Hardware and software setup

How to protect your computer from unauthorized access by intelligence agencies and hackers. Methods and techniques for protecting a computer and personal data on the Internet from hacker attacks and physical hacking - Make a computer

Antivirus must be installed on every Windows PC. For a long time this was considered the golden rule, but today IT security experts argue about the effectiveness of security software. Critics argue that antiviruses do not always protect, and sometimes even vice versa - due to careless implementation, they can create security holes in the system. The developers of such solutions counter this opinion with impressive numbers of blocked attacks, and marketing departments continue to assure the comprehensive protection that their products provide.

The truth lies somewhere in the middle. Antiviruses do not work flawlessly, but all of them cannot be called useless. They warn of many threats, but they are not enough to protect Windows as much as possible. For you as a user, this means the following: you can either throw the antivirus in the trash, or blindly trust it. But one way or another, it is just one of the blocks (albeit a large one) in the security strategy. We will supply you with nine more such "bricks".

Security Threat: Antiviruses

> What critics say The current controversy virus scanners provoked by former Firefox developer Robert O'Callahan. He claims that antiviruses threaten the security of Windows and should be removed. The only exception is Microsoft's Windows Defender.

> What developers say Antivirus creators, including Kaspersky Lab, impressive figures are given as an argument. So, in 2016, software from this laboratory registered and prevented about 760 million Internet attacks on users' computers.

> What CHIP thinks Antiviruses should not be considered a relic or a panacea. They're just bricks in the security building. We recommend using compact antiviruses. But don't worry too much: Windows Defender is fine. You can even use simple third party scanners.

1 Choose the right antivirus

We, as before, are convinced that Windows is unthinkable without anti-virus protection. You only need to choose the right product. For Windows 10 users, it can even be the built-in Windows Defender. Despite the fact that during our tests it showed not the best degree of recognition, it is perfectly and, most importantly, without any problems for security, built into the system. In addition, Microsoft has improved its product in the Creators Update for Windows 10 and made it easier to manage.

Anti-virus packages from other developers often have a higher degree of recognition than Defender. We advocate a compact solution. The leader of our rating on this moment is Kaspersky internet security 2017. Those who can refuse such additional options as parental control and a password manager, should turn their attention to a more budget option from Kaspersky Lab.

2 Follow updates

If only one measure had to be chosen to keep Windows secure, we would definitely choose updates. In this case, of course, we are talking primarily about updates for Windows, but not only. Installed software, including Office, Firefox, and iTunes, should also be updated regularly. On Windows, getting system updates is relatively easy. Both in the "seven" and in the "ten" patches are installed automatically at the default settings.

In the case of programs, the situation is more difficult, since not all of them are as easy to update as Firefox and Chrome, which have a built-in automatic update function. SUMo utility ( Software Update Monitor) will support you in this task and let you know when updates are available. The sister program DUMo (Driver Update Monitor) will do the same job for drivers. Both free assistants, however, only inform you about new versions - you will have to download and install them yourself.

3 Set up firewall


The built-in firewall in Windows does a good job and reliably blocks all incoming requests. However, it is capable of more - its potential is not limited to the default configuration: all installed programs have the right to open ports in the firewall without asking. Free utility Windows Firewall Control puts more features in your hands.

Run it and in the "Profiles" menu, set the filter to "Medium Filtering". Thanks to this, the firewall will also control outgoing traffic according to a given set of rules. What measures will be included there, you set yourself. To do this, in the lower left corner of the program screen, click on the note icon. So you can view the rules and, with one click, grant permission to a particular program or block it.

4 Use special protection


Updates, antivirus and firewall - you have already taken care of this great trinity of security measures. It's time fine tuning. Problem additional programs under Windows often lies in the fact that they do not use all the security features offered by the system. An exploit tool such as EMET (Enhanced Mitigation Experience Toolkit) further enhances installed software. To do this, click on "Use Recommended Settings" and let the program run automatically.

5 Strengthen Encryption


You can significantly enhance the protection of personal data by encrypting it. Even if your information falls into the wrong hands, a hacker will not be able to remove good coding, at least not immediately. In professional versions Windows already there is a BitLocker utility configured through the Control Panel.

VeraCrypt will become an alternative for all users. This program with open source is the unofficial successor to TrueCrypt, which was discontinued a couple of years ago. If it is only about protecting personal information, you can create an encrypted container through the "Create Volume" item. Select the "Create an encrypted file container" option and follow the wizard's instructions. Access to a ready-made data safe is carried out through Windows Explorer, like a regular disk.

6 Protect user accounts


Many vulnerabilities remain unexploited by hackers only because the work on the computer is carried out under a standard account with limited rights. Thus, for everyday tasks, you should also set up such an account. In Windows 7, this is done through the Control Panel and the Add or Remove User Accounts item. In the "ten" click on "Settings" and "Accounts", and then select "Family and other people".

7 Activate VPN when away from home


At home on a wireless network, your level of security is high, since only you control who has access to the local network, as well as being responsible for encryption and access codes. Everything is different in the case of hotspots, for example,
in hotels. Here Wi-Fi is distributed among unauthorized users, and for security network access you are unable to make any impact. For protection, we recommend using a VPN (Virtual Private Network). If you just need to browse sites through a hotspot, the built-in VPN will suffice. latest version Opera browser. Install the browser and in "Settings" click on "Security". In the "VPN" section, check the box for "Enable VPN".

8 Cut off unused wireless connections


Even the details can decide the outcome of a situation. If you are not using connections such as Wi-Fi and Bluetooth, simply turn them off and thus close potential loopholes. In Windows 10, the easiest way to do this is through the Action Center. "Seven" offers for this purpose the "Network Connections" section on the Control Panel.

9 Manage passwords


Each password must be used only once and must contain special characters, numbers, uppercase and lowercase letters. And also be as long as possible - ten or more characters is best. The concept of password security has reached its limits today because users have too much to remember. Therefore, where possible, such protection should be replaced by other methods. Take Windows sign-in as an example: if you have a Windows Hello-enabled camera, use facial recognition to sign in. For other codes, we recommend that you turn to password managers such as KeePass, which should be protected with a strong master password.

10 Protect privacy in the browser

There are many ways to protect your privacy online. For Firefox, the Privacy Settings extension is ideal. Install it and set it to "Full Privacy". After that, the browser will not give out any information about your behavior on the Internet.

Lifebuoy: backup

> Backups are essential
themselves not only after contracting the virus. It also proved to be excellent in case of problems with the hardware. Our advice: make a copy of the entire Windows once, and then additionally and regularly backup all important data.

> Full archiving of Windows Windows 10 inherited from the "seven" module "Archive and restore". With it, you will create a backup copy of the system. You can also use special utilities, For example, true image or Macrium Reflect.

> True Image File Protection and the paid version of Macrium Reflect can make copies of certain files and folders. Free alternative for archiving important information will become Personal Backup.

PHOTO: manufacturing companies; NicoElNino/Fotolia.com


Steegle.com - Google Sites Tweet Button

Unauthorized access (UAS) of an attacker to a computer is dangerous not only by the possibility of reading and/or modifying processed electronic documents, but also by the possibility of introducing a controlled software bookmark by an attacker, which will allow him to take the following actions:

2. Intercept various key information used to protect electronic documents.

3. Use the captured computer as a springboard for capturing other computers on the local network.

4. Destroy the information stored on the computer or disable the computer by running malicious software.

Protecting computers from unauthorized access is one of the main problems of information security, therefore, various subsystems for protecting against unauthorized access are built into most operating systems and popular software packages. For example, performing user authentication when logging into operating systems of the Windows 8 family. However, there is no doubt that the built-in tools of operating systems are not enough to seriously protect against UA. Unfortunately, the implementation of the protection subsystems of most operating systems often causes criticism due to regularly discovered vulnerabilities that allow access to protected objects bypassing access control rules. The service packs and patches released by software vendors objectively lag behind the information about discovered vulnerabilities. Therefore, in addition to standard means protection is necessary to use special means restrictions or access restrictions.


These funds can be divided into two categories:

1. Means of limitation physical access.

2. Means of protection against unauthorized access over the network.

Means of restricting physical access

The most reliable solution to the problem of restricting physical access to a computer is to use hardware to protect information from unauthorized access that is performed before loading operating system. The means of protection in this category are called "electronic locks".
Theoretically, any software access control tool can be exposed to an attacker in order to distort the algorithm of such a tool and subsequently gain access to the system. It is almost impossible to do this with a hardware protection tool: the electronic lock performs all actions to control user access in its own trusted software environment which is not subject to external influences.
On the preparatory stage using an electronic lock, it is installed and configured. The setup includes the following steps, usually performed by the person in charge, the Security Administrator:

1. Creating a list of users who are allowed access to the protected computer. For each user, a key carrier(depending on the interfaces supported by a particular lock - a flash drive, an iButton electronic tablet or a smart card), which will be used to authenticate the user upon entry. The list of users is stored in the non-volatile memory of the lock.

2. Formation of a list of files, the integrity of which is controlled by the lock before loading the operating system of the computer. Subject to control important files operating system, for example:

§ Windows 8 system libraries;

§ executable modules of the applications used;

§ document templates Microsoft Word etc.

File integrity control is the calculation of their reference checksum, for example, hashing according to the GOST R 34.11-94 algorithm, storing the calculated values ​​in the non-volatile memory of the lock and then calculating the real file checksums and comparing them with the reference ones.
V normal mode operation of the electronic lock receives control from the BIOS of the protected computer after the latter is turned on. At this stage, all actions to control access to the computer are performed, namely:

1. The lock asks the user for a carrier with key information necessary for his authentication. If key information of the required format is not presented or if the user identified by the information provided is not included in the list of users of the protected computer, the lock blocks the computer from booting.

2. If the user authentication was successful, the lock calculates the checksums of the files contained in the list of controlled files and compares the received checksums with the reference ones. If the integrity of at least one file from the list is violated, the computer will be blocked from loading. To enable further work on this computer it is necessary that the problem be resolved by the Administrator, who must find out the reason for the change in the monitored file and, depending on the situation, take one of the following actions to allow further work with the protected computer:

§ restore the original file;

§ remove a file from the list of controlled files.

3. If all checks are passed successfully, the lock returns control to the computer to load the standard operating system.


Since the above steps are performed before the computer's operating system is loaded, the lock usually loads its own operating system (located in its non-volatile memory - usually MS-DOS or similar low-resource OS) in which user authentication and file integrity checks are performed. . This also makes sense from a security point of view - the lock's own operating system is not subject to any external influences, which does not allow an attacker to influence the control processes described above.
Information about user logins to the computer, as well as unauthorized access attempts, is stored in a log, which is located in the non-volatile memory of the lock. The log can be viewed by the Administrator.

When using electronic locks, there are a number of problems, in particular:

1. The BIOS of some modern computers can be configured in such a way that boot control is not transferred to the BIOS of the lock. To counteract such settings, the lock must be able to block the computer boot (for example, by closing the Reset contacts) if the lock has not received control within a certain period of time after turning on the power.

2. An attacker can simply pull the lock out of the computer. However, there are a number of countermeasures:

§ Various organizational and technical measures: sealing the computer case, ensuring that users do not have physical access to the computer system unit, etc.

§ There are electronic locks that can lock the case system block the computer from the inside with a special latch at the command of the administrator - in this case, the lock cannot be removed without significant damage to the computer.

§ Quite often, electronic locks are structurally combined with a hardware encoder. In this case, the recommended security measure is to use the lock in conjunction with transparent (automatic) encryption software for computer logical drives. In this case, the encryption keys can be derived from the keys that are used to authenticate users in electronic lock, or separate keys, but stored on the same medium as the user's keys to enter the computer. Such a comprehensive protection tool will not require the user to perform any additional actions, but will not allow an attacker to gain access to information even when the electronic lock equipment is removed.

Means of protection against unauthorized access over the network

The most effective methods of protection against unauthorized access by computer networks are virtual private networks (VPN - Virtual Private Network) and firewalling. Let's consider them in detail.

Virtual Private Networks

Virtual private networks provide automatic protection of the integrity and confidentiality of messages transmitted over various public networks, primarily the Internet. In fact, a VPN is a collection of networks on the outer perimeter of which VPN agents are installed. A VPN agent is a program (or software and hardware system) that actually provides protection transmitted information by following the steps below.
Before sending any IP packet to the network, the VPN agent does the following:

1. Information about its destination is extracted from the header of an IP packet. According to this information, based on the security policy of this VPN agent, protection algorithms are selected (if the VPN agent supports several algorithms) and cryptographic keys, with which this package will be protected. In the event that the security policy of the VPN agent does not provide for sending an IP packet to a given addressee or an IP packet with these characteristics, sending an IP packet is blocked.

2. Using the selected integrity protection algorithm, an electronic digital signature(EDS), imitation prefix or similar checksum.

3. Using the selected encryption algorithm, the IP packet is encrypted.

4. Using the established packet encapsulation algorithm, the encrypted IP packet is placed in an IP packet ready for transmission, the header of which, instead of the original information about the destination and the sender, contains information about the destination VPN agent and the sender VPN agent, respectively. Those. network address translation is in progress.

5. The packet is sent to the destination VPN agent. If necessary, it is split and the resulting packets are sent one by one.

When receiving an IP packet, the VPN agent does the following:

1. Information about its sender is extracted from the header of an IP packet. If the sender is not allowed (according to the security policy) or unknown (for example, when receiving a packet with a deliberately or accidentally damaged header), the packet is not processed and discarded.

2. According to the security policy, algorithms for protecting this package and keys are selected, with the help of which the package will be decrypted and its integrity checked.

3. The informational (encapsulated) part of the packet is extracted and decrypted.

4. The integrity of the package is checked based on the selected algorithm. If an integrity violation is detected, the packet is discarded.

5. The packet is sent to the destination (over the internal network) according to the information in its original header.

The VPN agent can be located directly on the protected computer. In this case, with its help, only the information exchange of the computer on which it is installed is protected, however, the principles of its operation described above remain unchanged.


The basic rule for building a VPN is that communication between a secure LAN and an open network should be carried out only through VPN agents. There should absolutely be no communication methods that bypass the protective barrier in the form of a VPN agent. Those. a protected perimeter must be defined, communication with which can only be carried out through an appropriate means of protection.
A security policy is a set of rules according to which secure communication channels are established between VPN subscribers. Such channels are usually called tunnels, an analogy with which can be seen in the following:

1. All information transmitted within one tunnel is protected from both unauthorized viewing and modification.

2. Encapsulation of IP packets makes it possible to hide the topology of the internal LAN: from the Internet, the exchange of information between two protected LANs is visible as an exchange of information only between their VPN agents, since in this case all internal IP addresses do not appear in IP packets transmitted over the Internet . .

The rules for creating tunnels are formed depending on the various characteristics of IP packets, for example, when building most VPNs, the IPSec (Security Architecture for IP) protocol sets the following set of input data, according to which tunneling parameters are selected and a decision is made when filtering a specific IP packet:

1. Source IP address. This can be not only a single IP address, but also a subnet address or a range of addresses.

2. Destination IP address. It can also be a range of addresses, specified explicitly using a subnet mask or wildcard.

3. User ID (sender or recipient).

4. Transport Layer Protocol (TCP/UDP).

5. Port number from which or to which the packet was sent.

Firewall
A firewall is a software or software and hardware tool that protects local networks and individual computers from unauthorized access from external networks by filtering a two-way message flow during information exchange. In fact, the firewall is a "cut down" VPN agent that does not encrypt packets and control their integrity, but in some cases has a number of additional features, the most common of which are:
antivirus scanning;
packet correctness control;
control of the correctness of connections (for example, the establishment, use and termination of TCP sessions);
content control.

Firewalls that do not have the functions described above and perform only packet filtering are called packet filters.
By analogy with VPN agents, there are also personal firewalls that protect only the computer on which they are installed.
Firewalls are also located on the perimeter of protected networks and filter network traffic according to the configured security policy.

Comprehensive protection

An electronic lock can be developed on the basis of a hardware encoder. In this case, one device is obtained that performs the functions of encryption, generation random numbers and protection against unauthorized access. Such an encoder is capable of being the center of security for the entire computer; on its basis, you can build a fully functional system. cryptographic protection data, providing, for example, the following features:

1. Protecting your computer from physical access.

2. Protecting your computer from unauthorized access over the network and organizing a VPN.

3. File encryption on demand.

4. Automatic encryption of computer logical drives.

5. Calculation/verification of EDS.

6. Protect messages Email.

How to increase the security level of your PC?

Very often a person is faced with the fact that he cannot find a good complex, preferably free, and scammers for his personal computer. Usually, similar programs there are a huge number on the Internet, but this does not mean that they are reliable “guardians” of PC security. If you have important data stored on your computer, or you just don't want it to be affected by viruses, spyware or "Trojans", you must follow several measures to protect it. To help each user secure their computer, this article provides some tips to keep your computer and your files safe.


Let's see how it's possible

Protect personal computer

Information encryption

On a personal computer, as everyone knows, the main component of the system is where most of the information is contained. The loss of such media can be considered the most common way of data loss. You can avoid the risk with disk encryption. A person will not be able to access the information unless they enter the correct code. The solution to the problem can also be the purchase of media with built-in encryption, up to scanning the owner's fingerprints.

Software update

One of the most easy way to protect PC information is to update in a timely manner software. The conversation is not only about the operating system as a whole and, but also about other software. Developers of this or that software always release new versions. This must be done in order not only to improve protection, but also to correct some shortcomings in the previous program. Since due to such "holes" most often there is a "leakage" of information and open access for other users.
Most protection programs are equipped with an automatic update function. Agree, it’s much better when a message appears in front of you and the “update” button than the user himself spends time tracking and searching for updates.

Timely update

This is a very important point that should be observed if you wish. Since new viruses appear quite quickly and often, the developers of anti-virus programs strive to add the signatures of these new "infections" to update files as soon as possible. An anti-virus program that is rarely updated may miss a new virus that it does not know, even if it uses a heuristic analysis method. Therefore, it is important to update yours as often as possible, and even better, turn on the automatic update function so that it is always ready for any virus attack.

WiFi protection

If you are using Wi-Fi network to access the Internet, you need to protect your home network password. This action is necessary so that unauthorized users cannot bring a "harmful" infection into your . In addition, in the absence of a protective password, anyone gets access to the personal data of your computer.

Purchases

When shopping online, you must be using your bank card. However, in modern world developed information technologies this is not safe, as scammers can easily “hack” your computer in order to take advantage of your card details and use it for their own purposes. When shopping, the most safe option the use of a virtual card is considered.

HTTPS protocol

Taking advantage world wide web, use the HTTPS protocol, which creates some protection between your personal computer and the site. A striking example of this is the fact that many sites that have high security requirements often automatically use this protocol.

Checking hyperlinks

Even the most secure sites are attacked by hackers and spammers. They usually pose a threat to your computer by placing malicious links on pages. Therefore, any site, even the most secure in your opinion, can be hacked. If you have some concerns about this, it's best to play it safe and check the link you're about to click on.

Safety

The easiest way to lose access to information is to lose access directly to the computer. If you leave your PC unattended, you run the risk of never seeing it again. This method of information loss is the most “hurtful”, since access to files cannot be restored. In any case, if you often use your computer in public places where it is possible for unauthorized persons to access it, then secure it with a password.

Strong passwords

The security of your data directly depends on the complexity of the password. Therefore, if you are thinking about which combination of letters to use, consider some details:

  • it is not recommended to use standard words, names, nicknames, because burglars very often act by simple selection;
  • do not use memorable dates, for example, a birthday, because now a lot of information can be gleaned from social networks(Vkontakte, Odnoklassniki, My world);
  • also, you should not replace letters with similar characters, since this method is familiar to "pests";
  • in addition to using letters, use a combination of numbers, symbols, signs, and also change the case of letters. Moreover, than more quantity characters and characters in your password, the stronger it will be. For example password 5y;G!gF9#$H-4^8%Is will be quite complex and, of course, very reliable.

Public networks

Try, if possible, to refrain from important work when using public access networks in, as anyone will have access to your computer, and therefore to your data.

In today's world, where it is difficult to do without the Internet, which has become a part of everyday life for most people, and home and office computers store a huge part of the user's confidential information, we become the targets of attacks by intruders. Computer protection, as a necessary minimum of installed security software and user behavior rules, is a means of countering illegal actions from outside.

If you do not take any steps to protect your device and confidential data, consider that by this action or inaction you voluntarily open all possible loopholes for malware and hackers who can not only steal this data, but also damage your computer. The latter may consist not only in the infection of the operating system itself with viruses, but also in the incapacitation of expensive PC components.

Although viruses and malware There are different types, one thing is for sure, you won't want them inside your operating system. To counter this, Windows users 10 there are many tools to fight all kinds of malware.

As many people know, most of these security tools are already built into the OS by default. Additionally, you need to know that protecting your computer and your personal files is not only about installing security applications, but also in combination with knowing how to avoid potential threats.

COMPUTER PROTECTION

Let's take a closer look at the issue of securing a computer, laptop or tablet, as well as protecting the user's confidential data. Our tips will help you minimize the possibility of infiltrating your PC with almost all types of malware, including viruses, ransomware, spyware, adware, and more.

UPDATE WINDOWS 10

Operating room update Windows systems 10 and related software is the most important step you need to take to keep your device and data safe. Microsoft periodically releases packages to fix potential vulnerabilities that could be exploited by hackers.

With default settings, updates are downloaded and installed automatically, under certain conditions and within a certain period of time. Even in this case, it will not be superfluous to make sure that all the necessary patches are installed on your system. To do this, in the "Parameters" of the OS in the "Update and security" section, you must click on the "Check for updates" button.

In addition, it is important to periodically check and install updates for any software you have installed. Apps downloaded from the Windows Store will be updated automatically as soon as available. a new version. And about classic desktop programs, in most cases, you need to take care of the user himself. Always check the official software website to download and update them.

Next, decide on the relevance of the OS itself. Even if a computer is running one version, it does not necessarily mean that it is running the latest one. The new operating system was introduced in 2015, and since then the corporation has released several big updates. Added new features, improved performance and significantly improved security.

To find out which version is currently running on your PC, use the Win + R key combination on your keyboard and “winver” in the input field that appears. Version 1709 is the latest version at the time of this writing.

WINDOWS DEFENDER

Use an antivirus, which is a required component on every computer. Help detect and remove malware before it can compromise your files, affect performance, or crash your device.

Windows Defender, included in the System Security Center by default, offers excellent real-time computer protection. If you want even more protection, you can level it up. This built-in solution should be more than enough for most users. However, there are many third-party security solutions that you can use. Some of them are free and some are not. You can also add a popular solution called "Malwarebytes" as a second layer of protection.

ACCESS TO CONTROLLED FOLDERS

Ransomware is another type of malware that can lock your device by encrypting all your files and require you to pay a certain amount to unlock it. Starting with the Fall Creators Update, Windows 10 includes a feature known as Controlled Folder Access. It not only prevents capture, but also blocks unwanted changes to your files.

FIREWALL

Firewall - blocks access to your computer from the Internet and local network. You'll find plenty of third-party tools that provide network security protection, but the new version 10 of the OS already includes a very effective firewall.

To make sure it works correctly, find it there in the "Security Center" and make sure that each network connection is labeled "Firewall Enabled". Enable it otherwise.

PROVEN PROGRAMS

By all means, avoid downloading and installing applications from unknown sources, always try to download software from official websites. A great solution is to install apps from the Microsoft Store that are already verified by Microsoft. To increase your security level, enable the non-store installation prevention feature using the SmartScreen filter settings.

BACKUP

One of better ways to secure your files is regular backups. You should always think about making at least 2 backups. One can be saved removable drive, and the other in the cloud storage.

If you're using Windows 10, you don't need to get third party program for backup, as you can use the built-in tool. Alternatively, if you don't have a lot of files, you can copy your documents to a USB stick regularly.

Online backup is probably one of the best ways. The best option is to create account in OneDrive or . In their functionality, you can use the version history of files.

NETWORK SECURITY

The best tool to protect your computer and data is yourself. As a rule, a computer can be infected with viruses and data is compromised as a result of the user clicking on an unverified link in an email or a website pop-up window, or installing an application (game) from an untrusted source.

Use only modern web browsers such as Google Chrome, Microsoft Edge and Mozilla Firefox. They are always up to date, have great built-in security, alert you to a potential problem, and filter out unsafe websites. If you get a warning, don't try to find a way around it, there's probably a good reason for it.

If any type of malware does infiltrate the operating system, the first thing to do is disconnect the computer from the network by unplugging the Ethernet cable or turning off the router. Then open Antivirus and do a full scan hard drive. Remove detected malware.

There are also many other ways in which you can return the OS to a working state. But, before that, it is necessary to establish the cause of the failure or infection, and only then eliminate the consequences. In the absence of the necessary technical knowledge and experience, entrust this matter to a specialist.

Our others computer tips, as a list, placed in . We recommend that you familiarize yourself with them.

Unlike protection and technical support corporate networks, protection and technical support computers owned by home users and small businesses, it seems a simple task, but only at first glance. The problem is that next to the home user (as well as next to the user of the only computer of a small company) there is usually neither a system administrator nor a specialist in information security- their functions are forced to be performed by the user himself, not generally being either one or the other, and it is good if he is at least aware of the need to protect and maintain his computer.
Naturally, such a situation implies certain requirements for products and services designed to protect and maintain personal computers. Such products should have a simple interface that does not overload the user with unnecessary details and questions, the answers to which he does not know, convenient (preferably automatic) means of updating themselves, combine many different functions (for example, not just an antivirus, but an antivirus plus antispyware plus anti-phishing and anti-spam tools…), remind the user that it is time to take certain actions (for example, perform a virus scan of disks), perform some procedures without the user noticing (for example, perform online anti-virus scanning of incoming e-mail messages, documents opened and installed applications).

More recently, Symantec, McAfee, and Trend Micro have led the end-user security market. However, despite the rather convenient interfaces of the listed companies' personal protective equipment, according to Microsoft, about 70% of users either do not use antivirus programs in general, or update anti-virus databases very rarely. According to Microsoft representatives, it is for such users that the new service, which will be discussed in this article, will be intended. According to Bill Gates at the RSA Conference 2006 in February, this service is being developed primarily to improve computer security in general, and not to solve individual problems in this area.

The corporation's plans to release a personal anti-virus product and organize a corresponding service have been discussed since its purchase of the Romanian anti-virus company GeCAD in June 2003. This year they are planned to be implemented: Microsoft intends to enter the personal protective equipment market this summer with its paid personal computer maintenance service OneCare Live, available by subscription.

According to employees of the corporation, the OneCare Live service will be put into operation in June. The subscription will cost about $50 per year (with a discount of up to $20 for the first year for beta testers), and up to three PCs will be serviced for this fee. OneCare Live is currently available for beta testing to owners of the English version of Windows XP with SP2 installed - running this version of Windows, the Windows OneCare application, updated with OneCare Live, performs actions on the user's computer to protect and improve performance. A beta version of Windows OneCare is available at http://www.windowsonecare.com.

Below we will look at the main features of this product. We emphasize that this article is about a beta version, so by the time the final launch of the OneCare Live service, the functionality Windows applications OneCare and OneCare Live services are subject to change.

Key Features

Like most personal Microsoft products, Windows OneCare is marketed as an easy-to-use yet feature-packed product for those Windows XP SP2 users who don't have time to set up security and take care of their computer on a daily basis. This product integrates with Windows Security Center in Windows XP and allows you to antivirus protection, defragmentation of the hard disk, backup and restore data using CD or DVD media, and personal firewall management. OneCare users can also use the Windows Defender anti-spyware app.

Custom Windows interface OneCare is extremely simple: system area the taskbar is an icon, the color of which (green, yellow or red) shows how urgently you need to take some measures to improve the security of your computer (Fig. 1).

Clicking on the icon brings up the main window of the application, allowing the user to determine what actions need to be taken and, if desired, initiate their execution (Fig. 2).

Rice. 2. The main window of the Windows OneCare application

If necessary, you can perform several actions in turn: anti-virus scanning, removal junk files, defragmentation.

Antivirus

Antivirus is one of the most important components of Windows OneCare, which allows you to scan memory and disks and constantly monitor your system with antiviruses.

The anti-virus scanner is launched by clicking the Scan for Viruses link in the main application window, after which you need to select the drive or folder that you want to scan. The anti-virus scan process is carried out automatically, and infected objects found are automatically quarantined (Fig. 3).

The antivirus settings allow you to enable or disable constant antivirus monitoring of the system, configure the list of antivirus exclusions, and manage the contents of the quarantine (Fig. 4).

Note that at the moment, independent tests of the effectiveness of this antivirus and the speed of response of the OneCare service itself to new threats are not available, so it is not yet possible to compare it with competing products. For this comparison to work properly, at a minimum, wait for the final product release and the launch of OneCare Live in commercial mode.

Data backup and recovery tools

backup and restore tools, which can be launched by clicking on the link Back up files, browse HDD computer for new or changed files since the last backup and offers to burn these files to an external hard drive, CD or DVD. Before performing a backup, the user can select the types of files he is interested in and view the resulting list (Fig. 5).

Rice. 5. Select files for backup

Before starting a backup, the user is informed about how many disks he will need to create a backup and how long it will take.

To restore files from a backup, select the Restore Files link. OneCare allows you to recover all your lost files, determine which ones you need to recover, and also find the files you need inside the backup.

Performance Tools

optimization tools Windows performance OneCare provides the ability to sequentially perform five operations: deleting unnecessary files, defragmenting the hard drive, anti-virus scanning; checking for files that need to be backup, checking for all necessary operating system updates (Fig. 6).

At the end of the optimization, you can get a report on its results (Fig. 7).

Configuring optimization tools allows you to set a schedule according to which the listed actions are performed and indicate whether unnecessary files should be deleted during their execution.

***

So, this year, users will receive from Microsoft a product that can simplify the care of computers and protect them with relatively little effort, as well as a service that maintains anti-virus databases and this product itself in proper condition. It's hard to predict now how much this product will out-compete competing solutions from Symantec, McAfee and Trend Micro, especially given that Symantec plans to launch a similar service this fall (this project is codenamed Genesis). For now, we only note that often a platform manufacturer that has just entered the market for tools or other applications for this platform is in a much more advantageous position than companies that have already settled in this market, but do not produce the platforms themselves, and the development of the market for development tools for Windows and .NET in the last five years is a clear proof of this. True, unlike the market for development tools, the market for personal protective equipment is still far from saturation.

At the end of February, in a report by Bill Gates at the RSA Conference, the company's immediate and long-term plans to create a more secure environment for using digital technologies were revealed. Thus, in order to support the Identity Metasystem ideology, which allows private users and websites to exchange personal identification information more securely and securely over the Internet, Microsoft plans to introduce a number of new technologies, including InfoCard technology, which simplifies this process and at the same time improves the security of access to resources and personal data on the Internet. Microsoft also has plans to further reduce user costs associated with identity and access control. Starting with the next server version of Windows, Microsoft will expand the Active Directory role to include Rights Management Services, Certificate Services, Metadirectory Services, and Federation Services, which will enable the creation of a unified identity and access control infrastructure. Gates also unveiled the first beta version of Microsoft Certificate Lifecycle Manager, a policy enforcement solution that accelerates planning, configuration, and management digital certificates and smart cards, and enhances security with multi-factor authentication technology.

A few words about products for corporate users

Note that Microsoft's soon-to-be-anticipated entry into the security market is by no means limited to products and services for home users.

In addition to OneCare, Microsoft plans to release a similar Microsoft Client Protection product for corporate workstations and laptops. Client Protection will allow system administrator perform anti-virus protection of workstations. The corporation plans to release a beta version for the general public in the third quarter of 2006. The launch of Microsoft Client Protection in production is scheduled for the end of this year.

In addition to client-side protection, anti-virus and anti-spam software is expected to be released for email servers running Microsoft Exchange and SMTP servers - for this purpose, Microsoft Corporation recently acquired one of its partners, Sybari Software, which specialized in such tools. Named Antigen for Exchange, Antigen for SMTP Gateways, Antigen Spam Manager and Antigen Enterprise Manager, these products protect against viruses, worms, spam and inappropriate content using split multi-engine scanning and will be available for the next 6 months. In addition, a beta version of Internet Security & Acceleration Server (ISA Server) 2006 is now available, which combines a firewall, virtual private networking (VPN), and Web caching.

Microsoft also announced the acquisition of FutureSoft, Inc. DynaComm i:filter Web filtering technology, which allows companies to manage Internet access in their environment.

We will talk about the products and technologies listed above as they become available.

Liked the article? Share with friends!
Was this article helpful?
Yes
Not
Thanks for your feedback!
Something went wrong and your vote was not counted.
Thank you. Your message has been sent
Did you find an error in the text?
Select it, click Ctrl+Enter and we'll fix it!