Learn how to disable computers from using software

  

Computer Shop News If you want to disable this machine or a computer can not use the software, you can do it by the following methods. The method is as follows: The following methods are valid for WinXP, Win2000, and Win2003 systems.

Just create a new file named ws2_32.dll in the installation directory of a software, so the system will run out with a file error.

New ws2_32.dll can be obtained by the following method.

Create a new text file with empty content, and then rename it to ws2_32.dll, so you can get the ws2_32.dll file.

For example, if you don't want QQ to run, then you can disable the software by the following methods.

First find the installation path of QQ, such as: C:\\Program Files\\Tencent\\QQ\\Bin, then, create new ws2_32.dll in the path, so when you double-click QQ.exe, A pop-up prompt will appear:

QQ.exe - corrupted image, application or C:\\Program Files\\Tencent\\QQ\\Bin\\ws2_32.dll is an invalid windows image. Please check your installation disk again. Click OK to exit, so you can't run QQ.

Of course, you have to remember the file and location of ws2_32.dll. Once you want to restore the software, you have to delete the file and the problem is solved.

Knowledge Extension:

If your client is a Windows XP version, you can use the software restriction policy.

Software Restriction Policy is a technology that allows administrators to decide which programs (although the word "program" is used here, but not just the exe file, we can limit it by this technology. Files of any type extension are executed) which are trustworthy and which are untrustworthy. For untrusted programs, the system refuses to execute. Usually, the administrator can let the system use the following methods to identify whether the software is trustworthy: the path of the file, the hash value of the file, the certificate of the file, the area of ​​the website where the file is downloaded in the Internet option, and the distribution of the file. Business, all files for a specific extension, and other mandatory attributes.

The software restriction policy can be set not only in the stand-alone Windows XP operating system, but also can affect only the current user or user group, or affect all users who log in locally to this computer. All client computers joining the domain are set up and can also be set to affect a specific user or group of users, or all users. We will explain this in a stand-alone format and set up to affect all users. The settings in the stand-alone and workgroup environments are similar to this. On the other hand, sometimes we may be unable to run certain system components due to incorrect settings (for example, it is forbidden to run all msc suffix files and cannot open the Group Policy Editor), in this case we just restart the system to safe mode, Then log in with the Administrator account and delete or modify this policy. Because logging in with the Administrator account in secure mode is not affected by these policies.

In this example, we assume an application where the employee's computer can only run all the programs that come with the operating system (C drive), as well as the Word, Excel, PowerPoint, and Outlook necessary for the job. The version numbers are all 2003, and it is assumed that the Office program is installed on the D drive, and the operating system of the employee's computer is Windows XP Professional.

Run Gpedit.msc to open the Group Policy Editor. If you look closely, you can find that there is a software restriction policy entry under "Computer Configuration" and "User Settings". ? If you want this policy to work only for a specific user or group of users, use the policy under "User Configuration" if you want to be valid for all users who log on locally to the computer, use “ Computer Configuration” Strategy. Here we need to be effective for all users, so choose to use the policy under "Computer Configuration".

Before starting the configuration, we also need to consider a question, what features are allowed in the software we allow, and what features are disabled in the software, we have to come up with an optimal strategy that can make all The required software runs correctly, and none of the unnecessary software can run. In this case, most of the programs we allow are located in the Program Files and Windows folders on the system disk (C drive), so we can determine which programs are trusted by the path of the file. For the Office program installed on the D drive, you can also decide by path or file hash.

Click to open the software restriction policy entry under "Computer Configuration", and then click "Create a new policy" under the "Operation" menu (currently on XP with SP1 installed, default here) There is no strategy, but for the system with SP2, there is already a default policy built in), the system will create two new entries: "Security Level" and "Other Rules". There are two rules under the security level entry, “not allowed" and “unrestricted", the former means that by default, all software is not allowed to run, only specially configured A small number of software can run; the latter means that by default, all software can run, only a few specially configured software is prohibited from running. Because the software we need to run in this example has been fixed, we need to use “not allowed" as the default rule. Double-click this rule, then click the “set as default" button and continue after agreeing to the warning message.

Then open the "Other Rules" entry, you can see that by default there are already four rules, which are set according to the registry path, and the default is set to "ld"; ”. I strongly remind you that you should not modify these four rules, otherwise your system will run into a lot of trouble, because these four paths involve the location of important system programs and files. At the same time, as we said before, the files in the Program Files folder and the Windows folder under the system disk are allowed to run, and the four default rules already contain this path, so all we have to do is the Office program. Add a rule. Right click on the blank area of ​​the right panel and select “New Hash Rule”, then you can see the interface below. Click here to click the "Browse" button, and then locate the executable files for all allowed Office programs (remember what are they? winword.exe, excel.exe, powerpnt.exe, outlook.exe) and double click to join . Then select “unlimited" under the "Security Level" drop-down menu, then click OK to exit. Repeat the above steps to add the executable files of the four softwares and set them to be unlimited.

Here you can consider a question, why do we choose to create hash rules for each program's executable? Is it easier to unify a path rule for an Office application? In fact, this can avoid the executable file being replaced, or the user can copy some green software that does not need to be installed to run in this directory. Because if a directory rule is created, all files saved in the allowed directory will be executable, including files that allow the program itself, as well as any other files that the user copied into. The hash rule is different. The hash value of a particular file is fixed. As long as the content of the file does not change, its hash value will never change. This also avoids the possibility of fraud. However, there is also a problem. Although the hash value of the file may not change, the file itself may require some changes. For example, if you install a Word patch, the hash of the winword.exe file may change. So if you choose to create such a rule, you will need to see the situation and update the corresponding rules whenever the software is updated. Otherwise the operation of the normal program will be affected.

In addition to this, there are several strategies that can be used by us: mandatory, which limits which files the software restriction policy applies to and whether it is applied to the Administrator account; the assigned file types are used to specify which Files with extensions can be considered executable by the system, we can add or delete files of a certain type of extension; publishers who trust can use to decide which users can choose to trust publishers, and trust before There are other things you need to do. These three strategies can be chosen according to their actual situation.

Once the software display policy is set, once the restricted user attempts to run the blocked program, the system will immediately issue a warning and refuse to execute.

Copyright © Windows knowledge All Rights Reserved