Improve network security
Overview
This category contains privacy scripts for Windows.
These changes use Windows system commands to update your settings.
This category is dedicated to improving network security.
It aims to minimize vulnerabilities by offering various settings that improve the integrity and confidentiality of data transmitted over the network. It features a range of measures to protect data transmission from unauthorized access, interception, and other cyber threats to maintain a secure and private communication environment.
By improving network security, you secure your system and data from attackers, ISPs, VPN companies, and state actors.
Be careful running these scripts. This category includes scripts with high impact:
- 🔴 Some not recommended scripts. They should only be used by advanced users. They may break important functionality.
- 🟡 Some recommended scripts only if you understand its implications. Some non-critical or features may no longer function correctly after running this this category.
- 🟢 Some safely recommended scripts. Safe-to use for any user.
Implementation Details
-
Language: batch
-
Scripts Count: 36 scripts
-
Subcategories: 8
-
Required Privileges: Administrator rights
-
Compatibility: Windows only
-
Reversibility: All changes can be reverted
Apply now
These scripts are written using Batch (batchfile) scripting language.
Choose one of two ways to apply:
- Automatically via privacy.sexy: The easiest and safest option.
- Manually by downloading: Requires downloading a file.
Alternative 1. Apply with Privacy.sexy
privacy.sexy is free and open-source application that lets securely apply this action easily.
It allows selectively choose parts of this action to conduct. You can fully restore this action (revert back to the original behavior) using the application. Additionally, you can apply only the recommended scripts, instead of applying all of the scripts.
privacy.sexy instructions
- Open or download the desktop application
- Search for the category name:
Improve network security
. - Check the category by clicking on the checkbox of the category.
- Click on Run button at the bottom of the page.
Alternative 2. Download
You can choose to apply only scripts with less impact or also those with higher impact:
Strict
Recommended if you understand its implications. It may cause some non-critical features to no longer function correctly.
All
Not recommended for daily use as it breaks important functionality. It provides military-grade privacy, for special use-cases. Do not run it without having backups and system snapshots.
Consider restarting your computer for all changes to take affect.
This action is completely reversible, you can restore your changes to the initial/default state. The restore/revert methods provided here can help you fix issues.
If something goes wrong, use the Revert script provided above.
Standard
This script includes only Standard recommendation level.
Standard scripts in this category is recommended for all users. They help to improve privacy without affecting stability.
Download only standard scripts by clicking on the button:
Restore these changes if you decide to revert them by downloading the restore script:
Strict
This script includes Standard and Strict recommendation levels.
This script is only recommended if you understand their implications of every single change. Some non-critical or features may no longer function correctly after running this script.
Download Strict scripts:
Restore these changes if you decide to revert them by downloading the restore script:
All
This script includes Standard, Strict recommendation levels along with unrecommended scripts.
This script should only be used by advanced users. Some of these changes are NOT recommended for daily use as it breaks important functionality. Do not run it without having backups and system snapshots.
Download all scripts:
Restore these changes if you decide to revert them by downloading the restore script:
Explore further
This category includes total of 36 scripts and 8 subcategories.
Explore its 5 subcategories:
Enable strong secret key requirements
This category contains scripts that enhance system security by implementing stronger encryption key lengths. Stronger keys help prevent unauthorized data access and potential leaks. These scripts aim to protect your data when sent over network (Internet), making sure your security matches up with the latest guidelines and practices.
Disable insecure connections
This category includes scripts designed to enhance users' security and privacy by disabling outdated or vulnerable connections across the system. It safeguards data against interception, unauthorized access, and attacks that exploit outdated technology vulnerabilities, including man-in-the-middle attacks and data breaches. By disabling these insecure connections, these scripts follow cybersecurity best practices and recommendations. Although Windows supports insecure connections for compatibilit...
Enable secure connections
This category configures essential security settings to protect network communications. Newer security standards offer improved protection against vulnerabilities found in older versions. Scripts within this category enhance your privacy and security by enabling these standards to maintain the integrity of network communications.
Disable insecure remote administration access
This category improves security by disabling insecure remote administration features. Organizations use remote administration tools to manage multiple systems from a central location, performing tasks such as software updates, system checks, and configuration changes. However, if not properly secured, unauthorized users could exploit these tools to access sensitive data or control systems. This category addresses such vulnerabilities by disabling outdated or insecure remote access methods, thus ...
Disable non-essential network components
This category focuses on disabling or removal of specific networking features. These are generally considered unnecessary or less secure for most users. Disabling these features contributes to a more secure and privacy-focused environment by eliminating potential vulnerabilities and reducing the system's attack surface. These features may utilize outdated protocols or lack robust encryption and authentication methods, making them vulnerable to cyberattacks. If these features are not essential fo...
Explore Categories
This action belongs to Security improvements category. This category encompasses a range of scripts designed to improve the security of your system by enforcing security best practices. These scripts help protect your system against various types of cyber threats and unauthorized access. Read more on category page ▶
Support
This website relies on your support.
Your donation helps keep the project alive and improves its content ❤️.
Share this page: