Tuesday, November 27, 2007

UDP / TCP Ports Explained

Introduction

In this tutorial we will discuss the concept of Ports and how they work with IP addresses. If you have not read our article on IP addresses and need a brush up, you can find the article here. If you understand the concepts of IP addresses, then lets move on to TCP and UDP ports and how they work.

The devices and comptuers connected to the Internet use a protocol called TCP/IP to communicate with each other. When a computer in New York wants to send a piece of data to a computer in England, it must know the destination IP address that it woud like to send the information to. That information is sent most often via two methods, UDP and TCP.

The two Internet workhorses: UDP and TCP

UDP? TCP? I know you are getting confused, but I promise I will explain this in very basic terms so that you can understand this concept.

TCP stands for Transmission Control Protocol. Using this method, the computer sending the data connects directly to the computer it is sending the data it to, and stay connected for the duration of the transfer. With this method, the two computers can guarantee that the data has arrived safely and correctly, and then they disconnect the connection. This method of transferring data tends to be quicker and more reliable, but puts a higher load on the computer as it has to monitor the connection and the data going across it. A real life comparison to this method would be to pick up the phone and call a friend. You have a conversation and when it is over, you both hang up, releasing the connection.

UDP stands for User Datagram Protocol. Using this method, the computer sending the data packages the information into a nice little package and releases it into the network with the hopes that it will get to the right place. What this means is that UDP does not connect directly to the receiving computer like TCP does, but rather sends the data out and relies on the devices in between the sending computer and the receiving computer to get the data where it is supposed to go properly. This method of transmission does not provide any guarantee that the data you send will ever reach its destination. On the other hand, this method of transmission has a very low overhead and is therefore very popular to use for services that are not that important to work on the first try. A comparison you can use for this method is the plain old US Postal Service. You place your mail in the mailbox and hope the Postal Service will get it to the proper location. Most of the time they do, but sometimes it gets lost along the way.

Now that you understand what TCP and UDP are, we can start discussing TCP and UDP ports in detail. Lets move on to the next section where we can describe the concept of ports better.

TCP and UDP Ports

As you know every computer or device on the Internet must have a unique number assigned to it called the IP address. This IP address is used to recognize your particular computer out of the millions of other computers connected to the Internet. When information is sent over the Internet to your computer how does your computer accept that information? It accepts that information by using TCP or UDP ports.

An easy way to understand ports is to imagine your IP address is a cable box and the ports are the different channels on that cable box. The cable company knows how to send cable to your cable box based upon a unique serial number associated with that box (IP Address), and then you receive the individual shows on different channels (Ports).

Ports work the same way. You have an IP address, and then many ports on that IP address. When I say many, I mean many. You can have a total of 65,535 TCP Ports and another 65,535 UDP ports. When a program on your computer sends or receives data over the Internet it sends that data to an ip address and a specific port on the remote computer, and receives the data on a usually random port on its own computer. If it uses the TCP protocol to send and receive the data then it will connect and bind itself to a TCP port. If it uses the UDP protocol to send and receive data, it will use a UDP port. Figure 1, below, is a represenation of an IP address split into its many TCP and UDP ports. Note that once an application binds itself to a particular port, that port can not be used by any other application. It is first come, first served.

<-------------------- 192.168.1.10 -------------------->
0 1 2 3 4 5 .. .. .. .. .. .. .. .. 65531 65532 65533 65534 65535
Figure 1. IP address with Ports

This all probably still feels confusing to you, and there is nothing wrong with that, as this is a complicated concept to grasp. Therefore, I will give you an example of how this works in real life so you can have a better understanding. We will use web servers in our example as you all know that a web server is a computer running an application that allows other computers to connect to it and retrieve the web pages stored there.

In order for a web server to accept connections from remote computers, such as yourself, it must bind the web server application to a local port. It will then use this port to listen for and accept connections from remote computers. Web servers typically bind to the TCP port 80, which is what the http protocol uses by default, and then will wait and listen for connections from remote devices. Once a device is connected, it will send the requested web pages to the remote device, and when done disconnect the connection.

On the other hand, if you are the remote user connecting to a web server it would work in reverse. Your web browser would pick a random TCP port from a certain range of port numbers, and attempt to connect to port 80 on the IP address of the web server. When the connection is established, the web browser will send the request for a particular web page and receive it from the web server. Then both computers will disconnect the connection.

Now, what if you wanted to run an FTP server, which is a server that allows you to transfer and receive files from remote computers, on the same web server. FTP servers use TCP ports 20 and 21 to send and receive information, so you won't have any conflicts with the web server running on TCP port 80. Therefore, the FTP server application when it starts will bind itself to TCP ports 20 and 21, and wait for connections in order to send and receive data.

Most major applications have a specific port that they listen on and they register this information with an organization called IANA. You can see a list of applications and the ports they use at the IANA Registry. With developers registering the ports their applications use with IANA, the chances of two programs attempting to use the same port, and therefore causing a conflict, will be diminished.

--
Lawrence Abrams
Bleeping Computer Advanced Internet Concepts Tutorial

Guide to Windows Vista

Introduction

A Windows Vista feature is simply a set of programs or a particular capability of the operating system that can be enabled or disabled by an administrator. It is important to note that in Windows Vista, when you remove or disable a feature, you are not actually removing files from your hard drive, but rather just deactivating them. Therefore disabling a feature should not be used as a method of freeing up hard drive space. On the other hand, by disabling a feature you may gain an increase in performance due to memory and processor utilization no longer being allocated towards the particular feature.

Now that you understand what a Windows Vista Feature is, you may be wondering why people would need to enable or disable them? When you install Windows Vista, it installs a base set of features. This base set consists of programs and capabilities that Microsoft feels the average user would require or want when running Windows Vista. There are, though, features that come with the base install that some people may not need and by deactivating them you have one less potential program running in the background using up resources. On the other hand, some people may have need of a feature that is not activated by default such as Internet Information Services that would enable them to host a web site on their computer.

This guide will explain how to enable and disable Windows Vista features as well as describe what each feature does, whether it's installed by default, and whether we feel its necessary to enable.

How to enable or disable Windows Vista Features

To access the Vista Features screen you should follow these steps:

  1. Click on the Start button to open your Start Menu. The Start button looks like this: Vista Start Button

  2. When the Start Menu opens click on the Control Panel menu option.

  3. When the Control Panel window opens click on the Uninstall a program option option under the Programs category. This option is shown by the arrow in the image below. If you are using the Classic View of the Control Panel, then you would double-click on the Programs and Features icon instead.


    Vista Control Panel

  4. You will now be presented with the Programs and Features screen, or Uninstall or change a program screen, as shown in the image below.


    Vista Programs and Features Screen


    To access the Windows features screen you need to single-click on the option labeled Turn Windows features on or off as designated by the arrow in the image above.

  5. Windows Vista will now ask for your permission to access the Windows Vista Features. You should click on the Continue button to give this permission.

  6. The Windows Vista Feature List window will now open displaying all the Features available for your version of Vista. An entry can be a single feature or a feature with subfeatures. When enabling features that have subfeatures it is possible to only enable those subfeatures that are required by you. This enables you to finely tune how you want Vista to operate.


    Windows Vista Feature List


    Next to each feature is a box that can have three states. If the checkbox is checked that means that the feature, and all of its subfeatures if it has any, are enabled. If the box is filled with a solid blue color, then that means that some subfeatures of this feature are enabled but not all of them. If the checkbox is empty, then that feature and none of its subfeatures are enabled.

    To enable a feature, simply put a checkmark next to the feature name. To disable a feature simply remove the check from the feature or one of its subfeatures. When you are happy with how you disabled and enabled the features, you should click on the OK button to save these changes.

Now that you know how to access the Windows Vista Feature List and to activate and disable features you can control what programs and capabilities are available to you when using Vista. For a description of each feature, if they are enabled by default, and whether or not you need it, please read the next section of this tutorial.

Windows Vista Feature List

Below is the list of features that are available in Windows Vista. Please note that depending on the version of Windows Vista you may have, some of these features may not be available. This feature list was taken from Vista Ultimate which should have all the available features at this time.

The table below contains a list of all the features and their subfeatures. Each Feature name is a link to a description of the particular feature. These descriptions may contain link to further reference material about the particular feature. Each feature also has a corresponding default status. The key to the default status column is below:

Default Status Key
Status
Description
N
The feature or subfeature is not enabled by default.
Y
The feature or subfeature is enabled by default.
Partial
Some of the subfeatures of a feature are enabled by default.

ActiveX Installer Service
This feature enables standard users to install ActiveX controls. This feature can be controlled via Group Policy so that the an administrator can set what hosts a standard user can install an ActiveX control from. This service was added so that enterprise users are able to install ActiveX controls that are necessary for day-to-day business. The majority of users do not need this feature installed. More information can be found here.

Games
Games that come bundled with Vista. Loosen up and enable them. Some are fun! They include:

Chess Titans
Single-player chess game

FreeCell
A solitaire card game.

Hearts
A trick-based card game in which the goal is to get rid of your cards while avoiding points.

Inkball
A puzzle game where you try to bounce balls into a specific hole using walls you create with your mouse cursor.

Mahjong Titans
A solitaire game where you use Mahjong tiles instead of cards.

Minesweeper
A puzzle/strategy game.

Purble Palace
A childrens game designed to teach colors, shapes and pattern recognition.

Solitaire
A single-player card game.

Spider Solitaire
A solitaire card game.

Indexing Service
The indexing service is being provided for backwards compatibility for Windows versions prior to Vista. This service indexes the files on your hard drive in order to aid in rapid searching. In the past this service was known to cause slow downs on a computer. It is unnecessary to enable this feature.

Internet Information Services
Installs the services and administration tools for IIS 7.0. Internet Information Server 7.0 allows your computer to act as a Web server and FTP server. This feature should only be enabled if you require this functionality. More information about the various features and what versions of Vista have them can be found here.

FTP Publishing Service
This feature, and its subfeatures, are for enabling the IIS 7.0 FTP Server and FTP server management tools. More information about using the FTP in IIS 7.0 can be found here.

FTP Management Console
Enables the Management console for the Windows FTP Server. This should only be enabled if you need to manage an FTP server on your local machine or a remote machine you have administrative access to.

FTP Server
Enables the Windows FTP server. This feature should only be enabled if you need an FTP server running on your computer.

Web Management Tools
Install Web management console and tools.

IIS 6 Management Compatibility
Allows you to use the IIS 6 management console to manage FTP sites and Web sites using IIS 6 APIs.

IIS 6 Management Console
Enables you to manage IIS 7.0 FTP sites using the IIS 6 administrative interface. To manage FTP sites in IIS 7.0 you must have the IIS 6 Management Console installed. With this console installed you can also manage remote IIS 6.0 installations.

IIS 6 Scripting Tools
Allows you to use configuration scripts to manage an IIS 6 server.

IIS 6 WMI Compatibility
Enables the IIS 6 WMI scripting interface.

IIS Metabase and IIS 6 configuration compatibility
Enables IIS 6.0 metabase calls to interact with the new IIS 7.0 configuration store.

IIS Management Console
Installs the Web server management console that allows you to create, delete, and manage web sites running on a local or remote IIS 7.0 server. This console is only used for managing web sites. To manage FTP sites you must install the IIS 6 Management Console. More info on using the new console can be found here.

IIS Management Scripts and Tools
Enables you to manage an IIS 7.0 server with configuration scripts.

IIS Management Service
Allows a local web server to be managed remotely from another computer using the IIS Management Console.

World Wide Web Services

Application Development Features
Enables support for dynamically created web pages using various languages or coding methods.

.NET Extensibility
Enabling this feature allows IIS 7.0 to host .NET Framework applications.

ASP
Enabling this feature allows IIS 7.0 to host Classic ASP applications.

ASP .NET
Enabling this feature allows IIS 7.0 to host ASP .NET applications.

CGI
Enabling this feature allows IIS 7.0 to host CGI executables.

ISAPI Extensions
Enabling this feature allows ISAPI extensions to handle client requests.

ISAPI Filters
Enabling this feature allows ISAPI filters to modify web server behaviour.

Server-Side Includes
Enabling this feature allows IIS 7.0 to serve .shtm, .shtml, and .stm pages from a web site.

Common HTTP Features
Allows you to enable features that are required by most web sites.

Default Document
Allows you to specify a file that will opened automatically when a browser connects to a site without specifying a particular filename. For example if we specified index.html as our default document and we visited http://www.bleepingcomputer.com/, notice it does not specify a filename, IIS would automatically send back the contents of the index.html as it is the specified default document.

Directory Browsing
Allows you to view the contents of a directory on a web site that does not contain a default document. For example if their was an URL http://www.bleepingcomputer.com/Microsoft/ and there was no file in that the Microsoft directory that matched a specified default document, the server would instead display a listing of all the files in the Microsoft directory.

HTTP Errors
Enabling this feature will allow you to create customized error pages for your sites hosted under IIS 7. This allows for useful error pages like this rather than this. It is important to note that the follow error pages cannot be customized: 400, 403.9, 411, 414, 500, 500.11, 500.14, 500.15, 501, 503, and 505.

HTTP Redirection
This feature allows you to redirect a page to another page based upon rules. Information on configuring HTTP redirection can be found here and here. The available redirect types are:

  • Standard (302) - Tells the Web client to open the page specified in the Location HTTP header.
  • Permanent (301) - Tells the Web client that requested page has moved to a new permanent location.
  • Temporary (307) - The requested resource resides temporarily under a different URI. This error code also protects POST data from being lost during the redirection.

Static Content
The features enables IIS 7.0 to serve static HTML (.htm and .html) and image files.

Health and Diagnostics
This category and its subfeatures are for traffic logging and monitoring of IIS 7.0 web sites and applications.

Custom Logging
Enables you to customize what information is logged for web servers, sites, and applications on this server.

HTTP Logging
Enables logging of HTTP activity on this server.

Logging Tools
Installs tools and utilities that can be used for logging.

ODBC Logging
Allows you to log activity to a database via ODBC.

Request Monitor
Allows you to view the current worker processes in an application pool as well as seeing the current requests executing within a worker process.

Tracing
Enables IIS to log information about a request that is failing to serve back information. This is useful as it allows you to quickly debug an application on a particular page without having to reproduce the exact error again.

Performance Features

HTTP Compression Dynamic
Enables IIS 7.0 to compress dynamically generated output before sending it to the requesting browser. More information on configuring this can be found here.

Static Content Compression
Enables IIS 7.0 to compress static content such as HTML and images before sending it to the requesting browser.

Security
Features that enhance the security of your applications and web sites. For more information about how to configure the various security features below you can visit here.

Basic Authentication
Basic Authentication allows you to restrict who can access a specific resource on a web server. The visitor will provide a valid username and password that is authenticated against a specific domain. This mode of authentication is considered insecure as all credentials are passed in clear-text (unencrypted).

Client Certificate Mapping Authentication
Client certificate mapping allows users to log into your site automatically if they are using a client certificate.

Digest Authentication
Digest authentication authenticates users against a Windows domain controller. This method should be used when you require a higher level of security than you would get with Basic Authentication and your environment contains firewalls and proxy servers.

IIS Client Certificate Mapping Authentication
IIS client certificate mapping allows you to map certificates to specific clients or groups of clients. Those users who are using the mapped client certificate can automatically log into the site.

IP Security
Internet Protocol security uses the IPsec encryption protocol to encrypt the data travelling between your browser and the server.

Request Filtering
With Request Filtering you can analyzing all HTTP requests and if the request matches a specific criteria perform a particular action, such as denying the request. This functionality used to be part of the UrlScan utility but is now built into IIS 7.0.

URL Authorization
URL authorization enables you to create rules that allow you to permit or deny access to a particular URL depending on the user, groups, computers, domains that are accessing them.

Windows Authentication
Windows authentication enables web visitors to authenticate to the site using NTLM or Kerberos protocols. This type of authentication is best suited for Intranet applications.

Microsoft .NET Framework 3.0
The Microsoft .NET Framework version 3.0. Needed to run applications developed using .NET Framework 3.0.

Windows Communication Foundation HTTP Activation
Required for WCF HTTP activations.

Windows Communication Foundation Non-HTTP Activation
Required for WCF non-HTTP activations.

XPS Viewer
Enables you to view XPS documents.

Microsoft Message Queue (MSMQ) Server
Enables your computer to act as a Microsoft Message Queue Server. MSMQ allows applications to send messages to each other with guaranteed delivery. The server holds the message until the recipient application runs and then delivers the message to it. Unless you need this, do not enable it or its subfeatures.

Microsoft Message Queue (MSMQ) Server Core
This features and its subfeatures are the core components of the Microsoft Message Queue Server.

MSMQ Active Directory Domain Services Integration
Active Directory Domain Services Integration feature enables publishing of queue properties to Active Domain Directory Services, out-of-the-box authentication and encryption of messages using certificates registered in Active Directory Domain Services, and routing of messages across Windows sites. This feature becomes operational only when a computer becomes part of a domain.

MSMQ HTTP Support
Allows access to the MSMQ using the HTTP protocol. This feature requires that the Internet Information Server feature is enabled.

MSMQ Triggers
Enables incoming messages to trigger a COM component or executable depending on the filters defined for the particular queue.

Multicasting Support
Allows applications to send messages to a Multicast IP address which will then deliver the message to the queues associated with that address.

MSMQ DCOM Proxy
Enables MSMQ applications to use the MSMQ DCOM API to connect to a remote MSMQ server.

Print Services
Manages Printers and Printing.

Internet Printing
Enables your computer to print to printers via the HTTP protocol. This allows you to print to a printer anywhere in the world as long as you have HTTP access to it. This should be enabled for printing to print servers on your network. If you are only using printers that are attached locally to your computer, you do not need to enable this feature.

LDP Print Server
Makes your computer act as a Line Printer Daemon and a Remote Line Printer client. This will typically only be used if you want Unix computers to be able to print to your Windows printers.

LPR Port Monitor
Enables your computer to print to printers attached to UNIX machines.

Remote Differential Compression
Transmits files over a network by determining what is different between a local and remote file and only sending those differences. This method allows for the saving of bandwidth and time as only the data that is different between the two files is sent. Should be enabled if you copy data between networked computers. More info here.

Removal Storage Management
Manages and catalogs removable media and operates automated removable media storage devices such as tape changers, libraries, and jukeboxes. Is not needed if you do not backup to removeable media.

RIP Listener
Listens for route updates from routers that use the Routing Information Protocol version 1 (RIPv1). Is not needed for the majority of users.

Services for NFS
Enables your computer to share files using the Network File System protocol. This protocol is typically used when you want to share files with UNIX/LINUX computers. Only enable if you plan to share data between Linux or Unix computers.

Administrative Tools
NFS Management Tools

Client for NFS
Allows this computer to access files on a UNIX based computer using NFS.

Simple TCPIP services(i.e. echo, daytime etc)
Installs the basic TCP/IP services such as echo, daytime, quote, chargen, and discard. These tools are essentially useless and should not be installed. More information about the different Simple TCP/IP Services can be found here.

SNMP feature
Enables Simple Network Management Protocol agents to run on your computer so that network devices can be monitored. This feature is typically not required by the majority of users. Only enable it if you know you need it.

WMI SNMP Provider
Provides WMI access to the SNMP information.

Subsystem for UNIX-based Applications
Otherwise known as SUA, Subsystem for UNIX-based Applications installs a source-compatibility subsystem for compiling and running unix-based applications and scripts in Windows. Once this feature is installed, you can download the SDK by visiting the link found under Start -> All Programs -> Subsystem for UNIX-based Applications. More information about SUA can be found here. This feature should only be enabled if you know you need it.

Tablet PC Optional Components
Adds or removes accessories such as Tablet PC Input Panel, Windows Journal, and the Snipping Tool. Enabling this feature also installs software that enables handwriting recognition. Though this feature is not necessary to install unless you have a Tablet PC, by not installing it you will not have access to the Snipping Tool which is a very handy application. The Snipping Tool allows you to draw a selection of your screen that you would like to take a snippet, or screenshot, of.

Telnet Client
Enabling this will install a program called Telnet that allows you to connect remote Telnet servers. Telnet is a command-line program that can be run by typing telnet ipaddress in the Run field of your Start Menu. Unless you have a need for Telnet, there is no reason to enable this feature. More information about telnet can be found here.

Telnet Server
This feature will install a Telnet Server on your computer which will listen on TCP port 21 and configure the Windows firewall to allow incoming connections on this port. Enabling this feature is NOT recommended. Enabling this feature, and not having it properly configured, could pose a significant security risk as all information, including passwords, are sent in clear text. This means that anyone with a network sniffer can watch exactly what you are doing. It is for this reason that this feature is disabled by default. More information about telnet can be found here. If after reading this you still want to install a Telnet Server, it is recommended that you read this article.

TFTP Client
TFTP is a protocol similar to FTP but has less features and uses the UDP protocol to transmit data. TFTP is most commonly used to backup and restore a network devices firmware or configuration. Enabling this feature will install a TFTP client that you can use to download and upload files to and from a TFTP server. Solarwinds has a free TFTP Server that you can download if you want to use this feature. The Vista TFTP client is a command line program and can be access by typing tftp in a command prompt. Only enable if you need this feature particular feature. If you require a file transfer server of some sort, then use the IIS FTP server instead.

Windows DFS Replication Service
Allows you to replicate files between multiple computer in order to keep them synchronized. Vista's implementation of the DF Replication Service includes numerous enhancments such as Remote Differential Compression (RDC). More info here.

Windows Fax and Scan
This feature allows you to fax documents via a installed fax modem or to use a fax server located on your network. This program also allows you to have a central location where you can manage scanned documents and images. It is important to note that you can scan from other programs such as Photo Gallery.

Windows Meeting Space
Windows Meeting Space allows you to create a meeting and invite remote users to join it. When creating a meeting you have the ability to invite other users, provide documents that other people in the meeting have access to and can modify one at a time, and share your desktop or individual programs running on your computer. In order for this Feature to work you need to enable file replication, People Near Me, and allow it access through your firewall..

Windows Process Activation Service
Installs the Windows Process Activation Service. More info here. More info about the Windows Communication Foundation here.

.NET Environment
Installs the .NET environment for supporting managed code activation.

Configuration APIs
Install managed code configuration APIs.

Process Model
Install Process Model for the Windows Process Activation Service.

Windows Ultimate Extras
As an owner of Windows Ultimate you get access to additional premium content in the form of extra features, games, and applications. This premium content is only available to Windows Ultimate owners. As the new content becomes available it will be accessible via the Start Menu -> All Programs -> Extras .and Upgrades -> Windows Ultimate Extas icon.

Conclusion

Now that you know how to enable and disable features, get out there and start experimenting with your Vista installation. You may find that disabling certain features provides a performance boost, while enabling other features provide applications that make your life easier. Either way, play around and explore the available features. You can always turn them off again.

As always, if you want to learn more about, or discuss with your peers, the various features available in Windows Vista, then feel free to talk about it in of our Windows Vista forums.


This article is published and created for http://www.bleepingcomputer.com, otherwise known as Bleeping Computer, and is covered by all copyright laws. All articles on this website are copyright © 2003-2007 by Bleeping Computer, LLC. All right reserved. Use of these articles is limited to viewing and printing for personal use only. If you would like to use this material or portions of this material for other purposes you must receive explicit permission from Bleeping Computer before reprinting or redistributing this article in any medium.


How to Remain Secure on Cyber Monday

With Cyber Monday almost here, it's very important to equip your computer with powerful and well-developed technologies which would be able to defend you and keep your data secure during the entire holiday shopping season. Today, the Zone Alarm developers, Check Point Software Technologies, offered several pieces of advice on how to remain secure and buy products online without any threat.

For those of you who don't know what Cyber Monday is, it marks the beginning of the holiday shopping
season. This day is usually the best time for shopping because most merchants launch special offers and
prices for a wide category of products, all of them accessible via the Internet. Because millions of consumers will go online for shopping, some bad-intended persons a.k.a. attackers, phishers, scammers, hackers (you can call them however you want) will surely attempt to steal your money, products or even financial information.

"Internet holiday attacks get more advanced each year, but many people are still relying on outdated or nonexistent security solutions, which put their computers and identities at risk," said Laura Yecies, vice president and general manager of Check Point’s ZoneAlarm consumer division. "To stay safe online this holiday season consumers need to educate themselves on the latest types of threats, and make sure they are running up-to-date and comprehensive security software on their PCs."

Now that we understood that we have to secure our computers against hackers and attackers, what can we do to reach this goal? Well, the Zone Alarm creators give us some advice which might be really useful for an online holiday shopper:

1. Secure your computer with a powerful firewall, antivirus, antispyware and other security solution which could be able to block malicious attempts targeting your system.
2. Avoid publishing your details and especially the financial information on untrusted websites which doesn't seem to be genuine as some of them might be actually some phishing attacks.
3. Secure your browser in order to be able to protect your privacy as well as your identity. Beware! In the last few months more and more users became victims of identity theft!
4. Do not donate money to the organizations or websites promoted by email spam. Only donate money to trusted charities!
5. Buy stuff from the known merchants and websites. Some attackers might attempt to create fake online shops in order to steal users' information.


http://news.softpedia.com
By: Bogdan Popa, Security and Search Engines Editor

Windlight Atmospheric Rendering


Linden Lab's Second Life is getting the atmospheric rendering tech Windlight and the 3D cloud simulator Nimble from Windward Mark Interactive. Realism is the first thing the developer has to think about when a life sim such as Second Life is their main title. Here's why, as NextGeneration reports.

Although Linden has also acquired "all associated intellectual IP and interests" of Windward Mark, as the same site says, Alliance: The Silent War, Windward Mark's title in development, will not be part of the deal and will
continue to be developed separately by Windward Mark. So what will The Windlight technology do for Linden's
Second Life? Mainly, it will add realism to environments, while Nimble's job will be "simply" rendering more convincing clouds. And it sure needs it as Second Life is a 100% life simulator – some countries even use it as a voting platform. Just think how some nice clouds could influence your judgment when electing your president... Kidding of course.

Linden Lab CTO Cory Ondrejka also proposed the open source model: "Our core development team is tightly focused on improving the Second Life experience in terms of stability and scalability, but open sourcing has enabled external developers to integrate additional enhancements that are also hugely valuable; WindLight is one of these."

Man, Epic must be quite upset for Linden not to choose their Unreal Engine 3, huh? Not really actually, you see, although UE3 can do so much more than just make shooters look good, it's mainly used for action, not just strolling in the park or on the streets like in Second Life. Linden Lab hasn't acquired more powerful technology than that, but the most appropriate for what Second Life is all about.

All the developer had to worry about until now, was rendering the big city, and now it's not even the developer's worry, but Windward Mark Interactive's.

Source: http://news.softpedia.com

Tuesday, November 20, 2007

Group policy

Group policy registry entries for XP home

To enable the policy add the registry value listed. To disable it just remove the value. Sometimes the subkeys must be manually created. The number values given are in decimal form unless listed as 0x######## then that is hexadecimal form.

If you need help, take a look at registry tutorial.

User Configuration

Administrative Templates

  • Start Menu and Taskbar
    • Remove user's folders from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuSubFolders = 1
    • Remove links and access to Windows Update
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoWindowsUpdate = 1
    • Remove Common program groups
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoCommonGroups = 1
    • Remove My Documents from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSMMyDocs = 1
    • Remove Programs on settings menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSetFolders = 1
    • Remove Network Connections from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoNetworkConnections = 1
    • Remove Favorites from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoFavoritesMenu = 1
    • Remove Search from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoFind = 1
    • Remove Help menu from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSMHelp = 1
    • Remove Run from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoRun = 1
    • Remove My Pictures from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSMMyPictures = 1
    • Remove My Music from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuMyMusic = 1
    • Remove My Network Places from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuNetworkPlaces = 1
    • Add Logoff to the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: ForceStartMenuLogoff = 1
    • Remove Logoff from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: StartMenuLogoff = 1
    • Remove and prevent access to the shutdown command
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoClose = 1
    • Remove drag-and-drop context menu from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoChangeStartMenu = 1
    • Prevent changes to Taskbar and Start Menu settings
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSetTaskbar = 1
    • Remove access to context menus for the taskbar
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoTrayContextMenu = 1
    • Do not keep history of recently opened documents
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoRecentDocsHistory = 1
    • Clear history of recently opened documents on exit
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: ClearRecentDocsOnExit = 1
    • Turn off personalized menus
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: Intellimenus = 1
    • Turn off user tracking
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoInstrumentation = 1
    • Add "Run is seperate memory space" check box to Run dialog box
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: MemCheckBoxInRunDlg = 1
    • Do not use the search-based method when reolving shell shortcuts
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoResolveSearch = 1
    • Do not use the tracking-based method when resolving shell shortcuts
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoResolveTrack = 1
    • Gray unavailable Windows Installer programs Start Menu shortcuts
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: GreyMSIAds = 1
    • Prevent grouping of taskbar items
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoTaskGrouping = 1
    • Turn off notification area cleanup
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoAutoTrayNotify = 1
    • Lock the taskbar
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: LockTaskbar = 1
    • Force classic Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSimpleStartMenu = 1
    • Remove balloon tips
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSMBalloonTip = 1
    • Remove pinned programs list from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuPinnedList = 1
    • Remove frequently accessed program list from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuMFUprogramsList = 1
    • Remove All Programs list from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuMorePrograms = 1
    • Remove and disable the Turn Off Computer button
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoClose = 1
    • Remove "Undock PC" bbutton from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoStartMenuEjectPC = 1
    • Remove Username from the Start Menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoUserNameInStartMenu = 1
    • Remove Clock from system notification area
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: HideClock = 1
    • Hide the notification are
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoTrayItemsDisplay = 1
    • Do not display any custom toolbars in taskbar
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoToolbarsOnTaskbar = 1
  • Desktop
    • Hide and disable all items on the desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoDesktop = 1
    • Remove My Documents from the desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum
      • DWORD: {450D8FBA-AD25-11D0-98A8-0800361B1103} = 1
    • Remove My Computer icon from the desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum
      • DWORD: {20D04FE0-3AEA-1069-A2D8-08002B30309D} = 1
    • Remove Recycle Bin icon from the desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\NonEnum
      • DWORD: {645FF040-5081-101B-9F08-00AA002F954E} = 1
    • Remove Properties from My Documents context menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoPropertiesMyDocuments = 1
    • Remove Properties from My Computer context menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoPropertiesMyComputer = 1
    • Remove Properties from the Recycle Bin context menu
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoPropertiesRecycleBin = 1
    • Hide My Network Places icon on desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoNetHood = 1
    • Hide Internet Explorer icon on desktop
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoInternetIcon = 1
    • Do not add shares of recently opened documents to My Network places
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoRecentDocsNetHood = 1
    • Prohibit user from changing My Documents path
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: DisablePersonalDirChange = 1
    • Prevent adding, dragging, dropping, and closing Taskbar's toolbars
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoCloseDragDropBands = 1
    • Prohibit adjusting desktop toolbars
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoMovingBands = 1
    • Don't save settings on exit
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoSaveSettings = 1
    • Remove Desktop Cleanup Wizard
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoDesktopCleanupWizard = 1
    • Active Desktop
      • Enable Active Desktop
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: ForceActiveDesktopOn = 1
      • Disable Active Desktop
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoActiveDesktop = 1
      • Disable all items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoComponents = 1
      • Prohibit changes
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoActiveDesktopChanges = 1
      • Prohibit adding items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoAddingComponents = 1
      • Prohibit deleting items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoDeletingComponents = 1
      • Prohibit editing items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoEditingComponents = 1
      • Prohibit closing items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoClosingComponents = 1
      • Add / Delete items
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop\AdminComponent
        • STRING: Add = URL
        • STRING: Delete = URL
      • Active desktop Wallpaper
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • STRING: Wallpaper = path
        • STRING: WallpaperStyle = 0,1, or 2
          • 0 =centered
          • 1 = tiled
          • 2 = stretch
      • Allow only bitmapped wallpaper
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoHTMLWallpaper = 1
    • Active Directory
      • Maximize size of active directory searches
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Directory UI
        • DWORD: QueryLimit = 0x00000000(0) to 0xffffffff(4294967295)
        • default: 0x00002710(10000)
      • Enable filter in Find dialog box
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Directory UI
        • DWORD: EnableFilter = 1
      • Hide active directory folder
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Directory UI
        • DWORD: HideDirectoryFolder = 1
  • Control Panel
    • Prohibit access to control panel
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoControlPanel = 1
    • Force classic control panel style
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: ForceClassicControlPanel = 1
    • Add / Remove Programs
      • Remove Add/Remove Programs programs
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoAddRemovePrograms = 1
      • Hide change or remove programs page
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoRemovePage = 1
      • Hide Add New Programs page
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoAddPage = 1
      • Hide Add/Remove windows components
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoWindowsSetupPage = 1
      • Hide the add a program from CD-ROM or floppy option
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoAddFromCDorFloppy = 1
      • Hide Add programs from Microsoft option
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoAddFromInternet = 1
      • Hide Add programs fromNetwork option
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoAddFromNetwork = 1
      • Go directly to Components Wizard
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoServices = 1
      • Remove support information
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • DWORD: NoSupportInfo = 1
      • Specify default category for Add New Programs
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Uninstall
        • STRING:DefaultCategory = category
    • Display
      • Remove Display in Control Panel
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: NoDispCPL = 1
      • Hide desktop tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: NoDispBackgroundPage = 1
      • Prevent changing wallpaper
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop
        • DWORD: NoChangingWallPaper = 1
      • Hide appearances and themes tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: NoDispAppearancesPage = 1
      • Hide settings tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: NoDispSettingsPage = 1
      • Hide screen saver tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: NoDispScrSavPage = 1
      • Screen saver
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Control Panel\Desktop
        • STRING: ScreenSaverActive = 0 or 1
          • 0 disables screensaver altogether
          • 1 enables screensaver specified in SCRNSAVE.EXE
      • Screen saver executable name
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Control Panel\Desktop
        • STRING: SCRNSAVE.EXE = path of the screensaver
      • Password protect the screen saver
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Control Panel\Desktop
        • STRING: ScreenSaverIsSecure = 1
      • Screen saver timeout
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Control Panel\Desktop
        • STRING: ScreenSaveTimeOut = value in seconds
      • Desktop Themes
        • Remove Theme option
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
          • DWORD: NoThemeTab = 1
        • Prevent selection of Windows and Buttons styles
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
          • DWORD: NoVisualStyleChoice = 1
        • Prohibit selection of font size
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
          • DWORD: NoSizeChoice = 1
        • Prohibit Theme color selection
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
          • DWORD: NoColorChoice = 1
        • Load specific visual style or force windows classic
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
          • STRING: SetVisualStyle = path of msstyle to use or blank to force windows classic
    • Printers
      • Browse a common website to find printers
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Printers\Wizard
        • STRING: PrintersPage = URL
      • Browse network to find printers
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Printers\Wizard
        • DWORD: Downlevel Browse = 1
      • Default Active Directory path when searching from printers
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Printers\Wizard
        • STRING: Default Search Scope = LDAP distinguidhed name
      • Point and printer restrictions
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Printers\PointAndPrint
        • DWORD: InForest = 1 restrict printer access to only printers in their forest
        • DWORD: Restricted = 1 restrict all printers
        • DWORD: Truster Servers = 1 allows printers from servers in Server List
        • STRING: Server List = truster server list seperated by semicolons
      • Prevent addition of printers
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoAddPrinters = 1
      • Prevent deletion of printers
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoDeletePrinters = 1
    • Regional and Language Options
      • Regional and Language Options
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Control Panel\Desktop
        • STRING: MultiUILanguageID = number code for language setting, English is 00000409
  • Shared Folders
    • Allow shared folder to be published
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\SharedFolders
      • DWORD: PublishSharedFolders = 1
    • Allow DFS roots to be published
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\SharedFolders
      • DWORD: PublishDfsRoots = 1
  • Network
    • Offline Files
      • Prohibit user configuration of Offline Files
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: NoConfigCache = 1
      • Syncronize all offline files when logging on
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: SyncAtLogon = 1
      • Syncronize all offline files when logging off
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: SyncAtLogoff = 1
      • Syncronize before suspend
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: SyncAtSuspend = 0 for Quick and 1 for Full
      • Action on server disconnect
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: GoOfflineAction = 0 for Work Offline 1 for Never go Offline
      • Non-default server disconnection actions
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache\CustomGoOfflineActions
        • STRING: servername = 0 for Wrok Offline and 1 for Never go Offline
      • Remove 'Make Available Offline'
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: NoMakeAvailableOffline = 1
      • Prevent use of Offline Files folder
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: NoCacheViewer = 1
      • Administratively Assigned Offline files
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache\AssignedOfflineFolders
        • STRING: UNC path = completely blank
      • Turn off reminder balloons
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: NoReminders = 1
      • Reminder balloon frequency
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: ReminderFrequencyMinutes = value in minutes
      • Initial reminder balloon lifetime
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: InitialBalloonTimeoutSeconds = value in seconds
      • Reminder balloon lifetime
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: ReminderBalloonTimeoutSeconds = value in seconds
      • Event logging level
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: EventLoggingLevel =
          • 0 - Cache data corrupted
          • 1 - Log 'Server Offline'
          • 2 - Level 1 + Log 'Net Stopped' and 'Net Started'
          • 3 - Level 2 + Log 'Server available for reconnect'
      • Prohibit 'Make Available Offline' for these files and folders
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache\NoMakeAvailableOfflineList
        • STRING: UNC path = completely blank
      • Do not automatically make redirected folder available offline
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\NetCache
        • DWORD: DisableFRAdminPin = 1
    • Network Connections
      • Ability to rename LAN connections or remote access connections for all users
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RenameConnection = 1
      • Prohibit access to properties of components of LAN connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_LanChangeProperties = 0
      • Prohibit acces to properties of components of remote access connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RasChangeProperties = 0
      • Prohibit TCP/IP advanced configuration
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_AllowAdvanceTCPIPConfig = 0
      • Prohibit access to the Advanced Setting item on Advanced menu
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_AdvancedSettings = 0
      • Prohibit adding or removing components for the LAN or remote access connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_AddRemoveComponents = 0
      • Prohibit access to properties of LAN connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_LanProperties = 0
      • Ability to change properties of an all user remote access connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RasAllUserProperties = 1
      • Prohibit changing properties of a private remote access connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RasMyProperties = 1
      • Prohibit deletion of remote access connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_DeleteConnection = 0
      • Ability to delete all user remote access connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_DeleteAllUserConnection = 1
      • Prohibit Enabling/Disabling components of a LAN connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_ChangeBindState = 1
      • Prohibit connecting and disconnecting a remote access connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RasConnect = 0
      • Ability to Enable/Disable a LAN connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_LanConnect = 1
      • Prohibit access to the New Connection wizard
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_NewConnectionWizard = 0
      • Ability to rename LAN connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RenameLanConnection = 1
      • Ability to rename all user remote access connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RenameAllUserRasConnection = 1
      • Prohibit renaming private remote access connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_RenameMyRasConnections = 0
      • Prohibit access to the Dial-Up preferences on the advanced menu
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_DialupPrefs = 0
      • Prohibit viewing of status for an active connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_Statics = 0
      • Enable Windows 2000 Network Connections settings for Administrators
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Network Connections
        • DWORD: NC_EnableAdminProhibits = 1
  • System
    • Don't display the getting started welcome screen at logon
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoWelcomeScreen = 1
    • Century interpretation for the year 2000
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Control Panel\International\Calendars\TwoDigitYearMax
      • STRING: 1 = year, default is 2029
    • Configure driver search locations
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\DriverSearching
      • DWORD: DontSearchCD = 1
      • DWORD: DontSearchFloppies = 1
      • DWORD: DontSearchWindowsUpdate =1
    • Code signing for device drivers
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows NT\Driver Signing
      • DWORD: BehaviorOnFailedVerify = 0 Ignore, 1 Warn, or 2 Block
    • Custom user interface
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
      • STRING: Shell = filename.exe
    • Prevent access to the command prompt
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System
      • DWORD: DisableCMD = 1 disable script processing, 2 enable script processing
    • Prevent access to the registry editting tools
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
      • DWORD: DisableRegistryTools = 1
      • This will not allow you to reopen regedit to solve your problem, not recommended, only listed for completeness.
    • Turn off autoplay
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoDriveTypeAutoRun = 0x000000b5(181) CD or 0x000000ff(255) All Drives
    • Download missing COM components
      • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\App Management
      • DWORD: COMClassStore = 1
    • Windows Automatice Updates
      • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
      • DWORD: NoAutoUpdate = 1
    • User Profiles
      • Limit profile size
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: WarnUserTimeout = minutes
        • DWORD: WarnUser = 1
        • DWORD: MaxProfileSize = value in KB
        • DWORD: EnableProfileQuota = 1
        • DWORD: IncludeRegInProQuota = 1 yes or 0 no
        • STRING: ProfileQuotaMessage = error message you want to display when quota has been reached
    • Scripts
      • Not applicable
    • Ctrl+Alt+Del Options
      • Remove task manager
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: DisableTaskMgr = 1
      • Remove lock computer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: DisableLockWorkstation = 1
      • Remove Change password
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System
        • DWORD: DisableChangePassword = 1
      • Remove logoff
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoLogoff = 1
      • Logon
        • Do not process the run once list
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
          • DWORD: DisableLocalUserRunOnce = 1
        • Do not process the legacy run list
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
          • DWORD: DisableLocalUserRun = 1
      • Group Policy
        • Not applicable
      • Power Management
        • Prompt for password on resume from hibernate/suspend
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System\Power
          • DWORD: PromptPasswordOnResume = 1
  • Windows Components
    • Windows Explorer
      • Turn on classic shell
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: ClassicShell = 1
      • Removes the Folder Options menu item form the Tools menu
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoFolderOptions = 1
      • Remove the File Menu from Windows Explorer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoFileMenu = 1
      • Remove 'Map Network Drive' and 'Disconnect Network Drive'
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoNetConnectDisconnect = 1
      • Remove Search button from Winodws Explorer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoShellSearchButton =1
      • Remove Windows Explorer default context menu
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoViewContextMenu = 1
      • Allow only per user or approved shell extensions
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: EnforceShellExtensionSecurity = 1
      • Do not track Shell shortcuts during roaming
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: LinkResolveIgnoreLinkInfo = 1
      • Hide the manage item on the Windows Explorer context menu
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoManageMyComputerVerb = 1
      • Hide these specified drives in MyComputer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoDrives = 0 - None; 3 - A & B; 4 - C; 7 - A, B, & C; 0x03ffffff(67108863) - All
      • Prevent access to drives from My Computer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoViewOnDrive = 0 - None; 3 - A & B; 4 - C; 7 - A, B, & C; 0x03ffffff(67108863) - All
      • Remove Hardware Tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoHardwareTab = 1
      • Remove DFS Tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoDFSTab = 1
      • Remove Security Tab
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoSecurityTab = 1
      • Remove User Interface to change menu animation settings
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoChangeAnimation = 1
      • Remove User Interface to change KEYboard navigation indication setting
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoChangeKEYboardNavigationIndicators = 1
      • No 'Computers Near Me' in My Network Places
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoComputersNearMe = 1
      • No 'Entire Network' in My Network Places
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Network
        • DWORD: NoEntireNetwork = 1
      • Maximum number of recent documents
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: MaxRecentDocs = maximum number of recent docs
      • Do not request alternate credentials
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoRunasInstallPrompt = 1
      • Request credentials for network installations
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: PromptRunasInstallNetPath = 1
      • Remove CD Buring features
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoCDBurning = 1
      • Do not move deleted files to the Recycle Bin
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoRecycleFiles = 1
      • Display confirmation dialog when deleting files
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: ConfirmFileDelete = 1
      • Maximum allowed Recycle Bin size
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: RecycleBinSize = percent of disk
      • Remove shared documents from My Computer
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoSharedDocuments = 1
      • Turn off caching thumbnail pictures
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
        • DWORD: NoThumbnailCache = 1
      • Common Open File Dialog
        • Items displayed in Places Bar
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32\PlacesBar
          • STRING: Place# = path of folder, # is the next sequential number
        • Hide the common dialog places bar
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32
          • DWORD: NoPlacesBar = 1
        • Hide the common dialog back button
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32
          • DWORD: NoBackButton = 1
        • Hide the drop down list of recent files
          • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\comdlg32
          • DWORD: NoFileMru = 1
    • Microsoft Management Console
      • Restricted/Permitted snap-ins
        • Extension snap-ins
        • GroupPolicy
          • Group Policy snap-in extensions
          • Resultant Set of Policy snap-in extensions
    • Task Scheduler
      • Hide property pages
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Property Pages = 1
      • Prevent task run on End
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Execution = 1
      • Prohibit Drag and Drop
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: DragAndDrop = 1
      • Prohibit New Task creation
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Task Creation = 1
      • Prohibit Task Deletion
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Task Deletion = 1
      • Remove Advanced Menu
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Disable Advanced = 1
      • Prohibit Browse
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Task Scheduler5.0
        • DWORD: Allow Browse = 1
    • Terminal Services
      • Start a program on Connection
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
        • STRING: InitialProgram = path of the program
        • STRING: WorkDirectory = directory
        • DWORD: fInheritInitalProgram = 1
      • Remote Control Settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
        • DWORD: Shadow = 0 - No Remote Connection allowed; 1 - Full control with user permission; 2 - Full control without user permission; 3 - View session with user permission; 4 - View session without user permission;
        • Sessions
          • Set Time limit for disconnection sessions
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
            • DWORD: MaxDisconnectionTime = value in milliseconds
          • Set time limit for active sessions
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
            • DWORD: MaxConnectionTime = value in milliseconds
          • Set time limit for idle sessions
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
            • DWORD: MaxIdleTime = value in milliseconds
          • Allow reconnection from original client only
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
            • DWORD: fReconnectSame = 1
          • Terminate session when time limits are reached
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsNT\Terminal Services
            • DWORD: fResetBroken = 1
    • Windows Installer
      • Always install with elevated privileges
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
        • DWORD: AlwaysInstallElevated = 1
      • Search order
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
        • STRING: SearchOrder = combination of "n" for network, "m" for media or CD, "u" for URL. Example: "nmu" or "nm" or "un"
      • Prohibit rollback
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
        • DWORD: DisableRollback = 1
      • Prevent removeable media source for any install
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Installer
        • DWORD: DisableMedia = 1
    • Windows Messenger
      • Do not allow Windows Messenger to be run
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Messenger\Client
        • DWORD: PreventRun = 1
      • Do not automatically start Windows Messenger initially
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Messenger\Client
        • DWORD: PreventAutoRun = 1
    • Windows Update
      • Remove access to use all Windows Update features
        • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate
        • DWORD: DisableWindowsUpdateAccess = 1
    • Internet Explorer
      • Search: Disable Search Customization
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
        • DWORD: NoSearchCustomization = 1
      • Search: Disable Find Files via F3 within the browser
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
        • DWORD: NoFindFiles = 1
      • Disable external branding of Internet Explorer
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
        • DWORD: NoExternalBranding = 1
      • Disable importing and exporting of Favorites
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer
        • DWORD: DisableImportExportFavorites = 1
      • Disable changing Advanced page settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Advanced = 1
      • Disable changing home page settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: HomePage = 1
      • Use Automatic Detection for dial-up connections
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
        • DWORD: DialupAutodetect = 1
      • Disable caching of Auto-Proxy scripts
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
        • DWORD: EnableAutoProxyResultCache = 0
      • Display error messages on proxy script download failure
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
        • DWORD: DisplayScriptDownloadFailureUI = 1
      • Disable changing Temporary Internet Files Settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Cache = 1
      • Disable changing history settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: History = 1
      • Disable changing color settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Colors = 1
      • Disable changing link color settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: links = 1
      • Disable changing font settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Fonts = 1
      • Disable changing language settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Languages = 1
      • Disable changing accessability settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Accessability = 1
      • Disable Internet Connection Wizard
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Connwiz Admin Lock = 1
      • Disable changing connection settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Connection Settings = 1
      • Disable changing proxy settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Proxy = 1
      • Disable changing Automatic Configuration settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Autoconfig = 1
      • Disable changing ratings settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Ratings = 1
      • Disable changing certificates settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Certificate = 1
      • Disable changing Profile Assistant settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Profiles = 1
      • Disable AutoComplete for forms
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: FormSuggest = 1
      • Do not allow auto-complete to save passwords
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: FormSuggest Passwords = 1
      • Disable changing Messaging settings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Messaging = 1
      • Disable changing Calendar and Contact setttings
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: CalendarContact = 1
      • Disable the reset web settings feature
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: ResetWebSettings = 1
      • Disable changing default browser check
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
        • DWORD: Check_If_Default = 1
      • Identity manager: Prevent users from using identities
        • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\CurrentVersion\Indentities
        • DWORD: Locked Down = 1
      • Internet Control Panel
        • Disable the General Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: GeneralTab = 1
        • Disable the Security Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: SecurityTab = 1
        • Disable the Content Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: ContentTab = 1
        • Disable the Connections Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: ConnectionsTab = 1
        • Disable the Programs PAge
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: ProgramsTab = 1
        • Disable the Privacy Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: PrivacyTab = 1
        • Disable the Advanced Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Control Panel
          • DWORD: AdvancedTab = 1
      • Offline Pages
        • Disable adding channels
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoAddingChannels = 1
        • Disable removing channels
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoRemovingChannels = 1
        • Disable adding schedules for offline pages
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoAddingSubscriptions = 1
        • Disable editing schedules for offline pages
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoEditingSubscriptions = 1
        • Disable removing schedules for offline pages
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoRemovingSubscriptions = 1
        • Disable offline page hit logging
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoChannelLogging = 1
        • Disable all scheduled offline pages
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoScheduledUpdates = 1
        • Disable channel user interface completely
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoChannelUI = 1
        • Disable downloading of a site subscription content
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoSubscriptionContent = 1
        • Disable editing and creating of schedule groups
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: NoEditingScheduleGroups = 1
        • Suscription limits
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
          • DWORD: MaxSubscriptionCount = number of pages
          • DWORD: MaxSubscriptionSize = size in KB
          • DWORD: MaxWebcrawlLevels = 0 to 3
          • DWORD: MinUpdateInterval = number of minutes
          • DWORD: UpdateExcludeBegin = time
          • DWORD: UpdateExcludeEnd = time
        • Browser menus
          • File Menu: Disable Save As... Menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoBrowserSaveAs = 1
          • File Menu: Disable New Menu options
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoFileNew = 1
          • File Menu: Disable Open menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoFileOpen = 1
          • File Menu: Disable Save As Web Page Complete option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Infodelivery\Restrictions
            • DWORD: NoBrowseSaveWebComplete = 1
          • File Menu: Disable closing the browser and Explorer windows
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoBrowserClose = 1
          • View Menu: Disable Source menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoViewSource = 1
          • View Menu: Disable Full Creen menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoTheaterMode = 1
          • Hide Favorites Menu
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoFavorites = 1
          • Tools Menu: Disable Internet Options menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoBrowserOptions = 1
          • Help Menu: Remove 'Tip of the Day' menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoHelpItemTipOfTheDay = 1
          • Help Menu: Remove 'For Netscape Users' menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoHelpItemNetscapeHelp = 1
          • Help Menu: Remove 'Send Feedback' menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoHelpItemSendFeedback = 1
          • Disable Context menu
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoBrowserContextMenu = 1
          • Disable Open in New Window menu option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoOpeninNewWnd = 1
          • Disable Save this program to disk option
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions
            • DWORD: NoSelectDownloadDir = 1
        • Toolbars
          • Disable customizing browser toolbar buttons
            • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
            • DWORD: NoBandCustomize = 1
          • Disable customizing browser tollbars
            • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
            • DWORD: NoToolbarCustomize = 1
          • Configure Toolbar Buttons
            • KEY: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
            • DWORD: SpecifyDefaultButtons = 1
              The values below should be set to 1 to show and 2 to hide
              • DWORD: Btn_Back
              • DWORD: Btn_Copy
              • DWORD: Btn_Discussions
              • DWORD: Btn_Edit
              • DWORD: Btn_Encoding
              • DWORD: Btn_Favorites
              • DWORD: Btn_Folders
              • DWORD: Btn_Forward
              • DWORD: Btn_Fullscreen
              • DWORD: Btn_History
              • DWORD: Btn_Home
              • DWORD: Btn_MailNews
              • DWORD: Btn_Media
              • DWORD: Btn_Paste
              • DWORD: Btn_Print
              • DWORD: Btn_Refresh
              • DWORD: Btn_Search
              • DWORD: Btn_Size
              • DWORD: Btn_Stop
              • DWORD: Btn_Tools
        • Persistance Behavior
        • Administrator Approved Controls
      • NetMeeting
        • Enable Automatic Configuration
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: Use AutoConfig = 1
          • STRING: ConfigFile = URL of the file
        • Disable Directory Services
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoDirectoryServices = 1
        • Prevent adding directory servers
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoAddingDirectoryServers = 1
        • Prevent viewing Web Directory
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoWebDirectory = 1
        • Set the Intranet support Web Page
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • STRING: IntranetSupportURL = URL of the support page
        • Set Call Security Options
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: CallSecurity = 1 - Required; 2 - Disabled;
        • Prevent changing call placement method
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoChangingCallMode = 1
        • Prevent automatic addeptance of calls
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoAutoAcceptCalls = 1
        • Prevent sending files
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoSendingFiles = 1
        • Revent receiving files
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoReceivingFiles = 1
        • Limit the size of sent files
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: MaxFileSendSize = value in KB
        • Disable chat
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoChat = 1
        • Disable NetMeeting 2.x Whiteboard
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoNewWhiteBoard = 1
        • Disable Whiteboard
          • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
          • DWORD: NoOldWhiteBoard = 1
        • Application Sharing
          • Disable Application Sharing
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoAppSharing = 1
          • Prevent sharing
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSharing = 1
          • Prevent Desktop sharing
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSharingDesktop = 1
          • Prevent Sharing Command prompts
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSharingDosWindows = 1
          • Prevent Sharing Explorer Windows
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSharingExplorer = 1
          • Prevent control
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoAllowControl = 1
          • Prevent Application Sharing in true color
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoTrueColorSharing = 1
        • Audio & Video
          • Limit the bandwith of Audio and Video
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: MaximumBandwith = value in kbps
          • Disable Audio
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoAudio = 1
          • Disable full duplex Audio
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoFullDuplex = 1
          • Prevent changing DirectSound Audio Setting
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoChangeDirectSound = 1
          • Prevent sending video
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSendingVideo = 1
          • Prevent receiving video
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoReceivingVideo = 1
        • Options Page
          • Hide the General Page
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoGeneralPage = 1
          • Disable the Advanced Calling Button
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoAdvancedCalling = 1
          • Hide the Security page
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoSecurityPage = 1
          • Hide the Audio page
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoAudioPage = 1
          • Hide the Video page
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\Conferencing
            • DWORD: NoVideoPage = 1
      • Windows Media Player
        • User Interface
          • Set and lock skin
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
            • DWORD: SetAndLockSkin = 1
            • STRING: DefaultSkin = skin name
          • Do not show anchor
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
            • DWORD: DoNotShowAnchor = 1
        • Playback
          • Prevent Codec download
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
            • DWORD: PreventCodecDownload = 1
        • Networking
          • Hide Network tab
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
            • DWORD: HideNetworkTab = 1
          • Streaming media protocols
            • KEY: HKEY_CURRENT_USER\Software\Policies\Microsoft\WindowsMediaPlayer
            • DWORD: WindowsMediaStreamingProtocols = 1

              Protocols, set to 1 to allow and 0 to disallow
              • DWORD: HTTP
              • DWORD: Multicast
              • DWORD: TCP
              • DWORD: UDP
                • STRING: UDPPorts = port number


Here's a full view of the file:

Download: http://www.mediafire.com/?jomsg1dobzg