Andrew Douma, a vendor-neutral consultant, writes in Penetration Testers’ Guide to Windows 10 Privacy & Security:
Safeguarding the privacy and security of myself and my clients’ data — while still allowing me to execute a penetration test is the goal.
Having concluded in September that Qubes OS was best suited as a portable lab, I have adopted Windows 10 Pro v1607 as my offensive platform.
You will be able to apply these techniques to your personal system, drastically improving your security posture and keeping your affairs private.
Microsoft has made much progress improving the security capabilities of their Operating System (OS). However, their pervasive use of “telemetry” and forcing software installation/upgrades, has cost them the trust of their customers.
On principle, I never want to see any persistent outbound UDP connections that I did not setup myself. I also do not want my network captures polluted.
So here we are: I trust neither my OS nor my hardware vendor. Welcome to my Windows 10 hardening guide
If you want to step in to help me cover the costs for running this website, that would be awesome. Just use this link to donate a cup of coffee ($5 USD for example). And please share the love and help others make use of this website. Thank you very much!
My name is Jan. I am not a hacker, coder, developer, programmer or guru. I am merely a system administrator, doing my daily thing at Vevida in the Netherlands. With over 15 years of experience, my specialties include Windows Server, IIS, Linux (CentOS, Debian), security, PHP, websites & optimization.
Windows privilege escalation guide
SSL in WordPress: how to move WordPress to HTTPS? The definitive guide
WhatsApp prepares to share user info with Facebook – Time to switch
OpenPGP Best Practices
SMTP over Hidden Services with postfix