{"id":67680,"date":"2021-07-27T04:10:05","date_gmt":"2021-07-27T08:10:05","guid":{"rendered":"http:\/\/bangla.salearningschool.com\/recent-posts\/securing-your-windows-8-pc-computer-hardware-engineering-root-computer-troubleshooting-by-sayed-ahmed\/"},"modified":"2021-07-27T04:10:05","modified_gmt":"2021-07-27T08:10:05","slug":"securing-your-windows-8-pc-computer-hardware-engineering-root-computer-troubleshooting-by-sayed-ahmed","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=67680","title":{"rendered":"Securing your windows 8 PC #Computer Hardware Engineering #Root #Computer Troubleshooting #By Sayed Ahmed"},"content":{"rendered":"<p>Windows 8 as Microsoft claims is the most secure operating system from Microsoft.<\/p>\n<p>Some ways to secure your Windows 8 PC.<\/p>\n<p>As Windows 8 is built upon UEFI (Unified Extensible Firmware Interface), you can take advantage of secure boot; scan and ensure that system elements are okay before Windows 8 even boots on your system. <\/p>\n<p>Yes as usual you can set a PIN\/Password to login into the PC<br \/>\nYou can also set a picture password. You need to select a picture, draw some gestures on the picture for Windows 8 to store. You need to make the same\/similar gesture at login time. You can do this from PC settings-&gt;user  : follow the rest<br \/>\nWindows 8 also has features built in for face detection and auto login\/logoff.<\/p>\n<p>You can install windows defender to protect your PC from Malware and Spyware<br \/>\nFrom start screen type defender, you will find the application. If it is disabled, you may need to remove the other antivirus software first, then activate it, and then again reinstall the other antivirus software<\/p>\n<p>Firewall is always there to protect your pc from unwanted access from outside. You can define rules for private network and public network. Public network settings should be more strict. You can configure to block all incoming request; or you can configure for notification for all incoming access requests and then allow individually. Turn on Firewall.<\/p>\n<p>Use Action Center as can be seen in the control panel to check the security settings and also to change.<br \/>\nConfigure &#8216;User Account Control Settings&#8217; as can be seen under Action Center. Use the most strict settings so that you get notifications for all changes in your system. Move around the action Center and configure appropriately such as checking alerts, checking system notifications, checking and administering archived messages, configuring what to do with unrecognized apps and similar.<\/p>\n<p>Use the privacy settings; you may configure not to allow to access your location information. You may only allow selectively. Use PC Settings-&gt;Privacy.<\/p>\n<p> From: http:\/\/sitestree.com\/?p=307<br \/> Categories:Computer Hardware Engineering, Root, Computer Troubleshooting, By Sayed Ahmed<br \/>Tags:<br \/> Post Data:2013-05-31 21:08:47<\/p>\n<p>\t\tShop Online: <a href='https:\/\/www.ShopForSoul.com\/' target='new' rel=\"noopener\">https:\/\/www.ShopForSoul.com\/<\/a><br \/>\n\t\t(Big Data, Cloud, Security, Machine Learning): Courses: <a href='http:\/\/Training.SitesTree.com' target='new' rel=\"noopener\"> http:\/\/Training.SitesTree.com<\/a><br \/>\n\t\tIn Bengali: <a href='http:\/\/Bangla.SaLearningSchool.com' target='new' rel=\"noopener\">http:\/\/Bangla.SaLearningSchool.com<\/a><br \/>\n\t\t<a href='http:\/\/SitesTree.com' target='new' rel=\"noopener\">http:\/\/SitesTree.com<\/a><br \/>\n\t\t8112223 Canada Inc.\/JustEtc: <a href='http:\/\/JustEtc.net' target='new' rel=\"noopener\">http:\/\/JustEtc.net (Software\/Web\/Mobile\/Big-Data\/Machine Learning) <\/a><br \/>\n\t\tShop Online: <a href='https:\/\/www.ShopForSoul.com'> https:\/\/www.ShopForSoul.com\/<\/a><br \/>\n\t\tMedium: <a href='https:\/\/medium.com\/@SayedAhmedCanada' target='new' rel=\"noopener\"> https:\/\/medium.com\/@SayedAhmedCanada <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows 8 as Microsoft claims is the most secure operating system from Microsoft. Some ways to secure your Windows 8 PC. As Windows 8 is built upon UEFI (Unified Extensible Firmware Interface), you can take advantage of secure boot; scan and ensure that system elements are okay before Windows 8 even boots on your system. &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=67680\">Continue reading<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1917],"tags":[],"class_list":["post-67680","post","type-post","status-publish","format-standard","hentry","category-fromsitestree-com","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":7524,"url":"http:\/\/bangla.sitestree.com\/?p=7524","url_meta":{"origin":67680,"position":0},"title":"\u0986\u09aa\u09a8\u09be\u09b0 Windows 8 PC \u0995\u09c7 \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0995\u09b0\u09c1\u09a8","author":"Author-Check- Article-or-Video","date":"March 26, 2015","format":false,"excerpt":"My name : Rakib Alam Article name : \u0986\u09aa\u09a8\u09be\u09b0 Windows 8 PC \u0995\u09c7 \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0995\u09b0\u09c1\u09a8 \u0986\u09b8\u09b8\u09be\u09b2\u09be\u09ae\u09c1\u09df\u09be\u09b2\u09be\u0987\u0995\u09c1\u09ae, \u0986\u09b6\u09be \u0995\u09b0\u09bf \u09b8\u09ac\u09be\u0987 \u09ad\u09be\u09b2 \u0986\u099b\u09c7\u09a8\u0964 \u0986\u09aa\u09a8\u09be\u09a6\u09c7\u09b0 \u09b9\u0987\u09a4 \u0985\u09a8\u09c7\u0995\u09c7\u0987 Windows 8 \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0 \u0995\u09b0\u09c7\u09a8\u0964 \u098f\u0996\u09a8 \u09aa\u09b0\u09cd\u09af\u09a8\u09cd\u09a4 Microsoft \u098f\u09b0 release \u09b9\u0989\u09df\u09be \u09b8\u09b0\u09cd\u09ac\u09b6\u09c7\u09b7 \u09b8\u0982\u09b8\u09cd\u0995\u09b0\u09a8 \u09b9\u09b2 Windows 8.1 . Microsoft \u09a6\u09be\u09ac\u09bf \u0995\u09b0\u099b\u09c7 \u09af\u09c7 \u098f\u0987 Windows 8 \u09b9\u09b2 \u09a4\u09be\u09a6\u09c7\u09b0 \u09b8\u09ac\u099a\u09c7\u09df\u09c7\u2026","rel":"","context":"In &quot;\u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be&quot;","block_context":{"text":"\u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be","link":"http:\/\/bangla.sitestree.com\/?cat=263"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7643,"url":"http:\/\/bangla.sitestree.com\/?p=7643","url_meta":{"origin":67680,"position":1},"title":"\u0986\u09aa\u09a8\u09be\u09b0 Windows 8 PC \u0995\u09c7 \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0995\u09b0\u09c1\u09a8","author":"Author-Check- Article-or-Video","date":"March 28, 2015","format":false,"excerpt":"My name : Rakib Alam Article name : \u0986\u09aa\u09a8\u09be\u09b0 Windows 8 PC \u0995\u09c7 \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0995\u09b0\u09c1\u09a8 \u0986\u09b8\u09b8\u09be\u09b2\u09be\u09ae\u09c1\u09df\u09be\u09b2\u09be\u0987\u0995\u09c1\u09ae, \u0986\u09b6\u09be \u0995\u09b0\u09bf \u09b8\u09ac\u09be\u0987 \u09ad\u09be\u09b2 \u0986\u099b\u09c7\u09a8\u0964 \u0986\u09aa\u09a8\u09be\u09a6\u09c7\u09b0 \u09b9\u0987\u09a4 \u0985\u09a8\u09c7\u0995\u09c7\u0987 Windows 8 \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0 \u0995\u09b0\u09c7\u09a8\u0964 \u098f\u0996\u09a8 \u09aa\u09b0\u09cd\u09af\u09a8\u09cd\u09a4 Microsoft \u098f\u09b0 release \u09b9\u0989\u09df\u09be \u09b8\u09b0\u09cd\u09ac\u09b6\u09c7\u09b7 \u09b8\u0982\u09b8\u09cd\u0995\u09b0\u09a8 \u09b9\u09b2 Windows 8.1 . Microsoft \u09a6\u09be\u09ac\u09bf \u0995\u09b0\u099b\u09c7 \u09af\u09c7 \u098f\u0987 Windows 8 \u09b9\u09b2 \u09a4\u09be\u09a6\u09c7\u09b0 \u09b8\u09ac\u099a\u09c7\u09df\u09c7\u2026","rel":"","context":"In &quot;\u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be&quot;","block_context":{"text":"\u09a8\u09bf\u09b0\u09be\u09aa\u09a4\u09cd\u09a4\u09be","link":"http:\/\/bangla.sitestree.com\/?cat=263"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":78585,"url":"http:\/\/bangla.sitestree.com\/?p=78585","url_meta":{"origin":67680,"position":2},"title":"SSH","author":"Author-Check- Article-or-Video","date":"November 4, 2025","format":false,"excerpt":"From AI tools as is \ud83d\udd10 Understanding SSH (Secure Shell): How It Works and Why It Matters When you connect to a remote server or transfer files securely over the internet, you\u2019re likely using SSH \u2014 Secure Shell. SSH has become the standard protocol for secure communication between computers, system\u2026","rel":"","context":"In &quot;Computer Networks&quot;","block_context":{"text":"Computer Networks","link":"http:\/\/bangla.sitestree.com\/?cat=1978"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24394,"url":"http:\/\/bangla.sitestree.com\/?p=24394","url_meta":{"origin":67680,"position":3},"title":"Two Cents on Privacy and Security #Root","author":"Author-Check- Article-or-Video","date":"April 8, 2021","format":false,"excerpt":"Folder Changes View: You might want to use a tool like Folder Change View to monitor any changes to your files and folders. You will also be able to create a list of the files changed - this will happen automatically once you configure. Folder Change View http:\/\/www.nirsoft.net\/utils\/folder_changes_view.html Keep the\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26256,"url":"http:\/\/bangla.sitestree.com\/?p=26256","url_meta":{"origin":67680,"position":4},"title":"Part-2: If you want to learn security, or if you already are a security professional\/engineer, can you answer the following questions on Security? Do you know (and can do) the answers to the following questions on Security? #Root","author":"Author-Check- Article-or-Video","date":"April 21, 2021","format":false,"excerpt":"What are the important concepts to know and implement for Infrastructure security? Consider only the software side. What are patching, hardening, enabling encryption, filtering connections in regards to network infrastructure? What is the relation with security? What will you do in regards to these? How is software patching different for\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7601,"url":"http:\/\/bangla.sitestree.com\/?p=7601","url_meta":{"origin":67680,"position":5},"title":"\u0986\u09aa\u09a8\u09be\u09b0 \u0989\u0987\u09a8\u09cd\u09a1\u09cb\u099c \u09ee (Windows 8) \u09aa\u09bf\u09b8\u09bf \u098f\u09b0 \u09b8\u09c1\u09b0\u0995\u09cd\u09b7\u09be","author":"Author-Check- Article-or-Video","date":"March 27, 2015","format":false,"excerpt":"\u0986\u09aa\u09a8\u09be\u09b0 \u0989\u0987\u09a8\u09cd\u09a1\u09cb\u099c \u09ee(Windows 8) \u09aa\u09bf\u09b8\u09bf \u098f\u09b0 \u09b8\u09c1\u09b0\u0995\u09cd\u09b7\u09be \u09ae\u09be\u0987\u0995\u09cd\u09b0\u09cb\u09b8\u09ab\u099f \u098f\u09b0 \u09a6\u09be\u09ac\u09bf \u09ae\u09a4\u09c7 \u0989\u0987\u09a8\u09cd\u09a1\u09cb\u099c \u09ee, \u09ae\u09be\u0987\u0995\u09cd\u09b0\u09cb\u09b8\u09ab\u099f\u09c7\u09b0 \u09b8\u09ac\u099a\u09c7\u09af\u09bc\u09c7 \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0985\u09aa\u09be\u09b0\u09c7\u099f\u09bf\u0982 \u09b8\u09bf\u09b8\u09cd\u099f\u09c7\u09ae\u0964 \u099a\u09b2\u09c1\u09a8 \u0986\u09ae\u09b0\u09be \u09a6\u09c7\u0996\u09c7 \u09a8\u09c7\u0987 \u0986\u09aa\u09a8\u09be\u09b0 \u0989\u0987\u09a8\u09cd\u09a1\u09cb\u099c \u09ee \u09aa\u09bf\u09b8\u09bf \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u0995\u09b0\u09be\u09b0 \u099c\u09a8\u09cd\u09af \u0995\u09bf\u099b\u09c1 \u0989\u09aa\u09be\u09af\u09bc\u0964 \u09af\u09c7\u09b9\u09c7\u09a4\u09c1 \u0989\u0987\u09a8\u09cd\u09a1\u09cb\u099c \u09ee UEFI (\u0987\u0989\u09a8\u09bf\u09ab\u09be\u09af\u09bc\u09c7\u09a1 \u098f\u0995\u09cd\u09b8\u099f\u09c7\u09a8\u09b8\u09bf\u09ac\u09b2 \u09ab\u09be\u09b0\u09cd\u09ae\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 \u0987\u09a8\u09cd\u099f\u09be\u09b0\u09ab\u09c7\u09b8) \u0989\u09aa\u09b0 \u09a8\u09bf\u09b0\u09cd\u09ae\u09bf\u09a4 \u09b9\u09af\u09bc, \u09a4\u09be\u0987 \u0986\u09aa\u09a8\u09bf \u09a8\u09bf\u09b0\u09be\u09aa\u09a6 \u09ac\u09c1\u099f \u09b8\u09c1\u09ac\u09bf\u09a7\u09be \u0997\u09cd\u09b0\u09b9\u09a3 \u0995\u09b0\u09a4\u09c7 \u09aa\u09be\u09b0\u09c7\u09a8;\u2026","rel":"","context":"In &quot;Windows 8&quot;","block_context":{"text":"Windows 8","link":"http:\/\/bangla.sitestree.com\/?cat=75"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/67680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=67680"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/67680\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=67680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=67680"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=67680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}