COMPRESS LINUX, PLEASE VISIT WWW.TINYLINUXFIREWALL.COM



WINDOWS SECURITY 



WINDOWS LOCK-DOWN LAYER 1



Open up "Windows Firewall with Advances Security"


Windows: Type here to search

Enter: Windows Firewall with Advanced Security



BLOCK INBOUND TRAFFIC



Left > Top = Click on Inbound Rules


Windows Firewall with Advanced Security > 

Inbound Rules


Right > Top = Click on New Rule


Inbound Rules > 

New Rule...


What type of rule would you like to create?

Choose = Custom


Click Next


Does this rule apply to all programs or a specific program?

Choose = All programs


Click Next


To which ports and protocols does this rule apply?

Choose = Any


Click Next


Which local IP addresses does this rule apply to?

Choose = Any IP address


What action should be taken when a connection matches the specified conditions?

Choose = Block the connection


When does this rule apply?

Choose = Domain, Private, Public


Click Next


Name:

Anything! (Block Inbound Traffic)



ALLOW OUTBOUND TRAFFIC



Left > Top = Click on Outbound Rules


Windows Firewall with Advanced Security > 

Outbound Rules


Right > Top = Click on New Rule


Outbound Rules > 

New Rule...


What type of rule would you like to create?

Choose = Custom


Click Next


Does this rule apply to all programs or a specific program?

Choose = All programs


Click Next


What action should be taken when a connection matches the specified conditions?

Choose = Allow the connection


Click Next


When does this rule apply?

Choose = Domain, Private, Public


Click Next


Name:

Anything! (Allow outbound Traffic)



WINDOWS PROTECTION LAYER 2



SEPERATION



Uninstall the program unnecessary


Windows: Type here to search

Enter: Uninstall

Choose: Change or remove a program


Uninstall all (Program) except the (Product Registration) or Minimum (Program) installed on your computer.



WINDOWS PROTECTION LAYER 3



SECURITY



BROWSER



Use: Comodo

Download: http://download.comodo.com/browser/release/dragon/dragonsetup.exe



FIREWALLS



WINDOWS, YOU ARE POSSIBLE TO INSTALL MANY FIREWALLS

Use: TinyWall

Download: https://tinywall.pados.hu/download.php


Use: McAfee Security Scan Plus

Download: https://home.mcafee.com/downloads/free-virus-scan



Remember: Pin to Start firewall Tinywall and McAfee Security Scan Plus

so it auto start.



Windows: Type here to search

Enter: Tinywall Controller

Point the mouse to Tinywall Controller from Menu 

Right Click

Choose: Pin to Start



Make sure click on the TinyWall icon and then click on Elevate this feature help alot and then Change Mode/click on Red Icon (Allow only outgoing)


* Sometime start up your computer the Tinywall is not On, so you can not connect to internet.


Start up Tinywall

Windows: Type here to search

Enter: Tinywall

Double click on TinyWall Controller



WINDOWS PROTECTION LAYER 4



EXTRA-SECURITY




Open up "Task Manager"


Windows: Type here to search

Enter: Task Manager


Point the mouse to Task Manager from Menu 


Right Click

Choose: Pin to taskbar


Open up Task Manager everytime login to computer will help protect files on computer screen.



WINDOWS PROTECTION LAYER 5



EXTRA-SEPERATION



Create Visitor User

Open up "Command Prompt (Admin)"

Right-click Command prompt, and then click Run as administrator

Or

Right-click on Start button, and then click Command Prompt (Admin)

Run commands:

Command: net user Visitor /add /active:yes

Type the following command to remove the new user account from the default Users group and press Enter:

Command:  net localgroup users Visitor /delete

Type the following command to add the new user account to the Guests user group and press Enter:

Command: net localgroup guests Visitor /add

Completed

Use Visitor for most security.

You have to setup the password for the Administrator Account but you don't need the password for the Visitor Account.



RESET VISITOR USER


Open up "Command Prompt (Admin)"

Right-click Command prompt, and then click Run as administrator

Or

Right-click on Start button, and then click Command Prompt (Admin)

Run commands: net user Visitor /delete



Alway login to computer with Visitor, if you need to access into computer with Administrator. Make sure you turn off completely the wifi on your computer.



Just reinstall Windows operating system after few months of use to avoid hackers connecting the application and breaking the setup of the windows softwares.




Firewalling & DDoS Mitigation

Real-Time DDoS Protection - Real-Time DDOS Protection

DDoS Security Solutions

Worried About DDoS Attacks? - Read Cyber Front Lines Report

DDoS Protection | Intelligent DDoS Mitigation

DDoS Protection | Instant Activation | 3-Second

Mitigation for any size distributed denial-of-service

DDoS Protection and Mitigation Services

7 Proven Tactics To Prevent DDoS Attacks

Stop DDoS Attacks - with Shape Security

Firewalling & DDoS Mitigation - Web App Firewall, WAF

Stop DDoS Attacks - with Shape Security

Real-Time DDoS Protection - Real-Time DDOS Protection

Anti-DDoS Protection

DDoS Attack Protection Solutions & Services

Network DDoS Protection & Mitigation Solutions

DDoS Protection and Mitigation Service | Fastly

DDoS Protection - FortiDDoS - Fortinet

Real-Time DDoS Protection - Real-Time DDOS Protection

Stop DDoS Attacks - with Shape Security

DDoS Protection & Mitigation Solutions

DDoS Protection bank information security

DDoS Protection - Stop Even the Largest Attacks

Firewalling & DDoS Mitigation

Real-Time DDoS Protection - Real-Time DDOS Protection

How to defend against denial of service attacks

Control Plane Distributed Denial-of-Service (DDoS) Protection

DDoS Protection Service: DDoS Shield

Denial of Service Protection

DDoS Attack Protection | Preventing DDoS Attacks

DDoS (Distributed Denial-of-Service) Protection

DDoS Protection - Denial of Service Mitigation

Anti DDOS Protection - Networking and Security

DDoS Security Solutions

Superior DDos Protection - TierPoint DDos Defens

Stop DDoS Attacks - with Shape Security

DDoS Security Solutions - Download Free Whitepaper

Real-Time DDoS Protection - Real-Time DDOS Protection

DDoS-GUARD: DDoS Protection and Mitigation | Anti-DDoS

DDoS protection for high-speed networks 

DDoS Mitigation and Protection Services

What Is a DDoS Attack? Distributed Denial of Service

24/7 DDoS experts

DDoS Protection Services - Future-proof your network.

Firewalling & DDoS Mitigation 

Real-Time DDoS Protection - Real-Time DDOS Protection

Stop DDoS Attacks - with Shape Security

Real-Time DDoS Protection - Real-Time DDOS Protection

Applicative DDoS Protection - Real-Time Bot Protection

Distributed Denial of Service (DDoS) Protection

Anti-DDoS: Intelligent DDoS Protection & Mitigation Service

How DDoS Protection Works

Stop DDoS Attacks - with Shape Security

DDoS Protection & Mitigation Services

Automated DDoS Protection

Product Detail DDos Protection

DDoS Protection for securing your physical servers

DDoS Mitigation Services | Remote DDoS Protection Services

Top DDoS Protection Solutions

DDoS Protection and Mitigation - True DDoS Protected

7 Best DDoS Protection Services to consider

DDos Mitigation - Using NGINX to Prevent DDoS Attacks

Enhanced web security and DDoS protection

Firewalling & DDoS Mitigation - Prevent SQLi, XSS, and Hackers

DDoS Protection: 14 Unique Ways to Protect Your Organisation

Stop DDOS Attacks immediately - Strong DDoS protection

DDoS Solutions Market Leader - Protection from DDoS Threats

DDoS Defense - Are You Protected From Attack?

DDoS Protection And Mitigation Market

DDoS Protection | Instant Activation

7 Proven Tactics To Prevent DDoS Attacks

Ddos Protection - Ddos Protection

DDoS protection: security against DDoS attacks

Distributed Denial-of-Service (DDoS) Attack Protection

Anti DDOS Protection - Networking and Security

DDoS protection: security against DDoS attacks

Global Remote Ddos Protection Market

Distributed Denial-of-Service (DDoS) Attack Protection

7 Proven Tactics To Prevent DDoS Attacks

Applicative DDoS Protection - Real-Time Bot Protection

7 Proven Tactics To Prevent DDoS Attacks

Patented DDoS Protection

How to Prevent DDoS Attacks

DDoS Protection And Mitigation Market 2020 Global Market

DDoS Protection and Mitigation | Anti-DDoS | DDoS-GUARD

Distributed Denial-of-Service (DDoS) Attack Protection

VPS DDoS Protection

Distributed Denial-of-Service (DDoS) Attack Protection

DDoS Protection – Total WebHeads

Ddos Protection - Ddos Protection - Ddos Protection

DDoS mitigation

Distributed Denial-of-Service (DDoS) Attack Protection

DDoS Protection Services 

Custom DDoS Protection

Slowloris-DDoS-Protection: Provides protection

Distributed Denial-of-Service (DDoS) Attack Protection

DDoS Protection for the gaming community

7 Proven Tactics To Prevent DDoS Attacks

Private Host - Dedicated Servers, Vps Servers, DDOS protection

Game and Web Server Anti-DDoS Protection

DDoS Protection - Protect yourself from DDoS Attacks

What's the best DDoS Protected Server?

How to Protect WordPress from DDoS Attacks?

DDoS protection for high-speed networks

Mitigation Ddos - Real-Time Bot Protection

How to Stop a DDoS Attack

DDoS Protection and Mitigation Services 

Best DDoS protection

DDoS Protection | Intelligent DDoS Mitigation

Applicative DDoS Protection | Real-Time Bot Protection

DDoS Defense | Are You Protected From Attack?

DDoS Protection for Businesses | Smart Tool for Complex Threats

Worried About DDoS Attacks? 

DDoS Defense | Are You Protected From Attack?

What Is DDoS Protection And Mitigation? 

7 Proven Tactics To Prevent DDoS Attacks

Denial-of-service attack

DDoS Protection - Denial of Service Mitigation

Anti-DDoS - DDoS Protection

Distributed Denial-of-Service (DDoS) Attack Protection

DDoS Solutions Market Leader | Protection from DDoS Threats