Limit win9x/nt system Function 26 Recruit _ Registration Form

Source: Internet
Author: User

For some public or private computers, we don't want everyone to be able to modify the system settings or run other programs. Although they sometimes think their level is not low, but their frequent "accidental misses" will keep you busy with the maintenance of the system. In this case, we have to do something to limit the functionality of the system.

The registry is actually a series of data files that Windows 9x/nt primarily controls for hardware, software, user environments, and features of Windows. In the Windows 3.1 era, the registry functionality was performed primarily by Win.ini, System.ini, and individual. ini files. When you meet a problem that can't be solved by some introductory textbook, you can often get what you wish by modifying the registry.

You must use Registry Editor to modify the registry. In Windows 9x, Registry Editor is Regedit.exe, which is located in the Windows directory. In Windows NT, the Registry Editor specifically designed for Windows NT is Regedt32.EXE, which is located in the \Winnt\System32 directory. In Windows NT 4.0, the system also provides Regedit.exe, which is located in the \WINNT directory. Specifically, the Windows NT two registry editors are available for the registry modifications that are covered in this article.

The easiest way to start Registry Editor is to type regedit or Regedt32 (for Windows NT operating systems) on the Run command line of the Start menu.

1. Remove the Run command from the Start menu (Windows 9x & NT) and only partially restrict the application from running, the application can still run from the explorer.
Key Name [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
Value name NoRun
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

2. Remove the "Logoff ..." command from the Start menu (Windows 9x & NT), and the logout button will not work on Windows NT.
Key name [hkey_current_user\software\ microsoft\windows\currentversion \policies\explorer]
Value name Noclose
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

3. Disable the Shut down system command (Windows 9x & NT)
Key name [hkey_current_user\software\ Microsoft\windows\currentversion\policies\explorer]
Value name Nologoff
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

4. Remove other menu items except taskbar (Windows 9x & NT) from the Start/settings menu
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\explorer]
Value name Nosetfolders
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

5. Remove the Taskbar and Start menu command from the Start/settings menu (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\explorer]
Value name Nosettaskbar
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

6. Hide Network Places (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\explorer]
Value name Nonethood
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

7. Noentirenetwork, hide "Entire Network" in My Network Places (Windows 9x & NT)
Key name [HKEY_CURRENT_USER\Software \microsoft\windows\current Version\policies\explorer]
Value name Noentirenetwork
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

8, hide all the icons on the desktop (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\explorer]
Value name NoDesktop
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

9. Do not save settings when exiting (Windows 9x & NT)
Key name [HKEY_CURRENT_USER\Software \microsoft\windows\current Version\policies\explorer]
Value name Nosavesettings
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

10. Running only allowed Windows applications (Windows 9x & NT) is probably the most valuable trick to prevent someone from running a program that you don't want to run on the public machine you're responsible for. If you combine the above several strokes, then this utility machine will be bulletproof. However, before using this feature, be careful that once a program is not listed, you cannot run it, so Regedit.exe should be listed first. This allows registry editor functionality to be restored, even if Registry Editor is disabled, using the method of importing registry files.
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\explorer]
Value name Restrictrun
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

11, in addition to the path under the new primary key Restrictrun, under the key to add a value of "1", "2", "3" and other string values, the data is allowed to run the program name. You do not need to enter a path, as long as you specify the file name of the executing program. As shown below,
Key name [HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\policies\explorer\restrictrun]
Value Name 1
Type REG_SZ (String value)
Windows application name that data allows to run

12. Prohibit access to display icons (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\system]
Value name Nodispcpl
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

13. Hide the Background tab on the Display Properties dialog box (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\system]
Value name Nodispbackgroundpage
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

14, hide the Display Properties dialog box on the Screen Saver tab (Windows 9x & NT)
Key name [hkey_current_user\software\ microsoft\windows\current Version\policies\system]
Value name Nodispscrsavpage
Type REG_DWORD (double word value)
Data (0= invalid; 1 = valid)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.