Friday, May 20, 2011
【 Weak current college 】 computer registry not open solutions (2)
Registry control user mode examples are:
¡Ï Control Panel functions;
★ Desktop appearance and icons;
¡Ï network parameters;
★ Browser functionality and features.
Some of these features is and user independent, some are for the user.
Computer related control item based on the name of the computer, and login user-independent. Control type example is to install an application, regardless of which user, program availability and access is unchanged, however, running the program icon depend on the network login user. Network protocol availability and priority based on the computer, but the current connection and user information.
Here are the registry entries for the base and the computer control of some examples:
★ Access control;
★ Login confirmation;
★ File and printer sharing;
¡Ï network card settings and protocols;
★ System performance and virtual memory settings.
No registry, Win9x and WindowsNT is not likely to exist. They are so complex that the .ini files used in the past to control their scalability needs almost unlimited installation and using the application, the registry enables it. However, the registry is more complex than the .ini file, to understand how it works, what to do and how to use it to do is the key to effective management system.
In the system registry control all 32-bit applications and their features and multiple applications of interaction, such as copying and pasting, it also controls all of the hardware and drivers. Although the majority can be through the control panel to install and set up, understand the registry still do for WindowsNT and Win9x system management basics.
To sum up, the registry holds a variety of parameters, direct control at Windows startup, hardware driver loading, as well as some Windows applications running, resulting in the entire system plays a central role. It includes:
(1) hardware and software forconfiguration and status information, the registry holds the application and the Explorer shell of initial conditions, preferences, and unloading of data.
(2) networking computer settings for the entire system and all kinds of license, the file name extension associated with the application, the hardware part of the description, status and properties.
(3) performance records, and other underlying system status information, and other data.
If the registry is damaged, the light from the Windows startup process to an exception, to and potentially cause the entire system of completely paralyzed. Therefore correctly understand, use, particularly timely backup and restore the registry in question, for Windows users, it is very important. Learned knowledge of the registry, and its associated application, it will cause your computer to multitask! thus becoming a real computer whiz!
Terminology associated with the registry:
①, registry: a database in a tree hierarchy. Physically, it is the System.dat and User.dat files; logically, it is the user in the registry editor, see the configuration data.
②, & quot; HKEY: root keys & quot; or & quot; & quot; primary key, its icon and Explorer Folders icon a bit alike. Windows98 will registry is divided into six parts, and call it HKEY_name, it means one of the key handle. (Figure 2)
③, key (key): it contains additional folder and one or more values.
④, subkey (subkeys): in a key (the parent key) following a key (a key).
⑤, branch (branch): represents a specific subkey and everything. A branch from the top of each registry, but usually used to describe a key and all of its contents. ⑥, valueentry (value): with a name and a value of the ordered value. Each key can contain any number of values. Each entry consists of three parts: a name, data type, data. (Fig. 3)
¡Ï name: does not include backslash characters, numbers, the representative character, a space ofany combination. The same key cannot have the same name.
¡Ï data types: string, binary, three double-word.
String (REG_SZ): as the name implies, a string of ASCII characters. Like & quot; & quot; HelloWorld, is a string of words or phrases. In the registry string value is generally used to indicate the file description, hardware ID, etc. Generally it consists of letters and numbers. The registry is always displayed string within quotation marks. Binary (REG_BINARY): F03D990000BC, there is no limit on the length of the binary value in the registry editor, binary data to hex mode displayed.
Double word (REG_DWORD): literally understand should be a DoubleWord, double-byte values. From 1-8 hexadecimal data, we used the hexadecimal or decimal form to edit. If D1234567.
¡Ï data: value of specific values, it can take up to the 64KB.
⑦, Default (default): each key include at least one value, called a default value (Default), it is always a string.
Registry of internal organizational structure and relationships
Computer configuration and the default user setting of noteCopies the table data is saved in the WindowsNT in the following five files: DEFAULT, SAM, SECURITY, SOFTWARE, SYSTEM, NTUSER.DAT. But Windows9x/Me/2000 will all registry files into 2 files System.dat and User.dat in:. They are binary files cannot be viewed with a text editor. They exist in the Windows directory with hidden, system, read-only property. System.dat contain computer-specific configuration data, User.dat contains user specific data. User.dat file location to a user name to log in, it is located in the user name of the directory, C:\\Windows\\profiles\\ system while C:\\Windows Directory keeps a default User.dat file for new users. Internal organization structure is similar to a directory management tree hierarchy structure.
WINDOWS registry has six root key, which is equivalent to a hard disk is divided into six sections.
At " & quot; Run dialog, enter RegEdit, and then click & quot; OK & quot; buttons, you can run the registry editor.
Left pane displays the registry root keys, this root keys altogether six. These root keys are all uppercase, with HKEY_ to prefix, this command conventions is the Registry functions of the Win32API keyword symbol variable.
Although in the registry, the six root keys looks in a parallel position, had nothing to do with each other. But in fact, HKEY_CLASSES_ROOT, and the information stored in the HKEY_CURRENT_CONFIG is stored in the HKEY_LOCAL_MACHINE portion of the information, and information stored in the HKEY_CURRENT_USER is deposited information of HKEY_USERS. HKEY_CLASSES_ROOT HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE includes all of the information. Every time the system starts, the system will map out the information in the HKEY_CURRENT_USER allows users to view and edit the information.
In fact, HKEY_LOCAL_MACHINE\\SOFTWARE\\Classes is HKEY_CLASSES_ROOT, in order to view and edit the user easy and the system is designed as a root key. Similarly, HKEY_CURRENT_CONFIG\\SY-STEM\\CurrentControl is HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControl.
Save the HKEY_USERS default user and the current logged-on user's user information. HKEY_CURRENT_USER saves the current logged-on user's user information.
HKEY_DYN_DATA saved system run time, dynamic data, it reflects the current state of the system, each time the runtime are not the same, even on the same machine.
According to the above analysis, the information in the registry HKEY_LOCAL_MACHINE and HKEY_USERS can be divided into two broad categories, the two main types of details please see the following introduction.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment