Registry modification cheats to improve system security-registration form

Source: Internet
Author: User

Now the computer gives people a feeling of fragile, not today by this virus raid, is tomorrow by the hacker attack, error, panic became like a potluck. In order to make the computer "strong" up, many people find anti-virus software, firewalls, hope that through these software to enhance the computer's immune power. Indeed, the software has, to some extent, enhanced the ability of the computer to resist foreign attacks, but there is nothing to do about the vulnerabilities in the computer's internal system. The purpose of this article is to introduce a way to improve the security of the system by modifying the registry.


One, hide a server

In order to ensure that the resources on the local area network are protected from other people's illegal access and attack, we consider from the security point of view, sometimes need to hide the name of the server computer specified in the LAN so that other LAN users can not access, so how do we achieve it? Here's what you can do with this setting:

1. Open Registry Editor and click the following branch in the Editor dialog box with the mouse: Hkey_local_ MACHINE \ SYSTEM \ currentcontrolset \services \ lanmanserver \ Parameters key values.

2, with the mouse click the key value below the hidden value name, if not found this name, then add one, its data type is REG_DWORD.

3, then double-click this item with the mouse, in the pop-up "DWORD Editor" dialog box, enter 1.

4, finally click the "OK" button, and exit the Registry editing window, restart the computer can hide a server in the local area network.

Second, prevent other people from illegally editing the registration form

The registry is the soul of the entire system, and any error modification to the registry can cripple the system. Therefore, if you are not a system master, it is best not to easily modify the registry. Of course in public places, in order to prevent those computer "rookie" to change the registry settings at will, we'd better cancel other users to modify the registry right. We can follow these steps to achieve this goal:

1, first in the registry editing interface, find the Hkey_current_user\software\microsoft\windows\currentversion\policies\ key value;

2, and then under the policies key value of the next new system primary key, if the primary key already exists, you can directly proceed to the next step;

3, and then in the corresponding system primary key to the right window of the space to create a new DWORD string value, and named DisableRegistryTools;

4, set the value of the DisableRegistryTools to 1, set up, restart the computer can be achieved to prevent other people from illegally editing the registry.

VI. Hide User Login Name

Win9x above operating system can have memory function to the information of previous user login, the next time we restart the computer, we will find the last user's login in the username column, this information may be used by some illegal elements, and the user poses a threat, so we need to hide the name of the user login.

1, in the setting, please use the mouse to access the key value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon;

2, in the corresponding Winlogon key value to the right window, with the right mouse button click in the window blank, from the pop-up shortcut menu to select the new/string command;

3. Name the new string "DontDisplayLastUserName" and set the string value to "1";

4, after setting up, restart the computer can be hidden on the machine user login name.

Seven, do not allow user dial-up access

If the user's computer has important information on it, it may not allow others to access it casually. So how to prevent other people from dialing in to access your computer, reduce security risks, the specific steps are:

1. Open Registry Editor and expand the following key values in the editor:

[Hkey_local_machine\software\microsoft\windows\currentversion\policies\network];

2, in the editor to the right of the list with the mouse to select the "Nodialin" key value, if not the key value, you must create a new DWORD value, the name is set to "Nodialin";

3, then double-click the "Nodialin" key value, the editor will pop up a dialog named "String Editor", in the Text column of the dialog box, enter the value "1", where 0 of the Prohibit dial-in access function, 1 delegates to allow dial-in access;

4, after the exit and log on to the network, the above settings will work.

Viii. screen access to floppy disk

As the saying goes, "mouth", many viruses in the computer are infected by access to an unclean floppy disk, and if we allow the user to access the floppy disk over the network, the entire network could be infected, and the end result would be a poisoning of all the computers in the network. In order to prevent the virus from invading the entire network, we must strictly manage the computer's input device to sever the source of the virus, so we should prohibit access to the floppy disk through the network. When you set up, you can do this by following these steps:

1, in the System Operation dialog box input regedit command, open Registry Editor;

2, in the Registry Editor Operation window, in turn, open the key value HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon;

3, in the corresponding Winlogon to the right window, check if there is no key value allocatefloppies, if not, right-click the window blank, select "New"/"DWORD value" from the pop-up shortcut menu;

4, the new DWORD is named Allocatefloppies, while its value is modified to 0 or 1, where 0 of the representatives can be access to all administrators in the domain, 1 representatives can only be accessed by local landing.

Ix. prohibit access to the File system button

In the System Properties dialog box, there is a feature button called file system that allows you to set up settings for your computer's hard disk, floppy disk, and other mobile devices. However, to prevent illegal users from tampering with the settings of these devices, you sometimes need to hide the "File System" button in the system properties, which is the following steps:

1, open the Registry Editor window, and in turn in the window to access the following key branch: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System;

2, in the corresponding system key value of the right window, with the mouse click in the window blank, from the pop-up shortcut menu select "New"/"DWORD string value";

3, to create a new DWORD string value, named "Nofilesyspage", and its value set to "1";

4, after setting up, restart the computer to make the settings effective.

Ten, let the "Network Neighborhood" icon Hidden

As you know, you can access content on other computers in your local area network from your network neighbors, but if other computers do not have special access rights, those with ulterior motives are likely to use their network Places to illegally delete important data on other computers, causing losses to other computers. To avoid such losses, we can use the registry to hide our network Places.

1, first in the Open Registry Editor Operation window, with the mouse to access the key value hkey_current_user\software\microsoft\ windows\currentversion\policies\explorer;

2, in the corresponding Explorer key value to the right of the Operation window, with the mouse click in the window of the blank, from the pop-up shortcut menu, access the mouse in turn to "new"/"DWORD string value";

3, the new DWORD string value is named Nonethood, and the value is set to 1 (hexadecimal);

4, after setting up, restart the computer can make the settings effective.

Xi. restrictions on the use of certain characteristics of the system

In internet cafes or public places, sometimes in order to ensure that the system's properties are not arbitrarily changed by other ordinary users, we have to limit the use of certain features of the system. To do this, we can use the method of modifying the Registry Editor to achieve this goal.

1, run the Registry Editor, enter the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System key value;

2, if the key value does not exist, create a new one;

3, then set the value of the Disabletaskmanager below the key value to 1, which means that the user will be prevented from running task Manager.

4, then set the Nodispappearancepage to 1, indicating that the user will not be allowed to change the display mode in the control Panel;

5, the following nodispbackgroundpage set to 1, indicating that users will not be allowed to change the desktop background and wallpaper.

12, limit the user to use the specified program

To prevent users from illegally running or modifying programs, causing the entire computer system to be in a state of disarray, we can make the system secure by modifying the registry to allow users to use only specified programs.

1. Open the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer key value in the Registry Editor window in turn;

2, in the corresponding Explorer key value to the right window, a new DWORD string value, named "Restrictrun", its value set to "1";

3. Add the string values named "1", "2", "3", respectively under the primary key of the Restrictrun, and set the value of the string "1", "2", "3" to the program name we allow the user to use. For example, "1", "2", "3" are set to Word respectively. EXE, Notepad. EXE, write. EXE, users can only use Word, Notepad, WordPad, so that our system will be the greatest protection, but also can limit the user to run unnecessary software.

13. Do not allow users to set screen protection password

A lot of computer users use computers have a monopoly, they do not want to use their own computers, and then let others use, so they often leave the computer in a short time, set the computer screensaver password, but unfortunately, after using the computer, they can not promptly remove these screensavers password, This can easily cause other users to not use the normal, serious to prevent the computer from starting. In order to avoid these phenomena, we can modify the registry, to set the user does not have the right to screen screensaver password settings.

1, open the Registry Editor window, in the window with the mouse to access the Current_user\controlpanel\desktop\screensaveusepassword key branch;

2, in the corresponding Screensaveusepassword key value of the right window, the Screensaveusepassword value set to 0 on it.

14, set the file system to NTFS format

In Windows2000 and NT systems, the user can set the partition to NTFS to ensure the security of the file system, of course, we can modify the registry method to set the file system to NTFS format, the implementation of the following steps:

1. Open Registry Editor and expand the following key values in the editor:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem;

2. Click the Edit menu in the Registry Editor and select the "New" menu item in the Drop-down menu, and click "DWORD Value" in the submenu where it pops up.

3. Enter the name of the DWORD value in the list on the right of the editor as "Ntfsdisablelastaccessupdate";

4, then double-click the Ntfsdisablelastaccessupdate key value, the editor will pop up a dialog named "String Editor", in the Text column of the dialog box, enter the value "1", where 0 represents "Cancel" the feature, 1 represents "Enable" the feature.

The attack of WinNuke hacker program against computer

WinNuke is a highly destructive program that destroys the Windows system in the computer, which can cause the entire computer system to become paralyzed, so it is necessary to prevent WinNuke from damaging. We can set it up in the registry to ensure that the system is secure.

1. In the Registry Editor Operation window, click the key value hkey_local_machine\system\currentcontrolset\services\vxd\mstcp with the mouse;

2, in the corresponding MSTCP key value of the right window, with the mouse click the window blank, from the shortcut menu pop-up select "New"/"DWORD Value", and the DWORD value named "Bsdurgent", if the key value already exists, you can directly proceed to the next step;

3, and then set the Bsdurgent value to 0, restart the computer after the goal can be achieved.

16, restore the error of the registry changes

Because the registry is the core and soul of the computer, any error modification to the registry may cause the computer to not start properly. To make sure it's foolproof, when we modify the registry, to backup the registry, once you have made a small error in modifying the registry, you can then import the previously backed up registry files into the registry to restore the previous contents of the registry, and the following steps are specific:

1, in the Run dialog box input regedit command, the program will pop up a Registry Editor window;

2, in this window, click Import Registry File under the Registry menu, locate the backup. reg file from the pop-up file dialog box, and then click the OK button in the dialog box again to write the correct information to the registry;

3, when the registry damage or error changed the hardware and software settings, resulting in system startup failure, and automatic repair is invalid, with "Scanreg.exe/fix" can not be restored, in pure dos run "scanreg.exe/restory" for recovery, with five data to choose from, First select the most recent recovery, if still not, and then choose again, until the system is running normally.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.