Don’t underestimate the resourcefulness of people trying to be annoying

Date:January 4, 2006 / year-entry #9
Orig Link:
Comments:    17
Summary:TechNet Magazine's January • February 2006 issue is now available, including a short article from me on the resourcefulness of people trying to be annoying. The issue also has an article on how to use the Volume Shadow Copy Service which I mentioned a few months ago. (And if you had read that posting from last September,...

TechNet Magazine's January • February 2006 issue is now available, including a short article from me on the resourcefulness of people trying to be annoying. The issue also has an article on how to use the Volume Shadow Copy Service which I mentioned a few months ago. (And if you had read that posting from last September, you'll know why the Previous Versions Client is kept in a folder called "twclient". Try using that at a party to impress someone.)

Comments (17)
  1. Wesha says:

    <i>"In Windows 95 we gave programmatic access to the Start menu "Fast items" list, the items that appear at the top of the Start menu above the Programs list. This area was intended for the user to customize with their favorite links. But programs quickly saw the opportunity and added themselves to it every chance they got.</i>

    ….. Of course among the first ones to abuse this functionality was Microsoft Office with its "New Office Document" and "Open Office Document" items. :/

  2. J says:

    Haha, I swear when I read the title of this blog post that I thought you’d be writing about people like the above poster instead of something technical related. I was quite disappointed when I found out the topic was just a repeat of old blog material. :(

  3. I thought that poster’s comment was very apropos, especially considering that IE and Outlook Express pin themselves…

  4. Um, no, IE and OE do not pin themselves. The Start menu pins your default web browser and default email program. If you change your web browser/email program, the icon changes to match. (See the Start menu’s Properties dialog.)

    And the article was not a repeat. It was actually a response to the comment

    "Is there any reason to have a programmatic interface to the cd autoplay settings?"

    This question is based on an invalid assumption: There is no programmatic interface to the CD autoplay settings. The people were hacking the undocumented settings. There’s new content in the article, but half of it is a repeat of old blog content in order to establish context for the new content.

  5. ThalesC says:

    I’d love if this type of limitation would also apply to programs trying to add themselves to Windows startup list. I simply hate those stupid programs that despite everything to the contrary think they’re sooooo important that they absolutely have to be running all the time in the system. They can’t pin themselves to the Start menu, but they can make sure they’ll always have a flashy icon in the notification area of the task bar. That’s really, really annoying…

  6. Anonymous Coward says:

    ThalesC: Grab autoruns at Marvel at how long it takes to list all the programs and different ways they can be configured to run at startup. I suggest telling it hide the Microsoft signed ones. It feels especially gratifying getting rid of whole bunches of useless programs that way.

  7. David Candy says:

    I don’t understand Volume Shadows. A file is locked, so the backup makes a copy and monitors writes to it. But so what? If it refuses to back it up because it is in an unknown state then it must still be in an unknown state by the end of the backup (unless the app locking it has finished with the file)

  8. AP says:

    I would LOVE the ability to lock the "run" key under HKLMMicrosoftWindowsCurrentVersionRun.

  9. mikebell says:

    David – the file was in a known and consistent state UNTIL the write began. Hence by shadowing a copy right when the OPEN for WRITE request is being processed, you have a consistent copy. During the write, all bets are off (well, without various other more complicated measures).

    Keep in mind file by file snapshots like this aren’t always the perfect solution. With a multifile database, inter-file consistency is important and this method doesn’t guarantee this will necessarily be the case.

  10. :: Wendy :: says:

    So is the model that the OS is the governement (rules system) that manages the behaviour of society? There must be a wealth of literature on Social Engineering thatcould be pro-actively applied to the management of social spaces – where the OS isviewed as a social space. Game theory developed a very westernised view od the ‘social dilemma’ in the from of ‘the prisoners dilemma’ (westernised individual achievement oriented). Though the original premis was more based on a long term view of ‘re-newable resources’ – ‘the commons dilemma’. It would be good to see explicit evidence of microsoft developing windows as a cooperatively managed renewable resource…

  11. That’s interesting… didn’t know that.

    So there *is* a programmatic way to pin your application then — register it as the default mail or web handler!

  12. Ben Cooke says:


    You can achieve the locking you desire using registry permissions. Regedit.exe is really limited, presumably because it was originally built for Win95, but the old NT registry editor Regedt32.exe has a menu option to set registry key permissions.

    You can deny your own user account permission to create new values in that Run key, and then any calls to add new values there will fail. If you ever want to add something manually, you can just flick the permissions back again temporarily.

    Technically there’s no reason why an application couldn’t go in there and enable the write permission itself before adding the key, but I don’t think many would actually bother. I suspect most apps don’t even bother to check whether their registry call succeeds or not, because people tend to be sloppy about these matters.

    Of course, you may find that some setup utilities and software fail spectacularly due to this unexpected setting, so you’d better keep in mind that you’ve done it so that you aren’t left scratching your head a few months later when something bizarre happens during an application install.

    (Disclaimer: The above might all be completely false. You might want to test on a harmless key elsewhere in the registry first. If you accidentally lock half of your registry while following my instructions, don’t come crying to me!)

  13. John Topley says:

    The Windows XP version of regedit.exe includes the security permissions menus too. No need to use regedt32 anymore, unless you prefer MDI. This change may have been introduced with Windows 2000, I can’t remember.

  14. Scott Tringali says:

    Or, just get Mike Lin’s awesome startup monitor and control panel applet and stomp those nasties before the even get in there.

  15. Jonathan Wilson says:

    I use Spybot Search and Destroy as an anti-spyware tool and it contains a nice thing that sits in memory and looks for possible spyware and will warn me if something tries to insert itself into the run keys.

    Other spyware (such as the microsoft anti spyware) may do the same, I dont know.

  16. Anil says:

    from the bio at the bottom –

    His web site deals with Windows history and

    **being attacked by sidewalks**

    – emphasis added

  17. Chris Becke says:

    Security permissions are an approach. But not quite what I want.

    I think that, generally, anytime an application tries to access files or registry entries that are not its own outside of proper APIs, that something neferious is going on.

Comments are closed.

*DISCLAIMER: I DO NOT OWN THIS CONTENT. If you are the owner and would like it removed, please contact me. The content herein is an archived reproduction of entries from Raymond Chen's "Old New Thing" Blog (most recent link is here). It may have slight formatting modifications for consistency and to improve readability.

WHY DID I DUPLICATE THIS CONTENT HERE? Let me first say this site has never had anything to sell and has never shown ads of any kind. I have nothing monetarily to gain by duplicating content here. Because I had made my own local copy of this content throughout the years, for ease of using tools like grep, I decided to put it online after I discovered some of the original content previously and publicly available, had disappeared approximately early to mid 2019. At the same time, I present the content in an easily accessible theme-agnostic way.

The information provided by Raymond's blog is, for all practical purposes, more authoritative on Windows Development than Microsoft's own MSDN documentation and should be considered supplemental reading to that documentation. The wealth of missing details provided by this blog that Microsoft could not or did not document about Windows over the years is vital enough, many would agree an online "backup" of these details is a necessary endeavor. Specifics include:

<-- Back to Old New Thing Archive Index