jak najbardziej rozumiem i się nie dziwię, jednak znalazłem TUTAJ coś takiego (nieco za połową strony), co może sugerować, iż również w tej gałęzi można dodawac takie blokujące wpisy (wartość DWORD 4):
The danger WEB
Hi,
Here's a batch file that would block up the dangerous
websites that would like to ruin/spoil your Win98 computer.
It work like this:
First I'm exporting the following two registry keys:
1.) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\
Internet Settings\ZoneMap
2.) HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\
Internet Settings\Zones
both the keys is stored in a file named "%temp%.\$s.reg". A file named
"%temp%.\$spy.reg" is then created like this:
The file "%temp%.\$spy.reg" contents the websites along with a dword =
00000004, and that information goes to the first key "KEY(1.)\Domains\
website". (There is 21 such items).
The second key: "KEY(2.)\4" is then affected by new dwords 1001...1E05
along with "CurrentLevel"=dword:00012000.
I don't know if the second key above is the same with another computer
without a danish Win98, IE 6.0 but I toke the dwords that was modified
after I was setting the classified zone to the highest security level?
If you don't like that, then delete all lines prefixed uppercase ECHO.
Benny Pedersen, http://2dos.homepage.dk/
PS. 83 lines, 4096 bytes,
@echo off% DangerWEB.BAT to BlockUp%
set cmdline= If U ready to move the file %temp%.\$s.reg to a safe place, % %
if exist %temp%.\$s.reg for %%c in (echo pause cls goto) do %%c%cmdline%then
goto Continue
:If
for %%c in (goto:EOF "explorer /e,. /root,, /select,") do %%c %temp%.\$s.reg
:Continue
set cmdline=HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\
set cmdline=%cmdline%CurrentVersion\Internet Settings\Zone
for %%c in (Map s) do start /wait regedit /e %temp%.\$%%c.reg "%cmdline%%%c"
ren %temp%.\$Map.reg $spy.*
copy /b %temp%.\$s.reg + %temp%.\$spy.reg = %temp%.\$s.reg> nul
set cmdline=HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\
set cmdline=%cmdline%CurrentVersion\Internet Settings\Zone> %temp%.\$spy.reg
echo>>%temp%.\$spy.reg REGEDIT4
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\admonitor.net]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\excite.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\doubleclick.net]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\doubleclick.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\linkexchange.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\valueclick.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sexlist.txt]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.txt]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.txt\counter3]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sexlist.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\sextracker.com\counter3]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\flexactive.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\flycast.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\gator.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\gator.net]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\cometcursor.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\comet.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\mycometcursor.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\onflow.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\onflow.txt]
echo>>%temp%.\$spy.reg "*"=dword:00000004
ECHO>>%temp%.\$spy.reg [%cmdline%s\4]
ECHO>>%temp%.\$spy.reg "1001"=dword:00000003
ECHO>>%temp%.\$spy.reg "1200"=dword:00000003
ECHO>>%temp%.\$spy.reg "1400"=dword:00000003
ECHO>>%temp%.\$spy.reg "1402"=dword:00000003
ECHO>>%temp%.\$spy.reg "1405"=dword:00000003
ECHO>>%temp%.\$spy.reg "1407"=dword:00000003
ECHO>>%temp%.\$spy.reg "1604"=dword:00000001
ECHO>>%temp%.\$spy.reg "1606"=dword:00000003
ECHO>>%temp%.\$spy.reg "1607"=dword:00000003
ECHO>>%temp%.\$spy.reg "1608"=dword:00000003
ECHO>>%temp%.\$spy.reg "1800"=dword:00000003
ECHO>>%temp%.\$spy.reg "1802"=dword:00000001
ECHO>>%temp%.\$spy.reg "1803"=dword:00000003
ECHO>>%temp%.\$spy.reg "1804"=dword:00000003
ECHO>>%temp%.\$spy.reg "1A00"=dword:00010000
ECHO>>%temp%.\$spy.reg "1A02"=dword:00000003
ECHO>>%temp%.\$spy.reg "1A03"=dword:00000003
ECHO>>%temp%.\$spy.reg "1A05"=dword:00000003
ECHO>>%temp%.\$spy.reg "1A06"=dword:00000003
ECHO>>%temp%.\$spy.reg "1C00"=dword:00000000
ECHO>>%temp%.\$spy.reg "1E05"=dword:00010000
ECHO>>%temp%.\$spy.reg "CurrentLevel"=dword:00012000
for %%c in ("start.exe /wait " del) do %%c %temp%.\$spy.reg
%0
:EOF
Modification. Add the following 10 Websites:
echo>>%temp%.\$spy.reg [%cmdline%Map\Domains\kazaa.com]
echo>>%temp%.\$spy.reg "*"=dword:00000004
And so on...
...Snipped, imesh.com audiogalaxy.com grokster.com limewire.com bearshare.
com downloadaccelerator.com real.com bonzi.com alexa.com