Security Tips

Tips 'n' Tricks regarding your Online Security.

 

A common question is how can I restrict which programs can be run on Windows? With Group Policy (or Local Group Policy on a standalone machine) you can do this, though it takes a bit of work. Here's how it works:

When analysing a compromised Windows system, investigators and system administrators can glean enormously useful information about attackers' actions by looking through the Windows registry, a hierarchical database storing tens of thousands of settings on a modern Windows box.

It is estimated than more than 50 million PCs around the world are now silently controlled by spammers and criminal gangs. These "zombie" PCs as they are called, are just normal PCs owned by Moms and Pops that have been taken over by malware secretly downloaded onto the PCs using web exploits, infected emails and more.

If you’ve ever run the Microsoft Windows XP’s Disk Cleanup utility, you probably discovered that your temporary files occupy a significant amount of space. You might select the Temporary Files check box in order to allow the Disk Cleanup utility to delete the files in the Temp folder,

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.