Advertisement
paranoidsbible

===Windows 7 Special -- Getting Ready===

Jan 3rd, 2018
783
1
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 31.05 KB | None | 1 0
  1. ===Windows 7 Special -- Getting Ready===
  2.  
  3. Non-profit and free for redistribution
  4. Written on January 3rd | 2018
  5. Published on January 3rd | 2018
  6.  
  7. For entertainment and research purposes only
  8. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  9.  
  10. DISCLAIMER
  11. The Paranoid's Bible and its writers hold no responsibility for the acts of others.
  12.  
  13. The Paranoid’s Bible is for research and entertainment purposes only.
  14.  
  15. Please visit our blog for more PDFs and information: http://www.paranoidsbible.tumblr.com/
  16. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  17.  
  18. ===Preface===
  19.  
  20. Windows 7 is most likely the last semi-user-friendly operating system to be released by Microsoft. This is mostly due to the fact that, unlike 8 and 10, the end-user can still take control of most things and retain some form of freedom on this proprietary system. Minor tweaks and configurations aside, a truly dedicated user or someone who’s desperate can secure 7 to such a state that it can become a nightmare for forensic analysts.
  21.  
  22. The purpose of this series of guides is to give the users of 7 a taste of what it takes to truly secure and protect their privacy when using anything by Microsoft. Besides that, we also want to get the reader used to digging around and customizing an OS to their needs and wants.
  23.  
  24. We know many within the privacy communities will find this useless or to be some form of faux pas, however we’re writing this for the uninitiated in mind. Many curious parties don’t want to jump feet first in the privacy pool, ergo we allow them to grow at their own rate by helping them customize and learn about something that they already are using—Windows 7.
  25.  
  26. It should be noted though that this doesn’t mean the Free Software Movement should be ignored, nor should any Open Source projects. The more people that get involved and work within these communities means we can see more user friendly software that could, in time, come to challenge proprietary software companies.
  27.  
  28. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  29.  
  30. ===7 and Anti-Forensics===
  31.  
  32. While we know that anything by Microsoft is extremely unsecure, easy to root through and obviously made for the 5-eyes in mind, it can be however, to some extent, secured and made to leave less traces than the norm. While anti-forensics on Windows to some is usually just running Ccleaner and modifying some settings and--depending on who's writing the guide -- some modifications to registry. Windows and anti-forensic is simply a chore and won't do much to stop a determined specialist from digging up your chat logs, embarrassing fan-fics (that you thought were deleted) and the fact that you masturbate to anthromorprhic animals with spiked penises and 12 foot long prehensile tongues.
  33.  
  34. This is why we must assume, when using Windows, that we’re being spied on. Due to it being so widely used and popular amongst gamers, however, Windows is a good system to use in an air-gap setup and as an introduction in securing an operating system. This is also why it’s good to be used as a main OS for your “average user” setup, thus lessening some potential questioning by family, friends, or coworkers.
  35.  
  36. Using Windows for day-to-day activities, like banking, playing games, downloading or streaming movies and shows should help you pollute any results or leaks on yourself with a healthy dose of garbage data that some poor schmuck will have to dig through for anything useful in court or to use against you. The reason for this is that Windows is simply used by a lot of people who don’t know much about computers, thus a lot of forensic analysts get used to simply plugging into or taking someone’s rig and doing a few sweeps.
  37.  
  38. Now, with a few modifications, due diligence, encryption and a few others things… you can keep a lot of traces and tracks off of Windows so if you do mess up, and suddenly the ABCs are banging on your door...they’ll be busy with your Windows rig while you have your other devices hidden somewhere else or simply not on site.
  39.  
  40. ===Resources===
  41. https://en.wikipedia.org/wiki/UKUSA_Agreement
  42. https://en.wikipedia.org/wiki/Alphabet_agencies
  43. https://en.wikipedia.org/wiki/Anti-computer_forensics
  44. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  45.  
  46. ===Why You Need to Practice Anti-Forensic===
  47.  
  48. It’s almost as if it is human nature to lie, cheat and accuse others of what we, ourselves, are guilty of doing. This is one reason why people, even a normal civilian, should fear the witch hunts that can be born from a single accusation. Within the lies spun, stories, conspiracies and rumors are created from the ether that can destroy a person’s social life, way of life, and ultimately ostracize them from society at large.
  49.  
  50. Simply put: People will project what’s most true of themselves onto others.
  51.  
  52. The zealot with dirty thoughts will accuse of others of dirty thoughts.
  53.  
  54. The rapist, masquerading as a male feminist, will accuse other men (feminist or not) of being rapists.
  55.  
  56. The ultra-left-leaning activist will accuse all others of being bigoted, while they, themselves, are bigoted.
  57.  
  58. This means that anyone ranging from an activist to a leaker to a journalist or civilian need to lessen not only their digital footprints but also the tracks left on their personal devices. Sure, OPSEC and INFOSEC are great starts, however if, for whatever reason, someone decides to paint a scarlet letter on your back… you’ll be up a creek without a paddle whenever they decide to seize your personal devices and whatever other piece of technology they deem needed or suspicious.
  59.  
  60. Again, this is why you need to look into anti-forensics--just in case you're ever accused of something you haven't done or want known.
  61. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  62.  
  63. ===Everyone Assumes, so Don’t===
  64.  
  65. A lot of people working for the ABCs and law enforcement in general have an ego and tend to power trip. They think themselves more intelligent or more physically suited for whatever it is they do. This is a benefit to many because they believe everyone’s an “average internet user” that doesn’t know the difference between a monitor and tower.
  66.  
  67. Use this to your advantage when building a “sticky rig” and setting it up.
  68.  
  69. ===Note:=== Sticky rig is a rig created for day-to-day use under the assumption that it'll be the one targeted in case of a seizure or warranted search. This is due to it being the one connected to the internet the most and the most stationary owned piece of tech.
  70.  
  71. These people think that your average hobbyist believes that moving and renaming files will somehow halt investigations. No, it’s true (http://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-1). While, yes, a lot of uneducated users and posers exists who try to gain some sort of “cred” by spouting off some asinine techno-babble they learned from whatever CSI show is in flavor, (some of) the people who do forensic analysis believe this to be everyone else with a computer.
  72.  
  73. Like any wise tactician, you really should investigate the competition. If there are forensic white papers or some loud mouth’s personal website or blog that discusses these things—dig through it. This will help you counter some but not all methods being deployed to dig through a rig and tech. However don’t become an egotistical little snot like other people. While it helps to be confident and prepared it also helps to play into their hand and lay about several false positives for them dig through.
  74.  
  75. The real thing here is to waste their time, energy, money and resources. While there are legitimate anti-forensic methods, with any propriety software you’re just preventing the inevitable. So while it pays in time to layer up your security on all your rigs, don’t be too shocked if you mess up down the line and they seize your rig if you end up in a SHTF situation.
  76.  
  77. Generally, read up on the competition before thinking you’re in the green. These people have better toys than most and are paid to sit around all day finding ways to incriminate you even if you accidentally visited that underage Thai lady-boy escort site.
  78.  
  79. ===Remember: === Some of these people are so egotistical that they’ll claim running Bleachbit or Ccleaner as being anti-forensic. Let that rumble around your mind for a bit—they think basic maintenance is anti-forensic.
  80.  
  81. ===Resources===
  82. https://belkasoft.com/countering-anti-forensic-efforts-part-2
  83. http://www.forensicmag.com/article/2015/09/countering-anti-forensic-efforts-part-1
  84. http://cyberforensicator.com/
  85. https://belkasoft.com/
  86. https://belkasoft.com/en/sqlite-analysis
  87. https://www.usenix.org/legacy/event/fast11/tech/full_papers/Wei.pdf
  88. ++++++++++++++++++++++++++++++++++++++
  89.  
  90. ===Preparing your Rig===
  91.  
  92. So, the first thing you must realize is that you need to do this on a fresh/clean install meaning that you’ve recently just installed 7. Any version works, in a sense, however Ultimate edition (64 bit) is recommended simply because it’s easier to work with and comes packed with a few more goodies than other editions.
  93.  
  94. The second thing you’ll need to realize is that Microsoft is putting all of its eggs in 10; ergo support is ending or has ended for most other versions of Windows. This means you need to either get your hands on an OEM copy or a pirated edition. While we don’t recommend piracy, it’s the sad state of things when it comes to Microsoft.
  95.  
  96. Third, once it hits 2020 support for 7 officially ends. No more updates, fixes, patches or anything. After that, whatever was done is done and you’re up a creek. So, please, really look into an open source/free software operating system, soon.
  97.  
  98. Finally, old hardware (2009 or older) is king as many will claim from a privacy enthusiast’s point of view. A lot of new hardware is already infected with corporate or government code. This can’t be removed or cleansed, it just exists. We must assume it’ll always exist simply because we never know what’s fully done to proprietary hardware, and that even if a source is released not everyone will be digging through it for flaws or exploits (or even willing to make them public).
  99.  
  100. So, to recap: Look toward grabbing an OEM copy of Windows Ultimate 64, some 2009 or older hardware (Focus on AMD and a board that supports ddr2 sticks that maxes out at 8 to 16 gigs). Then, obviously, focus on passive cooling (heatsinks, high-end thermal paste, powerful fans…etc) to help lessen the drawbacks of heat. This way you can avoid most (government or corporate) infected hardware and not worry about it broadcasting things to whoever paid or threatened its makers into giving them access.
  101.  
  102. While, yes, you can use newer tech and build yourself up a pretty decent gaming rig... anything serious should be done on a rig created from older-tech taken from pre-used rigs purchased from rummage sales and/or second-hand shops, like Goodwill or what have you. The other thing to remember is that if you purchase hardware off the net, there'll always exist the chance of a 3rd party tampering with it, government agents or not, in order to spy on you or infect your system or another party you share a network with.
  103.  
  104. === Tip #1: === Use a hardwired connection, none of that wireless crap. This applies for anything, actually.
  105.  
  106. === Tip #2: === Really research your choice of motherboard before committing to a build. The reason for this is that some boards' bios can be customized with unlocked/custom roms. This could potentially be helpful in the long run.
  107.  
  108. ===Tip #3: === Don’t use SSD. Those things hold a lot information even after secured deletion and a wiping. Keep to platter drives like SATA or IDE. Not as powerful and modern but a good trade off for making a forensic geek work for their keep.
  109.  
  110. ===Tip #4:=== Towers can be safely ordered online as long as you remove pre-installed peripherals.
  111.  
  112. ===Resources ===
  113. https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it
  114. https://www.guidingtech.com/67821/microsoft-support-end-windows-7-8-10/
  115. https://en.wikipedia.org/wiki/Passive_cooling
  116. https://blogs.wsj.com/digits/2014/05/12/greenwald-nsa-plants-backdoors-in-foreign-bound-routers/
  117. https://www.wired.com/2013/09/nsa-router-hacking/
  118. ++++++++++++++++++++++++++++++++++++++
  119.  
  120. ===Air-Gapping and You===
  121.  
  122. While the civilian version isn't as involved or complicated (https://en.wikipedia.org/wiki/Air_gap_(networking)), air-gapping is a major part of any anti-forensic plan. Simply restricting computers to specific tasks and keeping them unplugged when not in use can reduce a huge amount of potential traces from ever being made. This may seem like a waste of space, resources and time however in the long run it is a gift from heaven, especially when you take into account that it means less maintenance for you, which roughly translates to less wear and tear on your hardware.
  123.  
  124. You don't need to waste a lot of money, nor do have to reduce several rigs to a single task. The form of air-gapping that we're going to discuss is a dumb-downed version meant to help you reduce your tracks but also to reduce your overall potential for screwing up.
  125.  
  126. An example of this form of air-gapping works as thus:
  127.  
  128. - A more powerful rig/system used specifically for gaming, streaming and other intensive things like watching videos on YouTube.
  129.  
  130. - A similar rig as the above use specifically for editing of art, video or for similar projects (note: Usually seen as a burner rig/disposable rig if used for activism, protest, dissent or similar items).
  131.  
  132. - A lower-end rig meant for doing online shopping, banking, taxes and similar items.
  133.  
  134. - A memory intensive rig to serve as a "storage" rig, usually using RAID, for things like photos, videos and other items (note: these storage rigs are usually used for non-threatening or volatile items. E.G: Family photos, home videos, documents, tax backups...etc). This rig will always be disconnected from the internet and any network.
  135.  
  136. - A burner/throwaway top (Netbook or laptop) used for a variety of things, like dispersing content for activism, propaganda or for other similar purposes (or even nefarious means).
  137.  
  138. - A burner/throwaway top (Netbook or laptop) used for poon-vanning, which roughly translates to a disposable laptop and a series of high-capacity USBs used to leech off of open or unsecured WiFi networks to download pornographic content (note: can be applied to pirating parties or raids where a person uses the above to download music or movies).
  139.  
  140. - If you use Social Media, a burner top should be used.
  141.  
  142. - Printers should be bought in cash and from rummage sales. The cash only principle applies for printer ink and paper (Note: Printers have code that can show from what printer something was printed).
  143.  
  144. While basically compartmentalization, doing the above with the items we'll be discussing in the following guides should help you cut down on not only tracks but also resource waste. We've seen some people achieve boot-up times that are just under 10 seconds. This all depends on hardware and how well you maintain your system, however we'll discuss maintenance at a later date, but for now... move onto the next chapter.
  145.  
  146. ===Remember=== If using a burner top, always turn it off and remove the battery before returning to your home. This doesn't mean do it in the garage or a block away. You need to do it right off the bat, ideally a few blocks away from your original starting location (which should be a few miles away from your home) when you first started to download or upload.
  147.  
  148. ===Resources:===
  149. https://en.wikipedia.org/wiki/Printer_steganography
  150. ++++++++++++++++++++++++++++++++++++++
  151.  
  152. ===Mirroring===
  153.  
  154. While this chapter will discuss what mirroring is, we won't go into detail on how to do it, yet. That'll be done within another guide, however for now we feel its pertinent to bring up the fact that an un-discussed and often overlooked step of anti-forensics is knowing when to ditch your current HD for something a little fresher.
  155.  
  156. This is where mirroring comes in to serve as what some will call a time saving method. It's quite simple, actually. You get up to a certain point in preparing the OS, usually after Windows updates and installing your drivers and maintenance related programs. From there, after your first (or second) cleanup and optimization, you use any 3rd party software you like and mirror your HD's current state to one or more backup HDs.
  157.  
  158. This way, if you ever want to remove your current HD, for any reason what so ever, all you have to do is backup a series of miscellaneous files and transfer them to one of your mirrored HDs.
  159. ++++++++++++++++++++++++++++++++++++++
  160.  
  161. ===Recommended Programs===
  162.  
  163. As it says, recommended programs that we’ll list in an alphabetical order with a short description. This is what we’ve used on our test rigs and have found to work nicely. You may deviate as you may have your own.
  164.  
  165. The rule of thumb here is to replace 7’s default or built-in programs with others that work better or more open and free to use. Others are useful in their own ways, however you should only download and install what you believe you need.
  166.  
  167. The less programs installed means the less information you generate.
  168.  
  169. ===Remember:=== Download and place on a USB. This way you'll have them on hand whenever needed.
  170.  
  171. ===Note:=== Always download offline installers where you can, and to also always install your programs offline. Read through everything carefully, ensuring you uncheck/disable any extra-options like a program trying to force-install Chrome.
  172.  
  173. ---Archivers\Unpackers:--- You only need one.
  174.  
  175. 7 Zip: Unpack all the archives, also open source.
  176. http://www.7-zip.org/
  177.  
  178.  
  179.  
  180. ---Antimalware & Anti-virus:--- Download the free versions, not the demos. Set all services to manual or disabled until you need to update and/or run scans.
  181.  
  182. Adaware SE: A multi-scan program that detects malware and some viruses.
  183. https://www.adaware.com/antivirus
  184.  
  185. Emsisoft Emergency Kit: Should remove most possible infections and other malicious items.
  186. https://www.emsisoft.com/en/software/eek/
  187.  
  188. Malwarebytes: Became somewhat more businesslike than before, still good.
  189. https://www.malwarebytes.com/
  190.  
  191. Malwarebytes Anti-Rootkit: You’ll probably need this.
  192. https://www.malwarebytes.com/antirootkit/
  193.  
  194. Spybot S&E: Has trouble finding some infections, however their immunization’s great.
  195. https://www.safer-networking.org/
  196.  
  197. Spyware Blaster: Immunize your computer from potential threats.
  198. https://www.brightfort.com/spywareblaster.html
  199.  
  200.  
  201.  
  202. ---Anti-Spying:--- Stop spying and tweak settings. Always read the documentation. If it doesn’t need to update, block
  203.  
  204. Ancile: Spiritual successor of Aegis.
  205. https://bitbucket.org/ancile_development/ancile/downloads/
  206.  
  207. BeCyPDFMetaEdit: Purge meta-data from PDFs.
  208. http://www.becyhome.de/becypdfmetaedit/description_eng.htm
  209.  
  210. Blackbird: Similar to Ancile, should be ran after Ancile.
  211. http://www.getblackbird.net/
  212.  
  213. Destroy Windows 10 Spying: Redundant but still useful.
  214. https://github.com/Nummer/Destroy-Windows-10-Spying/releases
  215.  
  216. GWX Control Panel: Redundant but still good to have on hand.
  217. http://ultimateoutsider.com/downloads/
  218.  
  219. JPEG & PNG Stripper: Drag & Drop an image file or an entire folder, remove meta.
  220. http://www.steelbytes.com/?mid=30
  221.  
  222. Keyscrambler: Encrypt your keystrokes.
  223. https://www.qfxsoftware.com/
  224.  
  225. Ultimate Windows Tweaker: Redundant as most can be done by hand, still useful for the lazy.
  226. http://www.thewindowsclub.com/ultimate-windows-tweaker-v2-a-tweak-ui-for-windows-7-vista
  227.  
  228. XnView: A bit of an editor, better used to remove meta from images.
  229. https://www.xnview.com/en/
  230.  
  231. XP-AntiSpy: Automate some configs, easier to do for those with little time.
  232. https://xp-antispy.org/en/about/
  233.  
  234. X-setup PRO: Redundant and deprecated, still useful
  235. http://www.majorgeeks.com/files/details/x_setup_pro.html
  236.  
  237. Windows Access Panel: Lazy man’s toy, keep on hand.
  238. http://www.thewindowsclub.com/windows-access-panel-for-windows-7-vista
  239.  
  240. Windows Privacy Tweaker: Can do VIA manual configurations, still good to have on hand.
  241. https://www.phrozen.io/page/windows-privacy-tweaker
  242.  
  243.  
  244.  
  245. ---Browsers:--- Surf the net.
  246.  
  247. Firefox: Was good, slowly becoming crap.
  248. https://www.mozilla.org/en-US/firefox/
  249.  
  250. TOR Browser: Best known for use by TORpedos, good for other things than the ugly.
  251. https://www.torproject.org/
  252.  
  253.  
  254.  
  255. ---Cleaners & General Maintenance:--- Clean temp files, misc files, registry files and other misc items. Can repair some minor items, too. Only update by going to the programs sites, never allow it to auto-update
  256.  
  257. Bleachbit: Gets some things Ccleaner doesn’t.
  258. https://www.bleachbit.org/
  259.  
  260. Ccleaner: Bought up by Avast, however still useful.
  261. https://www.piriform.com/ccleaner/download
  262.  
  263. Clean After Me: Clean up some tough items, good for the lazy.
  264. http://www.nirsoft.net/utils/clean_after_me.html
  265.  
  266. Doc Scrubber: Purge meta data in documents.
  267. https://www.brightfort.com/downloads.html
  268.  
  269. Java Ra: Clean up crap left by Java installs. Fix and tweak some things, use it to uninstall and clean it up fully before installing the latest copy.
  270. https://singularlabs.com/software/javara/
  271.  
  272. Little Registry Cleaner: As it says on the box, however misses some items.
  273. https://sourceforge.net/projects/littlecleaner/
  274.  
  275. MRU-Blaster: Cleans quite a bit more than Privazer.
  276. https://www.brightfort.com/downloads.html
  277.  
  278. MV Regclean 7.0: Cleans registry. Disable its internet connection.
  279. http://www.velasco.com.br/produto.php?uid=0
  280.  
  281. MyDefrag/JkDefrag: Better than windows’ built in, has some decent advantages and even optimizes the system.
  282. http://www.majorgeeks.com/files/details/mydefrag.html
  283.  
  284. Ncleaner: Read the documentation and double check the settings you choose. Some setting tweaking, ignore their “Warning: blah blah setting”.
  285. http://www.majorgeeks.com/files/details/ncleaner.html
  286.  
  287. Privazer: Pretty decent and gets a whole lot of things cleaned in one swoop. Set everything for max privacy and at three wipes.
  288. https://privazer.com/
  289.  
  290. Privazer Shellbag Cleaner: Outdated but useful since the above doesn’t fully clean them.
  291. https://privazer.com/download-shellbag-analyzer-shellbag-cleaner.php
  292.  
  293. Steam Cleaner: Clean up all those junk files from Steam games.
  294. https://github.com/Codeusa/SteamCleaner/releases/
  295.  
  296. System Ninja: Removes a lot of files others miss.
  297. https://singularlabs.com/software/system-ninja/
  298.  
  299. TFC: Cleans Temp Files.
  300. https://www.bleepingcomputer.com/download/tfc/
  301.  
  302. Tron Script: Glorified batch files, helps automated things for cleaning.
  303. https://www.reddit.com/r/TronScript/comments/72gk69/tron_v1024_20140925_fix_ccleaner_vulnerability/
  304.  
  305. USB Oblivion: Remove traces of USB devices.
  306. https://sourceforge.net/projects/usboblivion/
  307.  
  308. Wise Cleaner: Gets a lot of things others don't, however be aware that the WinSxs backup option shouldn't be checked/enabled.
  309. http://www.wisecleaner.com/wise-registry-cleaner.html
  310.  
  311. Wise Registry Cleaner: Similar to the other two recommended reg cleaners, however catches things others don't.
  312. http://www.wisecleaner.com/wise-disk-cleaner.html
  313.  
  314.  
  315.  
  316. ---Diagnostic:--- Benchmark, generate reports, check some items and become increasingly bothered by that random .dll
  317.  
  318. Belarc Advisor: Security auditor for Windows.
  319. https://www.belarc.com/products_belarc_advisor
  320.  
  321. Cports: Network monitoring made easy.
  322. http://www.nirsoft.net/utils/cports.html
  323.  
  324. Executed Programs List: Use to ensure settings stick, if files are shown here you’ll need to make adjustments.
  325. http://www.nirsoft.net/utils/executed_programs_list.html
  326.  
  327. Last Activity View: A good way to gauge if settings stick besides showing you things that need adjusting.
  328. http://www.nirsoft.net/utils/computer_activity_view.html
  329.  
  330. MUI Cache View: Use to view MUI items, can also purge them from here.
  331. http://www.nirsoft.net/utils/muicache_view.html
  332.  
  333. Nmap: A pretty straightforward and easy to use (Once you learn how) network mapper/scanner.
  334. https://nmap.org/
  335.  
  336. Open Save Files View: Use to ensure settings stick, will show what files you opened if the settings aren’t adjusted.
  337. http://www.nirsoft.net/utils/open_save_files_view.html
  338.  
  339. System Internals: A multitude of decent programs like Autoruns. Good to have on hand when doing some digging and diagnostics
  340. https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
  341.  
  342. Turned on Times View: Another useful tool, lets you know when you’ve turned your rig on and off.
  343. http://www.nirsoft.net/utils/computer_turned_on_times.html
  344.  
  345. User Assist View: Yet another tool to use to gauge info on your rig
  346. http://www.nirsoft.net/utils/userassist_view.html
  347.  
  348.  
  349.  
  350. ---Firewall:--- As it says on the box, Joe. Only need one.
  351.  
  352. Comodo: Free firewall, upsets the CIA due to its paranoid mode.
  353. https://www.comodo.com/
  354.  
  355.  
  356.  
  357. ---IM & Chat:---
  358.  
  359. Mumble: Voice chat program that's open source, good alternative for the others.
  360. https://wiki.mumble.info/wiki/Main_Page
  361.  
  362. Pidgin: Simple program that allows you run multiple chat instances, like Skype, IRC or whatever else is supported (If you need to use something like Skype, this is a good alternative).
  363. https://pidgin.im/
  364.  
  365. TOX: Simple IM that offers end-to-end encryption that you route through TOR.
  366. https://tox.chat/
  367.  
  368.  
  369.  
  370. ---Media players:--- Only need the two, really.
  371.  
  372. Combined Community Codec Package: Better to just use this to avoid anything odd or malicious when trying to get things to play.
  373. http://www.cccp-project.net/
  374.  
  375. Foobar2000: Foobar is love, Foobar is life.
  376. https://www.foobar2000.org/
  377.  
  378. Windows 7 GIF Viewer: Get back your .gif viewing ability, also returns a false positive.
  379. http://www.goofwear.com/windows/
  380.  
  381.  
  382.  
  383. ---Preventative:--- As it says on the box, prevent things.
  384.  
  385. Hostman: Lazy-man's solution to editing, updating and managing host files on Windows.
  386. http://www.abelhadigital.com/hostsman
  387.  
  388. Peerblock: Think of it as a meta-firewall that allows you to block IPs VIA lists, whether you download them or make your own.
  389. https://code.google.com/archive/p/peerblock/downloads
  390.  
  391. Winpatrol: Monitors your system for changes, and also alerts you about said changes.
  392. https://www.winpatrol.com/
  393.  
  394.  
  395.  
  396. ---Text editor & Word processor:--- Simple text editors, good replacements for Word and Office.
  397.  
  398. Notepad 2: Notepad replacement, decent enough for editing and fixing code even.
  399. http://www.flos-freeware.ch/notepad2.html
  400.  
  401. That's about it, however you can find more @ https://paranoidsbible.tumblr.com/RP
  402. ++++++++++++++++++++++++++++++++++++++
  403.  
  404. ===Drivers and other Software You'll want on Hand===
  405.  
  406. One other thing to remember when installing Windows is that you'll need quite a few drivers to ensure everything's running as it should be, which usually translates to having an ungodly amount of versions of XNA framework and Visual C++ runtimes. While not exactly needed, to some extent, it does pay in dividends to download and keep several copies on hand of not only your hardware's drivers but some of the 3rd party software usually needed by games or other applications.
  407.  
  408. First and foremost, do research into your hardware. Look at manuals and use a program like CPU-Z to get the information you need, usually just names and version numbers. It's really important to also do your research on whether or not you should update, as some so-called "updates" can actually make your system unstable or brick it.
  409.  
  410. So, to recap: RESEARCH! RESEARCH! RESEARCH!
  411.  
  412. Your first step should be to find the appropriate drivers for your audio and graphics chipsets/cards. From there, double-check your hardware's documentation to see what other drivers you made need. You'll want to be doing this before setting up and working on your new rig. Finally, you'll most likely need the below software, especially if you're going to try using anything like games.
  413.  
  414. ===Note: === Go ahead and get your latest bios, in case, however really do look into if you need to update or not. Screwing up bios can brick your rig.
  415.  
  416. .NET Framework: Another common 3rd party software games usually need or want.
  417. https://www.microsoft.com/en-us/download/details.aspx?id=21
  418. https://www.microsoft.com/en-us/download/details.aspx?id=17718
  419.  
  420. Direct X: You should know about this by now.
  421. https://www.microsoft.com/en-us/download/details.aspx?id=35
  422.  
  423. Flash: Should be dead by now, honestly.
  424. https://www.adobe.com/support/flashplayer/debug_downloads.html
  425.  
  426. ===Note:=== Just grab the Flash Player Projector if you really need to play or goof around with any .SWF files. Use a download add-on for Firefox to grab games or whatever it is you're looking for or want.
  427.  
  428. Java: A true horror story.
  429. https://www.java.com/en/download/
  430.  
  431. ===Note:=== Download the latest offline installer. Never let it connect to the internet, nor should you let it auto-update. Use Java Ra to uninstall it before installing the latest version. Run Java Ra again to clean up random junk Java creates.
  432.  
  433. OpenAL: OpenAL is a cross-platform 3D audio API, used in games and other software. Grab both the Windows installer and SDK.
  434. https://www.openal.org/downloads/
  435.  
  436. PhysX: NVIDIA PhysX is a physics engine.
  437. http://www.nvidia.com/object/physx-9.17.0524-driver.html
  438.  
  439. Visual C ++: The demonic bastard from Microsoft that almost every game tries to install, especially if you download something from Steam.
  440. https://support.microsoft.com/en-us/help/2977003/the-latest-supported-visual-c-downloads
  441.  
  442. ===Note:=== You'll want to grab all Win 7 supported downloads, specifically offline installers if they have them. You'll want mostly 64 bit, however a few games or applications will force 32 bit on their own. Don't fret, they'll usually push those versions themselves.
  443.  
  444. XNA Framework: Microsoft XNA is a freeware set of tools.
  445. https://www.microsoft.com/en-us/download/details.aspx?id=15163
  446. https://www.microsoft.com/en-us/download/details.aspx?id=20914
  447.  
  448. ===Note:=== Very rarely will you actually need the above. The same applies to anything before 3.1. Just grab the two above (3.1 and 4.0) to be on the safe side.
  449.  
  450.  
  451.  
  452. ===Updates to make Windows Updates Work:===
  453.  
  454. ===Notes:=== Ensure you get the proper versions for your OS (E.G: x64)
  455.  
  456. KB3102810: Speedup WU and increases its speed.
  457. https://www.microsoft.com/en-us/download/details.aspx?id=49540
  458.  
  459. KB3112343: Fixes.
  460. https://www.microsoft.com/en-us/download/details.aspx?id=50031
  461.  
  462. KB3138612: More fixes.
  463. https://www.microsoft.com/en-us/download/details.aspx?id=51212
  464.  
  465. KB4019990: More fixes. Choose the appropriate version.
  466. https://www.catalog.update.microsoft.com/Search.aspx?q=KB4019990
  467.  
  468. WindowsUpdateAgent-7.6-x64: Updates the client. Choose the appropriate version.
  469. https://support.microsoft.com/en-us/help/3138612/windows-update-client-for-windows-7-and-windows-server-2008-r2-march-2
  470. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  471.  
  472. ===Afterword====
  473.  
  474. This is honestly just a quick primer to ensure you're prepared to what you're getting into and making sure you get your hardware and software prepared for what's to come. Once done with this, take a break, then start formulating your game plan. You're going to want to ensure that you've gotten all your software in order and backed up on a USB or two before even thinking about installing Windows 7. The reason for this is to ensure you're not scrambling and downloading anything while unprotected.
  475.  
  476. Before you move onto the next guide, please head over to https:// www.speedtest.net and record your net's download speed. This will be used for a later guide.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement