Introducing The Computer Security Tool

Welcome to the Computer Security Tool;

The Computer Security Tool exists because Microsoft Windows installations contain potential security weaknesses. Many unneeded programs and services are installed and enabled. Hackers target and exploit these services using automated scripts, rapidly propagating Trojans and other methods to obtain unauthorized access to sensitive personal or commercial information.

The Computer Security Tool will scan, identify, and lock down system security weaknesses.

The Computer Security Tool is not a virus scanner, nor is it a firewall. It is a tool to be used in conjunction with these tools to provide optimum computer security. The computer Security Tool specifically examines 8 key areas of a Windows Installation:

1. User Account Security

Examines user access rights, password security and the ease at which a system can be infiltrated via password attack;

2. Communication Security

Examines how your computer communicates with others, what information is displayed and accessible to a hacker, and what open communications channels are open but not in use on your system;

3. File Association Security

Looks at the system to see how it handles inbound threats to the system such as malicious file attachments;

4. File Permission Security

Examine which users on your system have the right to use and execute specific programs;

5. Computer Services Security

Windows Services are programs which usually run without human intervention and are usually started when the computer is turned on. The Computer Security Tool examines the active services to identify which are in use and which may pose a security threat;

6. Spyware Security

The Computer Security Tool examines the ease by which a Spyware programs to infect the system and provides options to block infection;

7. Windows Subsystem Security

Windows contains a number of programs that are intended to provide legacy support for old Operating Systems such as IBM's OS2. The Computer Security Tool can disable un-needed subsystem components;

8. Windows System Security

Examines the components of the system that protect the core infrastructure of the system, such as Windows Firewall, Windows Updates, page files, dump files and the like.

It is a tool which give both the home novice user and the system security professional the ability to implement a comprehensive security policy in minutes, and then implement system security changes on the fly.