1. Clearing the Page File at Shutdown
2. Disable the POSIX and OS/2 Subsystem.
3. Never leave default passwords blank.
4. Disable the Guest account
5. Install Windows In a different directory.
6. Fake out hackers with a dummy Administrator account
7. Set the Hosts file to read-only to prevent name hijacking.
8. Turn off unneeded Services
9. Disallow changes to IE settings through IE
10. Disable simple File Shares.
2. Disable the POSIX and OS/2 Subsystem.
3. Never leave default passwords blank.
4. Disable the Guest account
5. Install Windows In a different directory.
6. Fake out hackers with a dummy Administrator account
7. Set the Hosts file to read-only to prevent name hijacking.
8. Turn off unneeded Services
9. Disallow changes to IE settings through IE
10. Disable simple File Shares.
0 comments:
Post a Comment