Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Microsoft® Windows® Registry Guide, Second Edition A Note Regarding Supplemental Files Acknowledgments Introduction
This Book Is Different—Really Power Users First, Then IT Professionals Some Terminology Why I Love Windows XP Sample Files and Scripts Resource Kit Support Policy Final Note System Requirements
I. Registry Overview
1. Learning the Basics
Heart and Soul of Windows
For Power Users For IT Professionals
Registry Warnings and Myths Must-Know Concepts
Security Identifiers Globally Unique Identifiers Hexadecimal Notation Bits and Bit Masks Little-Endian and Big-Endian ANSI and Unicode Encoding Null and Empty Strings
Registry Structure
Keys Values Types
Registry Organization
HKEY_USERS HKEY_CURRENT_USER HKEY_LOCAL_MACHINE HKEY_CLASSES_ROOT HKEY_CURRENT_CONFIG
Registry Management Tools Registry Hive Files
Hives in HKLM Hives in HKU
2. Using Registry Editor
Running Regedit Regedit
Key Pane Value Pane
Searching for Data
Searching Incrementally Searching in Binary Values Bookmarking Favorite Keys Using Better Techniques
Editing the Registry
Changing Values Adding Keys or Values Deleting Keys or Values Renaming Keys or Values
Printing the Registry Exporting Settings to Files
Registration Files Win9x/NT4 Registration Files Hive Files Text Files
Working with Hive Files Getting Beyond Basics
3. Backing Up the Registry
Editing the Registry Safely
Copying Single Values Backing Up to REG Files Backing Up to Hive Files
Using System Restore
Taking Configuration Snapshots Looking Inside System Restore Managing System Restore Customizing System Restore Scripting System Restore
Backing Up the Registry Regularly
Planning a Backup Strategy Backing Up System State Data Restoring System State Data
Backing Up User Settings
4. Hacking the Registry
Redirecting Special Folders Customizing Shell Folders
Renaming Desktop Icons Using Custom Icon Images Adding Desktop Icons Hiding Desktop Icons
Reorganizing Control Panel Customizing File Associations
Running Programs from My Computer Opening Command Prompts at Targeted Folders Rooting Windows Explorer at a Targeted Folder Adding InfoTips to Program Classes
Adding File Templates Preventing Messenger from Running Personalizing the Start Menu
Configuring the Menu’s Contents Trimming the Frequently Used Programs List Restoring the Sort Order
Disabling Windows Tour Creating Program Aliases Customizing Internet Explorer
Extending the Shortcut Menus Changing the Toolbar Background Customizing Search URLs Maximum Concurrent Downloads
Clearing History Lists Running Programs at Startup Controlling Registry Editor
Default Action for REG Files Storing Window Position and Size
Logging On Automatically Changing User Information Looking for More Hacks
5. Mapping Tweak UI
General
Focus ALT+TAB
Mouse
Hover Wheel X-Mouse
Explorer
Shortcut Colors Thumbnails Command Keys Customizations Slide Show
Common Dialog Boxes
Places Bar
Taskbar and Start Menu
Grouping Start Menu
Desktop
First Icon
My Computer
Drives Special Folders AutoPlay Drive Letters
Control Panel Templates Internet Explorer
Toolbar Background Search View Source Small Animation Large Animation Image Toolbar
Command Prompt Logon
Autologon Settings Screen Saver
6. Configuring Servers
Server Customizations
Adding Comments to Server Announcements Optimizing the Server Service
Authentication
Configuring Kerberos Disabling Global Catalog Requirement Enabling Verbose Winlogon Messages
Internet Information Services
Configuring Http.sys Using Incremental Site ID Numbers
Network Connections
Enabling IP Forwarding Changing MTU Settings
Shutdown Event Tracker
II. Registry in Management
7. Using Registry-Based Policy
Editing Local Policies
Group Policy Extensions Registry-Based Policy Group Policy Storage
Extending Registry-Based Policy
Comments Strings CLASS
Syntax Example
CATEGORY
Syntax Example Keywords
KEYNAME POLICY
Syntax Example Keywords
EXPLAIN VALUENAME VALUEON and VALUEOFF ACTIONLIST
Syntax Example
PART
Syntax Example Keywords
CHECKBOX
Syntax Example Keywords
COMBOBOX
Syntax Example Keywords
DROPDOWNLIST
Syntax Example Keywords
EDITTEXT
Syntax Example Keywords
LISTBOX
Syntax Example Keywords
NUMERIC
Syntax Example Keywords
TEXT
Syntax Example
Deploying Registry-Based Policy
Windows 2000 Server-Based Networks Windows NT–Based Networks and Other Networks
Customizing Windows Using the Group Policy Tools
Gpresult
Syntax Examples
Gpupdate
Syntax Examples
Help and Support Center Resultant Set of Policy
Using DesktopStandard PolicyMaker Finding More Resources
8. Configuring Windows Security
Setting Permissions for Keys
Adding Users to ACLs Removing Users from ACLs Assigning Special Permissions
Mapping Default Permissions Taking Ownership of Keys Auditing Registry Access Preventing Local Registry Access Restricting Remote Registry Access Deploying Security Templates
Creating a Security Management Console Choosing a Predefined Security Template Building a Custom Security Template Analyzing a Computer’s Configuration Modifying a Computer’s Configuration Deploying Security Templates on the Network
Configuring New Security Features
Security Center Alerts Windows Firewall
Internet Explorer Privacy Settings Internet Explorer Security Zones
TemplatePolicies ZoneMap Zones
9. Troubleshooting Problems
Fixing Corrupt Settings
Allowing Windows to Fix Errors Repairing an Application’s Settings Removing Programs from the Registry Using Another Computer’s Settings
Recovering from Disasters
Windows Advanced Options Menu Windows Recovery Console Automated System Recovery
Diagnosing Registry Corruption
Power Failure File Corruption and Faulty Hardware The Registry Is Written To at Shutdown
Repairing a Corrupt Registry
Step 1 Step 2 Step 3 Step 4
10. Finding Registry Settings
Comparing REG Files
Using WinDiff Using Word 2003
Comparing with Reg.exe Auditing the Registry
Setting Audit Policy Auditing Registry Keys Analyzing the Results
Monitoring the Registry
Using Winternals Regmon Filtering for Better Results
11. Scripting Registry Changes
Choosing a Technique Installing INF Files
Starting with a Template Linking Sections Together Adding Keys and Values
Syntax Example
Deleting Keys and Values
Syntax Example
Setting and Clearing Bits
Syntax Example
Using Strings in INF Files
Setting Values with REG Files
Exporting Settings to REG Files Creating REG Files Manually Encoding Special Characters Deleting Keys Using a REG File
Editing from the Command Prompt
Adding Keys and Values
Syntax Example
Querying Values
Syntax Example
Deleting Keys and Values
Syntax Example
Comparing Keys and Values
Syntax Example
Copying Keys and Values
Syntax Example
Exporting Keys to REG Files
Syntax Example
Importing REG Files
Syntax Example
Saving Keys to Hive Files
Syntax Example
Restoring Hive Files to Keys
Syntax Example
Loading Hive Files
Syntax Example
Unloading Hive Files
Syntax Example
Scripting Using Windows Script Host
Creating Script Files Running Script Files
Syntax
Formatting Key and Value Names Adding and Updating Values
Syntax Example (VBScript) Example (JScript)
Removing Keys and Values
Syntax Example (VBScript) Example (JScript)
Querying Registry Values
Syntax Example (VBScript) Example (JScript)
Creating Windows Installer Packages
III. Registry in Deployment
12. Deploying User Profiles
Exploring User Profiles
Profile Hives Profile Folders Special Profiles
Getting User Profiles
Local Profiles Roaming Profiles
Using Roaming User Profiles
Managing Roaming User Profiles Understanding Fast Network Logon Understanding the New Merge
Deploying Default User Profiles
Customizing User Settings Cleaning User Profiles Creating Default User Folders Deploying Default User Folders
Coexisting with Earlier Versions of Windows Migrating User Settings to Windows
Files And Settings Transfer Wizard User State Migration Tool
13. Mapping Windows Installer
Repairing Registry Settings Managing Windows Installer with Policies
Installing with Elevated Privileges Caching Transforms in a Secure Location Locking Down Windows Installer
Removing Windows Installer Data
Msizap.exe Msicuu.exe
Inventorying Applications
14. Deploying with Answer Files
Creating Distribution Folders Customizing Answer Files
Setup Manager Notepad and Other Text Editors
Adding Settings to Unattend.txt
[GuiRunOnce] Cmdlines.txt
Adding Multiple Settings with One Script Logging On Automatically After Installation
15. Cloning Disks with Sysprep
Cloning Windows
Windows Tools Sysprep Limitations
Building a Disk Image
Customizing Mini-Setup Preparing for Duplication Cloning the Disk Image
Reducing Image Count
Filling SysprepMassStorage Manually Filling SysprepMassStorage Automatically Cleaning Up After Sysprep
Removing the Paging File Mapping Sysprep Settings Keeping Perspective
16. Configuring Windows PE
Exploring Windows PE
Capabilities Limitations
Using Windows PE as an Installation Platform
Starting the Computer Configuring the Hard Disks Installing Windows
Customizing Windows PE
Command-Line Tools Optional Components Network Drivers Mass-Storage Drivers Languages
Starting Windows PE
CD-Based Installation RIS-Based Installation Disk-Based Installation
Automating Installations
17. Deploying Office 2003 Settings
Profile Wizard
Customizing the Wizard Capturing Settings Deploying Settings
Custom Installation Wizard
Adding and Removing Registry Entries Customizing Default Application Settings Changing Office User Settings Adding Installations and Running Programs
Custom Maintenance Wizard Group and System Policy
18. Fixing Common IT Problems
Controlling Just-in-Time Setup
Outlook Express Windows Media Player Desktop Themes Other Shortcuts
Removing Components
Answer File [Components] Section Extending Windows Components Wizard Hiding Non-Removable Components
Removing Policy Tattoos Elevating Privileges of Processes
Group Policy Secondary Logon Scheduled Tasks AutoLogon
Severing File Associations Deploying Office Trusted Sources Enabling Remote Desktop Remotely Customizing the Windows Logon Restoring Administrative Shares Changing Source Location
IV. Appendixes
A. File Associations
Merge Algorithm File Extension Keys
OpenWithList PerceivedType ShellNew
Program Class Keys
DefaultIcon EditFlags Shell
Specialized Keys
Applications SystemFileAssociations Unknown
COM Class Keys
B. Network Settings
HKCU\Network HKLM\SYSTEM\CurrentControlSet\Services
LanmanServer LanmanWorkstation Tcpip\Parameters Tcpip\Interfaces
C. Per-User Settings
AppEvents Console Control Panel
Desktop Desktop\WindowMetrics Mouse
Environment Keyboard Layout Network Printers SessionInformation Software
Classes Microsoft\Command Processor Microsoft\Internet Connection Wizard Microsoft\Internet Explorer Microsoft\Internet Explorer\MenuExt Microsoft\Internet Explorer\SearchURL Microsoft\MessengerService Microsoft\Office Microsoft\Search Assistant Microsoft\VBA\Trusted Policies
Software\Microsoft\Windows\CurrentVersion
Explorer\Advanced Explorer\AutoComplete Explorer\ComDlg32 Explorer\HideDesktopIcons Explorer\HideMyComputerIcons Explorer\MenuOrder Explorer\RecentDocs Explorer\RunMRU Explorer\User Shell Folders
D. Per-Computer Settings
HARDWARE
DESCRIPTION DEVICEMAP
SAM SECURITY SOFTWARE
Classes Clients Microsoft\Active Setup Microsoft\Command Processor Microsoft\Driver Signing Microsoft\DrWatson Microsoft\Internet Explorer Microsoft\Sysprep Microsoft\Windows NT\CurrentVersion Microsoft\Windows NT\CurrentVersion\Winlogon Policies
SOFTWARE\Microsoft\Windows\CurrentVersion
App Paths Applets Explorer Explorer\AutoplayHandlers Explorer\Desktop\NameSpace Explorer\FindExtensions Explorer\HideDesktopIcons Explorer\HideMyComputerIcons Explorer\MyComputer Explorer\NetworkNeighborhood\NameSpace Explorer\RemoteComputer\NameSpace Explorer\StartMenu Explorer\User Shell Folders Explorer\VisualEffects Policies Run RunOnce Uninstall
SYSTEM
CurrentControlSet\Control CurrentControlSet\Enum CurrentControlSet\Hardware Profiles CurrentControlSet\Services
About the Author Index About the Author Copyright
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion