Making Windows XP secure..

Page 2 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

spikespiegal

Golden Member
Oct 10, 2005
1,219
9
76
I've been involved with handling desktop security for a number of corporations, and by far my biggest problem is educating users that most of the products and habits they use are worthless.

By far and away the most effective way to secure a Windows box is to avoid using an admin level account whenever possible. This rule supercedes any idiot belief in software firewalls and spyware/virus scanners, which accomplish little other than make software companies lots of money. Yet, I've aleady several posts in this thread equating Malware/Spyware with firewalls when neither have anything to do with each other. As long as this is the case, and we have 'tards who refuse to update Windows with security updates for fear it might break their stupid 3rd party software firewall, or think a software firewall is also a content filter, then malware writers will always have a job.

Contrary to urban myth, a fully patched Windows box sitting on the internet without a firewall is not in danger of being hacked. Hackers go after open port 25 relays, unpatched SQL services, things they can make money with, etc. If you aren't running these type of backend services on your machine, then the need for software firewalls becomes greatly diminished. Anybody who declares the value of software firewalls as being usefull because they can sometimes detect problems via outbound activity needs to be slapped, and denied a job from ever working in the IT industry. If you are that mentally incompetent as being unable to prevent this garbage from getting on your machine in the first place then you shouldn't be allowed the admin password on any computer.

If 75% of Windows desktop users were to use a non admin account 75% of the time, McAfee, Symantec, and pretty much every malicious code writer on the internet would go out of business in a month.

As for note, running Internet Explorer inside of a non-admin account pretty much renders it's security problems inert.

 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
From the website it sounds like you can use BitLocker for normal use just fine without TPM. You insert the USB key before turning the computer on and it should be pretty seamless. I've never used Bit Locker so I don't really know for sure, but that's what it sounds like to me from the page you linked.
That's correct. You can use Bitlocker on non-TPM 1.2 machines using a USB key. You can also use a USB key to store the recovery information in a TPM scenario.

Also, you can opt to use a startup PIN with the TPM, which is what I use.
 

flawlssdistortn

Senior member
Sep 21, 2004
680
0
0
Originally posted by: spikespiegal
I've been involved with handling desktop security for a number of corporations, and by far my biggest problem is educating users that most of the products and habits they use are worthless.

By far and away the most effective way to secure a Windows box is to avoid using an admin level account whenever possible. This rule supercedes any idiot belief in software firewalls and spyware/virus scanners, which accomplish little other than make software companies lots of money. Yet, I've aleady several posts in this thread equating Malware/Spyware with firewalls when neither have anything to do with each other. As long as this is the case, and we have 'tards who refuse to update Windows with security updates for fear it might break their stupid 3rd party software firewall, or think a software firewall is also a content filter, then malware writers will always have a job.

Contrary to urban myth, a fully patched Windows box sitting on the internet without a firewall is not in danger of being hacked. Hackers go after open port 25 relays, unpatched SQL services, things they can make money with, etc. If you aren't running these type of backend services on your machine, then the need for software firewalls becomes greatly diminished. Anybody who declares the value of software firewalls as being usefull because they can sometimes detect problems via outbound activity needs to be slapped, and denied a job from ever working in the IT industry. If you are that mentally incompetent as being unable to prevent this garbage from getting on your machine in the first place then you shouldn't be allowed the admin password on any computer.

If 75% of Windows desktop users were to use a non admin account 75% of the time, McAfee, Symantec, and pretty much every malicious code writer on the internet would go out of business in a month.

As for note, running Internet Explorer inside of a non-admin account pretty much renders it's security problems inert.

It's really as simple as this! Sticky?
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
Contrary to urban myth, a fully patched Windows box sitting on the internet without a firewall is not in danger of being hacked. Hackers go after open port 25 relays, unpatched SQL services, things they can make money with, etc.

For now, there's no telling what will be discovered to be vulnerable in a day or a week so you still need to limit your exposure as much as possible.

If 75% of Windows desktop users were to use a non admin account 75% of the time, McAfee, Symantec, and pretty much every malicious code writer on the internet would go out of business in a month.

So you're predicting their demise in ~5 years when Vista replaces the majority of XP machines? =)

As for note, running Internet Explorer inside of a non-admin account pretty much renders it's security problems inert.

From a "take over the box and install a rootkit" standpoint, yes, but not from a "delete all of my files" standpoint. Something like the old ILoveYou would still be just as effective (minus the propogation since it's more difficult to get to the addressbook now) today if it had a delivery system.

That's correct. You can use Bitlocker on non-TPM 1.2 machines using a USB key. You can also use a USB key to store the recovery information in a TPM scenario.

Also, you can opt to use a startup PIN with the TPM, which is what I use.

So there's no way to just use a plain passphrase and no TPM?
 

stash

Diamond Member
Jun 22, 2000
5,468
0
0
So there's no way to just use a plain passphrase and no TPM?
The only startup methods are TPM, TPM+PIN, TPM+USB key, or USB key only. Passphrase would imply that the key information is stored on the local drive, which is less than ideal. You can actually do this with Bitlocker. You can turn off Bitlocker, but keep the drive encrypted. So none of the startup methods above would be required, because the key is stored (in the clear) on the drive.