Solved

how to stop CMD.EXE being ran from FDD  XP home

Posted on 2003-10-21
5
134 Views
Last Modified: 2013-12-04
hi all

my first question,hope i dont sound to silly.

Am trying to lockdown a XP home box with internet card timing software onboard( hayman Is staff int cafe)). the internet card access software seems to lock down most of the box and runs well.
But ppl who dont want to pay for Int access can bring a copy of cmd.exe on a floppy run it and then uninstall/break the internet card acess software .(they know the path /s)
then for them all is well.free access
real user's who pay require floppy disk access,4 saveing emails etc.so cant do away with fdd

can i stop CMD.EXE being run from floppy?
can I disable cmd.exe being ran altogether (modify kernel) ?


all the best
hedwig
0
Comment
Question by:hedwigthetrader
  • 2
5 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 125 total points
ID: 9596342
Hedwig,

Do you want this

http://www.winguides.com/registry/display.php/1143/

Sunray
0
 
LVL 8

Expert Comment

by:nader alkahtani
ID: 9601474
If he change registry settings on worksations , the hacker can change it too , so  , he should use Group Policy to restrict users from any change

http://support.microsoft.com/default.aspx?scid=kb;en-us;322143

http://support.microsoft.com/default.aspx?scid=kb;en-us;322176



0
 
LVL 8

Expert Comment

by:nader alkahtani
ID: 9601552
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Advantages and dis-advantages of UAC 27 93
Server 2008-R2 lost password 19 98
Ways to verify USB ports are blocked on 30,000 PCs/laptops 12 133
server core and windows updates 3 36
As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

816 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now