Harden the Security of your Windows Computer for Free

Discussion in 'Tech: Medical Apps, iOS, Android, medical devices' started by Stroganoff, Mar 12, 2015.

Thread Status:
Not open for further replies.
  1. Stroganoff

    Stroganoff Never give up.
    Rocket Scientist 15+ Year Member

    Nov 6, 2003
    Likes Received:
    Update December 2018: The two free products in this thread are discontinued or End-of-Life, making this thread mostly obsolete.

    1. Malwarebytes Anti-Exploit has been discontinued and is only available as part of the paid Malwarebytes Anti-Malware Premium (for home use) and Malwarebytes Endpoint Protection (for business). I have zero affiliation with Malwarebytes and will not use SDN as a platform to push their paid products.

    2. Microsoft Enhanced Mitigation Experience Toolkit (EMET) 5.52 is now End-of-Life, and Microsoft has discontinued support for it. It is still free and valid for Windows 7 and Windows 8.x, but it no longer works in Windows 10. Instead, Windows 10 has incorporated some/most of EMET's functionality into Windows Defender Security Center --> App & browser control --> Exploit protection --> Exploit protection settings. Modifying these settings is for advanced users only.

    Source: https://support.microsoft.com/en-us/help/2458544/the-enhanced-mitigation-experience-toolkit
    ----------------------- Original Thread from 2015 ----------------------------

    tl;dr: This thread is not about anti-virus or anti-malware but about hacking prevention tools that work side-by-side your antivirus/anti-malware tools.

    Note: Only do this on your personally-owned computers or systems with which you are authorized.

    Sup? I haven't geeked out in this forum in a bit, but I finally learned some things I'd been meaning to learn about for a long time and wanted to share with you just how stupid easy it is to add some layers of protection to common Internet-facing applications we all run on our machines, namely web browsers.

    Nowadays, many hacking attempts, attacks, and exploits occur against weaknesses (think of them as aneurysms in your applications) in web browsers and other Internet-facing applications. If a website -- even a legitimate one -- is compromised, it can be used as a vector to deliver malware into your computer or a direct injection of an undocumented method to break into your machine and take control of it.

    <Large part of original post redacted due to outdated information>
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
    #1 Stroganoff, Mar 12, 2015
    Last edited: Jan 8, 2019
    Mad Jack likes this.
  2. Mad Jack

    Mad Jack Critically Caring
    Physician Verified Account 5+ Year Member

    Jul 27, 2013
    Likes Received:
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...
    Stroganoff likes this.
  3. johnnydrama

    johnnydrama I'm no Superman
    10+ Year Member

    Jun 13, 2006
    Likes Received:
    Best defense is a good offense.

    Kali Linux Review: Not Everyone’s Cup of Tea
Thread Status:
Not open for further replies.

Share This Page