View all database entries

ALL  PP  F0  F1  F2  F3  R0  R1  N1  N2  N3  N4  O1  O2  O3  O4  O5  O6  O7  O8  
O9  O10  O11  O12  O13  O14  O15  O16  O17  O18  O19  O20  O21  O22  O23  CHR  FF  

View MDO database (ALL)

Showing entries 17251 to 17275 of 18323.

Go directly to page: 1  684  685  686  687  688  689  690  691  692  693  694  695  696  697  698  733

(L) uPolicies-explorer: DisablePersonalDirChange = 0 (0x0)
Users can move the My Documents folder.
http://windowsxp.mvps.org/disablepersonaldirchange.htm
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: DisablePersonalDirChange = 1 (0x1)
Users cannot move the My Documents folder. May have been set by an Administrator.
http://windowsxp.mvps.org/disablepersonaldirchange.htm
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: DisablePersonalDirChange = dword:1
Users cannot move the My Documents folder. May have been set by an Administrator.
http://windowsxp.mvps.org/disablepersonaldirchange.htm
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: DisableThumbnails = 0 (0x0)
If you disable the Thumbnail Display of Network Folders then you will get to see the icons instead of Thumbnail Display on Network Folders. - May have been set by an IT administator.
http://www.itechtalk.com/thread5246.html
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: DisableThumbnails = 1 (0x1)
http://pcsupport.about.com/od/windowsvista/ht/vistatnpreviews.htm
http://vil.nai.com/vil/content/v_345372.htm
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: DisableThumbnails = dword:1
If you disable the Thumbnail Display of Network Folders then you will get to see the icons instead of Thumbnail Display on Network Folders. - May have been set by an IT administator.
http://www.itechtalk.com/thread5246.html
Windows ALL; discovered by Nasdaq
(Q) uPolicies-explorer: DisableThumbnailsOnNetworkFolders = 1 (0x1)
If you disable the Thumbnail Display of Network Folders then you will get to see the icons instead of Thumbnail Display on Network Folders. - May have been set by an IT administator.
http://www.itechtalk.com/thread5246.html
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: DisableThumbnailsOnNetworkFolders = dword:1
If you disable the Thumbnail Display of Network Folders then you will get to see the icons instead of Thumbnail Display on Network Folders. - May have been set by an IT administator.
http://www.itechtalk.com/thread5246.html
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: DisallowCpl = 1 (0x1)
The policy is enabled. The system hides the icons of Control Panel items specified by entries in the DisallowCpl subkey. It does not prevent any Control Panel programs from running.
http://technet.microsoft.com/en-us/library/cc960869.aspx
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: DisallowCpl = dword:1
The policy is enabled. The system hides the icons of Control Panel items specified by entries in the DisallowCpl subkey. It does not prevent any Control Panel programs from running.
http://technet.microsoft.com/en-us/library/cc960869.aspx
Windows ALL; discovered by Nasdaq
(Q) uPolicies-explorer: DisallowRun = 0 (0x0)
Restrict Users from Running the Application
http://www.pctools.com/guides/registry/detail/969
Windows ALL; discovered by nasdaq
(X) uPolicies-explorer: DisallowRun = 1 (0x1)
Added by the Internet Security Essentials ROGUE! MALWARE REMOVAL PROGRAM.
http://freeofvirus.blogspot.com/2011/02/internet-security-essentials-removal.html
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: DisallowRun = dword:0
Allows Users to Run Applications
http://www.pctools.com/guides/registry/detail/969
Windows ALL; discovered by Nasdaq
(Q) uPolicies-Explorer: DisallowRun = dword:1
Restrict Users from Running the Application
http://www.pctools.com/guides/registry/detail/969
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: EnableShellExecuteHooks = 1 (0x1)
May be set by a FBI Ransomware Infection Virus Registry Entries that should be removed. Check this out also : https://github.com/LRN/mimerun
http://www.expertsupportnow.com/self-help-adware-and-spyware-removal/
Windows ALL; discovered by Nasdaq
(Q) uPolicies-explorer: ForceActiveDesktopOn = 0 (0x0)
Add this setting to the registry to stop unauthorized users from locking machines from the Windows Security dialog box. Value Data: (0 = disabled, 1 = enabled)
http://www.pctools.com/guides/registry/detail/264/
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: ForceActiveDesktopOn = 1 (0x1)
Add this setting to the registry to stop unauthorized users from locking machines from the Windows Security dialog box. Value Data: (0 = disabled, 1 = enabled)
http://www.pctools.com/guides/registry/detail/264/
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: ForceActiveDesktopOn = dword:1
Add this setting to the registry to stop unauthorized users from locking machines from the Windows Security dialog box. Value Data: (0 = disabled, 1 = enabled)
http://www.pctools.com/guides/registry/detail/264/
Windows ALL; discovered by Nasdaq
(Q) uPolicies-explorer: ForceClassicControlPanel = 1 (0x1)
Forces classic Control Panel Style.
http://technet.microsoft.com/en-us/library/cc736754%28WS.10%29.aspx
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: ForceClassicControlPanel = dword:1
Forces classic Control Panel Style
http://technet.microsoft.com/en-us/library/cc736754%28WS.10%29.aspx
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: ForceRunOnStartMenu = 1 (0x1)
If you enable this setting, the Run command is added to the Start menu. If you disable or do not configure this setting, the Run command is not visible on the Start menu by default, but it can be added from the Taskbar and Start menu properties. If t
http://jalaj.net/2007/07/25/tweaking-registry-for-start-menu-xp-vista/
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: ForceRunOnStartMenu = dword:1
If you enable this setting, the Run command is added to the Start menu. If you disable or do not configure this setting, the Run command is not visible on the Start menu by default, but it can be added from the Taskbar and Start menu properties.
http://jalaj.net/2007/07/25/tweaking-registry-for-start-menu-xp-vista/
Windows ALL; discovered by Nasdaq
(Q) uPolicies-explorer: ForceStartMenuLogOff = 1 (0x1)
This setting forces the Logoff button to appear on the Start menu and prevents users from removing or hiding it. May be set by an administrator.
http://www.pctools.com/guides/registry/detail/1046/
Windows ALL; discovered by nasdaq
(Q) uPolicies-Explorer: ForceStartMenuLogOff = dword:1
Logoff on the Start Menu
http://www.pc1news.com/forcing-logoff-on-the-start-menu-1046.html
Windows ALL; discovered by nasdaq
(Q) uPolicies-explorer: GreyMSIAds = 0 (0x0)
Highlight Missing Windows Installer Programs on the Start Menu - Default value.
http://www.pctools.com/guides/registry/detail/1296/
Windows ALL; discovered by nasdaq

This is a list of items that is designed to help with the analysis of HijackThis, DDS, OTL and FRST logs.
It is by no means exhaustive (in fact it is being added to all the time), and is intended to complement other legitimate online lists.