Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Protecting Home Computers From Guest Users?

Anonymous Coward writes | about a year and a half ago


An anonymous reader writes "We frequently have guests in our home who ask to use our computer for various reasons such as checking their email or showing us websites. We are happy to oblige, but the problem is many of these guests have high risk computing habits and have more than once infested one of our computers with malware, despite having antivirus and the usual computer security precautions. We have tried using a linux boot CD but usually get funny looks or confused users. We've thought about buying an iPad for guests to use, but decided it wasn't right to knowingly let others use a computing platform that may have been compromised. What tips do slashdoters have to overcome this problem, technologically or otherwise?"

cancel ×

1 comment

Sorry! There are no comments related to the filter you selected.

The same way you protect anything (1)

SampleFish (2769857) | about a year and a half ago | (#43365189)

This question does not have to be so specific. Securing a computer for guest use is the same as securing a computer for any other reason. The solution is not simple. Using a LiveCD as you mentioned is the best way to isolate a user session from the installed operating system. Along those lines you can get a Linux distro that look like Windows if your friends can't handle the change.

Try Zorin: []

If you just need your default installation to be more secure you will need to take a layered approach to security. Consider installing a Unified threat management system capable of filtering information before it even reaches your computers. You can make all of your computers more secure this way.

Check out Untangle: []

Untangle can block malicious webpages and intercept viral downloads at the border of your network. This is a nice free way to bring corporate styled security to the home.

The next step is to secure your browser. You have indicated that this is the most likely attack vector. Start by making Firefox your default browser and install the following plugins: [] [] [] []

No-Script and Ref-Control can negatively effect usability and requires some learning to use effectively. It's well worth it. No script is really the only thing that can protect you from malicious code. It forces you to white-list code that you want to run. This granular control allows you to load the video on YouTube but not the advert that contains a drive by download.

I hope you find these tips helpful in your journey towards computer security. There is always more to learn. Good luck.

Check for New Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>