Our great sponsors
-
For security hardening either use the Windows security baselines to harden Windows, or go a step further and use a third-party guide like https://github.com/beerisgood/Windows11_Hardening.
-
so wait, you can prevent that also. I don't know what UWP is but there is a Windows Sandbox Utility. Nice. Let's follow the link (https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-sandbox/windows-sandbox-overview) to find that it says, "A sandbox is temporary. When it's closed, all the software and files and the state are deleted.". Do you honestly mean to tell me normal people use that when they install something? I don't think people even know that exists
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
I just want to add since application firewalls on Linux don't even need root to bypass (e.g. by calling an an allowed app, or by using mount namespaces so the executable path appears to be the same as an allowed app), I created a slightly more reliable bandwidth monitor for detecting this sort of stuff.
-
spent about 2 hours, but it was worth it; enjoy: https://github.com/xkcd386at/scripts/blob/master/linux-and-windows-insecurities--theory-vs-practice.md