How to Protect Windows Registry from Remote Access without Software

If you do spend a good quality time on internet regularly, you should concern about the security of your computer. There are lots of websites that do access your machine remotely without your notice. Those may edit the Windows registry and install something harmful into your machine. Here are two simple tricks to stop those unwanted access. You don’t need any third party software to accomplish these.

Process 1: Using “Services.msc”

Follow these simple steps to get the job done.

1. Hit “Start” > “Run”.

2. Type services.msc in the run prompt and press “OK”.

Type services.msc in Run Prompt

3. ‘Services’ window will appear. Scroll down the right pane to find “Remote Registry” option. Double click on it.

Select Remote Registry Option in Services Window

4. A pop-up window named ‘Remote Registry Properties (Local Computer)’ will appear. Under the “General” tab, there is an option, “Startup type”. Select “Disabled” from the dropdown list. Click “Apply” and then “OK”.

Startup Type Disabled=

5. Restart the computer to take effects.

Process 2: Using Registry Edit

1. Hit “Start” > “Run”.

2. Type regedit in the run prompt and press “OK”.

Type regedit in Run Prompt

3. ‘Registry Editor’ will appear. Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurePipeServers\winreg. Now right click on “winreg” and select “Permissions…”.

Right Click Context Menu Options of winreg in Registry Editor Window

4. Select all the options under “Group or user names” one by one and off all the check marks. If you want to keep your registry in visible mode (read mode) only, keep check mark on only in “Read” field under “Allow” column. Click “Apply” and then “OK”.

Permissions for winreg Window

5. Restart your computer and you are done.

You can apply any of the above tricks to keep your registry safe from unwanted access over internet.

Click Here to Leave a Comment Below 2 comments
Rahul @ MazaKaro - September 7, 2010

Nice tip to protect our system. This is useful if we dont have firewall.

Reply
VIctor - January 4, 2011

It owuld be better to explain what the implications will be to the user after he had applied these changes. Will he not be able to surf certain sites or not able to share files across the LAN or are there other restrictions which he will suffer after applying these changes? To just show how it is done without explaining why it is done is like creating a video without sound, frankly.

Reply

Leave a Reply: