Darius’ Guide to Windows 2k/XP Desktop Security

As I have browsed this site and others like it, I have often seen comments like “The only way to secure a Windows box is to not connect it to the Internet!” and “How can you stand to use Windows when you have to run tons of apps such as spyware removers and spend hours trying to keep it secure?” Some people have even gone as far as to say that it is literally impossible to secure Windows. Well, I’m here to tell you that not only is it possible, it’s actually quite trivial! It requires very little effort and you can do it without running a buttload of security apps and without spending a dime.

In fact, 90% of the work involved using my method occurs when you first install Windows. After that, it takes very little effort on your part. In this guide, I’m going to show you how to go about securing Windows on the desktop – the easy way 🙂 From now on, if somebody tries to tell you that you can’t secure Windows, you can point them to this article.


However, before we get started, here are a few things to keep in mind:

  • This guide is for Windows 2000 and XP on the desktop. It is not for Win9x, and it is not for severs either. Also, it is intended for people with broadband connections, because they are the ones who are most at risk.
  • I don’t claim to be any sort of expert on security. Over the years, I have learned what I needed to learn in order to stay safe. Therefore, this is a ‘minimalist’ method of security, which includes only what you really need to know. Before you say “This can’t possibly work!” or accuse me of not including this or that, just remember this … the proof is in the pudding. Before you write this off as being crap, just try it for a month or so and judge for yourself. I have been using this knowledge for years and have never had any security issues following these rules, and neither has anyone else I know who has followed them.
  • That being said, though I can say with a great amount of certainty that this will work for you, nothing is guaranteed, because I don’t know of anything that is ‘fool-proof.’
  • Just so you don’t think I’m totally biased, I will say that Windows is horribly insecure out of the box. If this bothers you, I would recommend checking out some Windows alternatives, including the snazzy new Mac Mini’s.
    Personally, I don’t care what you use. But if you want or need to use Windows, this information is for you.
  • One of these days, there may be some kind of ‘super worm’ released that can blast right through firewalls and such, but until then, even with unpatched vulnerabilities out there, you should still be safe following this guide.
  • Before posting any comments, read the FAQ at the end of the article – I wrote it especially for you 🙂

Prerequisites
So how much about Windows (and computers in general) do you actually need to know in order to follow these rules? Not much, really. If you’re reading this, I’m assuming your Windows box is probably already infected. Therefore, it’s probably a good idea to reinstall Windows when following this guide (as some things are better off done as soon as you install Windows anyway), so I’m assuming you’re going to (and know how to) do that. Other than that, the only other two requirements I can think of is that you know how to download/install programs and burn CDs.
If you want to use this guide to set up a computer for someone else to use, the other person doesn’t need to know much at all, as I have taught grandmas how to do this. However, just be sure you follow rule #1 below!

The 10 Rules


  1. Don’t let anyone near your Windows box who doesn’t understand and follow these rules: If you are reading this article hoping to find out how to secure a Windows machine for your computer-illiterate friend, relative, or employees, you’ve come to the wrong place. In fact, I would say that it is extremely difficult (if not impossible) to lock down Windows for somebody who knows nothing about security. If you know how to do this, you need to write your own article 🙂

    I’ve seen a Windows box locked down almost to the point of being bullet-proof, only to be infected after 15 minutes of use by someone clueless about security. If you know a person like this who isn’t willing to be taught, then set up Linux for them or by them a Mac. Windows is an OS for power users, not the computer illiterate.

  2. Take the proper precautions before going online: In this case, you have a few option. Any or all of the following should be sufficient:

    1. Set up a hardware router/firewall: This isn’t nearly as difficult as it sounds. In fact, you can walk into just about any computer electronics store and pick one of these up for about $30. They’re easy to set up and work great with pretty much any operating system. This doesn’t necessarily do everything a software firewall does, but it should be enough to protect yourself against any/all worms that propagate by scanning the Internet and looking for unprotected Windows machines. Even if you don’t do anything else in this guide, you are still miles ahead of other people who just connect their machines straight into a cable/DSL modem.

    2. Install a software firewall before going online: You should burn one of these to CD and have it ready before you reinstall Windows the next time.

    3. For XP users – install Service Pack 2 before going online: This is always recommended, even for non-XP users. However, XP Service Pack 2 is probably the only service pack secure enough to let you go online without some kind of firewall long enough to get all the critical updates. Note that you can download a program called AutoStreamer that allows you to easily slipstream a service pack into your Windows installation. (Slipstreaming a service pack is the process of integrating the service pack into your Windows installation so that it is automatically installed as part of the Windows installation process.)

  3. The first thing to do when you get online is go to Windows Update and download all the Critical Updates that are listed: After that, do this about once or twice a month. Or, you can turn on Automatic Update, but I don’t recommend doing so unless you’re using Windows XP with Service Pack 2 installed. (It just works better in SP2). If you happen to miss a critical update by a week or more, just following the other rules in this guide should protect you against pretty much anything by default.

  4. Avoid using Internet Explorer unless absolutely necessary: This is probably the most important thing to remember. There are all kinds of programs out there that are meant to patch up and secure IE, but you should seriously consider ditching IE and using something like Firefox or Opera instead.
    I realize there are a handful of sites that require you to use IE, such as Windows Update. However, outside of Windows Update, it’s very important to be cautious even when you have to use IE. For example, if you’re at a web site called “Joe’s Warez Shack” and he wants you to install some ActiveX control before downloading a crack, use some common sense! I would go as far as to say only accept ActiveX controls from companies that you know and trust.
    There are a few other things to keep in mind here as well. When I say don’t use IE, that includes email programs (such as Outlook and Outlook Express) that use the IE rendering engine. I would recommend Thunderbird as an alternative, but if you must use either of these two programs, be sure and download the latest security updates for both of them. Also, Outlook Express (the latest version with service pack) allows you to view all email in plain text – turn that option on. I don’t know if Outlook has this option or not, but go into Options and turn off as much HTML stuff (especially scripting) as you can. Also, a note a about programs that use the IE rendering engine for HTML interfaces – these should be safe to use, except for those programs that actually allow you to browse the web such as the IE ‘shell’ browsers and Winamp with it’s ‘mini browser.’ Note that although some of the shell browsers may have some built-in security measures, if you decide to use them, you do so at your own risk! Maybe they are secure, and maybe they aren’t. But I’d rather not find out 🙂 As for Winamp and other programs like it, feel free to use them … just don’t browse the web with them!

  5. Download and install a software firewall: You don’t actually have to pay any money for one of these – there are free ones available such as Sygate (the one I use), ZoneAlarm, Kerio, and others as well.
    Oh, and there’s one other thing about software firewalls. While this next thing is optional, it’s definitely recommended – when you’re not using the computer, turn on your firewalls ‘lock’ option, which stops all incoming/outgoing traffic to/from your computer until you’re ready to use it again. This can usually be done by right-clicking on the firewall’s icon in the task tray. If it turns out that the firewall is blocking some programs (such as anti-virus updates) that need to access the Internet while you’re away, some firewalls (such as ZoneAlarm) have an option to let certain programs access the Internet, even when the firewall is locked.
    About hardware routers/firewalls: As previously discussed, these are available for cheap. I would recommend getting one of these, even with a software firewall installed (although it is not absolutely necessary, so long as you’re protected in other ways before going online). If you have an older/spare PC lying around, you can also use that as a firewall, although if this kind of thing interests you, you probably already knew that 🙂

  6. Download and install an anti-virus program: Again, you don’t have to spend any money on one of these if you don’t want to. Free anti-virus programs exist such as AVG (the one I use), Avast, Nod32, and others. Once you’ve got one of these installed, turn on automatic updates and set it to scan for viruses in the middle of the night, so you don’t have to do anything else with it. Just be sure and check it every once in awhile to make sure that it is downloading updates properly.
    Now, I’m about to say something very controversial. As long as you follow all the other rules in this guide, you do not have to run a virus scanner resident (in the background) if you don’t want to. I know people who don’t and have been virus free for years. However, if you choose not to run one resident, you must be extremely vigilant about not using IE and scanning each and every file that is introduced to your system. Please be warned that doing this is like riding a motorcycle without a helmet – I seriously don’t recommend it, even for experienced users, because it’s just too easy to be careless or forget. But it is an option.
    A couple of other things to note about anti-virus programs – since most Linux users run a software firewall of some sort, this is really the only security-related program you’ll have to run that Linux users don’t! Also, if you’ve only been running VirusScan or Norton Anti-virus, try something else – you may be surprised to find that you can run an anti-virus program without much of a performance hit at all. Nod32 users know exactly what I’m talking about 🙂

  7. Avoid running any email attachments before scanning them: This also includes anything in compressed files, such as .zip. Also, be especially weary about the following file extensions:
    .bat, .chm, .cpl, .cmd, .crt, .com, .doc, .exe, .hlp, .hla, .inf, .js, .pif, .scr, .xls, .vbs (Did I miss any?) If you’ve got a virus scanner that can scan incoming email, this is relatively hassle-free.

  8. Turn on file extensions: Go to Folder Options in Windows Explorer and un check the option that says Hide extensions for known file types. This is so that you can see the file extension of all programs, which is helpful because some virus writers try to hide file extensions like this: test.txt.exe – if you had file extensions turned off, you would simply see it as test.txt and may full you into thinking is a text file instead of an executable.

  9. Research any program before you install it: Before you install any program, you’ll want to check to make sure that it contains no intrusive adware/spyware. Besides the once or twice a month Windows Update check and occasionally checking that your virus scanner is keeping up to date, this is really the only thing you have to actively do to keep your Windows box secure. This isn’t really as hard as it seems, and generally takes less than 5 minutes, probably less time than it would take to install an app in Linux if you had to look outside of your distro’s repository to find it. Here is what I normally do when I’m ready to install an app for the first time:

    • Go to Google and type in appname spyware where appname is the name of the program you want to install. If the program does contain spyware, you’ll usually get several links pointing this out. For example, if you search for kazaa spyware, you get about a million links for Kazaa adware/spyware removal tools, so you know this program is bad news. A note about spyware removal tools – DON’T USE THEM! If you know that you’re going to have to remove a bunch of crap after installing some app, then it’s better to not install it and look for something else to use instead. Otherwise, installing it and removing the crap afterwards is like having unprotected sex with somebody you know has an STD, and then going to the doctor the next morning to get a shot for whatever they might’ve had. This rule also applies for programs like Adaware, Spybot, and the rest of their ilk. Although you can keep them on your machine to scan every once in awhile just for piece of mind, these programs should NEVER be used as an ‘insurance policy’. The reason why I bring this up is because I’ve seen a lot of people with the mentality of “Well, I can install anything I want because I’ve got XYZ spyware remover installed that will protect me.” NO NO NO NO NO!!!!!!!!!!!!!!!! Please, don’t believe the marketing hype of some snake-oil salesmen trying to convince you that their app is going to save you from everything. If I EVER find out you’ve been doing this, I will come and slap you around a bit with a large trout! Except in a case which I specify below, you absolutely should never depend on these apps to protect you. They may be good to scan with occasionally, but that is all they should be used for!
      Though I don’t run these programs resident, I have a couple of them installed and scan my machine about once a month – the only thing they ever find is cookies.

    • Go to Download.com, search for your app, and read the User Comments. Fortunately, if an app does contain something nasty, there’s a pretty good chance a bunch of other lemmings have already installed it before you, so take advantage of people who learned the hard way 🙂 Usually, if an app is adware/spyware infested, the User Comments will let you know.


    Only in a couple of instances have I ever had to do any more work than that. However, if neither of the above methods yields any results, here are a few other things you can try.


    • Look on the program’s web site and if it is free, look to see if it specifically mentions whether or not the app contains adware or spyware. This information can usually be found either in the feature bullet points or the privacy policy. Though some software authors may decide to lie about this, it may give you some insight. Note that if the app is open source (especially if you find it on Source Forge), you can be pretty sure it is safe to use.
    • Look to see if the app costs money. If it does, there’s a good chance there’s no spyware. This is not a rule set in stone though, so be careful!
    • Ask a computer-literate friend to see if they’ve ever heard of the app.
    • If you’ve got a spare PC, a test partition, or an emulator (such as Virtual PC) installed, you can install the app there and then use spyware removers to scan with and see if they find anything. If the app checks out clean, it should be safe to install ‘for real’.
    • If all else fails (and this is a last resort), run setup for the program, and scan through the license agreement to see if there’s any mention of ‘3rd party programs’ or anything like that.

    Assuming that if you follow this rule and also don’t use IE, you should never have any spyware on your system. A couple of last things to note on this topic:


    • Though I generally tend to avoid any program which contains ads, I don’t claim that everything which contains adware is bad. For example, Opera has ads in the ‘free’ version, but they don’t cause any harm to your system or drastically slow your bandwidth to a crawl.
    • When I’m setting up a computer for somebody who I know probably won’t bother to do this much work before installing something, I usually put the fear of death in them by telling them that if they install anything from the Internet, it’s probably going to trash their machine. That way, they will usually either ask me or someone else before proceeding. This isn’t the ideal situation, but it’s better than having to clean up the mess after they install some spyware-infested monstrosity 🙂
    Well, really there is no number 10 🙂 But since 10 is such a good number, I’m keeping this one as a placeholder for something else that might come up in the future.

FAQ

Alright, so that’s it. Now you’ve got a secure box, have spent no money (except for maybe a hardware router/firewall, which goes well with any OS), and you’ll usually spend 15-30 minutes a month (for app research and Windows Updates) securing your box. That’s quite a far cry from the ‘hours and hours’ being proclaimed by the anti-Windows Evangelists, isn’t it? And you’re not even running a spyware remover resident!


Now, there are a few questions which will inevitably come up, so I’m going to address them here:


Q. Instead of using Windows, why not switch to something inherently more secure?
A. This is a good idea, and I would recommend that everyone explore the alternatives. I suppose anyone who knows about the alternatives and still chooses to run Windows does so for their own reasons. The reason why I do so is because I believe that Windows has the very best applications for what I use computers for. As a friend of mine so eloquently put it, “I don’t like Windows – I like what I can run on Windows.” Even hardcore anti-MS zealots have admitted that Windows is best for me to use, once they see the list of apps I’m using. Of course, there’s always the political/religious aspect of computing, but some of us are getting too damn old to be idealists.


Q. What about cookies / file encryption / file erasing?
A. Personally, I view these as privacy issues rather than security-related. The only time this would be of concern is if somebody has access to your box, either because you didn’t follow proper security precautions outlined here or because somebody with bad intentions has physical access to your machine. Obviously, if you are around people you don’t trust, you need either log off or lock your computer when away from it – this is true of any OS.


Q. What about not running as Administrator?
A. I have found that some programs don’t respond well to this, and it is generally a pain in the arse to pull off. Plus, I have never found it necessary, as I have always run as Administrator with no problems thus far.


Q. What about turning off some services and/or network protocols?
With a firewall installed, I haven’t found it necessary to do any of this. Remember, this is a bare bones guide to security, and only things that are absolutely essential are included here.


As an extension to the previous question …


Q. What happens if an app turns off the firewall?
Generally, a virus scanner would alert you of such an app on your machine. However, failing this, I have tried it before using ZoneAlarm – when another running program shuts down the firewall (as opposed to a user doing it from the UI), before it dies, it does something to your Internet connection so that when you try to visit a webpage, it’ll redirect you to another web page that informs you of what has happened. I’m not sure if all firewalls do this, but I bet most of them do.


Q. How do you know that you have never been hacked/infected?
Well, how does anyone know? 🙂 Truth is, I have been hit before, but only as a result of either purposely doing it as a test or not following my own rules (eg – not running anti-virus resident and not scanning files), and I have also seen other people’s infected machines. So I know what the symptoms are when a machine is infected. Plus, I’ve used a variety of virus scanners and anti-adware tools in the past, so you would think at least one of them would’ve found something by now!

I would like to conclude this by saying that if you have any comments, suggestions, or anything to add for a future revision of this article, please don’t hesitate to contact me. Also, I’ve been thinking about writing a similar article on Windows stability, which isn’t much more involved than this. Would anyone be interested in reading? Needless to say, I can easily go two years or more with 40+ apps installed on a single Windows install.
And what about speed, you ask? My friend Shane has already covered this quite nicely:
http://www.monroeworld.com/pchelp/tweakxp.php
The only thing I would add to what he wrote is to install this app, and turn on Windows classic folders.
Hmmm, no security issues and an OS that runs fast and smoother than a baby’s butt. See, you don’t have to ditch Windows in order to get these kinds of perks 🙂


About the author
I’ve been using Windows (in one flavor or another) for about 11 years now. I’ve also played with several other operating systems (some more than others), including Slackware, Gentoo, Debian, Suse, Redhat/Fedora, Knoppix, Mandrake, Linspire, Xandros, Libranet, LFS, FreeBSD, MacOS 8/9/OSX, etc. But my OS of choice is and has always been Windows. I’m not a Windows fanboy, I just believe in using the right tool for the job.


If you would like to see your thoughts or experiences with technology published, please consider writing an article for OSNews.

143 Comments

  1. 2005-02-08 10:28 pm
  2. 2005-02-08 10:29 pm
  3. 2005-02-08 10:29 pm
  4. 2005-02-08 10:33 pm
  5. 2005-02-08 10:33 pm
  6. 2005-02-08 10:34 pm
  7. 2005-02-08 10:36 pm
  8. 2005-02-08 10:40 pm
  9. 2005-02-08 10:43 pm
  10. 2005-02-08 10:45 pm
  11. 2005-02-08 10:45 pm
  12. 2005-02-08 10:47 pm
  13. 2005-02-08 11:02 pm
  14. 2005-02-08 11:04 pm
  15. 2005-02-08 11:05 pm
  16. 2005-02-08 11:07 pm
  17. 2005-02-08 11:13 pm
  18. 2005-02-08 11:21 pm
  19. 2005-02-08 11:43 pm
  20. 2005-02-08 11:44 pm
  21. 2005-02-08 11:48 pm
  22. 2005-02-08 11:55 pm
  23. 2005-02-08 11:58 pm
  24. 2005-02-08 11:59 pm
  25. 2005-02-08 11:59 pm
  26. 2005-02-09 12:05 am
  27. 2005-02-09 12:19 am
  28. 2005-02-09 12:24 am
  29. 2005-02-09 12:28 am
  30. 2005-02-09 12:29 am
  31. 2005-02-09 12:39 am
  32. 2005-02-09 12:50 am
  33. 2005-02-09 12:51 am
  34. 2005-02-09 12:53 am
  35. 2005-02-09 12:55 am
  36. 2005-02-09 1:19 am
  37. 2005-02-09 1:36 am
  38. 2005-02-09 1:39 am
  39. 2005-02-09 1:45 am
  40. 2005-02-09 1:51 am
  41. 2005-02-09 1:52 am
  42. 2005-02-09 1:53 am
  43. 2005-02-09 1:54 am
  44. 2005-02-09 1:55 am
  45. 2005-02-09 1:56 am
  46. 2005-02-09 1:57 am
  47. 2005-02-09 2:27 am
  48. 2005-02-09 2:52 am
  49. 2005-02-09 3:16 am
  50. 2005-02-09 3:21 am
  51. 2005-02-09 3:22 am
  52. 2005-02-09 3:22 am
  53. 2005-02-09 3:28 am
  54. 2005-02-09 4:26 am
  55. 2005-02-09 4:37 am
  56. 2005-02-09 5:11 am
  57. 2005-02-09 5:15 am
  58. 2005-02-09 5:21 am
  59. 2005-02-09 5:39 am
  60. 2005-02-09 5:39 am
  61. 2005-02-09 5:53 am
  62. 2005-02-09 5:55 am
  63. 2005-02-09 6:04 am
  64. 2005-02-09 6:26 am
  65. 2005-02-09 6:42 am
  66. 2005-02-09 6:52 am
  67. 2005-02-09 7:01 am
  68. 2005-02-09 7:24 am
  69. 2005-02-09 8:01 am
  70. 2005-02-09 8:12 am
  71. 2005-02-09 8:35 am
  72. 2005-02-09 9:05 am
  73. 2005-02-09 9:13 am
  74. 2005-02-09 9:25 am
  75. 2005-02-09 9:54 am
  76. 2005-02-09 10:02 am
  77. 2005-02-09 10:21 am
  78. 2005-02-09 10:22 am
  79. 2005-02-09 10:29 am
  80. 2005-02-09 10:34 am
  81. 2005-02-09 10:55 am
  82. 2005-02-09 11:59 am
  83. 2005-02-09 12:00 pm
  84. 2005-02-09 12:28 pm
  85. 2005-02-09 12:31 pm
  86. 2005-02-09 1:36 pm
  87. 2005-02-09 1:55 pm
  88. 2005-02-09 3:00 pm
  89. 2005-02-09 3:26 pm
  90. 2005-02-09 3:39 pm
  91. 2005-02-09 4:01 pm
  92. 2005-02-09 4:16 pm
  93. 2005-02-09 4:42 pm
  94. 2005-02-09 4:46 pm
  95. 2005-02-09 4:59 pm
  96. 2005-02-09 5:04 pm
  97. 2005-02-09 5:20 pm
  98. 2005-02-09 5:24 pm
  99. 2005-02-09 5:36 pm
  100. 2005-02-09 5:48 pm