12.11.2013 Views

Tweaking Optimizing Windows.pdf - GEGeek

Tweaking Optimizing Windows.pdf - GEGeek

Tweaking Optimizing Windows.pdf - GEGeek

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Right-click in the right hand pane, click New, and select DWORD Value. Name it 'NoSaveSettings'<br />

Now right-click on it, choose Modify, and type 1 in the Value data box.<br />

Click OK and exit the Registry Editor.<br />

All future windows settings will be from now on those you specified BEFORE creating the new "NoSaveSettings" Registry value, and<br />

can be changed ONLY temporarily. Next time you open that same window, its settings will revert back to the ones you started with,<br />

before this Registry change. To reenable permanent settings changes again, goto the same Registry key above, right-click on<br />

"NoSaveSettings", choose Modify, and change its Value data to 0.<br />

46. Clear Internet Explorer Typed URL History<br />

Internet Explorer caches any URL's that are typed into the address bar. This could become a privacy issue on a shared computer, or<br />

it may become a nuisance if there is a particular URL you want to remove without clearing the whole history. Open your registry and<br />

find the key below and delete any value you want to remove.<br />

Registry Settings:<br />

Key: [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs]<br />

47. Dlls and Exes to Read only<br />

Make all your dll's, exe's and com files read only. If you make all your application files (EXE) and dll's read only it will make your<br />

system more secure because normally trojans and viruses don't have any built in routines to change attributes of the files they are<br />

designed to modify - they can't modify a read only file without first changing its attributes. There are reasons viruses and trojans<br />

don't try to change the attributes<br />

- Virus programmers usually don't think anyone would make all their exe & dll files read only and don't write code to deal with that<br />

obstacle.<br />

- Even if they think about it, the goal of all viruses is to keep them as small as possible so they are harder to detect. Adding<br />

routines to change attributes increases the size of the programs. When an exe or dll or com file can't be modified the virus can't<br />

spread. BUT even better... If something tries to modify a read only file <strong>Windows</strong> usually pops up a notice and that would tip you<br />

that something suspicious was going on. If you try to delete a folder that has read only files you will be prompted with a second<br />

confirmation and this extra step helps to avoid mistakes of accidentally deleting the wrong files or folders.<br />

48. Turn off auto-insert notification on all cd drives<br />

Do this from control panels\system\devicemanager - click on each of your cd drives and goto properties\settings and uncheck auto<br />

insert notification. I have seen some commercial magazine disks that try to execute a virus automatically when a disc is inserted<br />

into your machine. Although a good virus checker would detect this.<br />

In NT you will have to do this through the registry.<br />

[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CDRom]<br />

Change to value of 'Autorun', or create a new DWORD value if it doesn't already exist, and set the data to equal '0' for Autorun<br />

disabled. Restart your computer. For example, the setting may look like: Autorun 0x00000000 (0)<br />

49. Stop .reg files from being automatically run<br />

This next registry entry changes the way a .reg file is handled. If a .reg is opened normally it would ask you 'are you sure you want<br />

to add details to the registry' and when a .reg is run with the /s switch it wouln't ask you it would just add the details anyway. This<br />

reg file changes the behaviour of a reg file, so if it is executed it will only edit the file and not import it into the registry. To merge<br />

the Registry file into your Registry, you will need to right-click on it and select Merge.<br />

-----Begin cut & paste here-----<br />

REGEDIT4<br />

[HKEY_CLASSES_ROOT\regfile\shell]<br />

@="edit"<br />

------End cut & paste here------<br />

50. Spyware<br />

Run 'Ad-Aware' program to fight the spying that a least 100 or so programs are known to do. (I do this mainly to save the band<br />

width wasted by the data and banner ads that are passing back and forth.) www.lavasoft.de<br />

Also check out SpyBot from http://spybot.safer-networking.de/<br />

51. Create a shortcut to lock computer<br />

This works in XP and probably NT and 2000. Right click on desktop and select new -> shortcut. Then copy and paste this in the<br />

program location box "rundll32.exe user32.dll,LockWorkStation" Click next and enter a name for you shortcut and then click finish.<br />

Now you can copy and paste that shortcut anywhere you want on your computer.<br />

52. Physically secure and protect your servers and critical workstations<br />

Quite simply lock them up - password protect consoles, lock them away in secure fireproof halon strong rooms which are alarmed<br />

and have security cameras inside. Make sure rooms have no windows and no roof or any access of any kind apart from one<br />

security door. The secure door must be very strong and protected with multiple entry systems e.g. keycard access with codepunch<br />

and/or fingerprint/retina scan recognition systems - you get the idea...<br />

53. XP Permissions<br />

Sharing of files and folders can be managed in two ways. If you chose simplified file sharing, your folders can be shared with<br />

everyone on your network or workgroup, or you can make your folders private. (This is how folders are shared in <strong>Windows</strong> 2000.)<br />

However, in <strong>Windows</strong> XP Professional, you can also set folder permissions for specific users or groups.<br />

To do this, you must first change the default setting, which is simple file sharing. Open Control Panel, click Tools, and then click<br />

Folder Options. Click the View tab, and scroll to the bottom of the Advanced Settings list. Clear the Use simple file sharing<br />

(Recommended) check box. To manage folder permissions, browse to the folder in <strong>Windows</strong> Explorer, right-click the folder, and<br />

then click Properties. Click the Security tab, and assign permissions, such as Full Control, Modify, Read, and/or Write, to specific

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!