on These Devices (1) Android 16 Just Put Parental Controls Directly on Your Kid's Phone (1) Android 16's Latest Beta Adds a Long-Awaited Lock Screen Feature (1) Android's Canary Channel Lets You Try New Features Before Anyone Else (1) Apple Has Improved the Powerbeats Pro 2's Heart Rate Issues (but It’s Still Not Enough) (1) Apple Is Working On These Five New Satellite Features for the iPhone (1) Apple Just Added Two More Apple Music Features to iOS 26 (1) Apple Just Patched Its First Zero-Day Security Vulnerability of 2026 (1) Apple's Newest iPhone Charger Is Pricey but Versatile (1) Apple’s Second macOS Tahoe Beta Lets You Test Out New AirPods Features (1) Are ‘Ultra-Processed’ Foods Really That Bad for You? (1) Are Brain Wearables the Future of Fitness Tracking? (1) but I Doubt They'll Be Able to Compete With Whoop's App (1) but My Brain Feels Amazing (1) CES 2026: You Can Chain 100 of These Ikea Bluetooth Speakers Together (1) CES 2026: You Can Finally Use XREAL's AR Glasses With the Nintendo Switch 2 (1) Despite Google's Battery Performance Update (1) Discord Is About to Force You to Prove Your Age (1) Disney Might Pull Its Channels From YouTube TV (1) Disney Movies Are Disappearing From YouTube and Google TV (1) Do You Really Need to Check With a Doctor Before Starting to Exercise? (1) E-Readers (1) Eight Apps I Use to Get a Ton of Free Stuff (1) Every Apple iPad Is on Sale for Labor Day (1) Everything You Need to Know About October Prime Day (1) Four Tools You Can Use to Find Any Leak in Your Home (1) Gmail Is Getting AI-Powered Search and Proofreading Features (1) Google Maps Will Soon Let You Talk to Gemini While Driving (1) Google's AI Mode Can Now Work Like a Virtual Sales Associate (1) Google's August 2025 Update Fixes These Issues With Your Pixel (1) Google’s First Foldable Phone Is Down to $580 for Labor Day (1) Google's Going All In on 'AI Mode' With New Features and a Global Launch (1) Here’s What to Expect From Walmart’s Black Friday and Cyber Monday Sales (1) How Apple Fixed the Photos App in iOS 26 (1) How Cold Is Too Cold to Run Outside? (1) How Did the FBI Get Nancy Guthrie's Nest Doorbell Footage? (1) How I Feel After 30 Days With the Hydrow Arc Rower (1) How Insurance Companies Use Drones to Raise Your Rates (and What to Do About It) (1) How to Estimate the Utility Bills for Your New Home (1) How to Set Up Your Own Custom Focus Modes on iPhone (1) How to Sign Up to Test Oura’s New Blood Pressure Feature (1) How to Speak With a Real Person at Target Customer Service (1) How to Turn Off the New ‘Gemini in Chrome’ Button (1) How to Watch Pornhub Even If It's Blocked In Your State (1) I Asked People the Real Reasons They Post Their Workouts Online (1) I Just Got an iPhone (1) I Like Peloton's Mindful 'Reflection Rides' More Than I Thought I Would (1) I Love This Minimalist Smart Lock (1) I Never Leave Home in Winter Without These (Cheap) Heated Gadgets (1) I Swapped My Massage Gun for This Chirp Roller and My Muscles Have Never Felt Better (1) I Tested AI 'Humanizers' to See How Well They Actually Disguise AI Writing (1) I'm a Comics Reader (1) I'm a Deals Writer (3) I'm a Full-Time Creator (1) I’m a Marathon Runner (2) I’m Learning to Do the Splits As an Adult (1) If You Hate Running (1) iOS 26 Will Make Managing Your Battery Life Easier (1) Is Moltbook (1) Millions of Earbuds and Headphones Have a Serious Android Security Vulnerability (1) My 10 Favorite YouTube Channels for At-Home Yoga Classes (1) My Favorite Amazon Deal of the Day: Samsung Galaxy Buds 3 FE + Galaxy SmartTag 2 (1) My Favorite Amazon Deal of the Day: Samsung's 'The Frame' TV (1) My Favorite Amazon Deal of the Day: Shokz OpenRun Headphones (1) My Favorite Amazon Deal of the Day: The 2024 Amazon Kindle Scribe (1) My Favorite Amazon Deal of the Day: The 2024 Kindle (1) My Favorite Amazon Deal of the Day: The 75-Inch Amazon Fire TV Omni QLED (1) My Favorite Amazon Deal of the Day: The 77-inch Sony Bravia A95L OLED TV (1) My Favorite Amazon Deal of the Day: The Nothing CMF Watch 3 Pro (2) My Favorite Amazon Deal of the Day: The Samsung Galaxy S25 FE With a $100 Gift Card (1) My Favorite Amazon Deal of the Day: The Samsung Galaxy Watch 8 (1) My Favorite Amazon Deal of the Day: The Sonos Roam 2 Portable Speaker (1) My Favorite Amazon Deal of the Day: The Soundcore Sleep A20 Earbuds (1) My Favorite Amazon Deal of the Day: These Shokz Bone Conduction Headphones (1) My Favorite Amazon Deal of the Day: This 75-inch Toshiba C350 Smart TV (1) My Favorite Amazon Deal of the Day: This 85-Inch TCL QLED TV (1) My Favorite Amazon Deal of the Day: This Like-New Amazon Kindle Paperwhite (1) My Favorite Underrated Fitness Watch Is Less Than $200 Until Prime Day Ends Tonight (1) My Five Favorite Things I Saw at CES Unveiled 2026 (1) My Legs Feel the Same (1) Nine Useful Power Tools You Probably Didn’t Know Existed (1) NYT Games Subscribers Can Now Make Custom Wordles for Their Friends (1) October Prime Day 2025: Live Updates on the Best Deals for MacBooks (1) OpenAI Is Killing ChatGPT-4o (Again) (1) OpenAI Will Now Operate Like a For-Profit Company (1) Peloton's 'Pace Targets' Workouts May Turn Me Into a Runner (1) Peloton's Nutrition Offerings Are Surprisingly Robust (and Free) (1) Samsung’s Next Galaxy Unpacked Will Reveal Its ‘Ultra’ Foldable (1) Samsung's Ultrawide Odyssey G9 Monitors Are Down to Their Lowest Prices Ever for Labor Day (1) Six New Ways to Customize Your Mac’s Look in macOS Tahoe (1) Six of the Best Indoor Air Quality Monitors for Your Home (1) Six of the Best YouTube Channels for Running Workouts (1) Six Tricks Companies Use to Hide the Impact of Tariffs (1) Smart Glasses (1) Sony Will Soon Let You Pair Your PS5 Controller With Multiple Devices at Once (1) Sony's DualSense PS5 Controllers Are on Sale for Black Friday (1) T-Mobile's App Is Recording Your Screen by Default (1) Target’s ‘Circle Week’ Sale Will Start Before Amazon’s October Prime Day (1) That PayPal 'Automatic Payment Status' Email Is a Scam (1) The 11-Inch M4 iPad Pro Is $500 Off for Prime Day (1) The AirPods 4 Are on Sale for $90 During Labor Day (1) The AirPods 4 Are Still at Their Prime Day Price (1) The Apple Watch SE 2 Is $80 Off Right Now (1) The Apple Watch’s Newest Health Feature Has Been Cleared by the FDA (1) The Beats Studio3 Are Just $89 Right Now (1) The Best Amazon Echo Speaker Is $80 Right Now (1) The Best Deals You Can Get on TVs Before Prime Day Ends Tonight (1) The Best Gifts for DIYers (That Aren't Tools) (1) The Best iPad for Most People Is on Sale for Its Lowest Price Ever (1) The Best Labor Day Tool Deals Under $25 (1) The Best Prime Day Deals on Headphones (1) The Best Sales on Headphones and Earbuds Right Now (1) The Best Study Apps That Make Learning Easier (1) The Bose Ultra Open Earbuds Are $100 Off Right Now (1) The Cheapest Apple Watch Is an Even Better Deal on the Last Day of Prime Day (1) The Difference Between a Drill (1) The Easiest (and Cheapest) Ways to Turn Your Attic Into Useful Storage Space (1) The Entire 'Planet of the Apes' Franchise Explained in 10 Infographics (1) The Google Pixel Watch 2 Is 20% Off Right Now (1) The Latest M4 MacBook Air Is Down to Its Lowest Price Ever for Labor Day (1) The Les Mills ‘Educational’ Fitness Classes Helped Me Understand Why My Favorite Workouts Work (1) The Meta Quest 3S VR Headset Just Dropped To Its Lowest Price Ever On Amazon (1) The Most Fun Snowball Fight Tech Money Can Buy (1) The PlayStation Portal Is Cheaper Than Ever Ahead of Black Friday (1) The Roku Streaming Stick 4K With HDR Is Half Off Right Now (1) The Samsung Galaxy Z TriFold's Price Is Eye-Watering (1) The Seven Best Tool Box Accessories Everyone Should Have (1) the Social Network for AI Agents (1) The Two Best Streaming Services for Movie Nerds Are Discounted for Black Friday (1) The Utilities Questions No One Thinks to Ask Before Buying a House (1) The XP-Pen Magic Note Pad Is $140 Off for This Early Black Friday Deal (1) The Yamaha Seqtrak Is My Tech ‘Upgrade of the Year’ (1) There's Something Off About Apple's New Sleep Score (1) These Are the Best Flashcard Apps for Studying (1) These Are the Best Labor Day Tech Deals on Amazon (1) These M4-Powered MacBook Pros Are All at Their Lowest Prices Ever Right Now (1) These Premium Earbuds Are Over $100 Right Now (1) This App Switcher for Mac Is Way Faster Than Command-Tab (1) This Is the Best AirPods Pro Deal Ahead of Black Friday (1) This JBL Outdoor Speaker Is $130 Off Ahead of Prime Day (1) This Last-Minute Sale on the Switch 2 Bundle Is Available at Best Buy Today (1) This LG 77-Inch OLED TV Is Half Off Right Now (1) This Orbital Massage Gun Is Now Essential to My Workout Routine (1) This Owala Water Bottle Is My Health Upgrade of the Week (1) This Pixel Still Caught Fire (1) This Popular 55-Inch Hisense TV Is 45% Off Ahead of Prime Day (1) This Quirky Wallet-Sized E-Reader Is Under $50 for Cyber Monday (1) This Ridiculously Detailed Spreadsheet Has Helped Me Stick to My New Year’s Resolutions for Five Years (1) This Rugged Soundcore Bluetooth Speaker Is Nearly 40% Off Right Now (1) This Samsung Ultra-Wide Curved Monitor Is 33% Off Right Now (1) This Sleep Number Bed Has Been Giving Me the Best Rest (1) This Sonos Soundbar Is $150 Off for Black Friday (1) Three Whoop Band Competitors Are Coming (1) Try 'Rucking' (1) Use the SQ3R Method to Study More Effectively (1) Use This App to Add Windows-Style Auto Scrolling to macOS (1) Vine Is Back (1) What It's Like to Race With the Garmin Forerunner 165 (1) What the Netflix/Warner Bros. Merger Could Mean for Streaming (1) What You Should Actually Know About Tylenol and Pregnancy (1) Where to Stream Every Nominated Movie Before the 2026 Oscars (1) Which Apple Announcements to Expect From WWDC 2025 (1) Who Can Get a Piece of Google's $135 Million Android Settlement (1) Why I Always Check the Wet Bulb Temperature Before a Summer Run (1) Why You Need to Update Your Plex Server ASAP (1) Yes (1) You Can Finally Remove Pixel’s Annoying 'At a Glance' Widget (1) You Can Get $150 Off an 11-inch iPad Air for Labor Day (1) You Can Get $350 Off the Galaxy S25 Ultra for Prime Day (1) You Can Get the Apple Watch Ultra 2 at Its Lowest Price Ever During Prime Day (1) You Can Get This Microsoft Surface Laptop SE on Sale for $190 Right Now (1) You Can Now Block Your Kids From Watching YouTube Shorts (1) You Can Now Buy These Massage Guns With Your FSA or HSA (1) You Might Soon Be Able to Change Your Gmail Address (1) You Need Adjustable Dumbbells in Your Life (1) Your iPhone's Camera Comes With a Hidden Translator (1) Your Webcam and Phone Camera Can Be Hacked (1) YouTuber Hank Green’s Focus App Just Overtook ChatGPT on the App Store (1) 'The Woks of Life' Reminded Me to Cook With All the Flavors I Love (1) 10 Scary Podcasts to Listen to in the Dark (1) 11 Ways to Automate Your Life (and Get Back More Free Time) (1) 13 of the Best Spooky Episodes From (Mostly) Un-Spooky Shows (1) 13 Spooky Movies Set on Halloween Night (1) 16 of the Best Ways to Declutter Your Home (1) 1Password Now Generates QR Codes to Share Wifi Passwords (1) 2024 (15) 21 Thanksgiving Movies About Families As Screwed-Up As Yours (1) 30 Movies and TV Shows That Are Basically 'Competence Porn' (1) 30 of the Most Obscenely Patriotic Movies Ever (1) 31 Spooky Movies to Watch Throughout October (1) 38 of the Best Queer Movies of the Past 100 Years (1) 40 Netflix Original Series You Should Watch (1) 55 Box Office Bombs Totally Worth Watching (1) Active Directory (1) Adobe's AI Video Generator Might Be as Good as OpenAI's (1) AIX (1) Amazon Prime Members Can Get Two Free E-Books in May (1) Amazon's Biggest Kindle Is $75 Off Right Now (1) and I'd Do It Again (1) and It's Not Worth the Price Hike (1) and Max Bundle Isn't a Terrible Deal (1) and the Dreo Solaris Is the Best Space Heater I’ve Tried (1) and These Are My Favorite Tech Deals From Walmart’s Black Friday Sale (1) and These Water-Resistant Running Shoes Are a Game Changer (1) and They're All on Sale for Black Friday (1) Apache (2) Apple Finally Made the New AirPods Max Worth Buying (1) Apple Intelligence Is Running Late (1) Apple Intelligence's Instructions Reveal How Apple Is Directing Its New AI (1) Apple Passwords Is Now on Firefox (but Not for Windows Users) (1) Apple's Latest Update Might Have Opted You Back Into Apple Intelligence (1) Apple’s Password Manager Had a Major Security Flaw (1) August 18 (1) August 4 (1) August 5 (1) Avoid an Allergic Reaction by Testing Your Halloween Makeup Now (1) Backup & Restore (2) best practices (1) bleepingcomputer (253) Blink Security Cameras Are up to 68% Off Ahead of Prime Day (1) Bluesky Has Trending Topics Now (But You Can Disable Them) (1) CentOS (1) CES 2025: Asus' Zenbook A14 Is the Lightweight Laptop My Back Wishes I Had (1) CES 2025: Govee’s New Pixel Light Will Remind You of a Lite Brite (1) ChatGPT Now Has a 'Library' of Your AI-Generated Images (1) Configure PowerPath on Solaris (1) Congress Might Ban DeepSeek (1) Documents (2) Don't Buy the New iPad Air (1) Don't Fall for This 'New' Google AI Scam (1) Don't Rely on a 'Monte Carlo' Retirement Analysis (1) Eight Cleaning Products TikTok Absolutely Loves (1) Eight Landscaping Features That Can Lower the Summer Heat in Your Yard (1) Eight of the Best Methods for Studying so You Actually Retain the Information (1) Eight Unexpected Ways a Restaurant Can Mislead You (1) Elevate Your Boring Store-Bought Pretzels With This Simple Seasoning Technique (1) Even Grok AI Can 'See' Now (1) Even Steam Has Malware Now (1) Everything Announced at Apple's iPhone 16 Event (1) Everything I'm Seeding in February (1) file system (6) Finally (1) Find (1) Find a Nearby ‘Gleaning Market’ to Save Money on Groceries (1) Five Red Flags to Look for in Any Restaurant (1) Five Ways to Keep Your Neighbors From Looking Down Into Your Yard (1) Five Ways You Can Lose Your Social Security Benefits (1) Flappy Bird's Creator Has Nothing to Do With Its 'Remake' (1) For Years (1) Four Reasons to Walk Out of a Job Interview (1) Four Signs Thieves Are Casing Your House (1) gaming (1) Gboard for Android Finally Gets Undo (1) Goldfish Crackers Have a New Name (for a Little While) (1) Google Might Be Removing the 'I'm Feeling Lucky' Button (1) Grok Is Now Available Without an X Account (1) Hackers Now Have Access to 10 Billion Stolen Passwords (1) Hackers Stole Health Records From 1.6 Million Planned Parenthood Patients (1) Here’s Everything You Get With Garmin’s New Connect+ Subscription (1) Here's What's New in the Latest Nintendo Switch Update (1) Here’s Why (and When) Gemini Is Replacing Google Assistant (1) How I Finally Organized My Closet With a Digital Inventory System (1) How I Pack Up a Hotel Room So I Don’t Forget Anything (1) How Opening Multiple Bank Accounts Helped Me Manage My Money Better (1) How to Buy Residency in Another Country With a 'Golden Visa' (1) How to Cancel Your Amazon Prime Membership After Prime Day Is Over (1) How to Choose the Best Weightlifting Straps for Your Workout (1) How to Do Fartlek Runs (and Seven Different Kinds to Try) (1) How to Enable (and Turn Off) Apple Intelligence on an iPhone (1) How to Get Free Car Maintenance and Repair Work (1) How to Get Started With Bluesky (1) How to Keep Squirrels Off Your Bird Feeders (1) How to Mute Words and Phrases on Your Bluesky Feed (1) How to Protect Your Kids From Identity Theft (1) How to Remotely Control Another iPhone or Mac Using FaceTime (1) How to Set Up Your Bedroom Like a Hotel Room (and Why You Should) (1) How to Speak With a Real Person at Target Customer Service (1) How to Stock a 'Tariff Pantry' (1) How to Take a Screenshot on a Mac (1) How to Take Full Control of Your Notifications on a Chromebook (1) How to Track When Nintendo Switch 2 Preorders Are Back in Stock (1) How to Track Your 2024 Federal Tax Refund (1) How to Use Lighting to Improve Your Home's Sale Price (1) How to Use Picture-in-Picture Mode on an Android Phone (1) How to Write SMART Goals That Actually Help You Reach Your Fitness Dreams (1) Hulu (1) I Chose the Beats Fit Pro Over the AirPods Pro (1) I Tested Grok 3 (1) I'd Recommend These Seven Outdoor Security Cameras I've Tested (1) I'm a Runner (1) I'm a Shopping Writer (1) I’m Always Cold (1) If You Got a Package You Didn't Order (1) If You Hate Running (1) If You Want Lossless Audio on Your AirPods Max (1) Important Questions (17) Instagram Is Using AI to Automatically Enroll Minors Into 'Teen Accounts' (1) Install and Configure PowerPath (1) interview questions for linux (2) Is ‘Ultra-Processed’ Food Really That Bad for You? (1) Is Amazon Prime Really Worth It? (1) It Might Be a Scam (1) It's Surprisingly Easy to Customize Your Mac's Folder Icons (1) July 14 (1) July 21 (1) July 28 (1) July 7 (1) June 30 (1) Lifehacker (75) LifeHacker (369) Linux (36) Make and Freeze Some Roux Now for Easy Turkey Gravy (1) Meredith's Training Diaries: How I Crushed My Marathon Personal Record (1) Meta Releases Largest Open-Source AI Model Yet (1) Monitoring (3) music (688) My Favorite 14TB Hard Drive Is 25% Off Right Now (1) My Favorite Amazon Deal of the Day: Apple AirPods Max (2) My Favorite Amazon Deal of the Day: Apple Pencil Pro (1) My Favorite Amazon Deal of the Day: Galaxy S25 Edge Preorders (1) My Favorite Amazon Deal of the Day: Google Nest Mesh WiFi Router (1) My Favorite Amazon Deal of the Day: Google Pixel 8 (1) My Favorite Amazon Deal of the Day: PlayStation 5 (1) My Favorite Amazon Deal of the Day: Samsung Odyssey G9 Gaming Monitor (1) My Favorite Amazon Deal of the Day: SHOKZ OpenMove Bone Conduction Headphones (1) My Favorite Amazon Deal of the Day: The 13-Inch M3 Apple MacBook Air (1) My Favorite Amazon Deal of the Day: The Beats Pill Portable Speaker (1) My Favorite Amazon Deal of the Day: The Garmin Forerunner 955 (1) My Favorite Amazon Deal of the Day: The Garmin Venu 3S (1) My Favorite Amazon Deal of the Day: The Google Nest Learning Thermostat (1) My Favorite Amazon Deal of the Day: The Google Pixel 9 Pro (1) My Favorite Amazon Deal of the Day: The Google TV Streamer 4K (1) My Favorite Amazon Deal of the Day: The Kindle Colorsoft Signature Edition (1) My Favorite Amazon Deal of the Day: The M4 MacBook Air (1) My Favorite Amazon Deal of the Day: The Microsoft Surface Pro (1) My Favorite Amazon Deal of the Day: The Samsung Galaxy Buds 3 Pro (1) My Favorite Amazon Deal of the Day: The Sonos Era 100 (1) My Favorite Amazon Deal of the Day: These Bose QuietComfort Headphones (1) My Favorite Amazon Deal of the Day: This Meta Quest 3S Bundle (1) My Favorite Bone-Conduction Headphones Just Dropped to Their Lowest Price (1) My Favorite Fitness Watch Is Getting Walking Workouts and a Smart Alarm (1) My Favorite Tools for Managing Cords and Cables (1) Nagios (2) Netflix Is Changing Its TV App Design (1) Newtorking (1) NFS (1) Now Is a Good Time to Buy a Refurbished M-Series MacBook (1) OMG! Ubuntu! (688) OpenAI Just Introduced More Ways to Use ChatGPT on WhatsApp (1) Opera’s New Browser Is Built to Break Your Doomscrolling Habit (1) Oracle Linux (1) oracleasm (3) osnews (66) Oura’s Readiness Score Finally Takes Menstrual Cycles Into Account (1) Password less communication (1) Patching (2) Pixel Studio Is the Easiest (If Not the Best) Way to Make AI Art on Your Pixel 9 (1) Poaching Is the Secret to Perfect Corn on the Cob (1) powerpath (1) Prioritize Your To-Do List By Imagining Rocks in a Jar (1) Red Hat Exam (1) Redo Buttons (1) register (265) Rsync (1) Safari’s ‘Distraction Control’ Will Help You Banish (Some) Pop Ups (1) Samba (1) Samsung Just Announced the Galaxy S25 Series (1) Save Time and Air Fry Your Pumpkin Pie (1) Scrcpy (1) Sending an Emoji in Google Messages Will Now Play a Fun Animation (1) September 1 (1) September 15 (1) September 2 (1) September 22 (1) September 23 (1) September 30 (1) September 8 (1) Seven Home 'Upgrades' That Aren’t Worth the Money (1) Seven Popular Home Renovations That Will Increase Your Property Taxes (1) Seven Things Your Credit Card’s Trip Protection Won’t Actually Cover (1) Seven Ways to Make Your Home's Entryway More Secure (1) Six Items That Will Maximize Your Carry-On Space (1) Six of the Most Common Tax Myths in 2025 (1) Six Signs Your Bank Is About to Fail (and What to Do About It) (1) Six Unexpected Household Uses for Dry-Erase Markers (1) Six Ways to Prevent a Contractor From Damaging Your House During a Renovation (1) ssh (1) Stop Your iPhone From Sharing Photos' Data With Apple (1) Swift Shift Is the Window Management Tool Apple Should Have Built (1) System hardening (1) Tailor Your iPhone's Fitness Summary to Your Workouts (1) Target’s ‘Circle Week’ Sale Is Still Going After October Prime Day (1) Target’s Answer to Prime Day Starts July 7 (1) Tech (9693) Tech CENTRAL (126) Technical stories (401) technpina (25) The 30 Best Movies of the 2020s so Far (and Where to Watch Them) (1) The 30 Best Sports Movies You Can Stream Right Now (1) The Apple Watch SE (2nd Gen) Is 27% Off Right Now (1) The Beats Solo 4 Are 50% Off Right Now (1) The Best Deals on Robot Vacuums for Amazon’s Early Prime Day Sale (2) The Best Deals on Ryobi Tools During Home Depot's Labor Day Sale (1) The Best Early Prime Day Sales on Power Tools (1) The Best Last-Minute Mother’s Day Gifts for Moms Who Like to Cook (1) The Best Last-Minute Valentine's Day Gift Ideas for Under $30 (1) The Best Movies and TV Shows to Watch on Netflix This Month (1) The Best October Prime Day Deals If You Are Experiencing Overwhelming Existential Dread (1) The Best Places to Go When You Don't Want to Be Around Kids (1) The Best Places to Order Thanksgiving Dinner to Go (1) The Best Strategies for Lowering Your Credit Card Interest Rate (1) The Best Way to Clean a Microwave (1) The Best Ways to Prevent Countertop Appliances From Damaging Your Kitchen (1) The Best Ways to Store All Your Bags and Purses (1) The Boox Note Air 4C Is a Color E-Reader and Digital Notebook in One (1) The Easiest Way to Free Up Disk Space on Your Mac (1) The Latest watchOS Beta Is Breaking Apple Watches (1) The Marshall Emberton II Speakers Are $70 Off for Black Friday (1) The New Disney+ (1) The Ninja Crispi Is Changing How I Make Party Dips (1) The PowerSchool Breach May Have Compromised Over 70 Million Users' Data (1) The Real Cost of Using a Nespresso Machine (1) The Samsung Galaxy Buds 3 Pro Are $60 Off for Black Friday (1) The Two Best Times of Year to Look for a New Job (1) the X Rival Everyone's Flocking To (1) There's a Fix for Apple Mail's Weird Archiving Behavior (1) These Anker Soundcore Sport X10 Earbuds Are Cheaper Than Ever (1) These Bissell Vacuums Are on Sale Ahead of Black Friday (and They're All Great) (1) These Dutch Ovens Are Less Than $70 Right Now (Including My Favorite One) (1) These Googly Eyes Will Help You Find Your Mac's Cursor (1) These Meatball Shots Are My Favorite Football Season Snack (1) These Milwaukee Tools Are up to 69% off Right Now (1) These Tech Products Are More Than Half Off During Amazon's Big Spring Sale (1) This 2024 Sony Bravia Mini-LED TV Is $400 Off Right Now (1) This 75-Inch Hisense ULED 4K TV Is $500 Off Right Now (1) This App Lets You Create Automations Your Mac Usually Doesn’t Support (1) This Google Nest Pro Is 30% Off for Prime Day (1) This Ikarao Portable Karaoke Machine Is More Than $100 Off (1) This iPhone and Mac App Lets You Edit Your Bluesky Posts (1) This MagSafe-Compatible Power Bank Is 40% Off for Black Friday (1) This Peanut Butter Latte Isn’t As Weird As It Sounds (1) This Safari Extension Gives You More Control Over Your Reddit Feed (1) This Tech Brand Will Get the Biggest Discounts During Prime Day (1) This TikTok Upholstery Cleaning Hack Actually Works (1) Three New Things We Know About the Nintendo Switch 2 (1) Three Quick Ways to Shorten a Necklace (1) Three Services People Don't Know They Can Get From Their Bank for Free (1) TikTok's '5x5' Cleaning Method Is Great If You're Short on Time (1) Today’s Wordle Hints (and Answer) for Monday (4) Today’s Wordle Hints (and Answer) for Sunday (11) Try 'Pile Cleaning' When Your Mess Is Overwhelming (1) Try 'Pomodoro 2.0' to Focus on Deep Work (1) Try 'Rucking' (1) Ubuntu News (361) Ubuntu! (1) Unix (1) Use the ‘Organizational Triangle’ to Keep Your House Neater (1) Use This App to Sync Apple Reminders With Your iPhone Calendar (1) Use This Extension to Find All Your X Followers on Bluesky (1) Use This Shortcut to Remove AI From Google Photos Search (1) Use TikTok's 'Rage Cleaning' Trend to Get Your Place Spotless (1) veritas (2) Videos (1) Warner Bros. Is Uploading Classic Movies to YouTube for Free (1) Was ChatGPT Really Starting Conversations With Users? (1) Watch Out for These Red Flags in a Realtor Contract (1) Wayfair Is Having a '72-Hour Closeout' Sale to Compete With Prime Day (1) We Now Know When Google Will Roll Out Android 15 (1) What Is a Healthy Resting Heart Rate? (1) What Is the 'Die With Zero' Movement (and Is It Right for You)? (1) What Not to Do When Training for a Marathon (1) What to Do When Your Employer Shifts Your Pay From Salary to Hourly (1) What to Look for (and Avoid) When Selecting a Pumpkin (1) What to Wear to Run in the Cold (1) What You Should Hoard Before Tariff Price Increases Kick In (1) What's New on Max in December 2024 (1) What's New on Netflix in March 2025 (1) What's New on Prime Video and Freevee in September 2024 (1) Where to Stream Every Nominated Movie Before the 2025 Oscars (1) Why Now Is the Best Time to Find Running Shoes on Sale (1) Why the Apple TV App Is Better on Android Than iPhone (1) Why You Can't Subscribe to Disney+ and Hulu Through Apple Anymore (1) Why You Might Want to Avoid the Latest Chromecast Update (1) Why You Need Cycling Shoes to Ride a Spin Bike (and How to Pick Some Out) (1) Why Your Home Gym Needs Adjustable Kettlebells (1) Windows (5) You Can Easily Add Words to Your Mac's Dictionary (1) You Can Fight (and Avoid) Your Landlord's Cleaning Fees (1) You Can Get 'World War Z' on Sale for $19 Right Now (1) You Can Get a Membership to BJ's for Practically Free Right Now (1) You Can Get Beats Studio Buds+ on Sale for $100 Right Now (1) You Can Get Microsoft Visio 2021 Pro on Sale for $20 Right Now (1) You Can Get This 12-Port USB-C Hub on Sale for $90 Right Now (1) You Can Get This Roomba E5 Robot Vacuum on Sale for $170 Right Now (1) You Can Hire Your Own Personal HR Department (1) You Can Now Make Google Messages Blur NSFW Images (1) You Can Search Through Your ChatGPT Conversation History Now (1) You Can Set Different Scrolling Directions for Your Mac’s Mouse and Trackpad (1) You Don't Need to Panic Over the Latest Steam 'Leak' (1) You Need Beneficiaries for More Accounts Than You Think (1) You’re Probably Going to Need Another Dongle (1) Your DeepSeek Chats May Have Been Exposed Online (1) Your Verizon Bill Just Got a Little More Expensive (1)

Recent Comments

Popular Posts

Translate

My Blog List

Popular

System Admin Share

Total Pageviews