Malice
BMFH
- Joined
- Mar 26, 2001
- Messages
- 12,734
- Reaction score
- 0
- Points
- 31
Hey all.
I wanted to get your thoughts on this, before I start to write a FAQ on this.
Lets assume LINUX is not an options here...so lets not go there ...windows only.
Assume you need any of the following solutions resolved:
1) You are an admin of the PC, and the person that will use this on a regular basis, will have it all the time. They need to use it, with very very few times, needing to install or configure anything other than the initial load. It needs to retain its settings after each reboot.
2) Similar to the first one, but noone but you have a username, except guest. Guest is logon to allow anyone to get to the web, run office, and a few other thinks....when the machine is rebooted it wipes the cache or something like that and goes back to a standard image.
I am going to be working on these ideas and type something out in the new future.
Remember, these are being built from a Security standpoint....doing all this and then having it get infected from a rootkit after I hand it over to someone is pointless.
I wanted to get your thoughts on this, before I start to write a FAQ on this.
Lets assume LINUX is not an options here...so lets not go there ...windows only.
Assume you need any of the following solutions resolved:
1) You are an admin of the PC, and the person that will use this on a regular basis, will have it all the time. They need to use it, with very very few times, needing to install or configure anything other than the initial load. It needs to retain its settings after each reboot.
2) Similar to the first one, but noone but you have a username, except guest. Guest is logon to allow anyone to get to the web, run office, and a few other thinks....when the machine is rebooted it wipes the cache or something like that and goes back to a standard image.
I am going to be working on these ideas and type something out in the new future.
Remember, these are being built from a Security standpoint....doing all this and then having it get infected from a rootkit after I hand it over to someone is pointless.