I don't know about any of these above, maybe they don't work or maybe you have them covered. Machine? Does your login application fill both screens or would one display the desktop therefore allowing them a way to access the resources? The user be dumped onto the desktop with full access to the resources? What if they insert a dvd or cd or a USB pen? Will the autorun dialog appear on top allowing them to break out of your application? What if they plug in a second monitor to the But what if your login application crashes. Will So you've blocked off alt-tab and ctrl-alt-delete, etc. It doesn't restrict the resources, it just tries to hide one way of reaching them. How to disable ctrl-alt-delete is the wrong question. That's the answer.Įither that or you can replace worrying about setting user permissions with worrying about the user having access to restricted resources. Doing that does sound like a pretty good solution though. "I don't really want to have to worry about setting up permissions on client machines. The question is misguided and the accepted answer is rubbish. That utility is no longer available from the original source, but is still find-able and there are others like it.Three year old topic and it's been answered, but I have an opinion and am already logged in, so might as well contribute. A previous edit of this answer linked to a utility called "Tweak Ctrl-Alt-Del Options" that made it very easy to disable all activities accessible via Ctrl-Alt-Del. It provides the kernel level module and abstracts some of the handling.Īs a possible alternative, consider that though you can't disable the Ctrl + Alt + Delete hook without a device driver/filter, you can prevent all of the tasks that are accessible via that hook per changes to registry or with group policy editor. The second link, to Interception, is newer and might also be quite useful. That first link to the Elbacom blog, in particular, could be useful since you are also targeting windows 7 embedded. Interception ( source) - A programming interface for intercepting input device communication.Keyboard Filter Driver for Windows Embedded Standard 7 - by Elbacom. I would suggest writing a custom keyboard filter or device driver (or looking for an existing one perhaps). I think this is fundamental security design feature of windows NT (and all derivatives). While I'm open to a non-programming solution, I doubt MS would make this kind of change available in the registry, etc.Įxcept for remapping/disabling keys, it is not possible to prevent Ctrl + Alt + Delete handling outside of kernel level code. Replacing GINA is a programming question and there's no reason to assume this won't be too. Since I've seen comments about this on other questions: I do believe this belongs on Stack Overflow. Up until recently we've been using Windows XP Embedded and could replace GINA, but we're about to switch to Windows 7 (technically Windows Embedded Standard 7 but in our case they're essentially the same) and GINA is no longer an option. Given that, we need to disable SAS/CAD/Ctrl+Alt+Delete in specific some others too, but those are easy with hooks. Access to the full keyboard is necessary so disabling, damaging or remapping keys is not a solution. The application runs as the shell, users shouldn't be able to get behind the application, and ideally they wouldn't be able to do anything that indicates that the system is running Windows. I work on medical devices and they run Windows. However, across all the questions and answers, no one has been able to answer completely given my situation. I know this question has been asked a few times and in a few different ways.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |