This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
BIOS strong passwords, and strong login passwords, and full disk encryption for physical attacks, | |
close unused ports and services for things you don't need (not so much a problem for desktops, but still) and keep everything up to date | |
if you are not using a piece of software (java, adobe flash and other common attack client side vectors) uninstall, and keep your attack surface low as possible | |
To avoid social engineering don't click attachments on emails or links. Senders can easily be spoofed with tools like SET, If you don't know and need to click, create a vm with snapshots to be safe. | |
if your browsing shady sites use a vm, for worst case scenario and always keep external backups in a safe location. |
NewerOlder