Blocking system changes

Posted on 2006-05-22
Last Modified: 2013-12-04
I have two computers on a Cyber Cafe.

The computers are running XP Home and have two users (administrator and guest).

Administrator has password. Guest does not have password.

I have some needs:
1) I don't want guest users changing their passwords.
2) I don't want guest users changing Lan Settings in Internet Explorer.
3) I don't want guest users having access to nothing except Internet Explorer and MSN Messenger.
4) I don't want guest users putting malicious code in the Cafe machines.

Is there an way of doing this easily (some software application, maybe)?
Question by:jclobocar
    LVL 48

    Accepted Solution

    LVL 15

    Expert Comment

    LVL 48

    Expert Comment

    LVL 11

    Expert Comment

    Perhaps a protection by DeepFreeze can solve your issues. Basically you create an image and freeze it. Upon reboot all of the changes are instantly wiped off.
    LVL 28

    Expert Comment

    Have a look at WinRollback:

    Should do what you need.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
    Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now