General discussion



By vidalr ·

Every year USA expend thousand of millions, even billions of dollars in security. Especially, in NT or XP environment. Problem is, that there is not a radical solution to Security, the spy ware and virus are there as well the breaks ins, so those who suffer in reality are the home users, and our children are exposed to pornography and many honest networks lost money.
Security administrators, as well many IT technicians know that security has two main folded problems.
1. Spywares and viruses.
2. The hackers attacks

The main radical solutions cover these two aspects, the malwares and the break in. A good security system must involved the end of spywares and virus as well the invisibility of all our ports, telnet, ping, tcp and udp incoming and outgoing etc. So, if a hacker wants to break in, will not know were to start. Don?t need to buy routers. I?ve been enjoying this freedom for almost two years. I won?t deny that I have tried two sell this information, using various means but I do lack in connection, so tonight Friday the 6, 2006 I have take the decision of sharing it, with you for free. I do not belong to the Open Source community, so do not mistaking me. So without more talk let?s walk the end of malwares, and enjoy the knowledge of having a secure system.

FIRSTH SOLUTION. The NT System windows 2000 or xp and the coming vista as a base, and the NT system and NT have as base the Unix System, with the difference that the code is not open for modification. The Unix System or GNU+Linux, do not have the problems of spywares and virus. Is possible to have a windows system without or almost nothing of malwares, is very simple even my 13 years old boy can do it. Although is easy the information itself is high in relevance even some Computer Scientist do not know about it, and those who know it wont tell you the full implication.
The information and steps of doing have my private rights, no the tools, I give the information for free to you but in any way this information could be used to make a software that contains this information, this information is done out the book therefore I own it, and will summarize the tree steps in bold letters:
3. PASSWORDS (this is of much importance, It wrap it up every thing, at the beginning do your passwords as you want. At the end if you decided to follow my information regarding password, you follow it, the decision is complete yours. The first and second step will work regardless you follow the third step or not.
This is a hands on practice, it been tested for almost 2 years is not longer in beta.
So let?s begin the hand on experience.
If you have the option of doing a whole Recovery System do it, (put your back up files in a cd) if not I will tell you when to begin. DISCONNECT OF THE INTERNET ONLY SHOULD BE CONNECT THE KEYBOARD, THE MOUSE , THE MONITOR AND THE SPEAKERS.
If you have the Icon of Recovery System click on it. If a window comes out telling you ? you partition disk is gone? do not worried, simply right click the icon, and click properties, a box will show and where it says open target, left click on it (when I do not say right click, all is left click) four icons will appear, the icon that says write a cd , click on it, the icon now will appear in the bottom left side of your screen saying that you need to place a CD-W and write , once is finish writing it , the cd-w will be push out itself , take the CDW out, and a small box will tell you restart, click OK, if not small box shows up restart anyway, once in your desktop right click the Recovery System icon, click the open option, and the big box of Recovery System will show up, it will ask if you want to start the process click ok, it will ask if you have created a cdw check mark yes, continue it, you will be ask if you want to do a full System Recovery or a Custom for advance users check mark the advance users and continue, you will see a box within a small box that said the number of your default space , in my case is 15 gb. Now is the time of increasing your space , not hardware is needed, those who tell you that in order to increase your gb , there is the need of buying hardware, are only after your money and it can cost you 300 hundred dollars, so my computer is 2003 and have 15 gb as default I put 90 the next one will be? all ? , you don?t want to put all , you may have the option of putting 120 before ?all? then do it, How much you put is entirely up to you, but according to my experience put the number before all is ok in my system. IF you want increase your space is up to you, no matter what, one day a box will show up saying that you are running out of space then buy a new computer or pay 300 dollars to your favorite tech store, some will say the increase is only virtual is not physical, again that is just talk , I have tested and work not hardware is needed, if you decided to increase your space, once, you do it click continue and the recovery system will start, those whose Icon of RS is ok, click you have created already a CDW, and follow the same steps when the whole system recovery is completed you will be ask to write a SR cdw, anyway, then the whole system will restart and the whole recovery of C+D drives will start, those who?s computers do not have the ICON SR do not worry we haven start yet the termination of malwares .
TERMINATION OF SPYWARES AND IMMUNIZATION TO VIRUS. Once you finish the whole RS or if you haven?t done the RS, restart your computer, while is restarting press the F8 key then a black page appears, giving you several option, using the arrows keys you go to SAFE MODE press enter and you will see the partition files, then the ADMINISTRATOR OPTION will appear you must enter as ADMINISTRATOR click and once you enter click ok and a black desktop screen without internet connection will appear go to run and type MSCONFIG click ok a box will show up , go to the start items option once there click DISABLE all the items must be disable , press apply and ok and exit without restart, is in this moment that you do the end of malwares(virus, spywares etc) once you have done it, Keep in mind that you are not removing you are just disabling. The sweet side of this program is that you are disabling the strongest spywares click apply and ok, exit without restart, then click on explorer icon, go to tools click internet options, in general you type the name of the page to do search, delete all cookies, delete all files off line files as well , put your history in 0 value and click and ok erase history. Go to the next tab there you increase the default of the internet icon as well Ethernet, apply, go to privacy and increase the default , go to connection and check automatic detection, then apply , go to the last tab and uncheck third parties connections, DO NOT restart, go to control panels right click , and click open, go to ad and remove, if quicken for taxes is off date you must remove it, we want to get rid of , the ports the hackers must be using, after go again to the start and right click on my computer click on properties and uncheck remote help, closed, and those who have done your whole RS is a good time to set your administrator password go to control panel , click users, click administrator and set the password, I found out that in a house is better to have only one user, nobody has the right to profile each member of the family, the same could be applied to networks, close DO NOT restart , go to run MSCONFIG must be there click ok on the MSCONFIG BOX and exit restarting, you will end at your desktop and the box of msconfig must be there check that nothing is there even if little messenger is check disable and EXIT WHITHOUT RESTART.
All seems to be normal; wrong although all is colorful, you are in a mode the safeties? mode in windows, just one click should be enough to open the programs, get rid of the costume of keep clicking the screen is an unsafe practice.
After, the speed will increase, you can listen to all kinds of music your kids can play in messenger and your computer never slow down the end of malwares have begun, who did it you did it , go to the explorer and repeat the same steps only that in connection you don?t do nothing, repeat all you have done in safe mode, and this is over. To those who done the whole RS update till you get SPACK 2.
ADMMINISTRATOR . Root word in Greek OIKONOMY, oiko= household, nomy= law or arrangement. The arrangement of the house , as a Administrator you have the right of disabling the start items, which are part of the EULA agreement, only as Administrator you have the right not of removing but disable the start items, as Administrator you can do it, and not law, can take away from you, what you think is better for your household.
Waiting for your speedy feed back

This conversation is currently closed to new comments.

40 total posts (Page 4 of 4)   Prev   02 | 03 | 04
Thread display: Collapse - | Expand +

All Comments

Collapse -

Uh ok

by jmgarvin In reply to OPEN LETTER

A) I don't trust that is your IP
B) Who cares? If I wanted a target that wouldn't press charges, I'd go to
C) You will probably get tons of port scans and nothing more (if that is your real IP)...
D) How do you know each person has only one shot? If they know how to poke at security, I would hope they know how to spoof...

Collapse -


by vidalr In reply to Uh ok

I will like to thank to all who gave me a feed back on my posts. I?m not a troller as someone pointed out. I did try to talk to you on how secure the NT system that I?m working on is.
Though I thank you I won?t deny that the majority of them were full of arrogance and insults which have been the trade mark of GNU+Linux users Anthropology.
I did not found a trace of skepticism on the feed backs, to the Greeks skepticism meant inquire: ?I personally don?t know at the moment, but I?m trying to find out the truth?.
Your comments were full of unbelief, those who say to everybody, about anything ?no? ?I doubt it? ?How do you know??
The love for the truth was and is of great importance. Or should we be content with ignorance? This question has been taken seriously by Socrates, Erasmus, Montaigne and Cabell.
We need the truth because without it, we cannot distinguish cleverly arguably truth from clever falsehoods.
To have true knowledge is important to override falsehood or ignorance.
I was grammatically incorrect but that does not give the ground to any computer student to call me imbecile or mock by posting ?say what?
I did the claim of having a most secure system, because I have the knowledge of the machine I?m working on, and a small mistake can destroy what I firmly believe.
Your comments contain such arrogance, that I forget that I?m dealing with GNU+Linux users, who are grammatically correct, and maybe Usenet users, who set the standards when on the edge connected the small program UUCP using the Unix system to the telephone lines giving birth to the internet.
I?m not making the claim of having a perfect system but one that I see has improve getting better and better, to have a windows machine like this is unheard off.
I gave you my address not to lower you but to test my machine, as some one call me I?m an imbecile, I know a person only needs the email to do it.
For give my address to such large crowd of computers students I do apologized.


Collapse -


by BFilmFan In reply to OPEN LETTER

Juan R Posadas developed a better sales pitch. I would recommend that you take a few moments and study his career.

Collapse -

Posadas is a genius

by jmgarvin In reply to Response

It's like scientology, except better!

Collapse -

Better than Scientology

by BFilmFan In reply to Posadas is a genius

South America has generated a number of really strange characters and he is among the most interesting.

Collapse -


by noyoki In reply to OPEN LETTER

Is it your goal to post the same exact posts in at least 1 thread at least 1x a day?

Collapse -


by apotheon In reply to SECURITY. TAKING CARE OUR ...
Collapse -


by Matthew Yurksaitis In reply to SECURITY. TAKING CARE OUR ...

Yikes Rueben,

It appears that you are a bit fustrated about your post, the responses and the status of getting your proposed solution published.

My orginal post was merely to address the difficulty in understanding your post and your solution as posted due to the difficulty in reading the post. Also, part of that difficulty in reading it was understanding your position regarding your solution. The post came across as though you had a solution which was viable and unique and no one wanted it, and from the post there was nothing to indicate it was unique.

In regards to your email, I have not received an email from you yet with details but would be glad to respond when I do.

In regards to philosophy you kind of opened up the discussion on that by ending your post with the root of the word OIKONOMY.

In regards to an apparent bias you have against GNU/Unix audiences, my systems are primarily Windows though there are Unix and Macintosh in the mix as well.

Provided for reference are a couple of links on Windows security guidelines & configurations from NIAP & the NSA.

This is the kind of detail that would help in regards to the viability of the solution you write about.

Collapse -

The problem with

by Jaqui In reply to Yikes!

all his posts is simple..long posts that are one huge block of text.

If he broke them into paragraphs rather than the one huge block then it would be far easier to read.
[ and we might not flay him for the posts ]

Collapse -

Consult with..

by ozi Eagle In reply to SECURITY. TAKING CARE OUR ...

Maybe you should consult with entawanabi.

Back to Security Forum
40 total posts (Page 4 of 4)   Prev   02 | 03 | 04

Related Discussions

Related Forums