Imaging is the best Security Program. No hours and hours spent on trying to clean an infected PC and never really know if it is Clean.
Mine: GRSecurity Hardened Linux kernel Hardware FireWall (Untangle) DD-WRT Router IDS/IPS on the Untangle box iptables firewall on linux
First of all I hope this is allowed here goes for my main computer I use Qubes OS which uses security through isolation. -------------------------------------------------------------------------------------------------------------------------------------- For my secondary computer I use Windows 7, with OpenDNS (Anti-Phishing) I also use DNScrypt for protection against man-in-the-middle attacks and snooping of DNS traffic at the last mile. And for the broswer I use noscript for protection against XSS attacks and HTTPS everywhere for MITM attacks. And at the sametime I use sandboxie for isolation of the browser from the OS in case it ever gets compromised for my search engine I use duckduckgo. For keyloggers I use keyscrambler,and for some privacy I use ghostery and for website rep I use web of trust for the firewall I use Zonealarm free firewall. for anti-viruses I use Avast Free,for the strong malwares I use Malwarebytes for advanced rootkits (NOT KERNEL ROOTKITS) I use roguekiller tigzy and kaspersky TDSSKiller with malware bytes anti-rootkit with sophos anti-rootkit if I can't even boot into my own computer I use avg rescue CD As a last resort if I have become completely compromised then i'll nedd to flatten the system (reformat the system disk) and rebuild it from scratch (reinstall Windows and your applications). ---------------------------------------------------------------------------------------------------------------------------------- For my dreamed computer I would like a fully hardened Gentoo with RKhunter and strong iptable with a non gui TOR browser (much like lynx) and having a gateway and workstation both on xen hardware vm much like whonix only xen this time with end-to-end cover traffic-- not just to the first hop, but all the way to your final destination -- to prevent the adversary from correlating presence of traffic at the destination to times when you're online. and protection against active attacks that block the padding for a short time at one end and look for patterns later in the path." Also having Quantum cryptography and having Federal Information Processing Standard Level 3 certified 140-2 and having a microkernel and having full isolation much like Qubes.And secure boot and secure bios and everything updated to the latest version,perhaps even something like safehouse.