Windows Registry Application Developer Issues SIG North Texas PC Users Group January 11, 2003 Daniel Ogden SIG Co-Leader

Slides:



Advertisements
Similar presentations
Working with the Windows Registry Computer Club of the Sandhills November 12, 2012.
Advertisements

Windows Under the Hood.
Your Friend and Mine The Windows Registry. What is the Registry? ► Think of as a giant 411 switchboard ► Simple idea of centralized one-stop shopping.
Windows Vista Boot process. All the computer running Windows vista have the same start up sequence: Power-on self test (POST) phase Initial startup phase.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
Configuration Files CGS2564. DOS Config.sys Device drivers Memory configuration Autoexec.bat Run programs, DOS commands, etc. Environment settings File.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Unit 3 IT278 Network Administration Course Name – IT278 Network Administration Instructor.
Mastering Windows Network Forensics and Investigation Chapter 8: The Registry Structure.
The Windows Registry Adapted from
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
Chapter 3: Configuring the Windows Vista Environment.
Registry Analysis What is it? What does it contain?
Hands-On Microsoft Windows Server 2003 Administration Chapter 10 Monitoring and Troubleshooting Windows Server 2003.
11 INSTALLING WINDOWS XP Chapter 2. Chapter 2: Installing Windows XP2 INSTALLING WINDOWS XP  Prepare a computer for the installation of Microsoft Windows.
Registry Structure What is it? What does it contain?
Chapter 9 Chapter 9: Managing Server Folders, Permissions, and Software Installation.
Hands-On Microsoft Windows Server 2003 Chapter 2 Installing Windows Server 2003, Standard Edition.
Hands-On Microsoft Windows Server 2008
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Chapter 10 Chapter 10: Managing the Distributed File System, Disk Quotas, and Software Installation.
Operating System & Application Files BACS 371 Computer Forensics.
Working with the Windows XP Registry
6. Configuring & Deploying the Desktop Thomas Lee Chief Technologist – QA.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
COMP1321 Digital Infrastructure Richard Henson February 2012.
IT Essentials: PC Hardware and Software 1 Chapter 7 Windows NT/2000/XP Operating Systems.
Overview Introduction to Windows NT Workstation 4.0. Installing Windows NT Workstation 4.0. Customizing and managing NT Workstation 4.0. Managing Windows.
2 © 2004, Cisco Systems, Inc. All rights reserved. IT Essentials I v. 3 Module 6 Windows NT/2000 Operating Systems.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Module 3: Resolving Boot Process Issues. Overview Understanding the Boot Process Using Advanced Boot Options Using the Boot.ini file to Change Startup.
Course ILT Monitoring and management Unit objectives Identify the stages of the Windows startup process Use Windows 2000 Professional and Windows XP utilities.
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
1 Microsoft Windows Internals, 4 ed Chapter 4. Management Mechanisms The Registry 謝承璋 2008 年 05 月 07 日.
1 Chapter Overview Understanding the Boot Process Editing the Registry Using Startup and Recovery Tools Safe mode LastKnownGood configuration Advanced.
MCTS Guide to Microsoft Windows 7
Ch 11. Services A service is a specialized program that performs a function to support other programs Many services operate at a very low level – Interacting.
A Look under the Hood Chapter 8 The registry is a database that includes settings for: Device drivers Services Installed applications Operating system.
A+ Guide to Software Managing, Maintaining and Troubleshooting THIRD EDITION Chapter 8 Managing and Supporting Windows XP.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 14 Managing and Troubleshooting Windows 2000.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
5. Windows System Artifacts Part 1. Topics Deleted data Hibernation Files Registry.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
COMP1321 Digital Infrastructures Richard Henson November 2013.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
Windows Server 2008 Chapter 3 Last Update
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 23 – The Registry.
1 Windows 98 Ancillary Systems x The Process Scheduler provides system resources. The Windows Driver Model (WDM) allows Windows 98 and Microsoft Windows.
Windows management Unit objectives: Manage the operating system Configure Task Scheduler Manage resources on your computer Participate in a Remote Assistance.
Cody, Brian, and Jerry. Contains configuration options for a boot menu. The file is hidden and read-only to protect it from user configuration. Microsoft’s.
MCTS Guide to Microsoft Windows Vista Chapter 12 Application Support.
Chapter Thirteen Booting Windows XP. Objectives Understand the Windows XP boot process Understand the Windows XP boot process Troubleshoot system restoration.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 11 Application Support.
Managing Services and Registry Chapter 16 powered by dj.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 7 Under the Windows Desktop McGraw-Hill.
Centralized Settings for Noxturnal  How to manage Noxturnal‘s Default Settings through Noxturnal Administrator mode  How to centralize Noxturnal settings.
Chapter 8 Server Management: Directories & Software Directory Structure Creating A Directory Directory Properties Setup Wizard Registry Installing/Uninstalling.
Fixing Windows 10 Automatic Updates Install Problem
9 Copyright © 2004, Oracle. All rights reserved. Getting Started with Oracle Migration Workbench.
Files Used in the Boot Process
Under the Windows Desktop
Tutorial 13 Windows Registry.
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
Windows Under the Hood Chapter 13.
Windows Registry: Introduction
Presentation transcript:

Windows Registry Application Developer Issues SIG North Texas PC Users Group January 11, 2003 Daniel Ogden SIG Co-Leader

Windows Registry  Windows Registry Settings (From Windows Customization presentation of )  Not for the faint of heart  Contrary to Microsoft and other’s recommendations, use “regedit.exe” rather than “regedt32.exe” for most registry operations  Permissions  Saving of keys as “Favorites”  Local run/Current User run  Default separate vdm  Current Control Set

Windows Registry  Scope of Presentation  Windows NT 4.0/2000/XP only  Registry Structure  Registry Elements  Registry in Windows Boot Process  Registry Security  Registry Customization

Windows Registry  Registry Structure  Subtree-Root Level of the Registry  Five Subtrees-  HKEY_LOCAL MACHINE Local system hardware, device drivers, services, and machine- specific application data information.Local system hardware, device drivers, services, and machine- specific application data information.  HKEY_USERS Pre-logon default user profile information and HKEY_CURRENT_USER keyPre-logon default user profile information and HKEY_CURRENT_USER key  HKEY_CURRENT_USER Currently logged on user profile informationCurrently logged on user profile information  HKEY_CLASS_ROOT Software configuration information from the HKEY_LOCAL MACHINE\SOFTWARE\Classes keySoftware configuration information from the HKEY_LOCAL MACHINE\SOFTWARE\Classes key  HKEY_CURRENT _CONFIG Hardware information from the HKEY_LOCAL MACHINE\SOFTWARE and HKEY_LOCAL MACHINE\ SYSTEM keysHardware information from the HKEY_LOCAL MACHINE\SOFTWARE and HKEY_LOCAL MACHINE\ SYSTEM keys

Windows Registry  Registry Elements  Keys/Subkeys  Defines the structure of the registry  Similar to folders in a file system  Values  Contains Registry data in specific subkeys  Five types of values String value (REG_SZ)-Single line string valueString value (REG_SZ)-Single line string value Binary value (REG_BINARY)-Binary valueBinary value (REG_BINARY)-Binary value DWORD value (REG_DWORD)-Doubleword value up to four bytes longDWORD value (REG_DWORD)-Doubleword value up to four bytes long Multi-string value (REG_MULTI_SZ)-Multiple line string valueMulti-string value (REG_MULTI_SZ)-Multiple line string value Expandable string value (REG_EXPAND_SZ)-Expandable string valueExpandable string value (REG_EXPAND_SZ)-Expandable string value  Hives  System-accessible only files containing registry database  Consist of a data file and a log file  Path- “%systemroot%\System32\config”

Windows Registry  Registry in Windows Boot Process 1.In the initial hardware detection phase, NTDETECT.COM detects the installed hardware, which information later will be stored in the HKEY_LOCAL MACHINE\HARDWARE key. 2.NTLDER then loads the information in the HKEY_LOCAL MACHINE\SYSTEM key, which contains the information regarding the device and service drivers that will be loaded. 3.NTLDR then creates the HKEY_LOCAL MACHINE\HARDWARE key and a Clone ControlSet key, which is a read-only copy of the ControlSet key created in step 2. 4.The boot process then initializes the drivers and services loaded earlier and records any errors in the Registry.

Windows Registry  Registry Security  Security is set by Registry permissions.  In Windows 2000, regedt32.exe must be used to set permissions. In Windows XP, regedit.exe can also be used.  Are two basic permission available ReadRead Full ControlFull Control  By default, only the System and Administrators have “full control” permissions  Can also create specific permissions  Inheritance behavior can be set to determine which permissions are inherited to child keys  Registry access can also be audited

Windows Registry  Registry Customization  Two native Windows Registry editors available  Regedt32.exe  Regedit.exe  While many books recommend using regedt32.exe as only it supports read-only mode and permissions (Windows 2000 only), regedit.exe is much easier to work with and is recommended for experienced Registry editors.  Can set certain keys as “Favorites” in regedit.exe  Can export keys to a text file (“regedit4” mode )

Windows Registry  Registry Customization  HKEY_CURRENT_USER  Control Panel  Software\{Various software apps}  Software\Microsoft  Software\Microsoft\Windows\Current Version  Software\Microsoft\Windows NT\Current Version  HKEY_LOCAL MACHINE  Software\Classes  Software\{Various software apps}  Software\Microsoft  Software\Microsoft\Windows\Current Version  Software\Microsoft\Windows NT\Current Version  System\CurrentControlSet

Windows Registry  Sources  Source for much of this presentation: Microsoft Windows 2000 Professional Installation and Configuration Handbook (Que Books)-Appendix A: The Registry and Registry Editors  Strongly recommend visiting as it has a collection of Registry books, Registry tips, and even a Registry tutorial