26 moves to restrict Win9X/NT System Functions

Source: Internet
Author: User


For some public or dedicated computers, we do not want everyone to modify system settings or run other programs. Although they sometimes think that their level is not low, their frequent "accidental loss" will keep you busy with system maintenance. In this case, we have to limit the functions of the system.

The Registry is actually a series of data files. Windows 9x/NT mainly controls hardware, software, user environment, and Windows features. In the Windows 3.1 era, the registry function is mainly implemented by Win. ini, System. ini, and various. ini files. When you encounter problems that cannot be solved by some entry-level teaching materials, modifying the Registry often gives you the desired result.

To modify the registry, you must use the Registry Editor. In Windows 9x, the Registration Table editor is regedit.exe, which is located in the Windows directory. In Windows NT, the Registry Editor designed for Windows NT is Regedt32.EXE, which is located in the \ WinNT \ System32 directory. In Windows NT 4.0, regedit.exe is also deployed in the \ WinNT directory. Windows NT Registry editors can be used to modify the Registry involved in this article.

The easiest way to start the Registry Editor is to type Regedit or Regedt32 (for Windows NT operating systems) in the "run" command line in the Start Menu ).

1. Delete the "run" command (Windows 9x & NT) from the "Start" menu, and only partially restrict the running of applications. The application can still be run from the resource manager.
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
Value: NoRun
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

2. Delete "logout..." from the "Start" menu ......" Command (Windows 9x & NT), the "logout" button does not work on Windows NT.
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
Value Name NoClose
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

3. Disable the "Shut down the system" command (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer]
Value Name: NoLogOff
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

4. Delete menu items other than the taskbar from the "Start"/"Settings" menu (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value Name: NoSetFolders
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

5. Delete the "Taskbar and Start Menu" command from the "Start"/"Settings" menu (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value Name: NoSetTaskbar
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

6. Hide "Network neighbors" (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value Name: NoNetHood
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

7. NoEntireNetWork: Hide "entire network" (Windows 9x & NT) in "Network neighbors)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value: NoEntireNetwork
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

8. Hide all icons on the desktop (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value: NoDesktop
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

9. Do not save settings when exiting (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value: NoSaveSettings
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

10. only run the allowed Windows applications (Windows 9x & NT). This is probably the most valuable move, this prevents someone from running programs that you don't want to run on the public machine you are in charge. If combined with the above tactics, the public machine will not be able to be attacked. However, you must be cautious when using this function. If a program is not listed, you cannot run it. Therefore, regedit.exe should be listed first. In this way, the Registry Editor function can be restored even if the Registry Editor is disabled and the Registry file is imported.
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer]
Value Name RestrictRun
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

11. In addition, you need to create a primary key RestrictRun in the path, and add string values such as "1", "2", and "3" under the key, the data is the name of the program that can be run. You do not need to enter a path. You only need to specify the name of the program to be executed. As shown below,
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ Explorer \ RestrictRun]
Value 1
Type: REG_SZ (string value)
Name of the Windows application that data allows to run

12. Disable access to display icons (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ System]
Value: NoDispCPL
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

13. Hide the "background" tab on the "show properties" dialog box (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ System]
Value: NoDispBackgroundPage
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

14. Hide the "Screen Saver" tab on the "show properties" dialog box (Windows 9x & NT)
Key name [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ Current Version \ Policies \ System]
Value: NoDispScrSavPage
Type: REG_DWORD)
Data (0 = invalid; 1 = valid)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.