Seven tricks for hacking Windows XP systems

  
        This article describes the seven methods commonly used in hacking Windows XP operating system. If you encounter similar problems, you should pay attention to it...

First trick: Screen saver

After screen saver is enabled in Windows As long as we leave the computer (or do not operate the computer) for a preset time, the system will automatically start the screen saver, and when the user moves the mouse or hits the keyboard to return to normal working, the system will open a password. The confirmation box can only be returned to the system after entering the correct password. Users who do not know the password will not be able to enter the working state, thus protecting the security of the data.

Tip: Some screen protectors with imperfect design do not have the "Ctrl+Alt+Del" combination of the shielded system. Therefore, you need to test whether the program has this major bug after the setup is completed.

However, the screen saver can only be started automatically after the user leaves for 1 minute. Do we have to sit at the computer and wait for N minutes to see the screen saver activation before we can leave? In fact, we only need to open the Windows installation. The system subdirectory in the directory, then find the corresponding screen saver (extension is SCR), hold down the right mouse button and drag them to the desktop, select the "Create shortcut at current location" command in the pop-up menu, on the desktop Create a shortcut for these screen savers.


After that, we can quickly start the screen saver by double-clicking this shortcut when leaving the computer.

The second trick: cleverly hide the hard disk

In the "Press Web Page" view mode, a warning message will pop up when you enter the Windows directory, telling you that this is the system folder. The contents of the folder may cause the program to run abnormally. To view the contents of the folder, click Show File. Then click "Show File" to enter the directory.

The reason is that there are two files, desktop.ini and folder.htt, in the root directory of Windows. Copy these two files to the root directory of a drive (since these two files are hidden files, you must click the "View" tab in the folder options and select "Show all files", so you can see this Two files)). Press the "F5" button again to refresh it and see what happened, and it is the same as when you enter the Windows directory.

Next, we use "Notepad" to open folder.htt, which is a file written in Html language, and use your imagination to modify it.

If you don't understand the Html language, don't worry, first find the "display file" to delete it, find "Modify the folder may cause the program to run abnormally, to view the contents of the folder, please Click to display the file, and change it to your favorite text, such as "safe and heavy, free people, etc. please leave."

Change "To view the contents of this folder, click" to "Otherwise, at your own risk!", then drag the slider down to the 9th line of the countdown and find "(file ://%TEMPLATEDIR%\\wvlogo.gif
)" This is the path to the gear image in the lower right corner of the window when the warning message is displayed. Change it to the path of your own image, for example, use "d:\\tupian\\tupian1.jpg" Replace the content after "//", remember that you must type the suffix of the image, otherwise it will not display the image.

Of course, you can also use web tools like Dreamweaver and FrontPage to make better results, then just copy the original file to the back of the following text, overwriting the "~" in the original file. The content is all right.

*ThisfilewasautomaticallygeneratedbyMicrosoftInternetEXPlorer5.0

*usingthefile%THISDIRPATH%\\folder.htt.

Save and exit, press "F5" to refresh, is it very personal? The next thing to do is to hide the drive you want with "Super Rabbit" and enjoy your work without rebooting. Finally, telling everyone that the trick is even more absolute is to simply delete the contents of the "~" in the original folder.htt file, which will create an illusion that this is an empty drive for the person who opens your drive. The files are more secure.

The third trick: disable the "Start" menu command

In Windows2000/XP, the group policy function is integrated. Through group policy, various software, computer and user policies can be set in a certain Aspects enhance the security of the system. Run the "Start → Run" command, enter "gpedit.msc" in the "Open" field of the "Run" dialog box, and then click the "OK" button to start the Windows XP Group Policy Editor.

In the "Local Computer Policy", expand the "User Configuration → Administrative Templates → Taskbar and Start Menu" branch, and provide the "Taskbar" and "Start Menu" in the right window. Strategy.

When the Start menu command is disabled, in the right window, the utility group, the "My Documents" icon, the "Documents" menu, and the "My Network Places" in the "Start" menu are removed. "Icons and other strategies. When cleaning up the "Start" menu, you can enable the policy corresponding to the menu item you don't need. For example, to delete the "My Documents" icon, the specific steps are:

1) In the policy list In the window, double-click the "Delete my document icon from the Start menu" option with the mouse.

2) In the "Settings" tab of the pop-up window, select the "Enabled" radio button and click "OK".

The fourth trick: disable desktop-related options

Windows XP's desktop is just like your desk, sometimes it needs to be organized and cleaned. With the Group Policy Editor, this work will be a breeze, as long as you expand the "User Configuration → Administrative Templates → Desktop" branch in the "Local Computer Policy", you can display the corresponding policy options in the right window.

1) Hide the system icon of the desktop

If you hide the system icon on the desktop, the traditional method is to use the method of modifying the registry, which will inevitably cause certain risks. The Group Policy Editor is a quick and easy way to do this.

To hide the "My Network Places" and "InternetEXPlorer" icons on the desktop, just in the right window, there are two policy options: "Hide Network Neighborhood Icon on Desktop" and "Hide InternetEXPlorer Icon on Desktop". Enable it. If you hide all the icons on your desktop, just enable "Hide and disable all items on your desktop".

When the "Delete my document icon on desktop" and "Delete my computer icon on desktop" options are enabled, the "My Computer" and "My Documents" icons will be taken from you. The computer desktop disappeared. If you no longer like the "Recycle Bin" icon on your desktop, you can also delete it by enabling the "Remove Recycle Bin from Desktop" policy item.

2) Prohibit some changes to the desktop

If you don't want others to change the settings of your computer's desktop at will, please put the "Do not save settings when exiting" policy option in the right window. Enabled. When you enable this setting, other users can make some changes to the desktop, but some changes, such as the location of the icon and open window, the location and size of the taskbar, cannot be saved after the user logs out.

The fifth trick: prohibit access to the "Control Panel"

If you do not want other users to access the computer's control panel, you just run the Group Policy Editor and expand in the left window. Local Computer Policy → User Configuration → Administrative Templates → Control Panel branch, then enable the No Access Control Panel policy in the right window.

This setting prevents the launch of the Control Panel program files, with the result that others will not be able to launch the Control Panel or run any Control Panel items. In addition, this setting removes the Control Panel from the Start menu, and this setting also removes the Control Panel folder from Windows Explorer.

Tip: If you want to select a "Control Panel" item from the properties menu of the context menu, a message will appear stating that this setting prevents this operation.

Sixth trick: setting user permissions

When multiple users share a computer, set user permissions in Windows XP, you can follow the steps below:

1) Run Group Policy Editor program.

2) Expand the "Computer Configuration → Windows Settings → Security Settings → Local Policies → User Rights Assignment" branch in the left window of the editor window.

3) Double-click the user right that needs to be changed, click the "Add User or Group" button, then double-click the user account you want to assign to the permission, and finally click the "OK" button to exit.

Seventh trick: Folder settings auditing

Windows XP can use audit trails to access user accounts, login attempts, system shutdowns or restarts, and similar events for accessing files or other objects. Audit files and folders under the NTFS partition ensure file and folder security. The steps for setting up auditing for files and folders are as follows:

1) In the Group Policy window, expand the "Computer Configuration → Windows Settings → Security Settings → Local Policies" branch in the right window step by step, and then Under the branch, select the Audit Policy option.

2) Double-click the "Audit Object Access" option with the mouse in the right window.

3) Right-click on the file or folder you want to review, select the "Properties" command in the pop-up menu, and then select the "Security" tab in the pop-up window.

4) Click on the "Advanced" button and select the "Audit" tab.

5) Choose your action based on your situation:

If you want to set up a review for a new group or user, you can click the "Add" button and type a new user in the "Name" box. Name, then click the "OK" button to open the "Audit Project" dialog.

To view or change an existing group or user review, select the username and click the View/Edit button.

To delete an original group or user review, select the username and click the "Delete" button.

6) If necessary, select the location you wish to review in the "Apply to" list in the "Audit Project" dialog.

7) If you want to prevent files and subfolders in the directory tree from inheriting these audit items, select the "Apply these audit items only to objects and/or containers in this container" checkbox.

Note: A user who is a member of the Administrators group or who is authorized to have the Manage Auditing and Security Logs permission in Group Policy can audit files or folders. Before Windows XP audits files and folders, you must enable Audit Object Access for the Audit Policy in Group Policy. Otherwise, when you set up the file and folder audit, an error message will be returned, and the files and folders will not be reviewed.

Copyright © Windows knowledge All Rights Reserved