Solved

Start and E

Posted on 2002-03-27
8
128 Views
Last Modified: 2011-09-20
I have installed some software that has the ability to disable the cntl+alt+del key, and also disable the Start button. I can turn on and off these features at will. but it also seems to have disabled the Start+E and Start+F - plus the other shortcut keys. Is there somewhere in the reg. that I can enable those keys again, while still allowing the software I use to limit access to the Start button and cntl+alt+del key.

0
Comment
Question by:Lyndon1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
8 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6901290
I am afraid that by using this software to disable the start button it has completely disabled the start button and all the built in shortcuts using the Windows Key for the Start button. Unless the program you are using has specific settings for this then it looks like it is an all or nothing situation.



The Crazy One
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6901332
You might want to take a look at the Group policies by running

Start > Run gpedit.msc

Of course to do this you will need to enable the Start button

When it opens migrate to Local Computer Policy > User Configuation > Administrative Templates > Start Menu & Taskbar. Look in the window pane on the right and you will see a list of things you can configure for the Start button. Something there might help and also you might find by using the Group Policy that you might not need to use that software for the Start button.
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 6901344
Computer Policy > User Configuation > Administrative Templates > System > Logon/Logoff and you will see several things there that you can use to limit the user to what they can do while logged on to the system. You might find using this Group Policy interface that you may not even need that software you are using. :>)
0
Backup Solution for AWS

Read about how CloudBerry Backup fully integrates your backups with Amazon S3 and Amazon Glacier to provide military-grade encryption and dramatically cut storage costs on any platform.

 

Author Comment

by:Lyndon1
ID: 6902147
OK...now I did something stupid...I was playing around with gpedit.msc and I removed the run command from the start menu....How do I get it back? so that I can run gpedit.msc and put things back to thier original config.
0
 

Author Comment

by:Lyndon1
ID: 6902157
ahh...never mind, I got it from a DOS prompt!! :)
0
 

Author Comment

by:Lyndon1
ID: 6902161
OK, when using gpedit.msc the settings for S+E and the others come up as "not config", and when I "enabled" them, it removed the feature from my Start menu.

Try again folks.

Tks
Lyndon
0
 
LVL 11

Expert Comment

by:ewtaylor
ID: 8905603
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
[paq refund]
Please leave any comments here within the next seven days.
 
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!
 
[ewtaylor]
EE Cleanup Volunteer
0
 
LVL 6

Accepted Solution

by:
Mindphaser earned 0 total points
ID: 8997502
Force accepted

** Mindphaser - Community Support Moderator **
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
While it may be true that the internet is a place of possibilities, it is also a hostile environment lurking with many dangers. By clicking on the wrong link, trusting the wrong person or using a weak password, you are virtually inviting hackers to …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

730 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question