Windows is NOT Safe
# Why Windows Isn't Secure: A Deep Dive into its Vulnerabilities and How to Protect Yourself
## Introduction
Before diving into the technical aspects, the speaker takes a moment to acknowledge the importance of Windows in their career. They mention having 11 professional certifications and earning over a million dollars in the past 20 years, attributing much of this success to Windows. However, they also emphasize that Windows has its vulnerabilities and is not as secure as many users might think. The goal of this article is to educate users on these vulnerabilities and provide actionable steps to make their systems more secure.
---
## Why Internet Security Suites Don't Work
The speaker strongly advises against wasting money on internet security suites, calling them "garbage" that doesn’t significantly improve system security. They argue that no amount of money spent on such software will protect your system from the vulnerabilities they are about to discuss. Instead, they focus on methods that work across any system, even so-called "locked-down" systems.
---
## PowerShell: The Ultimate System Control Tool
PowerShell is described as one of the most powerful tools in Windows, capable of making extensive changes to a system. When run with administrative privileges, it allows almost anything to be done to a system. For example, accessing `assistdm.cpl` (an old-school system properties tool) or modifying registry settings becomes easy with PowerShell.
The speaker warns that once someone has administrative access to PowerShell, the game is over—they can control the system completely. To mitigate this risk, they suggest disabling PowerShell and re-enabling it only when necessary. However, they acknowledge that this might not always be practical, especially for users who need PowerShell for legitimate purposes.
---
## Task Scheduler: A Weak Point in Windows Security
Task Scheduler has been around since the XP era and remains a vulnerability to this day. Users can create numerous tasks, including self-elevating ones, which can execute malicious code or unwanted scripts. The speaker recommends reviewing all scheduled tasks to ensure they are legitimate and disabling any unnecessary ones.
For example, they highlight software like Riva Statistics Tuner (for gaming FPS counters) and MSI Afterburner, noting that some of these tasks might not be necessary and could slow down the system or pose security risks. Disabling unwanted tasks can improve performance and reduce vulnerabilities.
---
## Visual Basic Scripts (VBScripts): A Common Attack Vector
VBScripts are native to Windows and have been historically problematic due to their association with viruses and malicious activities. The speaker warns users to be cautious when encountering files ending in `.vbs`, as these scripts can often lead to security breaches.
They demonstrate an example by saving a generic deployment script from GitHub as `test.vbs` and running it, showing how antivirus software might not catch all threats associated with such scripts. They also mention legitimate business use cases for VBScripts but stress the importance of being cautious when dealing with them.
---
## Group Policy Editor: A Double-Edged Sword
The Group Policy Editor is a powerful tool for configuring system settings, but it can also be misused to bypass security measures like PowerShell restrictions. The speaker explains how attackers might use this tool to run malicious scripts on startup or shutdown, even if PowerShell is locked down at the user level.
They recommend being cautious when modifying Group Policy settings and suggest using tools like `all apps configured` under system settings to review changes and revert them if necessary. This section emphasizes the need for careful handling of such administrative tools.
---
## Registry Editor: The Brain of Windows
The Registry, often referred to as the "brain" of Windows, contains critical system information. Accessing it via Regedit can be risky, as even minor mistakes can render a system unbootable or cause other severe issues. The speaker recommends disabling Regedit for most users unless they have a specific need for it.
They also mention using Regedit for tasks like setting up auto-login but caution against this due to the security risks involved. Overall, they stress that while Regedit is a powerful tool, it should be used sparingly and with extreme care.
---
## Hardening Your System: Recommendations
The speaker introduces a free, open-source tool called "Harden Tools" from GitHub, which helps users harden their systems by disabling potentially dangerous features like Windows Script Host (WSH), Office macros, and Adobe Reader vulnerabilities. They also recommend disabling autoplay for external devices to prevent malicious code execution.
They highlight the importance of being cautious when following online advice about system configurations and stress that running unfamiliar commands can have severe consequences. The tool they mention is a GUI-based solution, making it user-friendly for those who are not comfortable with command-line interfaces.
---
## Final Thoughts
The speaker concludes by acknowledging that while Windows has been their bread and butter, it is far from secure. They criticize Windows for being a "hack job" of various components, making it vulnerable to exploitation. This is why many users opt for more secure alternatives like macOS or Linux.
They encourage readers to share their thoughts and look forward to discussing further security topics in upcoming videos.
---
This article provides a detailed breakdown of the vulnerabilities discussed in the video and offers practical advice on how to secure your Windows system. By understanding these risks and taking proactive steps, users can significantly enhance their system's security.