Monday, January 8, 2007

How To Hack Your Registry

Hi Guys......... Here some tutorials how to make your computer safer and faster Let's start for Registry . What is Registry? In computing, the Windows registry is a database which stores settings and options for the operating system for Microsoft Windows 32-bit versions, 64-bit versions and Windows Mobile. It contains information and settings for all the hardware, operating system software (and most of non-operating system software too), users, and preferences of the PC and so on. Whenever a user makes changes to "Control Panel" settings, or file associations, system policies, or installed software, the changes are reflected and stored in the registry. The Windows Registry was introduced to tidy up the profusion of per-program INI files that had previously been used to store configuration settings for Windows programs. These files tended to be scattered all over the system, which made them difficult to keep track of. For more details Just click this link http://en.wikipedia.org/wiki/Windows_registry One of Microsoft’s goals in creating Windows XP was to make a more secure operating system ( I hope so,compare to Linux or Mac) Unfortunately, because security and functionality are often at odds, XP out of the box is not as secure as it can be. You can make your Windows XP computer more secure by tweaking a few registry settings—but as always, take care when editing the registry. An incorrect modification could render your system unusable. We recommend that you back up the registry before trying these edits.

1.Disable hidden administrative shares

Even if you haven’t shared any of your files or folders, an administrator (or anyone who knows a valid username and password for an account you’ve given administrative privileges) can remotely access your data by using the hidden administrative shares that XP creates by default. There is an administrative share for every drive on your system, but it doesn’t show up in the network browse list (My Network Places) because it has been marked as hidden by appending a dollar sign ($) to the end of the drive letter. You can delete these shares, but XP will just grow them back the next time you reboot. To prevent this, disable administrative shares by performing the following registry edit: 1. In your registry editor, navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\lanmanager\parameters. 2. In an empty portion of the right details pane, right-click and select New DWORD Value. 3. Rename the new value AutoShareWks. 4. Double-click the new value and enter 0 in the Value Data field

2. Don’t show the last logon name

If you’ve elected to use the standard logon dialog box instead of the Welcome joined to a domain, XP tries to be helpful by displaying the account name computer; you only have to type in the password. However, this is a security of the information needed to log on. Why make it easier? Of course, you administrator account and disabled the guest account so a hacker won’t next step is to disable the display of the last logged-on user. Here’s how: 1. In your registry editor, navigate to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ 2. In an empty portion of the right details pane, right-click and select 3. Rename the new value dontdisplaylastusername. 4. Double-click the new value and enter 1 in the Value Data field.

3. Control what applications a user can run If you’re sharing an XP computer with someone else and you’re the administrator, you can restrict the other user(s) to running only applications you specify. This can be particularly useful when sharing the computer with a young family member or if your computer must be used by guests. Here’s the procedure: 1. In your registry editor, logged on with the account you want to restrict, navigate to: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer. 2. In an empty portion of the right details pane, right-click and select New DWORD Value. 3. Rename the new value to RestrictRun. 4. Double-click the new value and enter 1 in the Value Data field. (You can modify this to allow all applications to run by changing the value to 0). 5. Create a new subkey named RestrictRun. 6. Create a new string value for each application you want to allow. Name each string value as a consecutive number. 7. Set the Value Data for each string value as the name of an application you want to allow (this should be the executable program name, such as explore.exe for Windows Explorer). 8. Reboot the computer to apply the change. Warning Don’t apply this policy to yourself or you may not be able to run the programs you need to in order to administer the computer—and if you can’t run the registry editor, you won’t be able to change the policy.

4. Disable saved password for dialup networking

It’s handy for users not to have to enter their passwords each time they start a dialup networking session, but it can also be a security risk to have Windows save the password, since anyone else can start a session, too. To disable the saved password function for DUN, do the following: 1. In your registry editor, navigate to: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RasMan\Parameters. 2. If the entry DisableSavePassword doesn’t already exist, right-click in an empty portion of the right details pane and select New DWORD Value. 3. Rename the new value to DisableSavePassword. 4. Double-click the new value (or if it already existed, just double-click it now) and enter 1 in the Value Data field to prevent Windows from saving the DUN password. If you want to enable saving of passwords later, you can do so by setting the value to 0.

Thanks to techrepublic.com

I hope this information useful...... Dubai 114 Production

No comments: