Securing Windows: How to Protect Your Computer Properly
By Paul Salmon
()
About this ebook
From securing the functionality in Windows, to ensuring your Internet connection is protected, Securing Windows: How to Protect Your Computer Properly will take you through the steps to ensure that harmful malware and viruses don't impact your computer.
Regardless of your technical expertise, you can easy understand what you will need to do in order to ensure your Windows desktop is as secure as possible. The most important aspect is that you will learn to secure your computer without spending a dime as all steps can be performed for free.
Key areas for securing Windows include:
* Hardening the Windows operating system and what you can change to increase the protection of your computer.
* Protecting your Internet connection to keep harmful malware and websites from accessing your computer..
* Installing secure software, and managing existing installed software.
Paul Salmon
Paul Salmon has been using and maintaining WIndows computers for almost 30 years. He has an extensive background knowledge in Windows has is an active developer of applications. He currently owns and writes for a technical blog and is actively learning about both Windows and Internet security.He is a husband to an amazing wife and a father of five boys.
Related to Securing Windows
Related ebooks
Blind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5PC Safety 101 Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsWindows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure Rating: 4 out of 5 stars4/5LINUX FOR NOVICES: A Beginner's Guide to Mastering the Linux Operating System (2023) Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsOnline Hacker Survival Guide Rating: 0 out of 5 stars0 ratingsLinux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system! Rating: 0 out of 5 stars0 ratingsDigital Cop: A Digital Cop's Guide to Cyber Security Rating: 0 out of 5 stars0 ratingsTop Jobs: Computer and Information Technology Rating: 0 out of 5 stars0 ratingsExploring SE for Android Rating: 0 out of 5 stars0 ratingsHow to Cheat at Securing Your Network Rating: 0 out of 5 stars0 ratingsComputer Maintenance Hacks: 15 Simple Practical Hacks to Optimize, Speed Up and Make Computer Faster Rating: 5 out of 5 stars5/5Operating System Forensics Rating: 4 out of 5 stars4/5Learning iOS Security Rating: 0 out of 5 stars0 ratingsYour System's Sweetspots: CEO's Advice on Basic Cyber Security: CEO's Advice on Computer Science Rating: 0 out of 5 stars0 ratingsVPN Third Edition Rating: 0 out of 5 stars0 ratingsWeb Application Defender's Cookbook: Battling Hackers and Protecting Users Rating: 0 out of 5 stars0 ratingsComputer Systems Performance Evaluation and Prediction Rating: 4 out of 5 stars4/5Combat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Computer Security Rating: 0 out of 5 stars0 ratingsHow to Cheat at Configuring Open Source Security Tools Rating: 0 out of 5 stars0 ratingsMastering Windows Server 2016 Rating: 0 out of 5 stars0 ratingsScene of the Cybercrime Rating: 4 out of 5 stars4/5Amazon Echo: How to Get the Most Out of Your Amazon Echo: User Guide, Tips, Tricks & Commands (Revised, Expanded & Updated for 2016) Rating: 0 out of 5 stars0 ratingsSeven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsMobile Malware Protection Third Edition Rating: 0 out of 5 stars0 ratingsThe Real Citrix CCA Exam Preparation Kit: Prepare for XenApp 5.0 Rating: 2 out of 5 stars2/5Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides Rating: 4 out of 5 stars4/5
Operating Systems For You
Hacking Essentials - The Beginner's Guide To Ethical Hacking And Penetration Testing Rating: 3 out of 5 stars3/5Excel : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Excel Programming: 1 Rating: 5 out of 5 stars5/5The Mac Terminal Reference and Scripting Primer Rating: 4 out of 5 stars4/5OneNote: The Ultimate Guide on How to Use Microsoft OneNote for Getting Things Done Rating: 1 out of 5 stars1/5Learn Windows PowerShell in a Month of Lunches Rating: 0 out of 5 stars0 ratingsiPhone Unlocked Rating: 0 out of 5 stars0 ratingsMastering Windows PowerShell Scripting Rating: 4 out of 5 stars4/5Windows 11 All-in-One For Dummies Rating: 5 out of 5 stars5/5The Windows Command Line Beginner's Guide: Second Edition Rating: 4 out of 5 stars4/5PowerShell: A Comprehensive Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Raspberry Pi Cookbook for Python Programmers Rating: 0 out of 5 stars0 ratingsLinux: Learn in 24 Hours Rating: 5 out of 5 stars5/5Exploring Windows 11: The Illustrated, Practical Guide to Using Microsoft Windows Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5CompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsLinux Command Line and Shell Scripting Bible Rating: 3 out of 5 stars3/5Make Your PC Stable and Fast: What Microsoft Forgot to Tell You Rating: 4 out of 5 stars4/5PowerShell: A Beginner's Guide to Windows PowerShell Rating: 4 out of 5 stars4/5Bash Command Line Pro Tips Rating: 5 out of 5 stars5/5Linux Command-Line Tips & Tricks Rating: 0 out of 5 stars0 ratingsThe Linux Command Line Beginner's Guide Rating: 4 out of 5 stars4/5Learn SQL Server Administration in a Month of Lunches Rating: 3 out of 5 stars3/5The iPadOS 17: The Complete User Manual to Quick Set Up and Mastering the iPadOS 17 with New Features, Pictures, Tips, and Tricks Rating: 0 out of 5 stars0 ratingsNetworking for System Administrators: IT Mastery, #5 Rating: 5 out of 5 stars5/5MacBook Pro User Manual: 2022 MacBook Pro User Guide for beginners and seniors to Master Macbook Pro like a Pro Rating: 0 out of 5 stars0 ratings
Reviews for Securing Windows
0 ratings0 reviews
Book preview
Securing Windows - Paul Salmon
Securing Windows: How to Protect Your Computer Properly
Paul Salmon
Copyright 2014 Paul Salmon
Smashwords Edition
Smashwords Edition, License Notes
This ebook is licensed for your personal enjoyment only. This ebook may not be re-sold
or given away to other people. If you would like to share this book with another person,
please purchase an additional copy for each recipient. If you’re reading this book and did
not purchase it, or it was not purchased for your use only, then please return to
Smashwords.com and purchase your own copy. Thank you for respecting the hard work
of this author.
Table of Contents
Introduction
Hardening Windows
Securing Your Internet Connection
Managing Software
Security Resources
Introduction
Windows is the most popular consumer operating system in the world, estimated to being installed on 1.3 billion computers. Besides being the most installed operating system, Windows is also a huge target for malware. Malware and malicious users have been an unfortunate part of the Windows ecosystem since pretty much the beginning.
While malware has been a serious threat in recent years, much of the malware can be prevented from being a concern on your Windows computer. This book will explain the steps you can take to mitigate the threat from malware and malicious users.
Who is this Book For
The aim of this book is simply to help secure your Windows computer. While many of the explanations may seem simple to those with a technical background, this book is written for anyone looking to keep their Windows system, and data, secure.
What You Will Learn
After reading this section I am hoping that you will have a better understanding of what you need to do in order to keep your computer secure. In this section I will talk about three main aspects of keeping your computer secure.
Hardening Windows
The security of a computer starts with Windows. Windows is the base for all running applications on your computer, and must remain as secure as possible. This part will discuss steps that you can take to ensure your Windows system is as secure as possible.
Securing Your Internet Connection
Malware is very common online, and much of the malware that infects Windows systems comes from the Internet. Ensuring your Internet connection is secure as possible will go a long way to keeping malware from infecting your computer and network.
Managing Software
While malware can exploit security vulnerabilities in Windows, much of the malware that can infect a computer does the same with installed applications. It is important to understand how to properly manage the software installed on your system to keep it secure.
Security Resources
Properly securing a Windows systems means learning and understanding how to properly secure a computer, and to stay up-to-date with the latest security news. There are many resources online that provide a lot of knowledge and tips that can greatly help keep your Windows system secure. Some of the resources I use are listed here.
About the Sections in this Book
Before continuing it is important to understand how the sections are written. Within each section there are sub-sections that help to provide a flow and breakdown the tasks outline within each section.
Within each sub-section, I have indicated the cost of performing the actions/task/steps outlined in the sub-section so you have an idea on whether you wish to perform the steps in that sub-section. Many sub-sections may have