• ‰ § ¶ ‡ µ ¢ © «» × ÷ Þ þ ———————————————————————————————————————————————————————————————— \laptop\security\police\priorities.txt multifaceted tools for reforming to make a robust internet ••• aspects of robustness ••• all components must be traceable to the author of the peer reviewed source ••• vulnerability detection ••• vulnerability review of commercial software, krapware, bloatware culling ••• intrusion detection, only inadequate methods are in use, virgin checksum database is needed ••• intrusion prevention; background checksum verification for storage and loaded ••• behavior detection ••• traffic analysis, detection and real time report of suspicious activity ••• backup work and data in files with no active components ••• backup to remote location and platform independent retrieval ••• keep active system files independent from data and source files store executable on write protected media e.g. kanguru.com/info/about-kanguru.shtml ••• commercial solutions have no interest in final solution ••• avoid compromised supply chain distributions https://www.cyberscoop.com/tag/supply-chain-security/ heed the advice of https://www.commoncriteriaportal.org/products/ gartner.com owasp.org/projects guru99.com opensamm.org https://www.bsimm.com/ https://www.slac.stanford.edu/xorg/nmtf/nmtf-tools.html wiki lists: https://en.wikipedia.org/wiki/Category:Computer_security_organizations https://owasp.org/www-project-top-ten/ guru99.com https://www.stopbadware.org/best-practices https://en.wikipedia.org/wiki/Category:Computer_security_companies https://en.wikipedia.org/wiki/Category:Spyware_removal https://en.wikipedia.org/wiki/Malicious_Software_Removal_Tool https://listoffreeware.com/best-free-bloatware-remover-for-windows/