How to Update and test your security tools

How to Update and test your security tools 

How_to_Update_and_test_your_security_tools_Technologic World

Security tools offer a range of of features, but it's not always clear which ones you really need or what's being protected. The very least protection you need is a firewall, Antivirus and anti-spyware software also provide important protection, but anti-spam and anti-phishing tools are less critical.

1. Get basic, free protection

Windows XP doesn't come with any anti-malware protection, but it does have a basic firewall. Vista and 7 have an advanced firewall plus Windows defender for anti-spyware protection. Windows 8 has an advanced firewall plus a new version of Windows Defender with both antivirus and anti-spyware protection. Microsoft's free Security Essentials is a good choice for XP, vista and 7 (it won't install on Windows 8), as it automatically checks the Windows Firewall during installation. Don't install more than one antivirus program - they will conflict with each other and expend their efforts trying to disable their rival rather than looking out for incoming malware. However, it's fine to use manual scanners that don't run in the background, such as Malware-bytes free (www.malwarebytes.org) in conjunction with most antivirus programs, including Microsoft's free security tools. Malware-bytes is useful for occasional scans to ensure your main security program is doing its job.
                    Windows does not have anti-spam protection, but there's anti-phishing protection (the Smart-screen Filter) in Internet Explorer 7 and later. If you want anti-spam protection, use mail-washer Free (www.mailwasher.net) The excellent tool works with any email software and any Windows version.

2. Test the effectiveness of your firewall 

How_to_Update_and_test_your_security_tools_Technologic World

To check Windows firewall is active , click windows key + R to open the Run Box, type firewall.cpl and press enter. If the firewall is off , in XP click "ON", in Vista Click "Update setting now" and in windows 7 and 8 click "Use recommended settings". For other firewall software check the status and switch it "on" (if it isn't already) in it's settings menu. To check how effective your firewall is, use the free ShieldsUP online port scanner (www.grc.com/shieldsup). All ports should be closed to incoming connections useless a program on the PC asks for data from the web, in which case the firewll will open a port for that particular program. Ports are the numbered virtual "channels" the firewall uses to allow programs to connect to the internet. For example, port 80 is useful for ordinary web traffic.

How to secure your PC’s from all types of viruses and Malwares
                       To start the test, click Proceed on the ShieldsUP home page, Click the "All service ports" link and wait for the scan to finish. You should see a grid of colored boxes. Green or Blue boxes are fine, but a red box means that a port is open and potentially vulnerable. If you have a NAS (network attached storage) device, home server or software that allows remote file access, port 80 and /or 443 might be open. This is normal, but make sure you use strong passwords with these services. If you don't use remote access software.  a NAS or home server, you need to investigate the open port. Note down the number of any open port ShieldsUP identifiers. Hover your mouse over its square to check.

3. Check which drive has open ports

How_to_Update_and_test_your_security_tools_Technologic World

To find out what's responsible for any open ports download and install Nmap from the "Microsoft Windows binaries" section. Click the "Latest release self-installer" link. You will need to know your PC's IP address. Press windows key +R to open a Run box, type cmd in the box, then press Enter. Type ipconfig in the Command Prompt windows and press Enter. Note down the four groups of numbers shown next to 'IPv4 address'. These will be in the format xxx.xxx.xxx.xxx.
                      Now, Run 'Nmap-Zenmap GUT, type the PC's IP address into the target box but replace the last group of numbers with an asterisk(*), for example 192.16.0.*. Click Profile, Quick Scan. A list of PC's and devices will appear in the left pane. Click each device in turn and check the list of open (green coloured) ports to find which one corresponds with the open ports shown in ShieldsUP, Next, download and install the Nmap-Zenmap GUI on another computer that's either on the same network or is online and can see your main computer via its IP address. Use this computer to check the PC on which Nmap already checked for open ports. 
                     Don't be alarmed if you find several open ports on each device - it simply means they're being used by a program. You only need to check those that corresponds to the ports ShieldsUP highlighted because they're open to the outside world. If more than one device shows the sane port open in Nmap (this is quite likely), you'll need to disconnect the other devices from the network and test them one at a time.

Get an email when someone uses your PC

4. Find the program associated with an open port

If the device with an open port is a PC, you'll need to work on which program on it has opened the port. To do this, close all running program, go to Start, Programs, Accessories, right-click Command Prompt then click 'Run as Administrator'. In windows 8, type command prompt from the start screen to find the program icon, then right click and choose 'Run as administrator' in the bottom menu bar.
               In the Command Prompt window, type netstat -bno. This generates a list of each internet connection and its associated program. The program name is shown in square brackets above each connection. The port used is shown in the foreign address column after the colon at the end of the end IP address. For example, a connection to using port 80 is shown as In most cases these will be legitimate programs and connections, but look for any oddly named or unnamed ones using the open ports revealed by ShieldsUP, in particular check for programs shown as "Listening' in the column. Use the Process Library site (www.processlibrary.com/en) to check which program is referenced.
              Once you have found the program that's exposing your PC, uninstall it using the 'Add/Remove Programs' or Uninstall Program options in windows. If the program resists being uninstalled or is malware, you must first stop it running. To do this press 'Ctrl+Alt+Del', Click Task Manager, Processes, Right click the rogue file then click End task. Now use your antivirus tools or use CCleaner (www.ccleaner.com) to delete it.

5. Patch holes in your security

How_to_Update_and_test_your_security_tools_Technologic World

Missing windows updates and old versions of installed software can be a real security risk. Use Secunia PSI to check for out of date programs. This fantastic free tool constantly scans for any updates to your installed programs as well as missing Windows security updates. Click 'Update programs automatically 'when you install Secunia or click settings, 'Update handling', then tick update. Secunia prompts you to run a scan immediately and provides a report of what needs to be updated and alerts you to programs you need to update manually.

About Me

My photo

I am Jeetendra Saxena from Jaipur India. I love to know the latest technology and what’s going on, in world as well as universe. Also, I want to share my knowledge with others. That’s why I started a website www.technologicworld.com to share technical , electrical, and logical knowledge from all over world. You can follow me on Facebook, Twitter, Google, Google+, LinkedIn, Friendlife etc…