So you've got a program that causes problems on your computer, or you have some other reason for not wanting a specific program to be installed on your computer. For example, Google is very pushy about its Google Chrome web browser: it's very easy for other users to click the button to install it, but you don't want that to happen (because, for example, you have already installed another web browser and you don't want to clutter your hard drive with software that no one is going to use anyway?) Wouldn't it be nice to remove the ability of the users to install that specific program, without getting in the way of other programs to work on your computer?
It's pretty easy to achieve with Folder Guard. All you need to do is restrict access to the folder in which the program is usually installed. If the program cannot create files into its program folder, it would not be able to install!
Let us show the steps involved using Google Chrome as an example. This web browser installs its files into the folder named Google, inside the C:/Program Files folder on your hard drive. (For other programs, you may want to try to install them first, to see which folders they install into.) Run Windows Explorer and navigate to the C:/Program Files folder. Is there a folder named Google there? If yes, continue to the next step. If not, create an empty folder and name it Google there:
Now run Folder Guard and use it to set up the read-only access to the Google folder. Such a restriction prevents modifications to the folder, including creating new files in it, which is exactly what we need.
The procedure is described in detail in the User's Guide of Folder Guard. The easiest way to proceed is to drag the Google folder from Windows Explorer window with the mouse and drop it over the Folder Guard window. When you drop a folder in such a way, the Folder Guard Wizard should start automatically:
Continue using the wizard to set up the protection we need. Select the option to restrict the folder without a password:
We don't need to restrict the visibility of the folder, so we leave it Default:
This is the step where we select the desired access restriction; for our purposes the read-only choice is just what we need here:
After the wizard is finished, an entry like this one should appear in the list of the restrictions of Folder Guard:
Now enable the protection (or, if the protection is already in effect, press the Apply button for the new restrictions to take effect) and try to install Google Chrome. If everything is well, it should display an error message like this one and stop installing:
The same steps can be used to prevent installing other programs, as well, as long as they don't allow the user to change the installation folder. If you want to prevent installing a program that does allows that, a different approach should be used.
- How to reset the root password after upgrading MariaDB
- How to upgrade MySQL or MariaDB properly
- Force DISKPART to delete EFI system partition on Windows 10
- How to make Windows 10 recognize a cloned hard drive again
- How to stop Windows 10 from using thumbnail preview icons for folders
- How to hide pictures from the Photos app in Windows 10
- How to save Windows Spotlight photos to your computer
- How to move the OneDrive folder to an encrypted drive
- Windows 10 fails to upgrade? Here is how to fix it.
- How to stop Microsoft Edge from hijacking PDF files
- Preventing installations of specific programs with Folder Guard
- Folder Guard licensing explained
- Speed up the updates of the network folders
- Make your Windows laptop work as a Wi-Fi access point
- How to stop automatic updates on Windows 10
- Windows cannot connect to the printer. Access is denied.
- Migrating encrypted data from TrueCrypt to USBCrypt
- Enhancing a photo CD collection with PhotoLauncher
- “The Microsoft account service is unavailable right now. Try again later.”
- Using DiffMerge as the external tool of AB Commander to compare plain text files
- How to erase the icon and/or thumbnail cache in Windows 10 and 8
- Transferring images between your PC and an Android device: Part 2
- Transferring images between your PC and an Android device: Part 1
- Case study: Using SoftDetective to suppress Corel Guide sign-in prompt
- Using junction points to change the iTunes backup folder location
- How to tell if my Windows is 32- or 64-bit?
- How do I stop Windows from rearranging my desktop icons?
- Organize your photo library with the Rename tool of AB Commander
- Windows does not offer the NTFS format option? Here is how to bring it back.
- Encrypt Firefox profile with USBCrypt
- Restarting Windows 10 and Windows 8 in the safe mode
- Integrating AB Commander with Universal Viewer
- How we host our web sites
- How to delete a protected EFI disk partition with Windows 10, 8, or 7
- Using Folder Guard to protect from the “social engineering” attacks
- How to erase Windows login password if you forget it
- How to unhide a folder hidden with Folder Guard
- How to repair Windows desktop icons with AB Commander
- Slow network in Windows 7 Virtual PC? Speed it up!
- How to show drive letters first in AB Commander and Windows Explorer
- What is my IP address?
- Amazon Cloud Drive offers free 5 GB online storage
- Why can’t I copy large files over 4GB to my USB flash drive or SD card?
- Test the strength of your password with USBCrypt
- Setting up the external text editor for AB Commander
- How to restrict Internet Explorer from downloading programs from the Internet
- Personal vs business license for USBCrypt
- Use Folder Guard to restrict access to Control Panel
- Compare MySecretFolder and Folder Guard
- Hide folders with Folder Guard
- Compare ActiveExit to WINEXIT
- Lock folders and drives with passwords
- Locking access to the external drives with Folder Guard
- Protecting Dropbox folder with USBCrypt
- How to set up Folder Guard to stop downloading from the Internet
- Is “Wipe the content” the same as “Secure Delete”?
- Can USBCrypt encrypt the C: drive?
- Make it easier to return your lost encrypted drive
- USBCrypt for users of Microsoft® Office
- Start programs elevated from a batch file
- How to make elevated programs recognize network drives
- How to disable hibernation with AB Commander
- Using names and labels to organize USBCrypt drives
- How to password-protect a USB flash drive
- Always have a backup of your important files