How to secure your Vista PC in 10 easy steps

While Windows Vista may be Microsoft Corp.’s most secure operating system ever, it’s far from completely secure. In its fresh-from-the-box configuration, Vista still leaves a chance for your personal data to leak out to the Web through Windows Firewall or for some nefarious bot to tweak your browser settings without your knowledge.

But by making a few judicious changes using the security tools within Windows Vista — and in some cases by adding a few pieces of free software — you can lock down your operating system like a pro.
1. Use Windows Security Center as a starting point

For a quick overview of your security settings, the Windows Security Center is where you’ll find the status of your system firewall, auto update, malware protection and other security settings. Click Start, Control Panel, Security Center, or you can simply click the shield icon in the task tray. If you see any red or yellow, you are not fully protected.

For example, if you have not yet installed an antivirus product on your machine, or if your current antivirus product is out of date, the malware section of the Security Center should be yellow. Windows does not offer a built-in antivirus utility, so you’ll want to install your own. For free antivirus, I recommend Avast Home 4.8 and AVG Anti-Virus 8.
2. Use Windows Defender as a diagnostic tool

The malware section of Windows Vista also protects against spyware using Windows Defender. The antispyware protection in your antivirus program usually trumps the protection Microsoft provides, but there are several good reasons to keep Windows Defender enabled. One is that every antispyware program uses a different definition of what is and is not spyware, so redundant protection can actually offer some benefit.

Another reason to keep Windows Defender enabled: diagnostics. Click Tools, and choose Software Explorer from the resulting pane. You can display lists of applications from several categories such as Currently Running Programs, Network Connected Programs and Winsock Service Providers, but Start-up Programs is perhaps the most useful. Click on any name in the left window, and full details will appear in the right pane. By highlighting, you can remove, disable or enable any of the programs listed.
3. Disable the start-up menu

Windows Vista keeps track of all the documents and programs you launch in the start-up menu. This can be convenient for some users, but it can also compromise your privacy if you share a computer within an office or household. Fortunately, Windows Vista provides an easy way to tweak this setting. To protect your privacy, follow these steps:

* Right-click on the task bar and select “Properties.”
* Click on the Start Menu tab.
* Uncheck “Store and display a list of recently opened files.”
* Uncheck “Store and display a list of recently opened programs.”
* Click “OK.”

4. Get two-way firewall protection

No desktop should be without a personal firewall, but even if the Security Center says you’re protected, you may not be. The Windows Firewall within Vista blocks all incoming traffic that might be malicious or suspicious — and that’s good. But outbound protection is not enabled by default. That’s a dangerous situation if some new malicious software finds its way onto your PC.

Microsoft did include the tools for Windows Vista to have a true two-way firewall, but finding the setting is a little complicated. (Hint: Don’t go looking the Windows Firewall settings dialog box.

To get two-way firewall protection in Windows Vista, do the following:

* Click on the Start button; in the search space, type “wf.msc” and press Enter.
* Click on the Windows Firewall with Advanced Security icon. This management interface displays the inbound and outbound rules.
* Click on Windows Firewalls Properties. You should now see a dialog box with several tabs.
* For each profile — Domain, Private and Public — change the setting to Block, and then click OK.

Even if you do this tweak, I recommend adding a more robust third-party firewall. I suggest either Comodo Firewall Pro or ZoneAlarm, both of which are free and fare very well in independent firewall testing.
5. Lock out unwanted guests

If you share your computer with others — and even if you don’t — Windows Vista includes a neat way to keep unwanted guests from guessing your systems administrator password. When you set up users and declare one user as administrator with full privileges, Windows Vista allows outsiders unlimited guesses at the password you chose. Here’s how to limit the guesses.

* Click Start, then type “Local Security Policy.”
* Click Account Lockout Policy.
* Choose Account Lockout Threshold.
* At the prompt, enter the number of invalid log-ins you’ll accept (say, three).
* Click OK and close.

6. Now audit your attackers

With the Account Lockout policy in place, you can now enable auditing to see any account attacks. To turn on auditing for failed log-on events, do the following:

* Click the Start button, type “secpol.msc,” and click the secpol icon.
* Click on Local Policies and then Audit Policy.
* Right-click on “Audit account log-on events policy,” and select Properties.
* Check the Failure box, and click OK.
* Right-click on “Audit log-on events policy” and select Properties.
* Check the Failure box and click OK.
* Close the Local Security Policy window.

You can then use the Event Viewer (by running eventvwr.msc) to view the logs under Windows Logs and Security.
7. Secure your Internet Explorer settings

The Windows Security Center will also report whether your Internet Explorer 7 (or IE 8) security settings are at their recommended levels. If the screen shows this section as red, you can adjust the settings within the browser itself.

* Within Internet Explorer, click Tools in the menu bar.
* From the drop-down menu, click Internet Options.
* Choose the Security tab.
* Within the Security tab, click Custom Level.

Here you’ll see a window with all the security options for the browser. If any are below the recommended level (if, say, some malware reconfigured your browser settings), these options will be highlighted in red.

To change an individual setting, click the appropriate radio button. To reset them all, use the button near the bottom of the tab. You can also change the overall security setting for Internet Explorer from the default Medium-High setting to the recommended High or Medium, if you wish. Click OK to save and close.

8. Use OpenDNS

Domain Name System (DNS) servers act as a phone book. When you type “pcworld.com” in the address bar, for instance, your browser sends that common-name request to your Internet service provider’s DNS servers to be converted into a series of numbers, or an IP address.

Lately, DNS servers have come under attack, with criminals seeking to redirect common DNS preferences to servers that they control. One way to stop such abuse is to use OpenDNS.

Go to Start, Control Panel, Network and Internet, and then click Network and Sharing Center. Under the tasks listed on the left, click Manage Network Connections. In the Manage Network Connections window, do the following:

* Right-click on the icon representing your network card.
* Click Properties.
* Click Internet Protocol Version 4.
* Click the Properties button.
* Select the Use the following DNS server addresses radio button.
* Type in a primary address of 208.67.222.222.
* Type in a secondary address of 208.67.220.220.
* Click OK.

9. Live with User Account Control

One area where some people might want to see the Windows Security Center turn red is User Account Control (UAC), perhaps the most controversial security feature within Windows Vista. Designed to keep rogue remote software from automatically installing (among other things), UAC has a tendency to thwart legitimate software installations by interrupting the process several times with useless messages.

In Windows 7, you’ll be able to set UAC to the level you want. Until then, you do have some options. One is to disable UAC. I would caution against that, since UAC is meant to warn you of potential danger.

Instead, install TweakUAC, a free utility that enables you to turn UAC on or off as well as provides an intermediate “quiet” mode that keeps UAC on but suppresses administration-elevation prompts. With TweakUAC in quiet mode, UAC will appear to be off to those running as administrator accounts, while people with standard user accounts will still be prompted.
10. Check your work

Now that you’ve tweaked Windows Vista, you can keep tabs on your system’s security with the System Health Report. This diagnostic tool takes input from the Performance and Reliability Monitor and turns it into an information-packed report that can spotlight potential security problems.

* Open Control Panel.
* Click System.
* In the Tasks list, click Performance (near the bottom).
* In the resulting Tasks list, click Advanced tools (near the top).
* Click the last item on the resulting list — “Generate a system health report.”

The report will list any missing drivers that might be causing error codes, tell you whether your antivirus protection is installed and declare whether UAC is turned on. You may want to run this report once a month just to make sure everything’s still good.

Source: ComputerWorld

Apply Vista Theme Easily

Deshack is Tools for apply your Vista Theme Easily, you just install deskhack and choose theme with usual way via PERSONALIZE menu on vista. No More the same windows aero name, but in the personalize-appearance will show all your theme. note : you must take theme into C:\windows\resource\theme\

enjoy!!!

DOWNLOAD

Vista Update Downloader

Vista Update Toolkit is a FREE program which downloads updates directly from Microsoft. Most files can be use with vLite or VUT built-in Integrator!


* Addon Support (Phase 1) – Phase 2 is direct integration
* MSU Files
* Language Packs
* Update Packs!
* Driver Packs!
* Office Service Packs
* Office Updates
* Integrate Updates!
* Simple WIM Image Mounter
* Addon Maker (Silent Installer Creator only)
* Download pre-made silent installers
* Ultimate Extras (Tinker, Dreamscene, Hold ‘Em, etc…)
* Extras (Hyper-V, Windows Search 4.0, etc..)
* Convert multiple MSU to CAB
* Convert multiple Language Packs to CAB
* Can also retrieve cab files from already downloaded updates to integrate with vLite or VUT built-in Integrator biggrin.gif
* Over 320 files available to download! Over 890 if you include the Updates in the Update Packs!
* Much much more…

Known Bugs
*When selecting files to convert from MSU to CAB without closing the converter after a previous conversion… nothing is converted. Needs confirming though smile.gif
———————————————————
What’s new!
*Added WPI Links
*Added addon tab
*Added descriptions for the new october updates
*Fixed Update Integrator completion process
*Fixed multiselect problems on some forms
*Remaining Icons added
*Downloader updated to version 2.2
*Update Detection fixed
*ISO Maker now supports files larger than 4GB
*Simple Registry Editor added
*All downloads can be added without downloading a new VUT version
*Renamed some items from VUD to VUT
*Code Improvements
*Improved Filtering system
*Addon Maker (Silent Installer) lets you import reg files
*Fixed Language Pack Converter
*Added Lime and Black colour scheme
*Added Lime and Fuchsia colour scheme
*Added Fuchsia and Black colour scheme
*Added Fuchsia and Lime colour scheme
*Added x64/x86 filter for all lists
*Fixed when Download queue downloaded wrong item
*Driver Pack uses central info (easily update driver packs info)
*Minor Improvements
*More Minor Improvements
DOWNLOAD

SOURCE : http://www.wincert.net/

DrivermaX Your genious Vista Driver Finder

Note: DriverMax only works on Windows Vista, Windows XP and Windows 2003 (all service packs). Driver downloads are *only* available for Windows Vista and Windows XP users.

DriverMax is a new tool that allows you to download the latest driver updates for your computer. No more searching for rare drivers on discs or on the web or inserting one installation CD after the other. Just create a free account, log in, and start downloading the updates that you need.

You can also export all your current drivers (or just the ones that work ok) to a folder or a compressed file. After reinstalling Windows you will have everything in one place!

Most of the situations when Windows is running slower are caused by faulty driver installations. Windows stores all versions of older drivers just in case you want to go back; sometimes it messes up older versions with more recent ones. The Export Wizard will only export the drivers you select by copying the needed files to a folder or a compressed ZIP file.

After reinstalling Windows all drivers will be back in place in less than 5 minutes – sparing you of searching, inserting disc after disk and losing precious time. The Import Drivers wizard allows you to install all the drivers that you exported earlier. The entire operation might take up to 5-10 minutes.

Just one single computer restart will be required after all drivers are reinstalled!

DriverMax is able to display a complete report of all drivers (versions, release dates) installed on your system. This feature can also be very useful when you want to analyze the differences between the drivers installed on different machines.

detail :
What are the device drivers?

A device driver, or a software driver is a type of computer software, typically developed to make the hardware in your computer work. Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. Often called a driver for short, it is a specialized hardware dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing needs.

Device driver theory

The key design goal of device drivers is abstraction. Every model of hardware (even within the same class of device) is different. Newer models also are released by manufacturers that provide more reliable or better performance and these newer models are often controlled differently.

Computers and their operating systems cannot be expected to know how to control every device, both now and in the future. To solve this problem, operating systems essentially dictate how every type of device should be controlled. The function of the device driver is then to translate these OS mandated function calls into device specific calls. In theory a new device, which is controlled in a new manner, should function correctly if a suitable driver is available. This new driver will ensure that the device appears to operate as usual from the operating systems’ point of view.

Depending on the specific computer architecture, drivers can be 8-bit, 16-bit, 32-bit, and more recently, 64-bit. This corresponds directly to the architecture of the operating system for which those drivers were developed. For example, in 16-bit Windows 3.11, most drivers were 16-bits, while most drivers for 32-bit Windows XP are 32-bit. More recently, specific 64-bit Linux and Windows versions have required hardware vendors to provide newer 64-bit drivers for their devices.

Device driver development

Writing a device driver is considered a challenge in most cases, as it requires an in-depth understanding of how a given platform functions, both at the hardware and the software level. Because many device drivers execute in kernel mode, software bugs often have much more damaging effects to the system. This is in contrast to most types of user-level software running under modern operating systems, which can be stopped without greatly affecting the rest of the system. Even drivers executing in user mode can crash a system if the device being controlled is erroneously programmed. These factors make it more difficult and dangerous to diagnose problems.

All of this means that the engineers most likely to write device drivers come from the companies that develop the hardware. This is because they have more complete access to information about the design of their hardware than most outsiders. Moreover, it was traditionally considered in the hardware manufacturer’s interest to guarantee that their clients would be able to use their hardware in an optimum way. However, in recent years non-vendors too have written numerous device drivers, mainly for use under free operating systems. In such cases, co-operation on behalf of the vendor is still important, however, as reverse engineering is much more difficult with hardware than it is with software, meaning it may take a long time to learn to operate hardware that has an unknown interface.

In Windows, Microsoft is attempting to address the issues of system instability by poorly written device drivers by creating a new framework for driver development known as Windows Driver Foundation (WDF). This includes UMDF User Mode Driver Framework that encourages development of certain types of drivers – primarily those that implement a message-based protocol for communicating with their devices – as user mode drivers. If such drivers malfunction they will not cause system instability. The KMDF Kernel Mode Driver Framework model continues to allow development of kernel-mode device drivers, but attempts to provide standard implementations of functions that are well known to cause problems, including cancellation of I/O operations, power management, and plug and play device support.

Device driver applications

Because of the diversity of modern hardware and operating systems, many ways exist in which drivers can be used. Drivers are used for interfacing with:

Printers

Video adapters

Network cards

Sound cards

Local buses of various sorts – in particular, for bus mastering on modern systems

Low-bandwidth I/O buses of various sorts (for pointing devices such as mice, keyboards, USB, etc.)

computer storage devices such as hard disk, CD-ROM and floppy disk buses (ATA, SATA, SCSI)

Implementing support for different file systems

Implementing support for image scanners and digital cameras

Choosing and installing the correct device drivers for given hardware is often a key component of computer system configuration.

Virtual device drivers

A particular variant of device drivers are virtual device drivers. They are used in virtualization environments, for example when an MS-DOS program is run on a Microsoft Windows computer or when a guest operating system is run inside e.g. VMware. Instead of enabling the guest operating system to dialog with hardware, virtual device drivers take the opposite role and emulate a piece of hardware, so that the guest operating system and its drivers running inside a virtual machine can have the illusion of accessing real hardware. Attempts by the guest operating system to access the hardware are routed to the virtual device driver in the host operating system as e.g. function calls.

The virtual device driver can also send simulated processor-level events like interrupts into the virtual machine.





drivermax easily find tour device driver
source www.innovative-sol.com

DOWNLOAD DRIVERMAX

Take Control Vista Files Software

What is Take Control?
Take Control lets you take ownership and get full control of any system file with ease
Features
Take ownership over every file and allows you to save and import lists of the files you have taken ownership of so the next time you can just import all files instead of finding and applying them all
System Requirements
Windows Vista

DOWNLOAD