免费视频淫片aa毛片_日韩高清在线亚洲专区vr_日韩大片免费观看视频播放_亚洲欧美国产精品完整版

打開APP
userphoto
未登錄

開通VIP,暢享免費電子書等14項超值服

開通VIP
如何禁止IE臨時文件夾可執(zhí)行文件運行?

通過在組策略建立路徑規(guī)則,不允許從臨時文件夾啟動任何可執(zhí)行文件(.exe/.bat./.cmd/.com等),以此達到防病毒的目的。具體的方法如下
運行里面輸入 GPEDIT.MSC,然后----計算機配置---WINDOWS設(shè)置---安全設(shè)置---軟件限制策略----其他規(guī)則,
點右鍵選創(chuàng)建新的規(guī)則---然后選新路徑規(guī)則,在路徑欄目里面輸入 %USERPROFILE%\Local Settings\Temp\(這個是當前用戶臨時文件夾的變量)*.exe,*.exe這個是你想要限制從臨時文件夾啟動的文件類型,比如*.bat/*.cmd等,一般我們限制可執(zhí)行文件就好了,當然你也可以通過這個方法限制其他路徑的文件是否允許執(zhí)行。


一般IE臨時文件默認的下載目錄都是在臨時文件夾中,我們禁止任何可執(zhí)行文件從臨時文件夾啟動,這樣應(yīng)該對病毒防御有一定的效果,另外比如某些游戲比如大話等需要從臨時文件夾啟動的游戲自動升級可能無法運行,不過我們只要隨時注意在自己的游戲主機升級這些游戲,也沒有什么影響的把。

這個方法雖然有效,但是我們的網(wǎng)吧系統(tǒng)也許都在正常的運行中把,如果需要一臺臺的去修改的話,也挺麻煩的,所以我為了方便操作,把自己設(shè)置好的規(guī)則導(dǎo)出來,做成了批處理,你可以通過你的開機維護通道來加載??赡軙W動一下,那是在強制刷新系統(tǒng),自己再用個VBS去黑框把。

暫時沒有發(fā)現(xiàn)有什么副作用,有覺得可以的朋友可以拿去試下,幫忙測試下有沒有效果,或者有什么病毒網(wǎng)站,(自動下文件并且運行的那種最好),發(fā)出來我去測試下。

使用方法

通過維護通道加載實際的應(yīng)用方法必須如下:
先做一個批處理
@echo off
regedit/s \\該策略的注冊表文件的共享路徑
taskkill /im explorer.exe /f
explorer.exe
gpupdate/force
RunDll32.exe USER32.DLL,UpdatePerUserSystemParameters

,把上面的批處理加到服務(wù)器的開機批處理里面去,這樣才可以立即生效,批處理直接導(dǎo)入的好像沒有效果,注銷才有效,
該策略的注冊表文件我在附件中發(fā)出來了,包括卸載免疫的。

如果是做母盤的話,直接運行notemp.bat就可以了。


下面是批處理自動免疫的內(nèi)容:

@echo off
echo Windows Registry Editor Version 5.00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{27122b10-e1d1-47c5-a299-b7d4286539a9}]>>tmp.reg
echo "LastModified"=hex(b):e0,ad,60,64,b9,8e,c7,01>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,55,00,53,00,45,00,52,00,50,00,52,00,4f,00,46,00,49,00,\>>tmp.reg
echo 4c,00,45,00,25,00,5c,00,4c,00,6f,00,63,00,61,00,6c,00,20,00,53,00,65,00,74,\>>tmp.reg
echo 00,74,00,69,00,6e,00,67,00,73,00,5c,00,54,00,65,00,6d,00,70,00,5c,00,2a,00,\>>tmp.reg
echo 2e,00,63,00,6f,00,6d,00,00,00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{45c49d12-7feb-48b6-81c8-516f801d1062}]>>tmp.reg
echo "LastModified"=hex(b):f6,fc,03,61,b9,8e,c7,01>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,55,00,53,00,45,00,52,00,50,00,52,00,4f,00,46,00,49,00,\>>tmp.reg
echo 4c,00,45,00,25,00,5c,00,4c,00,6f,00,63,00,61,00,6c,00,20,00,53,00,65,00,74,\>>tmp.reg
echo 00,74,00,69,00,6e,00,67,00,73,00,5c,00,54,00,65,00,6d,00,70,00,5c,00,2a,00,\>>tmp.reg
echo 2e,00,62,00,61,00,74,00,00,00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{4e1ddf37-dbd2-446c-865d-969ad8619b91}]>>tmp.reg
echo "LastModified"=hex(b):52,b5,68,5b,b9,8e,c7,01>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,55,00,53,00,45,00,52,00,50,00,52,00,4f,00,46,00,49,00,\>>tmp.reg
echo 4c,00,45,00,25,00,5c,00,4c,00,6f,00,63,00,61,00,6c,00,20,00,53,00,65,00,74,\>>tmp.reg
echo 00,74,00,69,00,6e,00,67,00,73,00,5c,00,54,00,65,00,6d,00,70,00,5c,00,2a,00,\>>tmp.reg
echo 2e,00,63,00,6d,00,64,00,00,00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{a88ef251-1ec4-42ce-95df-4f47bf20e2ee}]>>tmp.reg
echo "LastModified"=hex(b):88,0c,06,54,b9,8e,c7,01>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,55,00,53,00,45,00,52,00,50,00,52,00,4f,00,46,00,49,00,\>>tmp.reg
echo 4c,00,45,00,25,00,5c,00,4c,00,6f,00,63,00,61,00,6c,00,20,00,53,00,65,00,74,\>>tmp.reg
echo 00,74,00,69,00,6e,00,67,00,73,00,5c,00,54,00,65,00,6d,00,70,00,5c,00,2a,00,\>>tmp.reg
echo 2e,00,65,00,78,00,65,00,00,00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{dda3f824-d8cb-441b-834d-be2efd2c1a33}]>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,48,00,4b,00,45,00,59,00,5f,00,43,00,55,00,52,00,52,00,\>>tmp.reg
echo 45,00,4e,00,54,00,5f,00,55,00,53,00,45,00,52,00,5c,00,53,00,6f,00,66,00,74,\>>tmp.reg
echo 00,77,00,61,00,72,00,65,00,5c,00,4d,00,69,00,63,00,72,00,6f,00,73,00,6f,00,\>>tmp.reg
echo 66,00,74,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,5c,00,43,00,75,\>>tmp.reg
echo 00,72,00,72,00,65,00,6e,00,74,00,56,00,65,00,72,00,73,00,69,00,6f,00,6e,00,\>>tmp.reg
echo 5c,00,45,00,78,00,70,00,6c,00,6f,00,72,00,65,00,72,00,5c,00,53,00,68,00,65,\>>tmp.reg
echo 00,6c,00,6c,00,20,00,46,00,6f,00,6c,00,64,00,65,00,72,00,73,00,5c,00,43,00,\>>tmp.reg
echo 61,00,63,00,68,00,65,00,25,00,4f,00,4c,00,4b,00,2a,00,00,00>>tmp.reg
echo "LastModified"=hex(b):90,ad,4a,7e,32,d9,c4,01>>tmp.reg
regedit /s tmp.reg
del tmp.reg
taskkill /im explorer.exe /f
explorer.exe
gpupdate/force
RunDll32.exe USER32.DLL,UpdatePerUserSystemParameters
exit

下面是卸載免疫補?。?
@echo off
echo Windows Registry Editor Version 5.00>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths]>>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{27122b10-e1d1-47c5-a299-b7d4286539a9}]>>tmp.reg
echo "LastModified"=->>tmp.reg
echo "Description"=->>tmp.reg
echo "SaferFlags"=->>tmp.reg
echo "ItemData"=->>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{45c49d12-7feb-48b6-81c8-516f801d1062}]>>tmp.reg
echo "LastModified"=->>tmp.reg
echo "Description"=->>tmp.reg
echo "SaferFlags"=->>tmp.reg
echo "ItemData"=->>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{4e1ddf37-dbd2-446c-865d-969ad8619b91}]>>tmp.reg
echo "LastModified"=->>tmp.reg
echo "Description"=->>tmp.reg
echo "SaferFlags"=->>tmp.reg
echo "ItemData"=->>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{a88ef251-1ec4-42ce-95df-4f47bf20e2ee}]>>tmp.reg
echo "LastModified"=->>tmp.reg
echo "Description"=->>tmp.reg
echo "SaferFlags"=->>tmp.reg
echo "ItemData"=->>tmp.reg
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Safer\CodeIdentifiers\0\Paths\{dda3f824-d8cb-441b-834d-be2efd2c1a33}]>>tmp.reg
echo "Description"="">>tmp.reg
echo "SaferFlags"=dword:00000000>>tmp.reg
echo "ItemData"=hex(2):25,00,48,00,4b,00,45,00,59,00,5f,00,43,00,55,00,52,00,52,00,\>>tmp.reg
echo 45,00,4e,00,54,00,5f,00,55,00,53,00,45,00,52,00,5c,00,53,00,6f,00,66,00,74,\>>tmp.reg
echo 00,77,00,61,00,72,00,65,00,5c,00,4d,00,69,00,63,00,72,00,6f,00,73,00,6f,00,\>>tmp.reg
echo 66,00,74,00,5c,00,57,00,69,00,6e,00,64,00,6f,00,77,00,73,00,5c,00,43,00,75,\>>tmp.reg
echo 00,72,00,72,00,65,00,6e,00,74,00,56,00,65,00,72,00,73,00,69,00,6f,00,6e,00,\>>tmp.reg
echo 5c,00,45,00,78,00,70,00,6c,00,6f,00,72,00,65,00,72,00,5c,00,53,00,68,00,65,\>>tmp.reg
echo 00,6c,00,6c,00,20,00,46,00,6f,00,6c,00,64,00,65,00,72,00,73,00,5c,00,43,00,\>>tmp.reg
echo 61,00,63,00,68,00,65,00,25,00,4f,00,4c,00,4b,00,2a,00,00,00>>tmp.reg
echo "LastModified"=hex(b):90,ad,4a,7e,32,d9,c4,01>>tmp.reg
regedit /s tmp.reg
del/y tmp.reg
taskkill /im explorer.exe /f
explorer.exe
gpupdate/force
RunDll32.exe USER32.DLL,UpdatePerUserSystemParameters
exit

本站僅提供存儲服務(wù),所有內(nèi)容均由用戶發(fā)布,如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,請點擊舉報
打開APP,閱讀全文并永久保存 查看更多類似文章
猜你喜歡
類似文章
不用軟件,讓你的電腦急速如飛[實用技術(shù)]
電腦慢怎樣徹底清理電腦系統(tǒng)垃圾
清除“Recycler”病毒文件方法
清理Windows更新產(chǎn)生的垃圾
注冊表系統(tǒng)優(yōu)化(批處理文件)
使用批處理快速去除或恢復(fù)Win7桌面快捷方式的小箭頭
更多類似文章 >>
生活服務(wù)
分享 收藏 導(dǎo)長圖 關(guān)注 下載文章
綁定賬號成功
后續(xù)可登錄賬號暢享VIP特權(quán)!
如果VIP功能使用有故障,
可點擊這里聯(lián)系客服!

聯(lián)系客服