473,407 Members | 2,314 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,407 software developers and data experts.

Stealth login

107 100+
Hi,

I know windows stores the default login name (shown in the windows login box) in the registry (its a different registry key from xp to vista) and I want to stop it remembering admins passwords. So users can't easily tell that someone else has been logged onto their machine.

Does anyone know a solution for this?

Im not sure if it updates the registy with the current user when you successfully logon, or as you are loggin off but I thought about maybe having a bat file to store the original registry value (ie the previously logged on user) and then another bat file to restore it on logoff.

Does anyone know an easier solution to this? Group policy? Or else, do you know how to check/store registry values from a bat file?


Thanks

Andy
Aug 19 '08 #1
2 2025
theS70RM
107 100+
Cheers,

I eventually solved this using group policy and a couple of .bat files

I added to normal users login scripts a batch file that detects the operating system and then exports the appropriate registry keys to c:\whatever.reg. Then I put a batch file in the administrators logon that checks if whatever.reg exists and if it does then it imports it back into the registry.

Seems to do the trick

Andy
Aug 21 '08 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

3
by: koolyio | last post by:
Hey, could you please tell me what is wrong with my login script. I just started learning php. CODE: login.php <? session_start(); header("Cache-Control: private"); ?>
5
by: Simon | last post by:
Hi, I have a Login.php page that logs the user in and out. I has two forms within the page, (depending on what we are trying to do), either one to log in or out. The form calls itself using a...
2
by: Byrocat | last post by:
We have a number of production servers that soneone has decided that the DAS is not to be enabled. The rationale is that the developers should not run "discover" and then start plugging around on...
10
by: Demetri | last post by:
Does anyone know of any good examples or sites explaining how to create an application using C# that can run as a true stealth program, hidden from any process programs such as task manager, etc?
2
by: Beginner | last post by:
I know this is an old question, but searching all over the internet plus several MS security conferences, still haven't got a straight anwser. Basically, the login.aspx is on one dedicated server...
2
by: Ram Kumar | last post by:
Need a passionate, technically skilled and committed individual to guide the technology vision of Microsoft based mobile business platform. The platform was built using .NET, IIS, ASP, and SQL...
6
by: AppleBag | last post by:
I'm having the worst time trying to login to myspace through code. Can someone tell me how to do this? Please try it yourself before replying, only because I have asked this a couple of times in...
2
by: mochinushi | last post by:
Im a newb C++ programmer trying to figure out what concepts and protocols i should be reading on... What im trying to accomplish is a "stealth" tunnel/forwarder from my computer at the dorm to a...
13
by: Apostle | last post by:
Hi all, after thinking for sometimes, I thought it will be great opportunity to learn if I will start from scratch and build my own register/login system. Here is the thread that I will be posting...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.