{"id":956,"date":"2003-03-04T17:45:39","date_gmt":"2003-03-04T16:45:39","guid":{"rendered":"https:\/\/destinationcyber.com\/?p=956"},"modified":"2003-03-04T17:45:39","modified_gmt":"2003-03-04T16:45:39","slug":"windows-xp-comment-empecher-lexecution-automatique-des-scripts","status":"publish","type":"post","link":"https:\/\/destinationcyber.com\/?p=956","title":{"rendered":"WINDOWS XP. Comment emp\u00eacher l&rsquo;ex\u00e9cution automatique des scripts"},"content":{"rendered":"<p>Windows ex\u00e9cute trop facilement les scripts, parfois porteurs de virus. Il suffit en effet de cliquer deux fois sur l&rsquo;ic\u00f4ne d&rsquo;un fichier de script pour en lancer imm\u00e9diatement l&rsquo;ex\u00e9cution. On peut certes \u00e9viter de cliquer sur des \u00e9l\u00e9ments potentiellement dangereux. <\/p>\n<p>Mais pour \u00e9loigner tout risque de mauvaise manipulation, on pr\u00e9f\u00e9rera red\u00e9finir l&rsquo;action du double-clic : d\u00e9sormais, ce dernier, au lieu d&rsquo;ex\u00e9cuter les scripts, les ouvrira dans le Bloc-notes de Windows. Voici comment proc\u00e9der. <\/p>\n<p>S\u00e9lectionnez le menu <strong>D\u00e9marrer\/Ex\u00e9cuter<\/strong>, saisissez <strong>Regedit<\/strong> et validez en appuyant sur la touche <strong>Entr\u00e9e<\/strong>. D\u00e9roulez successivement les cl\u00e9s suivantes : <strong>HKEY_CLASSES_ROOT, JSEFile, Shell<\/strong>. Dans ces cl\u00e9s, cliquez deux fois sur la valeur intitul\u00e9e \u00ab <em>(par d\u00e9faut)<\/em> \u00bb et saisissez <strong>edit<\/strong> dans le champ <strong>Donn\u00e9es de la valeur<\/strong>. <\/p>\n<p>Effectuez la m\u00eame manipulation pour les cl\u00e9s <strong>HKEY_CLASSES_ROOT, JSFile, Shell ; HKEY_CLASSES_ROOT, VBEFile, Shell ; HKEY_CLASSES_ROOT, VBS File, Shell ; HKEY_CLASSES_ROOT, WSFFile, Shell ; HKEY_CLASSES_ROOT, WSHFile, Shell<\/strong> . <BR><\/p>\n<p>Fermez l&rsquo; <strong>Editeur de registre<\/strong> puis red\u00e9marrez votre PC. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Windows ex\u00e9cute trop facilement les scripts, parfois porteurs de virus. Il suffit en effet de cliquer deux fois sur l&rsquo;ic\u00f4ne d&rsquo;un fichier de script pour en lancer imm\u00e9diatement l&rsquo;ex\u00e9cution. On peut certes \u00e9viter de cliquer sur des \u00e9l\u00e9ments potentiellement dangereux. Mais pour \u00e9loigner tout risque de mauvaise manipulation, on pr\u00e9f\u00e9rera red\u00e9finir l&rsquo;action du double-clic : [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_citadela_custom_class":"","footnotes":""},"categories":[21],"tags":[],"class_list":["post-956","post","type-post","status-publish","format-standard","hentry","category-windows"],"_links":{"self":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=956"}],"version-history":[{"count":0,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=\/wp\/v2\/posts\/956\/revisions"}],"wp:attachment":[{"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/destinationcyber.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}