Advertisement
paranoidsbible

===Windows 7 Special -- Defaulting===

Jan 3rd, 2018
2,511
1
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 26.43 KB | None | 1 0
  1. ===Windows 7 Special -- Defaulting===
  2.  
  3. Non-profit and free for redistribution
  4. Written on January 3rd | 2018
  5. Published on January 3rd | 2018
  6.  
  7. For entertainment and research purposes only
  8. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  9.  
  10. DISCLAIMER
  11. The Paranoid's Bible and its writers hold no responsibility for the acts of others.
  12.  
  13. The Paranoid’s Bible is for research and entertainment purposes only.
  14.  
  15. Please visit our blog for more PDFs and information: http://www.paranoidsbible.tumblr.com/
  16. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  17.  
  18. ===Preface===
  19. Once you've finished the initial installation of 7, you should come to the desktop after it logs in or requests you to login. From here on out, we’ll work on doing the act of "Defaulting," which is where the end-user, while offline and NOT on any networks, uses nothing more than what is provided with the OS to configure, tweak and adjust settings (I.E: Setting things to your preferred defaults, or in this case for maximum security and privacy).
  20.  
  21. The reasoning for this is, while we're offline, we can avoid a lot of common mishaps and problems, like the system becoming compromised before doing any real security or configuring. The other reasoning for this is to lessen distractions and help you concentrate on the task at hand: Creating a clean environment for you to use.
  22.  
  23. So, before we begin, we wish to remind you to take breaks while doing this. We'll make notes of where you should take a break, however if you feel overwhelmed at any point in this guide... then, yes, take a break and come back to working on it. It's good practice to be patient and to take breaks when working on any operating system as it'll help you prevent mistakes and leaving any glaring holes in place.
  24.  
  25. ===REMEMBER===: You'll not be installing any drivers or programs, yet. This is so it's easier for you to adjust and control your system.
  26. ++++++++++++++++++++++++++++++++++++++++++++++++++++
  27.  
  28. ===Starting off Small===
  29.  
  30. Now, before we begin, have your USB ready for we’ll make a backup of our registry and do some minor tweaking before we do anything else.
  31. > Start Button
  32. > Type in “Regedit” and hit enter
  33. > In Regedit, select the “File” menu
  34. > Then select “Export” and save that file to your USB.
  35. > You’ve now backed up your registry
  36.  
  37. - --Disable User assist logs--
  38. HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Explorer\UserAssist\
  39. > Look for the two sub-keys called "Count"
  40. > Delete both of thesesub- keys
  41. > Now right-click on the “userassist” key
  42. > Scroll down to the “New” submenu
  43. > Create a new folder/key named "Settings"
  44. > In the “Settings” folder/key create a new DWORD value
  45. > Name this new DWORD "NoLog" and set value to 1
  46. > Windows should no longer store logs on your activity
  47.  
  48. --- Unload DLLs---
  49. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
  50. > In the “Explorer” folder/key
  51. > Right-click and create a new DWORD
  52. > Name it "AlwaysUnloadDLL" and set its value to 1
  53.  
  54. - --Tweaking NTFS to prevent some leaks---
  55. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Filesystem
  56. > In the “Filesystem” folder/key
  57. > Right-click and create a new DWORD
  58. > Name it "NtfsDisable8dot3NameCreation" and set it to 1
  59. --- Disable records, time and dates.---
  60. > In the “Filesystem” folder/key
  61. > Right-click and create a new DWORD
  62. > Name it NtfsDisableLastAccessUpdate and set it to 1
  63.  
  64. Exit out of the registry and proceed below.
  65.  
  66. Now click:
  67. Start > Control Panel > System and Security > Administrative Tools > Computer Management
  68.  
  69. Once inside:
  70. Computer Management > Performance > Data Collector Sets > Startup Event Trace Sessions
  71.  
  72. In this area, double click each item and set it to disable, which can be done by going to the “Trace Session” tab in the properties window that pops up and uncheck/disable the “Enable” option. From here, just hit apply and OK.
  73.  
  74. After the above, we’ll start small and work our way up. The first step here is to right-click your taskbar and select properties.
  75.  
  76. > Right-click taskbar
  77. > Select "Properties" from the menu that appears
  78. > Un-tick/disable "Lock the taskbar"
  79. > Tick/enable "Auto-hide the taskbar"
  80. > Tick/enable "Use small icons"
  81. > Taskbar location is up to you
  82. > Taskbar buttons should be set to "Never Combine"
  83. > For Notification area, you'll have to set it to what you want
  84.  
  85. Move onto the "Start Menu" tab.
  86. > Start Menu tab
  87. > Customization is up to you
  88. > Same applies to the "Power button action"
  89. > Un-tick/disable "Store and display recently opened programs in the Start menu"
  90. > Un-tick/disable "Store and display recently opened items in the Start menu and taskbar"
  91.  
  92. Moving to the "Toolbar" menu
  93. > Disable/un-tick everything here
  94.  
  95. The reasoning for the above is that you just removed some of the most commonly intrusive items that can be used by the forensic analysts, besides that you've reclaimed some resources and space that can be better used. While not optimized for the user, and could potentially cause some extra-clicks in the end, you did help lessen some potential issues besides making things look a little neater.
  96.  
  97. Now right-click the desktop and select "Personalize" from the menu that appears, do the following…
  98. > Personalization window appears
  99. > Click the "background" link from below
  100. > Select "Solid colors" from the drop-down menu in the windows that appears
  101. > Choose a color you wish to use
  102. > Click "OK"
  103. > In the same window from the beginning
  104. > Click the "Sound" link
  105. > In the window that appears, select "No sound" from the drop down
  106. > Click "Apply" and then "OK"
  107. > Click the "Change desktop icons" link on the upper most left of the "personalization" window
  108. > Adjust as you see fit, ensure "Allow themes to change desktop icons" is un-ticked/disabled
  109. > Click "OK" to return to the original window
  110. > Click "Change mouse pointers" link
  111. > Adjust how you see fit, however in the "Pointers Options" tab disable/un-tick the "Enhance pointer precision" option
  112. > In the "Pointers" tab, ensure you've disabled/un-ticked the "Allow themes to change mouse pointers" option
  113. > Click "Apply" and then "OK"
  114. > Exit out of the personalization window
  115.  
  116. The above saved you some resources and helped cut down on some annoyances you might experience down the line. It also helps us make the system look less appealing to shoulder surfers and nosey individuals. Doesn't matter, we all know one person who'd sit and watch over our shoulders; ergo this will help keep them uninterested to some extent.
  117.  
  118. Right-click the "My computer" icon on the desktop and select "Properties" from the menu that appears…
  119. > Click the "Advanced system settings" link
  120. > In the "Advanced" tab, click the "Performance" tab
  121. > In the "Visual Effects" tab, tick/select the "Adjust for best performance" option and click "Apply"
  122. > Click the "Advanced" tab and click the "Change" button in the "Virtual memory" section
  123. > Un-tick/disable "Automatically manage paging file size for all drives"
  124. > Tick/enable the "No paging file" option and then click the "Set" button.
  125. > Click the "OK" button and then the "Apply" button. DO NOT RESTART YET
  126. > Click the "OK" button again to return to the "System Properties" window
  127. > Still on the "Advanced" tab, click the "Settings" button in Startup and Recovery
  128. > Now un-tick/disable "Write an event to the system log" and "Automatically restart"
  129. > Set "Debugging Information" to "None"
  130. > Click the "OK" button again to return to the "System Properties" window
  131. > In the "System Protection" tab, click the "Configure" button
  132. > In the window that appears, tick/enable "Turn off system protection" option
  133. > Adjust the slider to "0 bytes"
  134. > Then click the "Delete' button to clear any backups/restore points made
  135. > Hit "Apply" and then the "OK" button to return
  136. > In the "Remote" tab, un-tick/disable "Allow Remote Assistance connections to this computer"
  137. > Tick/enable "Don't allow connections to this computer"
  138. > Click "Apply" and then "OK".
  139.  
  140. The reasoning for the above is to reclaim resources, prevent some of the most commonly targeted areas/features the forensic analysts dig into, and to basically help prevent traces from being made.
  141.  
  142. You may now restart your computer, however we recommend that at this point you take a few minutes for a break and decompress a bit before continuing. The reason for this, as stated previously, is to prevent you from feeling overwhelmed. Get up, take a walk around your room or house, get something to drink and stretch before continuing.
  143.  
  144. =====================================================================================
  145. TAKE A BREAK HERE
  146. =====================================================================================
  147.  
  148. ===Defaulting, Continued===
  149.  
  150. Once you've taken your break and restarted your computer, click the "Start" button.
  151. > Start button
  152. > Click the "Control Panel" button
  153. > "View by" drop down menu, select "large icons" for easier navigation
  154. > Click the "User Actions" icon
  155. > Navigate to the "Change User Account Control settings" link and click it
  156. > Adjust slider to the way bottom/"Never notify" and click "OK"
  157. > Return to control panel
  158.  
  159. We've disabled some of the pesky alerts and allowed ourselves to do more without being sidetracked by pop-ups every few seconds.
  160.  
  161. Go ahead and click the "Action Center" icon.
  162. > Action Center
  163. > Click the "Customer Experience Improvement Program settings" link
  164. > Ensure "No, I don't want to participate in the program" is selected
  165. > Click the "Problem reporting settings" and ensure "Never check for solutions" is selected
  166. > On the main window of the "Action center" settings, ensure you've un-ticked/disabled all options there.
  167. > Click "OK
  168. > Return to "Control Panel"
  169.  
  170. You've cut down on some of the info spreading behavior that's trademarked to Microsoft, besides disabling some logs used by forensic analysts.
  171.  
  172. Ignore "Administrative tools" for now and click the "AutoPlay" icon.
  173. > In the "AutoPlay" window
  174. > Un-tick/disable "Use Autoplay for all media and devices"
  175. > Set everything to "Take no action"
  176.  
  177. Prevents autoplay, which means you've prevented some obvious tactics used by people to try and spread malicious content to your computer.
  178.  
  179. Ignore "Backup and Restore," move directly to "Bitlocker Drive Encryption". Here you'll just want to ensure everything is disabled/set to off. You'll be using a better 3rd party encryption later on in this series of guides.
  180.  
  181. Ignore and skip the below areas:
  182. - "Color management" (unless you've some sort of preference you wish to use)
  183. - "Credential Manager", "Date and Time" (skip for now)
  184. - "Default Programs" (unless you've a specific preference)
  185. - "Desktop Gadgets" (Will be removed later as it's useless and a waste)
  186. - "Device Manager" (skip for now)
  187. - "Devices and Printers" (skip for now)
  188. - "Display" (unless you've a specific preference)
  189.  
  190. Click the "Ease of Access" icon and ignore everything there, save for the two settings "Always read this section aloud" & "Always scan this section". You'll want to un-tick/disable those two settings to prevent any potential issues in the future.
  191.  
  192. Moving onto "Folder Options, click its icon…
  193. > Folder Options
  194. > "General tab"
  195. > Up to you, however un-tick/disable the bottom two options
  196. > "Show all folders" & "Automatically expand to current folder" should be disabled/un-ticked
  197. > "View" tab, tick/enable only the below items
  198. - Always show icons, never thumbnails (prevents thumbnail caching)
  199. - Display the full path in the title bar (easier to navigate and make note of where things are)
  200. - Don't show hidden folders or drives (you can change this as needed)
  201. - Hide empty drives in the Computer folder (you can change this as needed)
  202. - Hide extensions for known file types (you can change this as needed)
  203. - Hide protected operating system files (you can change this as needed)
  204. - Show drive letters
  205. - Show encrypted or compressed NTFS files in color
  206. - Show pop-up description for folder and desktop items
  207.  
  208. ==Remember==: If it wasn't listed in the above for "Folder options," then we don't recommend it, however if you feel you need it then that's up you. We can't guarantee anything outside of our own knowledge.
  209.  
  210. > Still in "Folder Options"
  211. > "Search" tab
  212. > Enable/tick "Always search for file names and contents"
  213. > Enable/tick only the below settings
  214. - Include subfolders in search results when searching in file folders
  215. - Find partial matches
  216. - Don't use the index when searching in file folders for system files
  217. - Include system directories
  218. - Include compressed files
  219.  
  220. ==Remember==: If it wasn't listed in the above for "Folder options," then we don't recommend it, however if you feel you need it then that's up you. We can't guarantee anything outside of our own knowledge.
  221.  
  222. Ignore and skip the below areas:
  223. - Fonts (unless you need to add or remove. Remember more fonts = distinguishable systems)
  224. - Getting Started
  225.  
  226. Click the "Home Group" icon.
  227. > Click the "Change advanced sharing settings..."
  228. > Tick/enable all three of the "Turn off" settings
  229. - Turn off Network discovery
  230. - Turn off file and printer sharing
  231. - Turn off Public folder sharing
  232. > Still on the same the window, ensure the below settings are selected/enabled
  233. - Use 128-bit encryption to help protect file sharing connections
  234. - Turn on password protected sharing
  235. > Click save changes and return to Control Panel
  236.  
  237. Click the "Indexing Options" icon.
  238. > Click the "Modify" button
  239. > Click the "Show all locations" button
  240. > Check/click the box next to your "local disk" and then click the box again to uncheck everything
  241. > Repeat the above step with offline file
  242. > Double click "Start Menu" to see if anything appears, if not, you most likely disabled/unchecked all locations for indexing
  243. > Click OK" and then click "Close"
  244. > Return to Control Panel
  245.  
  246. Ignore and skip the below areas:
  247. - Keyboard (unless you've a specific preference)
  248. - Location and Other Sensors (for now)
  249. - Mouse (unless you've a specific preference)
  250.  
  251. Click the "Network and Sharing Center" icon
  252. ===Note===: Under “View your active networks,” if you see something like “Network 1” or similar, ensure it’s set to “Public Network” just to make sure some settings are semi-hardcoded. Always set your network as if it's a "Public Network" just to tighten things up a bit.
  253.  
  254. > Click the "Change adapter settings" link
  255. > Double click your Local Area Connection icon
  256. > Ensure only these three settings are enabled
  257. - Client for Microsoft Networks (for Windows update, will disable later)
  258. - Internet Protocol Version 4 (Enable IPV 6 only if you need it)
  259. - Link-Layer Topology Discovery Mapper I/O Driver
  260. > Click "Okay" and return to Control Panel
  261.  
  262. Ignore and skip the below areas:
  263. - Notification Area Icons (unless you've a specific preference)
  264. - Parental Controls
  265. - Performance Information and Tools
  266. - Personalization (unless you've a specific preference)
  267. - Phone and Modem
  268.  
  269. Click the "Power Options" icon
  270. > Click the "Hide additional plans" menu
  271. > Tick/enable "High performance" and then click "Change plan settings"
  272. > Set "Turn of display" to whatever you want
  273. > Click the "Change advanced power settings" link
  274. - High Performance > Require a password on wake > Yes
  275. - Hard disk > Turn off hard disk after > Whatever you wish
  276. - Desktop background settings > Slide show > Set to "pause"
  277. - Wireless adapter settings > Power saving mode > set to maximum power saving (Shouldn't have wireless on a desktop anyways)
  278. - Sleep > Hibernate after > Never
  279. - Sleep > Allow wake timers > Disable
  280. - USB settings > Whatever you want
  281. - Power buttons and lid > Set to "Shutdown"
  282. - PCI Express > Whatever you want
  283. - Processor power management > Whatever you want
  284. - Display > Whatever you want
  285. - Multimedia settings > Whatever you want
  286. - Internet Explorer > Whatever you want
  287. > Click "Apply" and then "OK"
  288. > Return to the Control Panel
  289.  
  290. Ignore and skip the below areas:
  291. - Programs and Features (for now)
  292. - Recovery
  293. - Region and Language (unless you've a specific preference)
  294. - RemoteApp and Desktop Connections
  295. - Sound (unless you've a specific preference)
  296. - Speech Recognition (unless you've a specific preference)
  297. - Sync Center
  298. - System (for now)
  299. - Taskbar and Start Menu (unless you've a specific preference)
  300.  
  301. Click the "Troubleshooting" icon
  302. > In Troubleshooting click "No" for whether or not you want to use the "updated" help files or to download them
  303. > Click the "Change settings" link to the left
  304. > Enable/tick the below
  305. - Off
  306. > All others should be disabled/un-ticked
  307. > Click "OK"
  308. > Return to Control Panel
  309.  
  310. Ignore and skip the below areas:
  311. - User Accounts
  312. - Windows CardSpace
  313. - Windows Defender (will be deleting)
  314. - Windows Firewall (Will be using a better 3rd party firewall)
  315. - Windows Update (for now)
  316.  
  317. We've now reclaimed some more resources, disabled some annoyances and prevented some areas from being used against us by forensic nerds. You've also further strengthened your system. Now restart your system once again.
  318.  
  319. =====================================================================================
  320. TAKE A BREAK HERE
  321. =====================================================================================
  322.  
  323. ===Taking Inventory===
  324.  
  325. Once we've taken our break and the computer has restarted, and before we do anything else... we're going to "Take inventory," which means we're going to familiarize ourselves a bit with our file system. This is a simple step and is more aimed at helping you rely on yourself more so than any program that exists.
  326.  
  327. You start off simply by going to "My computer' and then selecting the hard disk (Will be referred to as HD from now on) the OS is installed on and looking at your root directory. What's there? You should see folders similar to the below:
  328. - C:\PerfLogs
  329. - C:\Program Files
  330. - C:\Program Files (x86)
  331. - C:\Users
  332. - C:\Windows
  333.  
  334. ===Note===: C:\ is default, so whatever your HD's letter's set to.
  335.  
  336. Each of these will contain sub-folders and file, and those sub-folders will have sub-folders and files and so on and so forth. You don't have to make a note of everything there, however keep a .txt saved on a USB. This will serve as a loose journal on what folders exist and where. You just want the main folders listed, and possibly any sub-folders that standout to you. This way when you clean, check around or simply wish to browse you can make note of any changes that were made of any new files and/or folders created.
  337.  
  338. By doing this, you are basically ensuring nothing has been added without your knowledge. This is quite useful when uninstalled programs, especially games. A lot of programs will create folders and sub-folders that don't necessarily seem related to said program. So, for example, you installed a game from Steam which created a sub-folder called "Gitsgeneral" that isn't even close sounding like anything related to this game. Once you've uninstalled this game, "Gitsgeneral" still exists and you're unsure whether or not it’s safe to delete because you don't know what it's related to or even if it's something you put there.
  339.  
  340. This is why you should take the extra time to familiarize yourself to what folders exists and where on your system, especially in area like C:\Users\Your username here\AppData. There's a ton of folders that get stranded in Appdata, things like leftovers from games or programs you were testing out. So, yes, while a bit time consuming and annoying, make a general note and saving it on a secure USB, you'll be able to keep tabs on what created what and where. This is especially useful when you're manually cleaning traces during one of your monthly nuclear cleans.
  341.  
  342. Once done, take a break before moving onto the next chapter.
  343.  
  344. =====================================================================================
  345. TAKE A BREAK HERE
  346. =====================================================================================
  347.  
  348. ===Removing some bloat===
  349.  
  350. Every system has bloat, and unless you've gotten your hands on an OEM disk or a clean pirated copy of 7, you're going have to deal with uninstalling these items and removing any leftovers by hand. This is why we recommend you "Take inventory". Now, to began, simply click "Start" and then "All programs". Here you'll delete, by hand, any shortcuts you don't need or want (This won't delete this programs). You may get lucky, too, and find a handful of uninstall shortcuts to remove any programs you don't want or like.
  351.  
  352. From here, hit the Control Panel and finally click the "Programs and Features" icon. You'll get a bunch of folders and program names. We'll remove some items that are useless and/or pose a security and/or privacy risk. Below will be a list of things to remove (I.E: Un-tick/uncheck/disable):
  353.  
  354. - Games (Useless, can download free games or get games on any number of platforms)
  355. - Indexing services (Useless, info that can be used by forensic nerds)
  356. - Internet Information Services (useless)
  357. - Internet Information Services Hostable Web Core (useless)
  358. > Media Features, remove only...
  359. - Windows DVD Maker (Useless, better 3rd party programs exist)
  360. - Windows Media Center (useless)
  361. > Leave Windows Media Player alone (needed for some games and software)
  362. > Microsoft .NET Framework (numbers)
  363. - Disable everything that exists as a sub, leaving the main alone (should see a grayed out checkmark then)
  364. Example: Microsoft .NET Framework 3.5.1 is left alone, but the subs Windows Communication Foundation HTTP Activation & Windows Communication Foundation NonHTTP Activation are disabled/unticked
  365. - Microsoft Message Queue (MSMQ) Server
  366. > Print and Document Services (remove completely unless needed)
  367. > If needed, similar to the Microsoft .NET settings, disable everything and ensure it has a grayed out checkmark
  368. - RIP listener
  369. - Services for NFS
  370. - Simple Network Management Protocol (SNMP)
  371. - Simple TCIP services (i.e. echo, daytime etc)
  372. - Subsystem for UNIX-based applications
  373. - Tablet PC Components
  374. - Telnet Client
  375. - Telnet Server
  376. - TFTP Client
  377. - Windows Gadget Platform
  378. - Windows Process Activation Service
  379. - Windows TIFF IFilter
  380.  
  381. Now click the "OK" button, however don't restart your computer just yet (Click the "Restart Later" button). Double check the installed programs and make a note of what's installed. Remove anything you don't want or need, as fewer programs equate less potential problems.
  382.  
  383. You've just removed a bunch of junk and space wasters besides preventing the forensic nerds from using some items against you. Before we end this chapter, however, go to your personal folder (E.G: Your username) and do the following:
  384. - Contacts folder > Delete card/contact info
  385. - Favorites Folder > Delete the two sub-folders
  386. - Links > Delete the useless (three) items there
  387. - Delete the sample/demos in My Pictures & My Music & My Videos
  388.  
  389. You may now restart your computer once you've ensured you've uninstalled and removed anything you don't want or need.
  390.  
  391. ===NOTE===: Don't bother emptying your recycling bin, just yet.
  392.  
  393. =====================================================================================
  394. TAKE A BREAK HERE
  395. =====================================================================================
  396.  
  397. ===Preparing for the Next Guide===
  398.  
  399. As we near the completion of this guide, we'll be installing some programs. Not a lot, just enough to sanitize, clean and adjust the system. The next guide will address settings, registry edits and some manual cleaning before we install our programs and drivers. So, please, remember, take a break if you feel overwhelmed, and to also be patient.
  400.  
  401. Right click your desktop and make a new folder called "Maintenance". Double click and place the below files into it:
  402. - Ancile
  403. - Black Bird
  404. - DWS_Lite
  405. - GWX_control_panel
  406. - Icon Cache Flush
  407. - Run as system
  408. - USB Oblivion
  409. - Windows Privacy Tweaker
  410.  
  411. Unpack each program to their own folders and ensure they're located in the maintenance fold you've created. Open up "Ancile" and copy the folder in there to your desktop. Rename this folder to just "Ancile". Open up the Ancile folder and click the Ancile bat. Follow the prompts given. Let it run and do its thing, this will remove and cleanup a whole mess of loose ends. It'll also prevent Windows 10 from being forced onto your system.
  412.  
  413. Once it's finished, you can remove the folder from the desktop VIA deleting it.
  414.  
  415. Repeat the above with Black bird. You can remove the folder VIA deleting.
  416.  
  417. Go back to maintenance and double-click DWS_Lite. *Redundant*
  418. > DWS_Lite
  419. > "Settings" tab
  420. > Tick/enable the "Enable professional mode" setting and ensure everything's checked
  421. > Go to the "Utilities" tab
  422. > Click "Delete all Windws 10 metro apps"
  423. > Click "Delete one drive"
  424. > Click "Disable UAC"
  425. > Click "Remove all old DWS firewall rules"
  426. > Go to the "Main" tab
  427. > Click "Destroy Windows 7/8.1 Spying" button
  428.  
  429. Go back to maintenance and double-click GWX_control_panel. *Semi-redundant*
  430. > Click the "Delete windows 10 download folders..." button
  431. > Click "Clear Windows Update Cache"
  432. > Exit GWX_control_panel.
  433.  
  434. Go back to maintenance and double-click Windows Privacy Tweaker. *Semi-redundant*
  435. > Go to "Services" tab and then click "Uncheck all"
  436. > Go to "Scheduler" and then click "Uncheck all"
  437. > Go to "Registry" and then click "Uncheck all"
  438. > Click exit and then click the "No, later!" option
  439.  
  440. Go back to maintenance and double-click Icon Cache Cleaner/Rebuilder bat, follow on screen prompts.
  441.  
  442. Go back to maintenance and double-click USB Oblivion, uncheck "Save backup .reg-file," then check "Do real clean". Click the "Clean" button and run it twice. Exit it and you can now restart your computer.
  443.  
  444. Before moving onto the next chapter, please go to C:\Windows\System32\winevt\Logs and remove all event logs from there. The logs should have the extensions of *.evt and *.evtx (Should state “Event Log” as type).
  445.  
  446. The reason for their removal is simple: Less information to be leaked.
  447.  
  448. Now, go to Control Panel > Administrative Tools > Click “Services”.
  449.  
  450. Wait for the window to pop-up, once it has
  451. > Click the “Startup Type” tab
  452. > Ensure it sorts so “Automatic” is clustered at the top
  453. > Find “Windows Event Log” and double-click it
  454. > Set it to “Disable” and click “Apply” then “OK”
  455. > Repeat the above with “Windows Event Collector”
  456.  
  457. Restart your system so settings take effect.
  458. ++++++++++++++++++++++++++++++++++++++++
  459.  
  460. ===Afterword===
  461.  
  462. What you've just done is wholly overlooked by many computer users. While note completely foiling the forensic nerds, you did just make their job a bit harder by taking care of some overlooked areas. While some are seen as placebos or being redundant, you did ensure certain logs and traces won't be made now. So, once you get into the next guide in this series... things will be just that easier.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement