• This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn more.

Windows 8 Security


tw33k

Power User
VIP Member
Power User
Canberra

Posts
135
#1
Post your ideas/suggestins/wants for improvements to be added to the next version of Windows.

I'd like to see UAC improved. More information about exactly what's going on could be handy.
Bit-locker available in more versions and not just Ultimate.

What do you all want to see?
 
Last edited:

My Computer

System One

  • OS
    Win 8 x64 Pro
    System Manufacturer/Model
    tw33k
    CPU
    Intel 3770K @ 4.7GHz
    Motherboard
    ASUS Maximus V Formula
    Memory
    8gb (2x4GB) Crucial Ballistix
    Graphics Card(s)
    Sapphire 7950
    Sound Card
    On Board
    Monitor(s) Displays
    27" Acer B273HU
    Screen Resolution
    2048 x 1152
    Hard Drives
    Crucial M4 128GB
    WD Black 2TB
    Samsung F3 1TB
    WD 1TB USB 2.0
    WD 3TB USB 3.0
    PSU
    Corsair AX-750
    Case
    Corsair 800DW
    Cooling
    H100
    Keyboard
    Microsoft Wireless 5000
    Mouse
    Microsoft Wireless 5000
    Internet Speed
    5mb/s

The Howling Wolves

Both Are Veterans
VIP Member
Power User
California

Posts
1,714
#2
How about something like Sandboxie?
I posted question on What you would like to see in Win 8 and then saw your thread.
I appologize for dupilcate ?'s if I have offended anyone....
 

My Computer

System One

  • OS
    Windows 7 Home Premium S 64 bit
    System Manufacturer/Model
    HP
    CPU
    Intel Core 2 Quad Q6600 2.4GHz
    Motherboard
    ASUSTek
    Memory
    4 Gb Dual channel DDR2
    Graphics Card(s)
    512MB GeForce 8500GT
    Monitor(s) Displays
    HP w 2408 Vivid Color Widescreen LCD
    Cooling
    Cooling Budweiser now
    Keyboard
    MS intell keyboard
    Mouse
    MS intelli Mouse
    Internet Speed
    US Postal Service

Crispy

64 |3!T G33|<
VIP Member
Member
Aus, Gold Coast

Posts
250
#4
A really good Firewall becouse hackers are going to love this OS.
 

My Computer

System One

  • OS
    Windows 7 Ultimate x64 Service Pack 1 (Build 6.1.7601)
    CPU
    Intel Core 2 Quad Q6600 (G0 Kentsfield) LGA775 (FC-LGA6)
    Motherboard
    GIGABYTE GA-EP35C-DS3R (Rev. 2.1)
    Memory
    Corsair TW3X4G1333C9A 4GB PC-10600 (2x XMS3 2GB)
    Graphics Card(s)
    ASUS nVIDIA GeForce 8800 GT (G92GT/D8P)
    Sound Card
    RealTek ALC885/889A/890
    Monitor(s) Displays
    ChiMei CMV CT-730D 17inch (LCD Monitor)
    Screen Resolution
    1280-1024 60Hertz (Ture Colour 32bit)
    Hard Drives
    2x Barracuda 7200.10 SATA 3.0Gb/s 160-GB Hard Drive ST3160815AS (AHCI)
    PSU
    SUPER FLOWER 500watt Plug in Leads 24pin ATX BLACK MODEL
    Case
    Thermaltake Shark (VA7000SWA ATX) Full Tower
    Cooling
    Front 120mm fan (1400 RPM) /Rear 120mm (1400 RPM) blue LED
    Keyboard
    Labtec Media Desktop Y-SAD65
    Mouse
    Razer DeathAdder 3G Infrared Sensor (1800DPI)
    Internet Speed
    Telstra BigPond Elite Liberty ADSL2+ 24Mbps/256kbps
    Other Info
    ASUS PCE-N13 802.11n Wireless LAN card

ryo

Scripter program
VIP Member
Member
Indonesia

Posts
63
#5
it's can be detect if one of the virus or hacker wanna into the OS maybe using hacker tool like backdoor or something else..

the OS must be respons soon...
 

My Computer

System One

  • OS
    windows 7
    System Manufacturer/Model
    built up
    CPU
    Phenom II AMD Dragon 3.5Ghz
    Memory
    DDR3 4GB
    Graphics Card(s)
    ATI Radeon 512Mb
    Monitor(s) Displays
    HP L1506
    Screen Resolution
    1152 x 864
    Hard Drives
    WDC 1 TB SATA-II Green Power
    Keyboard
    HP wireless keyboard
    Mouse
    HP Optic
    Internet Speed
    1GB

Crispy

64 |3!T G33|<
VIP Member
Member
Aus, Gold Coast

Posts
250
#6
Yeah but where is all your personal information going to get kept on a server or on a PC?
 

My Computer

System One

  • OS
    Windows 7 Ultimate x64 Service Pack 1 (Build 6.1.7601)
    CPU
    Intel Core 2 Quad Q6600 (G0 Kentsfield) LGA775 (FC-LGA6)
    Motherboard
    GIGABYTE GA-EP35C-DS3R (Rev. 2.1)
    Memory
    Corsair TW3X4G1333C9A 4GB PC-10600 (2x XMS3 2GB)
    Graphics Card(s)
    ASUS nVIDIA GeForce 8800 GT (G92GT/D8P)
    Sound Card
    RealTek ALC885/889A/890
    Monitor(s) Displays
    ChiMei CMV CT-730D 17inch (LCD Monitor)
    Screen Resolution
    1280-1024 60Hertz (Ture Colour 32bit)
    Hard Drives
    2x Barracuda 7200.10 SATA 3.0Gb/s 160-GB Hard Drive ST3160815AS (AHCI)
    PSU
    SUPER FLOWER 500watt Plug in Leads 24pin ATX BLACK MODEL
    Case
    Thermaltake Shark (VA7000SWA ATX) Full Tower
    Cooling
    Front 120mm fan (1400 RPM) /Rear 120mm (1400 RPM) blue LED
    Keyboard
    Labtec Media Desktop Y-SAD65
    Mouse
    Razer DeathAdder 3G Infrared Sensor (1800DPI)
    Internet Speed
    Telstra BigPond Elite Liberty ADSL2+ 24Mbps/256kbps
    Other Info
    ASUS PCE-N13 802.11n Wireless LAN card

ryo

Scripter program
VIP Member
Member
Indonesia

Posts
63
#7
Yeah but where is all your personal information going to get kept on a server or on a PC?
i'm running in server and use thin client for my user company..so still use intranet. it's can be more save..and manage port open..
 

My Computer

System One

  • OS
    windows 7
    System Manufacturer/Model
    built up
    CPU
    Phenom II AMD Dragon 3.5Ghz
    Memory
    DDR3 4GB
    Graphics Card(s)
    ATI Radeon 512Mb
    Monitor(s) Displays
    HP L1506
    Screen Resolution
    1152 x 864
    Hard Drives
    WDC 1 TB SATA-II Green Power
    Keyboard
    HP wireless keyboard
    Mouse
    HP Optic
    Internet Speed
    1GB

iseeuu

New Member
VIP Member
Member
Posts
307
#8
i'm running in server and use thin client for my user company..so still use intranet. it's can be more save..and manage port open..
I am intrigued by the concept of Thin Client Server / Terminal! I hope to be inspired at some point to setup a thin client lab for myself for educational purposes. I wonder though, about the cost differences between having redundant servers to host clients and store all profiles, data, and programs, in contrast with just using PCs with Data Storage Servers? It seems to me we are going full circle back to the IBM AS400 and its dumb terminals?

There are two major concerns, for me, to the concept of "Off Site" Cloud Computing: the reliability of the off site server and Internet connection, for one. A failure anywhere down the line could bring a business to a dead stop if there is no on site host to the computer systems. Dumb terminals with no OS or storage are useless without the server connection.

Second, as has already been mentioned, I am not comfortable giving up all control of personal, sensitive data to an off site location. If hackers go fishing, wouldn't they prefer to have everyone's data collected together, like shooting fish in a barrel, as apposed to having to go after each business individually?
 

My Computer

System One

  • OS
    ...

Joan Archer

Gadget Mad Granny.
VIP Member
Power User
#9
i'm running in server and use thin client for my user company..so still use intranet. it's can be more save..and manage port open..
OK I suppose that's alright for a business but what about the home owner, especially say, the silver surfer. The majority of them aren't going to be in a position to have servers or even be able to afford the extra cost of such a set up.

I haven't really looked into the Cloud idea but as it's been mentioned I think I'd be inclined to agree that I'd not feel comfortable either having my personal data up in the clouds. ;)
 

My Computer

System One

  • OS
    Windows 7 Ultimate SP1 32 bit/ Windows 8.1 64 bit
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Zoostorm/ Asus K55A Notebook
    CPU
    Intel Core 2 Duo E4600 @ 2400 MHz
    Motherboard
    Foxconn 45CMX/45GMX/45CMX-K
    Memory
    2048 MB (2 x 1024 DDR2-SDRAM)/8GB DDR3
    Graphics Card(s)
    Intel Corp 82945G Integrated Graphics Controller
    Sound Card
    Onboard Realtek
    Monitor(s) Displays
    Hanns.G HH221 22" Widescreen
    Screen Resolution
    1920 x 1080
    Hard Drives
    ExcelStor (250GB)
    Keyboard
    Microsoft Natural Ergonomic Keyboard 4000 (UK)
    Mouse
    Microsoft Optical Wheel Mouse
    Internet Speed
    Just under 4MB download it's ADSL.
    Other Info
    Epson Stylus SX415 All-in-one Printer,
    Seagate Expansion 500GB External Desktop Drive

ryo

Scripter program
VIP Member
Member
Indonesia

Posts
63
#10
I am intrigued by the concept of Thin Client Server / Terminal! I hope to be inspired at some point to setup a thin client lab for myself for educational purposes. I wonder though, about the cost differences between having redundant servers to host clients and store all profiles, data, and programs, in contrast with just using PCs with Data Storage Servers? It seems to me we are going full circle back to the IBM AS400 and its dumb terminals?

There are two major concerns, for me, to the concept of "Off Site" Cloud Computing: the reliability of the off site server and Internet connection, for one. A failure anywhere down the line could bring a business to a dead stop if there is no on site host to the computer systems. Dumb terminals with no OS or storage are useless without the server connection.

Second, as has already been mentioned, I am not comfortable giving up all control of personal, sensitive data to an off site location. If hackers go fishing, wouldn't they prefer to have everyone's data collected together, like shooting fish in a barrel, as apposed to having to go after each business individually?
yah but for the security that's needed.
because if we work at office..so many significant data and we must take care of it.
so we use thin client..and all data user is save to the server using active directories. so is can easy to manage. and of course that thing make user can login to other office too..if the computer join domain. so all of data is saving to the server. that's why being more secure of it.
 

My Computer

System One

  • OS
    windows 7
    System Manufacturer/Model
    built up
    CPU
    Phenom II AMD Dragon 3.5Ghz
    Memory
    DDR3 4GB
    Graphics Card(s)
    ATI Radeon 512Mb
    Monitor(s) Displays
    HP L1506
    Screen Resolution
    1152 x 864
    Hard Drives
    WDC 1 TB SATA-II Green Power
    Keyboard
    HP wireless keyboard
    Mouse
    HP Optic
    Internet Speed
    1GB

ryo

Scripter program
VIP Member
Member
Indonesia

Posts
63
#11
OK I suppose that's alright for a business but what about the home owner, especially say, the silver surfer. The majority of them aren't going to be in a position to have servers or even be able to afford the extra cost of such a set up.

I haven't really looked into the Cloud idea but as it's been mentioned I think I'd be inclined to agree that I'd not feel comfortable either having my personal data up in the clouds. ;)
yah i think that too, if just for home.. that's expensive..lol..
but for the secure..that's balance if we spend money for it.. :)
 

My Computer

System One

  • OS
    windows 7
    System Manufacturer/Model
    built up
    CPU
    Phenom II AMD Dragon 3.5Ghz
    Memory
    DDR3 4GB
    Graphics Card(s)
    ATI Radeon 512Mb
    Monitor(s) Displays
    HP L1506
    Screen Resolution
    1152 x 864
    Hard Drives
    WDC 1 TB SATA-II Green Power
    Keyboard
    HP wireless keyboard
    Mouse
    HP Optic
    Internet Speed
    1GB

Corrine

Banned
VIP Member
Upstate NY

Posts
45
#12
I'd like to see UAC improved. More information about exactly what's going on could be handy.
I have not had any issues with UAC with either Vista or Win7. However, I would like the Admin account to be able to designate programs as approved for all users (so elevation is incorporated) or as always requiring approval/elevation. The determination would not be required at installation and would be able to be changed.
 

My Computer

iseeuu

New Member
VIP Member
Member
Posts
307
#13
I have not had any issues with UAC with either Vista or Win7. However, I would like the Admin account to be able to designate programs as approved for all users (so elevation is incorporated) or as always requiring approval/elevation. The determination would not be required at installation and would be able to be changed.
I agree, that would be an improvement and a useful feature.

On the subject of Windows security, Steve Gibson has never been bashful in pointing to the raw sockets being available in previous versions of Windows. I have never heard a reasonable rebuttal to his argument that raw sockets were never a necessity and always a source of computer compromise. It has been a while since I caught up with the newest from GRC.com, but I have used his socket utility, UPNP, and Shoot the Messenger on every Windows I have installed or repaired since.

It seems to me the best source for improving security is with the ISPs. (there was a thread on a similar subject at Seven Forums, that I didn't follow) Millions of compromised computers world wide are currently spewing malicious content, filling the web with trash. An ISP can make securing one's computer part of the EULA, sort of like driving a safe auto. An ISP can easily see what computers on their network are spewing trash, they probably do now. I know a local State University that will shut off the network jack if it is seeing above normal traffic. When the computer has been cleaned, the network access is restored. One USA ISP is purposefully limiting traffic to torrent sites because of the increased use of bandwidth. If the ISPs would take responsibility for the users in their network there wouldn't be any "botnets". That threat would be severely curtailed. It would also be easier to pull the plug on offending ISPs that fail to act to keep their networks from being used by "botnets".

Cheers!
 

My Computer

System One

  • OS
    ...

Corrine

Banned
VIP Member
Upstate NY

Posts
45
#14
It seems to me the best source for improving security is with the ISPs.
I'm sure we'll never see that. Other than getting all countries to agree, it would also require universal agreement on what would constitute taking a computer off-line when infected. Then, if the computer is off-line, how will they get the tools/updated definitions in order to remove the infection? I do like the idea of controlling access to torrents from a security standpoint.

If the ISPs would take responsibility for the users in their network there wouldn't be any "botnets".
Better yet, take down the ISPs that are protecting the botmasters. They are the criminals.
 

My Computer

iseeuu

New Member
VIP Member
Member
Posts
307
#15
I'm sure we'll never see that. Other than getting all countries to agree, it would also require universal agreement on what would constitute taking a computer off-line when infected.
You are probably correct, we may never see it. But look, connecting to the Internet is not a "Universal Right". Not everyone is allowed to sell domains. There are controls, bodies, agencies that administrate or oversee the WWW. Every ISP has to buy its access to the Internet from someone higher up the chain, every domain registrar has to abide by the rules to keep their status. It is no different with individual users and the EULA. An ISP can see which users on its network are using above average bandwidth. A little investigation would show the cause of the bandwidth usage and if is a compromised computer being used by a botnet for spam or denial of service attacks, the owner can either pay to have the computer cleaned or clean it himself. A service call form an ISP tech can verify the computer is clean and secured and network access can be switched on again. Really simple. ISPs might even be motivated to offer security services and education to its clients?

Better yet, take down the ISPs that are protecting the botmasters. They are the criminals.
If we will never see ISPs switch off individual users, I can't imagine how hard it would be to switch off an entire ISP's network. Microsoft has tried this. I have read where offending servers hosting botnet controllers have been disconnected form the Internet only to reappear shortly at another location. The problem is that the millions of compromised computers can be controlled from anywhere. But if you switch off Internet access to the compromised computers, there is no botnet to control.

The nature of assigning domains today allows for anonymous owners of a domain. Botmasters only need the domain for a few hours because they can line up hundreds and move from one to the next faster than Microsoft can track and shut them down. Even legit domain registrars can be used this way, so how do you prove they are culpable and shut them down? Again, if you take out the compromised computers you take down the botnet.

In the end, requiring an ISP to accept responsibility for its user's security as part of it's contract with ICANN or it's service provider seems to be the only way to spread the responsibility around evenly everywhere.

Cheers!
 

My Computer

System One

  • OS
    ...

Zen00

Chemical Juggler
VIP Member
Member
Provo, Utah

Posts
111
#17
Hot switchable Admin/Normal user modes, so you don't have to log out and log back in ever time you want to install something.
 

My Computer

System One

  • OS
    Windows 7 Ultimate 64-bit
    System Manufacturer/Model
    Zen Productions/000001
    CPU
    Intel Core i7-860
    Motherboard
    Gigabyte GA-P55A-UD4P
    Memory
    Corsair Dominator 2x2gb @ 1600mhz
    Graphics Card(s)
    ATI Radeon 5770 HD OCd
    Sound Card
    Integrated HD Audio
    Monitor(s) Displays
    Samsung P2570HD
    Screen Resolution
    1920x1080
    Hard Drives
    Western Digital Caviar Black 500gb
    PSU
    Corsair 750W HX
    Case
    Antec P183
    Cooling
    Corsair H-50
    Keyboard
    Logitech G110
    Mouse
    Logitech MX Revolution
    Internet Speed
    500kb/s average

notsograymatter

Member
VIP Member
Member
#18
I think a bit more control in UAC would be nice. I'm sure they've all been mentioned, but adding an ability to specify what a program is allowed to do that way I don't have to click ok every time I open CCleaner or Revo. I'd also like to be able to tell the computer that certain programs should require an admin password to open even if they're not affected normally by UAC.
 

My Computer

System One

  • OS
    W7 x64 & X 10.6.2
    System Manufacturer/Model
    Apple Macbook Pro Unibody (April 2009)
    CPU
    Core 2 Duo T9800 2.93 "Penryn"
    Motherboard
    NVIDIA 730i (MBP5,2)
    Memory
    4GB DDR3 PC 8500
    Graphics Card(s)
    NVIDIA 9600M GT (512MB)
    Sound Card
    Creative Sound Blaster X-FI 5.1 USB
    Monitor(s) Displays
    Apple 17" Anti-Glare & Acer X223Wbd
    Screen Resolution
    1440x900 (1680x1050/1920x1200 MAX)
    Hard Drives
    320GB SATA II Internal HDD

    1TB SATA II External HDD
    750GB SATA II External HDD
    360GB SATA II External HDD
    PSU
    Magsafe
    Case
    MBP Unibody (April 2009)
    Cooling
    2 x 6000 RPM MBP Fans
    Keyboard
    Logitech G-15 (v2)
    Mouse
    Logitech G-9 (v1)
    Internet Speed
    16Mbps / 2Mbps
    Other Info
    Logitech X-540 Surround Sound Speakers
    Sennheiser PC-151 Headset

Users Who Are Viewing This Thread (Users: 0, Guests: 1)