|
Home | Switchboard | Unix Administration | Red Hat | TCP/IP Networks | Neoliberalism | Toxic Managers |
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and bastardization of classic Unix |
|
Switchboard | ||||
Latest | |||||
Past week | |||||
Past month |
Windows 2000 Registry Management
How to Maintain Current
Registry Backups in Windows NT 4.0 and Windows 2000
Microsoft Knowledge Base Article: 318149 - The solution that is described in
this article is not supported by Microsoft. Use this method at your own risk.
Registry Maintenance
Sample Chapter 2 from Osborne's Admin 911: Windows 2000 Registry.
If your registry becomes corrupt, confused, or misguided, it affects the
health of your computer and your software, and it hinders your ability to get
any work done. Sometimes a sick registry is the result of user action, caused by
somebody mucking around without the proper respect for the delicacy of the
registry. Just as often, registry problems occur as a result of software
installation procedures, hardware configuration, or general system configuration
changes. If you plan registry maintenance properly, and execute that plan
regularly, you can rescue your computer from the clutches of a registry that no
longer works properly. That's what this chapter is about.
Getting Rid of the Unwanted
Sample Chapter 8 from Mastering Windows 2000 Registry, published by Sybex,
Inc.
Download the WinGuides.com Help Files
Windows Registry Guide 2003
Size: 1.4 MB
Platforms: Windows 95/98/ME/NT/2000/XP
Download now!
Windows XP Registry Backup 101
In this article we will cover the Windows XP Registry, its function importance and most importantly, how to apply a basic level of disaster prevention to your system in case a problem does occur. Backing up the Registry in Windows XP is simple, painless and can save you a headache when you need that backup.
RegEditX - Tweaks for the Windows Registry Editor (REGEDIT) free beta
RegEditX makes your registry editing more productive than ever. RegEditX extends the standard Windows Registry Editor (REGEDIT), so you don't have to learn new ways of accomplishing tasks you already know how to perform. Just keep using the same familiar Registry Editor --- more efficiently.
Once you've tried RegEditX, you won't want to edit the registry any other way.
PsExec Might be useful for remote operations on registry
PsExec is a
command-line tool that lets you execute processes on remote systems and redirect console
applications' output to the local system so that
these applications appear to be running locally. You can download PsExec
for free from the Sysinternals Web site (http://www.sysinternals.com).
Here are some advanced tips and tricks to help you leverage the full
potential of PsExec as a systems management utility.
The PsTools Suite Incidentally, the reason that the suite is named PsTools and that all the member tools have Ps as a prefix to their name is that the first tool I developed that satisfied the listed criteria was PsList, a program that lists running processes. I named the tool after the ps utility that performs the same function on UNIX systems. |
Windows Registry Guide - Registry tweaks and fixes for Windows systems
Registry Hacks to secure Windows 2003
Elcor Software - Registry Defragmentation ( registry optimizer registry booster cleaning registry increases system )"Registry Defragmentation" optimizes registry by removing fragmentation, deleting unused entries, compacting the registry and re-indexing registry for maximum speed.Windows registry is its core, constantly modifying and growing in size. It's being altered each time you install/remove programs or config system settings. Such changes made to Windows registry cause it to grow in size, no matter whether new information is added or deleted from registry. Thus registry quickly loses its linear structure which results in increase of application response time and registry access time.
"Registry defragmentation" performs physical defragmentation of the Windows registry file. After defragmentation your registry will acquire linear structure which will reduce application response time and registry access time. "Registry defragmentation" also removes unused entries, thus making registry even smaller in size. Do not worry if sometimes after defragmentation the registry will become smaller only by 1-5%, the key is not in size but in its linear structure, hence it determines access time.
Usually you'll have to use "Registry defragmentation" when new program is installed/removed. You should perform defragmentations regularly, because registry's linear structure is quickly lost and as the time runs on it only becomes more non-linear. With this aim program package includes special scheduler which can help you to organize such regular optimizations.
Microsoft Windows 2000 Resource Kit: Registry Information -- several online books
This file provides detailed descriptions of Windows 2000 registry content, such as the subtrees, keys, subkeys, and entries that advanced users want to know about, including many entries that cannot be changed by using Windows 2000 tools or programming interfaces.
How to Restore the Registry Step-by-step instructions on how to restore the system registry.
Support
Article: How To Use WinDiff to Compare Registry Files
How can you compare registry entries before and after an upgrade, the
installation of a new software package, or between two computers?
Registry Settings Management in Deployment The Registry Editor allows you to specify registry keys and values to be added to the registry of the target computer.
Windows 2000 Registry Repair Utility
Office 2000 SR-1/Windows 2000 Utility: Registry Repair The Office 2000 SR-1/Windows 2000 Registry Repair Utility restores the registry settings for several important files that may cause Office 2000 SR-1 applications to behave oddly on Windows 2000.SubInACL (SubInACL.exe) SubInACL is a command-line tool that enables administrators to obtain security information about files, registry keys, and services, and transfer this information from user to user, from local or global group to group, and from domain to domain.
Amazon.com/Microsoft Windows XP Registry Guide by Jerry Honeycutt See Sample Chapter about Tweak UI...
the best reference book on the subject,
October 31, 2004
The strengths of the book are: (1) presentation; (2) chapters on deployment; (3) backing up and (4) Group Policy mapping to registry keys (but containing some errors). Such information is hard to find elsewhere unless you set the policy and find out what changes (but there are hundreds of policies to verify). The section on scripting is only introductory and does not tell you how to read or write REG_BINARY values in hexadecimals. There are four significant and quite unnecessary section repetitions: (1) autologon; (2) IE SearchURLs; (3) IE History Lists and (4) IE Toolbar background. Some sections like those on customising group policy templates and *.inf files are for IT professionals rather than home users but the advanced home users might benefit from reading about them. It compliments rather than competes with another registry book by P. Hipson (from Sybex, but the Sybex falls behind by some margin in terms of usefulness.) |
Finally, a sensible Registry book, August
3, 2004
I've been reading Registry books ever since the registry started in Win311, and, although I have painfully figured out a lot of things about it, none of the books I read helped me in doing so. This book explains organization and function of the registry in a clear, no obfuscation way. Although the registry remains a complex and sometimes contradictory beast, this book, with a little work, will make it understandable, and no longer mysterious. Don't allow the sections aimed at IT professionals put you off. "XP Registry Guide" is chock-full of good tips, good advice, and over-all good information. |
|
Highly Recommended, March 31, 2003
Reviewer: A reader
First, I am NOT affiliated with Microsoft, the publisher or
the author. I highly recommend this book for anyone wanting
to learn about the registry. It can be used both as a
reference and a learning aid. Two points of major emphasis:
1) There are no significant errors in the text and 2)
support provided by the author. The few errors that are
documented can be found, as documented in the book, can be
found on the website. I personally sent e-mail to the author
and while I did not expect to necessarily receive a reply, I
did in under 2 days! While it would be nice to have a CD-ROM
with the samples, they can be found on the website along
with a forum that does receive replies from the author. I
highly recommend this book to anyone wanting to learn about
the registry. I would say that it is for true Power Users or
Administrators, but a novice should have no problems as
enough background is given... Did I mention no errors? This
is critical especially for the topic being discussed.
Incorrect statements can lead to problems with machines as
well as hinder the learning process.
Download.com/Windows Registry Guide 2003
The Windows Registry Guide is a Windows help file that reveals all the best tips, tricks, and tweaks for the Windows XP, 95, 98, Me, NT and 2000 Registries. The Registry is a database used to store settings and options for the 32-bit versions of Microsoft Windows. It contains information and settings for all of the PC's hardware, software, users, and preferences. Whenever a user makes changes to Control Panel settings, file associations, system policies, or installed software, the changes are reflected and stored in the Registry.
Mystery behind windows registry
Then RegHance is THE tool you can't afford to be without! RegHance is designed to give you better overview capabilities and greater control, from building multiple lists of important keys to easier navigation. You can comment and save large numbers of keys to disk with just a few clicks of your mouse. RegHance is compatible with Windows 9x/ME/NT4.0, Windows 2000 and Windows XP. Not only does RegHance include a powerful hexadecimal editor that allows the user to read and write binary data to and from disk, it also includes advanced search and book marking capabilities.RegHance supports:
- Multiple-result searching
- Deleting and manipulation of registry keys
- Switching between horizontal and vertical views
- Native keyboard shortcuts to enhance productivity
Search results can be:
- Converted to bookmarks
- Commented and saved to disk
- Exported as a text file
You can use the quick-address bar to quickly jump to a particular key or you can save and restore your working desktop at any time.
In addition RegHance was also designed to work in conjunction with Ad-Aware to provide the user with the ability to quickly and easily investigate ANY suspicious registry key with a simple mouse click.
[Nov 14, 2004] PC Magazine Opinion Corruption at the Jersey Shore I also came across a freeware application that does a partial Winsock reset for you. WinSock XP Fix 1.2 creates a backup of your registry and then repairs any Registry entries that may have been affected by adware removal. Unlike the Microsoft solution, it doesn't remove the stack and force you to reload TCP/IP. You can find WinSock XP Fix at a number of shareware sites, including www.spychecker.com/program/winsockxpfix.html.
I did a little poking around in the Microsoft Knowledge Base and found that this was not an unusual problem and that it was caused by corruption of the Winsock. I hadn't thought about the Winsock-the Windows TCP/IP socket API and IP stack-in years, at least not since the advent of Windows XP. But it used to be a veritable Achilles' heel for Windows systems.The Knowledge Base gave command line NetShell instructions that would reset the Winsock to its default configuration, and also listed Registry entries that I could remove to force a reload of the Winsock and TCP/IP stack. The two essential articles are 811259 and 299257. But before I did that, I decided to look further to figure out how the Winsock had become corrupted.
A little more investigation pointed to adware and spyware. Evidently some ad/spyware modifies the Winsock or installs itself into the IP stack to give ads access to your system-or to give a hacker free rein. When you run the removal programs (you do, don't you?), the shims inserted by the adware are not removed, but they no longer link to anything. The stack becomes unstable, and it begins reporting errors and behaving erratically.
I also came across a freeware application that does a partial Winsock reset for you. WinSock XP Fix 1.2 creates a backup of your registry and then repairs any Registry entries that may have been affected by adware removal. Unlike the Microsoft solution, it doesn't remove the stack and force you to reload TCP/IP.
I decided to try it (I had a recent, full backup of my system on one of Iomega's great new REV 35GB removable hard drives, so I didn't mind living dangerously), and it worked perfectly. No more dropped wireless connections and no more "cable unplugged" error messages. You can find WinSock XP Fix at a number of shareware sites, including www.spychecker.com/program/winsockxpfix.html.
[Nov 10, 2004] Viewing and Manipulating the Registry
Regdmp
Regdmp is a Resource Kit utility that works hand-in-hand with Regini. As its name implies, it is used to dump the contents of the Registry. It works similarly to the Regedit export feature and creates output that is compatible with Regini scripts. Regdmp uses the same subtree names as Regini to specify which Registry path you want to dump. Using Regdmp, you can create Regini input scripts based on actual Registry values. You can then modify the contents of Regdmp output to make any modifications you need to the Registry. Figure 10 shows an example of using Regdmp to export the contents of the HKEY_CURRENT_USER\Control Panel\Desktop key.The command to generate this output and redirect it to a file is as follows:
regdmp "HKEY_CURRENT_USER\Control Panel\Desktop" >desktop.ini
Karen's Power Tools need Visual Basic Runtime v6.0
Jun 7, 2000 | 2.5 | Registry Pruner | Remove unneeded entries from Windows' Registry. |
Mar 13, 2000 | 1.2 | Registry Ripper | Extract portions of Windows' Registry, and save them to a file. |
NONAGS Command Line Tools - Freeware
RegDel 1.1 for Win9x/NT4/ME/Win2k (30 kb) From NonagsPLUS (Members) (30 kb) Updated: Jan 02, 2000 Homepage Author: Douglas Good |
|
Description: RegDel allows you to delete registry keys and/or values from within a batch file, since Windows Regedit lacks this feature. Easy to use 32 bit command line utility. |
Reg.exe
Simple usage: REG operation <Parameter List> operation [ QUERY | ADD | UPDATE | DELETE | COPY | SAVE | BACKUP | RESTORE | LOAD | UNLOAD ]For example: Reg add hkcu\software\testkey\testvalue=1 reg_dword \\testsr
Reg can access the whole of the registry and uses the codes HKCU, HKLM, HKCR, HKU and HKCC to refer to the various hives in the registry. Reg is not case-sensitive.
The Reg operations can be used with remote machines by adding the UNC name of the server to the end of the command line (see reg add /? for more help).
Reg can be found on the Resource Kit supplements. It provides much of the functionality of the previous utilities in a series of commands that are much like the Net command. One of the advantages of using Reg is that the syntax remains the same throughout the tool. It will also back up and restore the registry and provide the options to load and unload parts of the registry on the fly. However, Reg can't search the registry as Regfind can, and it has had its problems and revisions. For example, there was a problem with it not recognizing UNC machine names over 13 characters long, as it counted the two \\s as part of the name. It is advisable to download the latest version from supplements at ftp://ftp.microsoft.com/bussys/winnt/winnt-public/reskit/nt40/i386 as reg_x86.exe.
Download Free Windows 2000 Resource Kit Tools
REG: This tool enables you to add, change, delete, search, backup, restore, and perform other operations on registry entries from the command prompt or a batch file. It can be used on both local and remote computers. Note: This version of REG is in fact version 1.10 from the NT4 Resource Kit. It works with Windows 2000 but is not the version 2 that comes with the 2000 Reskit and is very much updated and with differing syntax to version 1.10, nor is it the version 3 that comes bundled with Windows XP (Thanks Pete!)
REGBack: Registry Backup - Registry Backup (RegBack) is a tool for backing up the Windows Registry to files without use of a tape drive. RegBack allows you to back up Registry hives while the system is running and has the hive files open.
REGFind: RegFind is a command-line tool with which you can search the Windows 2000 registry for arbitrary data, key names, or value names and optionally replace any of these with new values.
322756 - How to back up, edit, and restore the registry in Windows XP and Windows Server 2003 For a Microsoft Windows NT 4.0 version of this article, see 323170.
Important This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:
Dealing with Unwanted Spyware and Parasites Various Registry Fixes
To use: download - right-click and select: Edit to view in Notepad.
Right-click and select: Merge - to enter the info into the Registry, and reboot.Note: always backup the Registry before making any changes. Also be aware these reg files are intended for stand-alone or home users. Corporate users are urged to check with their network supervisor before removing restrictions.
Continued: Free Windows Registry Tools Bulletin, 2003
Google matched content |
Society
Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers : Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism : The Iron Law of Oligarchy : Libertarian Philosophy
Quotes
War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda : SE quotes : Language Design and Programming Quotes : Random IT-related quotes : Somerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose Bierce : Bernard Shaw : Mark Twain Quotes
Bulletin:
Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 : Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law
History:
Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds : Larry Wall : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOS : Programming Languages History : PL/1 : Simula 67 : C : History of GCC development : Scripting Languages : Perl history : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history
Classic books:
The Peter Principle : Parkinson Law : 1984 : The Mythical Man-Month : How to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite
Most popular humor pages:
Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor
The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D
Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.
FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.
This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...
|
You can use PayPal to to buy a cup of coffee for authors of this site |
Disclaimer:
The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.
Last modified: March 12, 2019