You can’t, as a result of the old PC industry marvel is known as PEBCAK, or “Issue exists among seat and console”. A great deal of hacks rely upon “social building,” which means controlling individuals into giving over their passwords or different subtleties. It very well may be as simple as calling up and claiming to be from the administrative center or, clearly, exchanging passwords for bars of chocolate. Linux and Mac OS X are safer than Windows, however PEBCAK is an issue with each working framework.
You could similarly well ask, “How might I make my home totally secure?” Some basic safety measures will shield you from easygoing burglary in a decent neighborhood, however not bars and spiked metal will stop a posse outfitted with explosives to pass your entryways over. In this way, the genuine issue is to choose how much security you need. This will rely upon what your identity is and where you live.
Who? In figuring, you need a more elevated level of security on the off chance that you are a conspicuous objective or you approach truly significant data. Evident targets incorporate famous people, activists, and insightful columnists. You may likewise have significant data in the event that you work in money, or at a significant exploration foundation, or for some administration offices, and so on.
Where? In figuring, you make your own neighborhood. On the off chance that you visit destinations that represent considerable authority in hacking, splitting, or privateer programming, at that point you’re at substantially more hazard than if you just visit standard locales for shopping and informal communication. Destinations that offer free music, programming, or sex entertainment are bound to be perilous than ones that offer paid-for reciprocals. Keep in mind, if it’s free, someone is likely making a buck some way or another, regardless of whether it’s simply by introducing adware.
In ensuring your home, the primary standard is: don’t leave entryways opened and windows open. In ensuring your PC, it’s: don’t leave security gaps open. Keep the working framework and all your product forward-thinking. By far most of Windows hacks depend on abusing openings that Microsoft shut months or even years prior. Indeed, some of the time there are “zero-day” misuses for which there is no fix, however these are worth very much of cash and fundamentally utilized on high-esteem targets.
To stay up with the latest, turn on auto-refreshes: Microsoft will introduce fixes on or not long after the second Tuesday of every month. Be that as it may, ongoing renditions of Windows, whenever fixed, are not, at this point the fundamental objective. As a need, you should likewise ensure your program (counting IE), all Adobe and Apple programs for Windows, and Oracle’s Java are cutting-edge. Uninstall Java on the off chance that you don’t generally require it. In fact, uninstall all that you needn’t bother with: it will decrease your assault surface.
A few projects can help. I utilize Secunia’s Personal Software Inspector, which checks for unpatched projects and helps update them. I additionally utilize SlimWare’s SlimCleaner, which checks and rates your product (it should all be Good), and records programs that need refreshing. It likewise packs in loads of other valuable apparatuses including a cleaner, a circle analyzer/defragger/wiper/shredder and copy document locater, and a Hijack log.
You should likewise run enemy of infection programming. Numerous individuals utilize the inherent Microsoft Security Essentials or Windows Defender. The individuals who need something heavier can introduce a free program, for example, Avast 2015 or AVG Free. On the off chance that you require more complete security, introduce a paid-for suite, for example, Kaspersky or Bitdefender Total Security 2015. See my previous answer, How would i be able to ensure my Windows PC against malware?, and check some ongoing tests before choosing.
Past enemy of infection, it merits running the intermittent check for covered up rootkits utilizing Kaspersky’s TDSSKiller.
The internet browser is your interface to the net, and in this manner well on the way to be assaulted. Most driving programs are sensibly protected, whenever kept refreshed, and Google Chrome likely could be the most secure. In spite of the fact that Chrome has the most elevated number of weaknesses, they get fixed rapidly, and it has a “sandbox” to help protect it from the remainder of your PC. Aggressors along these lines need two adventures: one for the Chrome program and one for the sandbox. On the off chance that you need greater security, you can run any program in its own sandbox, utilizing Sandboxie.
Doohickey’s Freeware additionally proposes utilizing DropMyRights to diminish the harm that malware can do while you are surfing.
Use Qualys BrowserCheck or a comparative site to watch that all your program modules are exceptional.
For high-hazard clients, maybe a definitive assurance is to sandbox all your figuring by utilizing a fleeting or virtual machine. The most straightforward approach to do this is to boot another working framework from a Live CD or USB thumb drive – normally Linux however it could be Windows – and afterward dump the entire thing a short time later. With Returnil SystemSafe, you can produce a clone of your present working condition and dispose of it when you’ve gotten done with it. A few people use “virtual PC” projects, for example, Oracle’s VirtualBox for a similar reason.
Any PC that is online will discover its ports being filtered from different PCs, some of which will be worms (infections), and some of which might be human assailants. It’s in this manner critical to have a firewall, and the one incorporated with Windows 7 and 8 is adequate for most clients. In the event that you need more insurance, there are a lot of options, and you may as of now have gotten one as a major aspect of a security suite. If not, read Gizmo’s manual for the Best Free Firewall Protection.
Your PC must have a few ports open to interface with the net, yet the entirety of your ports ought to be shut or “stealthed”. Run a firewall test at AuditMyPC or GRC (Shields UP) and so on. NirSoft’s small CurrPorts will reveal to you which ports your PC is at present utilizing, in the event that you need to check for dubious movement.
Being normally dubious, I run SysInternal’s Process Explorer and TCPView, and GlassWire, to watch what my PC is doing, yet this is a lot to expect of typical home PC use.
For extremely high-hazard clients, or corporate systems, a definitive security is to utilize a different PC or worker as a DMZ(demilitarized zone). In any case, your PC is most likely behind a NAT switch that systems address interpretation between the outer web and your inner system, and this secures against a great deal of inbound traffic. Obviously, it’s critical to ensure your switch is secured by a solid secret phrase, no default it might have dispatched with. Additionally, if it’s a remote switch, your Wi-Fi must be set up to utilize WPA2 (Wi-Fi Protected Access) encryption for security. The old WEP (Wired Equivalent Privacy) framework can be split in minutes.
To summarize: most common Windows clients ought to approve of Windows as transported, if every one of its barriers are turned on and all product is stayed up with the latest. In case you’re in danger, you can introduce programs that expansion the degree of security. From that point onward, the greatest hazard is social building, regardless of whether it’s simply getting you to click something you realize you shouldn’t.
Individuals who need a significant level of assurance may think that its value following a greater amount of the tips laid out above, however in case you’re being focused by GCHQ or America’s three-letter offices (or the Chinese or Russian counterparts), at that point you’ll have to make much more intense strides.