Author

Topic: Prevent malware from infecting your Windows computer - some tips (Read 245 times)

hero member
Activity: 714
Merit: 1010
Crypto Swap Exchange
Avoid to use your daily computer with which you do all your online internet shit, social media garbage and doom scrolling for any crypto wallet stuff. Use a Linux box for your crypto wallet and banking stuff.

Do not install dubious software on your machines and mobile phones. Be cautious with browser extensions that require substantial permissions, the less you have, the less can fail or abuse you. If you use cracked software or keygens outside of fenced virtual machines, you're on your own and you should know who's to blame if you catch malware.

Educate youself on safe computing and best practices.
sr. member
Activity: 952
Merit: 275
I have formatted my PC like 40 times since the first day that I started using windows98 and it is a big problem for me to keep doing this, losing files here and there, for some malware they are very tough to get rid off, imagine if its crypto stealing malware? The damage will be done already, I don't want this and that is why I always advice people against strong crypto on PC.

Losing all your assets because of a virus or malware infection is not something you can just say that you've learnt your lesson, it will always be a part of you, and there is still a chance that your same PC will get infected again, who will wait around to find this out the second time again? It can never be me.

So it is wiser to use your PC for everything else minus strong your assets on the PC, even if you know how to secure your PC very well it is still not the safest place, again internet connection is a bad idea for storing crypto asset, get a hardware wallet.
legendary
Activity: 2870
Merit: 7490
Crypto Swap Exchange
Most malware have a kill-switch that terminates if it is running inside a virtual machine, or is running with some other parameters, so in this post, I will tell you the common cases where a virus will exit and show you how to activate them.
Maybe then the simplest solution to protecting a PC on Windows would be to install a virtual machine? Directly on Linux OS (double kill!). And work on a virtual machine with any suspicious (as well as working) data. That is, separation of functions: Windows (the main OS) for entertainment (home PC), a virtual machine for solving work problems (work PC). Ideally, this separation of workstations should be done on different physical PCs.

Virtual machine is only great when you don't need GPU/3D acceleration and have fairly decent PC though.

Bump

Stop using Windows if you can help it. All my boxes run Linux.

9.8/10 vulnerability score looks really bad.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
legendary
Activity: 2072
Merit: 4265
✿♥‿♥✿

Maybe then the simplest solution to protecting a PC on Windows would be to install a virtual machine? Directly on Linux OS (double kill!). And work on a virtual machine with any suspicious (as well as working) data. That is, separation of functions: Windows (the main OS) for entertainment (home PC), a virtual machine for solving work problems (work PC). Ideally, this separation of workstations should be done on different physical PCs.

You made a good point, and that's exactly what I do when I have a lot of curiosity about a file that's being offered to download. I downloaded it as a file for Windows in the VirtualBox virtual machine. One of the differences in using virtual machines is the advantage of using machine rollbacks: the ability to create system snapshots. After using the snapshot, when you reboot your virtual system, you get a completely clean image without traces of previous use.
As for the regular use of VPNs, free versions and not, some of them have disadvantages such as disconnections, and the owner is not always notified that his real IP is displayed at some point. For this purpose, there is software that completely breaks the Internet at the moment when the VPN breaks the connection.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Need to ask this can a malware frequently attack a network drive adapter  or probably reside on a home broadband provider.... had an issue of getting blanked out whenever I use my WiFi but works fine using a LAN cable with another wifi although  I haven't tested the normal

"home broadband provider", do you mean ISP? Because ISPs also get hacked but generally they are not able to hack the customers too.

What you're describing is probably not an attack or malware, as network slowdowns and connection interruptions are usually caused by throttling by your ISP, not by any sort of virus. Smiley

Most malware have a kill-switch that terminates if it is running inside a virtual machine, or is running with some other parameters, so in this post, I will tell you the common cases where a virus will exit and show you how to activate them.
Maybe then the simplest solution to protecting a PC on Windows would be to install a virtual machine? Directly on Linux OS (double kill!). And work on a virtual machine with any suspicious (as well as working) data. That is, separation of functions: Windows (the main OS) for entertainment (home PC), a virtual machine for solving work problems (work PC). Ideally, this separation of workstations should be done on different physical PCs.

Linux running on Unraid sounds like a good idea, but it only makes sense if you have obscenely large resources that you can split up comfortably.

I must mention that I do not support consistent use of VPN, especially for personal or confidential activities as it may have a back door and your personal data rendered vulnerable.

Then you are able to rent a cheap VPS and install Wireguard on it.
jr. member
Activity: 58
Merit: 10
Need to ask this can a malware frequently attack a network drive adapter  or probably reside on a home broadband provider.... had an issue of getting blanked out whenever I use my WiFi but works fine using a LAN cable with another wifi although  I haven't tested the normal
legendary
Activity: 1792
Merit: 1296
Crypto Casino and Sportsbook
Most malware have a kill-switch that terminates if it is running inside a virtual machine, or is running with some other parameters, so in this post, I will tell you the common cases where a virus will exit and show you how to activate them.
Maybe then the simplest solution to protecting a PC on Windows would be to install a virtual machine? Directly on Linux OS (double kill!). And work on a virtual machine with any suspicious (as well as working) data. That is, separation of functions: Windows (the main OS) for entertainment (home PC), a virtual machine for solving work problems (work PC). Ideally, this separation of workstations should be done on different physical PCs.
sr. member
Activity: 490
Merit: 346
Let love lead
Firstly, all these malwares are more obtainable when you use a cracked version of windows as against buying a licensed version. The licensed version comes with additional features that help protect windows from malware infections.

Another major loophole is that most engineers format computers and use drivers pack to drive the windows, thereby using outdated software that may be porous and would not update its malicious software detection tools to the recent version. It's recommended to run windows update and wait until its updated to the most recent and secured version.

There is a tool embedded by Microsoft to help fish out some of these viruses, it called MRT (malicious software removal tool), you can run it occasionally and it helps. You cannot get access to it if your OS is not properly updated. It scans and automatically removes malicious software from the computer and gives you a report of work done.

Finally, using of Licensed Strong Antivirus like QuickHeal , Nord, or even Avast can go a long way to give you strong firewall and temper protection that free versions cannot offer you.

I must mention that I do not support consistent use of VPN, especially for personal or confidential activities as it may have a back door and your personal data rendered vulnerable.

Although windows is the weakest OS, these tips above can also help you stay on the safer side even in all its weakness
full member
Activity: 658
Merit: 172
In as much windows security is bad using older versions of it like Windows 8 makes things worse for you especially since they're not even getting security updates anymore.
I use the latest version of the windows, and I make sure to always allow security updates whenever they are available, I hope that helps.

Some of these VPN are malwares, so in as much as anyone will want to use VPN either free or paid versions they should consider going for a trusted and reliable ones
It is good to get names so we can search and download from the official websites of these companies which is also important to avoid downloading a bad or copy application.
Can we get some example for this suggestions, like the best Free or Paid VPN that we can get to do the job. It will be really helpful rather than keeping us guessing.
sr. member
Activity: 322
Merit: 318
The Alliance Of Bitcointalk Translators - ENG>BAN
I don't know if I'm correct, but most of the time, the infections are caused by careless use of browsers, am I right? I am a victim of ransomware malware (2–3 times) and clipboard viruses (multiple times) and others. And all of them happened when I downloaded a random files from the internet (intentionally or unintentionally) and ran them, thinking they'd be safe (I know it's stupid). Luckily, there was no financial loss for me, and I only wasted a whole day hard formatting the HDD/SSD and reinstalling the OS. So if we were to be careful when browsing the internet, not downloading random shit or visiting random sites, we could avoid most of the infections? And just as you said "Trust your gut", because I don't use any Antivirus software.
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Alright. Thanks a lot.
Last question, will this stop me or at least warn me when I'm about to download a file with a virus into my computer, however hidden the virus may be?

No, it won't. Maybe the antivirus won't even detect it. You have to trust your gut.
hero member
Activity: 1442
Merit: 775
  • Internet connection

The simplest case is when the malware is unable to talk to anything on the internet. In this case, based on samples that I have seen, they automatically exit and/or query in an infinite loop. An offline computer cannot be hacked. The way to detect this is to run monitoring with Wireshark or tcpcap, and have other software read the log files they generate and alert you if a program is repeatedly querying an IP address or website.
I did not know about this tip on computers but I read that the Australian President Albanese turned off his phone at least one time a day, before reboot it. He said it is recommendation from his staffs as one of tip for security of his phone.

I don't understand technical reasons but by reading your thread, this tip, I guess Albanese does it with a similar reason on security technically.

Turn your phone off every night for five minutes, Australian PM tells residents

Quote
The Australian government’s advice is not new. In 2020, the United State’s National Security Agency issued best-practice guidelines for mobile device security, which included rebooting smartphones once a week to prevent hacking.

While a reboot every day may seem a basic measure, experts believe it can help, in some instances.

Dr Priyadarsi Nanda is a senior lecturer at the University of Technology Sydney who specialises in cybersecurity development.

He said rebooting a phone regularly could minimise risk because it forcibly closes any applications and processes running in the background that could maliciously be monitoring users or collecting data.

Nanda said many users don’t realise their apps are often running in the background.
hero member
Activity: 952
Merit: 555
I have one more tip for you: If you use a VPN for the whole computer, you will bypass most malware which checks if you are using a residential (home) connection or a datacenter (VPN) connection. So you should have a VPN running at all times, even if it is a free one.

Thank you for this informations, this will help in many ways on preventing for any further attempt on scam or hack targeted at us, i really like the last aspect here which talks more about the use of VPN because as from my own view, id thought about the negative impression of making use of a VPN in such a way that those that uses it were intended for an attack and not knowing we can also shield ourself from any of it kind, its also impressive to know that there are many advantages we could get from the use of VPN and also have access to either the free or paid ones and still works and function as expected.
sr. member
Activity: 700
Merit: 470
Hope Jeremiah 17vs7
In as much windows security is bad using older versions of it like Windows 8 makes things worse for you especially since they're not even getting security updates anymore.

I have one more tip for you: If you use a VPN for the whole computer, you will bypass most malware which checks if you are using a residential (home) connection or a datacenter (VPN) connection. So you should have a VPN running at all times, even if it is a free one...
Some of these VPN are malwares, so in as much as anyone will want to use VPN either free or paid versions they should consider going for a trusted and reliable ones

You should try as many as possible (without wrecking your computer in the process) because some malware don't do all these checks and others make additional checks, for example they may also check your graphics card name for VMware or VBox.

Alright. Thanks a lot.
Last .
 this stop me or at least warn me when I'm about to download a file with a virus into my computer, however hidden the virus may be?
I don't think you will be warn by any of these steps since these are just manual processes done to prevent malwares.

It's the Os that detect malwares when you are downloading files to your computer while if your Os is too weak or limited to detect it then it will have room in your computer and this is what this tips are helping us prevent.
That's why it's good to be cautious of were you download and sites you visit.

legendary
Activity: 2730
Merit: 7065
The best protection against viruses and malware is not visiting weird websites, downloading unnecessary (pirated) software, being nosy and clicking, downloading and visiting everything you see. A healthy dosage of paranoia helps in this case. If you consider most of the unnecessary things you see online a threat and you don't engage with it, you limit the ways by which a malware can enter your system.

Windows is the most targeted OS in the world, which doesn't make it very secure, but with the right habits, you can keep it safe enough.
sr. member
Activity: 686
Merit: 332
You should try as many as possible (without wrecking your computer in the process) because some malware don't do all these checks and others make additional checks, for example they may also check your graphics card name for VMware or VBox.

Alright. Thanks a lot.
Last question, will this stop me or at least warn me when I'm about to download a file with a virus into my computer, however hidden the virus may be?
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Every computer I've ever used comes with windows and I've never thought anything about it ever even though I knew it was inferior in a way to other OS. It's more user friendly and what I'm used to.
My question is, how do I use a computer without internet access? Do you mean I'll disconnect from the internet after I discover a virus? Please can you explain that better.

Yes, that is what I mean. After you go to Task Manager and terminate the program carrying the virus then you can reconnect to the internet.


Another lame question here, bare with me. Lol.

Would anyone of the points you mentioned be good enough, or I have to follow more than one to be sure
Also, if I do these, but go ahead to download a malicious file that has a virus into my computer unknowingly, will I be protected from a hack? How do I discover it before it's too late and how do I stop it before it gets too late?

You should try as many as possible (without wrecking your computer in the process) because some malware don't do all these checks and others make additional checks, for example they may also check your graphics card name for VMware or VBox.
sr. member
Activity: 686
Merit: 332
  • Internet connection
The simplest case is when the malware is unable to talk to anything on the internet. In this case, based on samples that I have seen, they automatically exit and/or query in an infinite loop. An offline computer cannot be hacked. The way to detect this is to run monitoring with Wireshark or tcpcap, and have other software read the log files they generate and alert you if a program is repeatedly querying an IP address or website.

Every computer I've ever used comes with windows and I've never thought anything about it ever even though I knew it was inferior in a way to other OS. It's more user friendly and what I'm used to.
My question is, how do I use a computer without internet access? Do you mean I'll disconnect from the internet after I discover a virus? Please can you explain that better.

I hope this helps somebody and makes them avoid getting hacked.

Another lame question here, bare with me. Lol.

Would anyone of the points you mentioned be good enough, or I have to follow more than one to be sure
Also, if I do these, but go ahead to download a malicious file that has a virus into my computer unknowingly, will I be protected from a hack? How do I discover it before it's too late and how do I stop it before it gets too late?
legendary
Activity: 1568
Merit: 6660
bitcoincleanup.com / bitmixlist.org
Some of us are cursed unfortunate to have to be using Windows when it has been long known to be the least secure operating system in the whole world, essentially.

There are a variety of ways that malware can infect your computer but we are not concerned about any of them right now, we are here to discuss one thing.

Most malware have a kill-switch that terminates if it is running inside a virtual machine, or is running with some other parameters, so in this post, I will tell you the common cases where a virus will exit and show you how to activate them.



Easy:

  • Internet connection

The simplest case is when the malware is unable to talk to anything on the internet. In this case, based on samples that I have seen, they automatically exit and/or query in an infinite loop. An offline computer cannot be hacked. The way to detect this is to run monitoring with Wireshark or tcpcap, and have other software read the log files they generate and alert you if a program is repeatedly querying an IP address or website.

  • Hostname

Here in this case, the virus will quit if the hostname matches one from a specific list. You are able to open any reverse engineering tool like WinDbg and search for human-readable strings, to find them out. If you have MinGW installed you can also use the "strings" program in the terminal.

  • MAC Address

Similarly, the virus quits if the system's MAC address matches one on a hard-coded list. There are some MAC address spoofers you can find on Google which can spoof your MAC address to be one of those addresses, which will make you immune to that strain of malware.

Medium:

  • Username

Similarly, the virus will sometimes refuse to execute if the username matches a hard-coded list. But since you can't easily change the username on a Windows account, this could pose a problem. The solution is to use a reverse engineering tool to "insert" your own username as a string (but it would be a lot safer to not run the program).

  • Display resolution

Generally speaking, malware will not run on any computer that it believes is a virtual machine. This includes all systems with resolution less than 800x600. You can't easily spoof your display resolution, however you can intercept API calls to Windows by downloading/building the Detours program by Microsoft and intercepting the calls. And also  you can use the Process Monitor program that is part of Sysinternals to detect this API call.

Hard:

  • IP Addresses

If there's a hard-coded list of IP addresses, you can take advantage of that, but this usually does not work for two reasons. First, home connections use NAT by their ISP which means their IP address keeps changing. And second, it is next to impossible to spoof the IP address unless you have access to specialized software that is not available on Windows. But you can try anyway.

  • Registry Keys

Certain viruses detect the strings "VMware" and "VBox" insite the registry editor for the hardware ID, the disks, etc. But it is very dangerous to change these as you might break your computer by using the registry editor.



I have one more tip for you: If you use a VPN for the whole computer, you will bypass most malware which checks if you are using a residential (home) connection or a datacenter (VPN) connection. So you should have a VPN running at all times, even if it is a free one.

I hope this helps somebody and makes them avoid getting hacked.
Jump to: