windows registry (2)
TRANSCRIPT
-
8/3/2019 Windows Registry (2)
1/62
Windows RegistryReport On Seminar Topic: Windows Registry
Name : Mit B. Suthar
College : L.D. College of Engineering
Branch : Computer EngineeringDivision : A
Batch : B2
Enrollment No : 090280107041
Roll No : 507140
/09/2011
-
8/3/2019 Windows Registry (2)
2/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Certificate
This is to certify that Mit B. Suthar studying in L.D. College of
Engineering in Branch Computer Engineering Division A
having Roll No 507140 and Enrollment No 090280107041 has
successfully completed report and presentation on Seminar topic :
Windows Registry
Date of Submission :
Signature :
Mit B. Suthar Roll No. 507140Page No. 2
-
8/3/2019 Windows Registry (2)
3/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Index
No. Description Page No
1An Overview to Windows Registry
3
2What is the Registry?
5
3Using the Registry Editor (regedit.exe)
6
4Isn't it dangerous to do anything with the Registry?
15
5 Editing Registry 18
6 Registry Damage 29
7 Example of REG File 32
8 Full list of data types 33
9 Descriptions of folder names used in Registry Editor 35
10 Some Registry tricks to Optimize your Windows 36
11 Conclusion 60
12References
60
Mit B. Suthar Roll No. 507140Page No. 3
-
8/3/2019 Windows Registry (2)
4/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
AnOverview to Windows Registry
My seminar topic is windows registry. The registry is the heart and soul of
Microsoft Windows Operating System. The registry contains the configuration data that
makes the operating system work. The registry enables developers to organize
configuration data in ways that are impossible with other mechanisms, such as INI files.
More importantly, it enables you to customize Windows Operating System (Windows
XP) in ways you can't through the user interface. Every application that runs on
Microsoft's latest desktop operating system does absolutely nothing without consulting
the registry first.
Through this seminar, we will learn how to customize the registry, how to take
care of the registry and how to back up the registry so you can restore it if things go awry.
The registry is an invaluable tool for the IT professional deploying, managing, and
supporting Windows Operating System. Whether you are a desktop engineer, deployment
engineer, or a support technician, you'll learn techniques that will make your job easier. The
registry is the heart and soul of Microsoft Windows Operating System.
The registry contains the configuration data that makes the operating system work. The
registry is everything-it is the brain of the operating system. The registry enables
developers to organize configuration data in ways that are impossible with other
mechanisms, such as INI files. More importantly, it enables you to customize
Windows Operating System in ways you can't through the user interface. Windows
Operating System and every application that runs on Microsoft's latest desktop operating
system do absolutely nothing without consulting the registry first. When you
doubleclick a file, Windows consults the registry to figure out what to do with it. When
you install a device, Windows assigns resources to the device based on information in the
registry and then stores the device's configuration in the registry. When you run an
application such as Microsoft Word, the application looks up your preferences in the
registry. If you were to monitor the registry during a normal session, you'd see the
registry serves up thousands of values within minutes.
Mit B. Suthar Roll No. 507140Page No. 4
-
8/3/2019 Windows Registry (2)
5/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
What does the average user need to know about the Registry?
The majority of home PC users probably have either never heard of the Registry or think of it
as something to avoid. It is true that editing or making direct changes to the Registry is not
typically an activity of most users but it is important to at least know how to back up the
Registry and how to restore a damaged or corrupted Registry. A little learning here can save
big headaches with computer problems. The backup and restore process is neither difficult
nor lengthy and is easily mastered by the greenest of neophytes. Also, just a little knowledge
will make the Registry seem less like some cabalistic ritual of Druid priests and will remove
some of the fear and loathing from the subject. The Registry is so essential to the functioning
of a Windows PC that anyone who uses a PC regularly should at least have a general idea of
what the Registry does.
Mit B. Suthar Roll No. 507140Page No. 5
-
8/3/2019 Windows Registry (2)
6/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
What is the Registry?
The Windows Registry is a central database containing all the varied assortment of
information needed for the computer to run both the hardware and the software. The Registry
is in constant use and almost anything that you do on a Windows PC will access the Registry
for information. The information is divided among a number of hidden system binary files.
Very few PC users will ever need to access these files directly. If desired, viewing the
contents of the Registry is done with the Registry Editor accessory, which combines the
various components and displays them in a readable unified text form. Using the Registry
Editor (regedit) is described below.
The registry has a subtle but important role in Microsoft Windows Operating
System. On one hand, the registry is passiveit's just a big collection of settings sitting
on your hard disk. On the other hand, it plays a key role in all those activities. The
settings in the registry determine how Windows appears and how it behaves. They even
control applications running on your computer. This gives the registry great potential as a
tool for power users or IT professionals, enabling them to customize settings that aren't
available in the user interface. Windows stores configuration data in the registry. The
registry is a hierarchical database, which you can describe as a central repository for
configuration or a configuration database. A hierarchical database has characteristics that
make it ideally suited to storing configuration data. This allows settings to be referenced
using paths, similar to file paths in Windows Operating System. The registry's
hierarchical organization makes all settings easy to reference.
Mit B. Suthar Roll No. 507140Page No. 6
-
8/3/2019 Windows Registry (2)
7/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Using the Registry Editor (regedit.exe)
I don't expect the average home PC owner to be involved in manual Registry editing but there
is no reason why advanced PC users should shy away from editing the Registry directly,
provided that they follow the iron-clad rule of always backing up first. It is also advisable to
restrict direct Registry editing to small changes. If more extensive changes are involved, a
script or an editing interface like TweakUI or the Group Policy Editor is a preferable method
for making edits. Many useful Registry edits consist of changing one or two values and are
easily reversed.
Accessing the Registry Editor (Regedit)
The Registry Editor (also called regedit) is not listed in the Start menu or in All Programs.
The utility is a single file regedit.exe and is located in the Windows folder on XP systems. It
is accessed by using the Run line. Enter "regedit" and the utility will open. In Vista the utility
is opened by entering "regedit.exe" in the Start Search line The Runline can also be used in
Vista (but is no longer necessarily on the Start menu). As to be expected, an administrator
account is required.
Regedit is a two-pane interface with keys in the left pane (key pane) and value names with
the corresponding data in the right pane (value pane). The setup is not unlike Windows
Explorer with keys analogous to folders and values analogous to files. An example is shown
in the figure below.
Mit B. Suthar Roll No. 507140Page No. 7
-
8/3/2019 Windows Registry (2)
8/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Fig 1 - Registry Editor of Wndows XP
Mit B. Suthar Roll No. 507140Page No. 8
-
8/3/2019 Windows Registry (2)
9/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Mit B. Suthar Roll No. 507140Page No. 9
-
8/3/2019 Windows Registry (2)
10/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Also listed in the right or value pane is the type of data contained in a value. There are a
number of formats that data can take and the usual ones that most PC users will encounter are
given in Table I. I have omitted the more esoteric types. The three listed in the table
constitute the vast majority of all Registry entries
Table I Common registry Data Types
Data type Description
REG_BINARY Binary data . Usually in hexadecimal notation. An example is 0xA8
REG_DWORDDouble word (32 bits). Can be edited in either hexadecimal ordecimal
REG_SZ A string. Figure 1 shows examples in the right pane.
Mit B. Suthar Roll No. 507140Page No. 10
-
8/3/2019 Windows Registry (2)
11/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Menus in Registry Editor
Regedit has some of the same menus that are so familiar throughout Windows. These can be
seen near the top of Figure 1. Shown below are what two commonly used menus look like.
Figure 2 File Menu
The File menu has the functions "Import" and "Export" that involve backup and restore.
Figure 3 Edit Menu
Mit B. Suthar Roll No. 507140Page No. 11
-
8/3/2019 Windows Registry (2)
12/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
As you would expect, the "Edit" menu is where commands are located for making changes to
the Registry. Keys and values can be deleted, added, or renamed. (Permission settings on
keys can also be edited but that is an advanced subject beyond our scope.) Another two very
useful functions are "Find..." and "Find Next". The Registry has thousands of keys and these
search functions are very necessary. Unfortunately, the search function cannot find binary
values or REG_DWORD entries. It searches key names, value names, and string data.
The bottom of he window for Regedit shows the path of the currently highlighted key as can
be seen in Figure 1. The Edit menu also contains a useful entry "Copy Key Name" that sends
the path of the key to the clipboard, Since path names can be quite long, this can be very
useful.
Figure 4 Favourite Menu
Another menu that can be quite useful is "Favorites". If you find that there are is a certain key
that you modify often, this key can be added to the "Favorites' list for easy access. The
example of a "Favorites" menu shown on the right contains three favorites. Note the names
have been chosen by this user and can be anything that is a convenient reminder. They
actually refer to specific Registry keys, which can have very long path names.
Mit B. Suthar Roll No. 507140Page No. 12
-
8/3/2019 Windows Registry (2)
13/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Editing Registry Keys and Values
There are many useful adjustments to the Windows configuration or behavior that can be
made by simple editing of the Registry. Unless you are a trained IT professional, you should
probably limit Registry editing to one or two values at a time. I will limit this discussion to
this type of straightforward scenario.
The first step in editing is always to back up the Registry. Also, back up the key you are
working on. If you are a very careful worker, backing up just the key where editing is to be
done may suffice but make a system restore point first anyway. To back up a key,
open Regeditand highlight the key. Open the "file" menu and click "Export". For most cases.
you will choose to export as a registration or REG file. This is a text file with
extension .regthat is a copy of the highlighted Registry key. Save it to someplace safe. To
restore a key with a REG file, right-click it and choose "Merge". On many machines the
default leftdouble-click on a REG file will also create a merge. I prefer to change the double-
click action to "Edit" so that accidental mergers do not happen. Notice that I use the word
"merge". Reg files do not replace keys but add to them, something to keep in mind. Anything
extra that you may have added is not deleted. Some experienced PC users prefer to do any
actual editing in the exported REG file and then to merge the edited file. This prevents
accidentally doing something to the wrong key.Keep in mind that Regedit has no "undo"
function. What's done is done.
If you are editing an entire key, you are very likely deleting it. (Careful! Back it up.) If you
are making a number of changes, I suggest using a REG file and not editing in the Registry
itself. I repeat, even power users should probably stick with editing one or two values. To
delete a highlighted key, choose "Delete" from the "Edit" menu. Note that there is no recycle
bin for deleted Registry keys or values. Deleted means gone to the great bit-bucket in the sky.
Mit B. Suthar Roll No. 507140Page No. 13
-
8/3/2019 Windows Registry (2)
14/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Figure 5 Edit Registry Entry (String)
For the most part, direct Registry editing means changing a value. Highlight the value in
question in the right-pane of Regedit. Then choose "Modify" from the "Edit" menu or right-
click the value and choose "Modify" from the context menu. For strings, a box like the one
shown on the right will open .As a specific example, consider the last value in the right-pane
of Figure 1. The time that the system waits for a service to close at Shutdown is controlled by
the entry for the value, WaitToKillServiceTimeout. The value is in milliseconds and the
default is 20000 ( 20 seconds). To make things close up more quickly, you could change the
value to 10000 (10 seconds). Or you might need to make it longer for certain systems. Enter
the desired string in the line "Value data" and click OK.
Mit B. Suthar Roll No. 507140Page No. 14
-
8/3/2019 Windows Registry (2)
15/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Figure 6 Edit Registry Entry (DWORD)
A great many Registry values are strings but another type of data that is common is the
"dword". A slightly different box will appear if you are editing a REG_DWORD value. The
figure on the left shows the appropriate box. Note that when entering a DWORD value, you
need to specify the base for the number. Be careful to be sure that you have chosen correctly
between hexadecimal and decimal. You can enter either but the number that you enter must
correspond to the correct value for the chosen base. In the example here the decimal number
"96" would have to be "60" if hexadecimal were picked for the base.
Mit B. Suthar Roll No. 507140Page No. 15
-
8/3/2019 Windows Registry (2)
16/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Isn't it dangerous to do anything with the Registry?
Because it is involved in everything, damage to the Registry can stop a PC from functioning.
For that reason Microsoft has gone out of its way to make the Registry mysterious and
fearsome sounding. It is reasonable that Microsoft does not want to have to deal with service
calls from ignorant people who have tried to edit the Registry but I think the constant
warnings about the Registry that you see everywhere on the Internet are overdone. They are a
form of CYA arising in part from our overly litigious society. Yes, you can create a lot of
problems if you mess up the Registry but you can also cause problems if you go around
deleting things from the Windows or Program folders. You can do stupid things with almost
anything. And yes, mistakes do occur. I once misplaced a comma while editing a Windows
95 Registry and found that my computer wouldn't boot. But I had a backup and it took only a
minute or two to fix the problem. Actually, the Windows XP Registry is much more robust
and it's much harder to make it unbootable. If you follow the iron-clad rule to make a backup
first and know how to restore it, informed editing of the Registry is not such a precariousundertaking as it is made out to be.
Although directly editing the Registry is notrecommended for less advanced PC users, there
is no reason for most PC users to forego the nice system tweaks that can be provided by the
many useful scripts that are available. The only caveatis that the user of any script should
back up the Registry first and should know how to undo the action of any script byrestoring
the backup. As already mentioned, this is an easy enough process for anybody. Actually,
some scripts even have an undo function in case you don't like the results of employing the
script.
Mit B. Suthar Roll No. 507140Page No. 16
-
8/3/2019 Windows Registry (2)
17/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Registry Backup
If there is one thing about the Registry that everyone should know, it is how to back it up,
Every time you make a system change- installing software, attaching new hardware, or
whatever- a backup should be made of the Registry. Fortunately, this is not difficult.
System Restore
Backing up is often done for you by System Restore. Depending on how often you turn your
computer off, the default setting is for System Restore to backup certain system components
approximately every 24 hours. However, you can also manually create a restore point
whenever you wish and it's a good idea to do so whenever you make a system change. Put the
script file on the desktop and making a restore point is just a double-click away. One
drawback to System Restore is that it doesn't provide a convenient way to back up just the
Registry or parts of the Registry.
Registration (REG) files
I have previously mentioned REG files in discussing the use of the Registry Editor. Although
the entire Registry could be be backed up as a REG file, this is not practical. However, REG
files provide a convenient method for backing up individual subkeys. REG files have the
advantage that they are easily copied to backup media. Remember that REG files are in text
form and create merges when they are imported back into the Registry proper.
Mit B. Suthar Roll No. 507140Page No. 17
http://www.registryonwindows.com/regedit.htmlhttp://www.registryonwindows.com/regedit.htmlhttp://www.registryonwindows.com/regedit.htmlhttp://www.registryonwindows.com/regedit.html -
8/3/2019 Windows Registry (2)
18/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Hive files
Here we have to deal with a bit of Microsoft jargon. A key with all its subkeys and values in
binary form is often called a "hive" in Microsoft literature. Why the term? "Because one of
the original developers of Windows NT hated bees. So the developer who was responsible for
the registry snuck in as many bee references as he could." So says Raymond Chen (who
should know).
When using the export function of Regedit, one of the options is to save an exported key as a
hive file. Being binary, a hive file can't be read like the text-containing REG files but it has
an advantage for backup. When imported, it restores a key exactly as it was and does not
simply merge as do REG files. Hive files also are more appropriate for backing up a large key
with many subkeys. For example, I use a hive file to back up the entire
HKEY_CURRENT_USER and store it on another disk.
Backup software
Of course, software that backs up the entire disk such as Microsoft Backup or imaging
programs back up the Registry along with everything else, There are also some programs that
are designed to make Registry backups. One commonly used free utility
is ERUNT (Emergency Recovery Utility NT). Among paid commercial programs,
Macecraft's JV16 Power Tools gets high marks.
Mit B. Suthar Roll No. 507140Page No. 18
http://blogs.msdn.com/oldnewthing/archive/2003/08/08/54618.aspxhttp://blogs.msdn.com/oldnewthing/archive/2003/08/08/54618.aspx -
8/3/2019 Windows Registry (2)
19/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Registry Cleaners
There are many programs that claim to do wonderful things by "cleaning" the Registry. That
is, they prune out dead or corrupted entries. Some are better than others. Some are even
dangerous. Back in the days of Windows 95, I was an advocate of regular housekeeping for
the Registry. However, the Registry in Windows XP is far more robust and much less prone
to corruption. Those who install and uninstall a lot of software and/or those who tweak the
Registry a lot may find it worthwhile to do regular Registry maintenance, For ordinary PC
users I feel that the Registry needs this type of maintenance only infrequently. The programmentioned above, JV16 Power Tools, is a good choice for this task. Another possibility
isCCleaner. However., ordinary PC users should probably just avoid cleaning the Registry.
It's too easy for the wrong thing to be removed from the Registry
Mit B. Suthar Roll No. 507140Page No. 19
http://www.macecraft.com/http://www.ccleaner.com/http://www.ccleaner.com/http://www.ccleaner.com/http://www.ccleaner.com/http://www.macecraft.com/http://www.ccleaner.com/ -
8/3/2019 Windows Registry (2)
20/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Editing Registry
Manual Editing
Figure 7 - Registry Editor of Windows 7
The Windows registry can be edited manually using programs such as regedit.exe and on
older versions of Windows, regedt32.exe, although these tools do not expose some of
registry's metadata such as the last modified date. They also implement workarounds in code
that allow Registry keys to be renamed, as the underlying APIs do not support this capability.
Mit B. Suthar Roll No. 507140Page No. 20
http://en.wikipedia.org/wiki/File:Registry_Editor_Vista.png -
8/3/2019 Windows Registry (2)
21/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Figure 8 Registry Editor of Windows 3.11
As a careless change could cause irreversible damage, a backup of the registry before editing
is recommended by Microsoft.
A simple implementation of the current registry tool appeared in Windows 3.x, called the
"Registration Info Editor" or "Registration Editor". This was basically just a database of
applications used to edit embedded OLE objects in documents.
Windows 9x operating systems included REGEDIT.EXE which could be used in Windows
and also in real mode MS-DOS. Windows NT introduced permissions for Registry editing.
Windows NT 4.0 and Windows 2000 were distributed with both the Windows 9x
REGEDIT.EXE program and Windows NT 3.x's REGEDT32.EXE program. There were
several differences between the two editors on these platforms:
Mit B. Suthar Roll No. 507140Page No. 21
-
8/3/2019 Windows Registry (2)
22/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
REGEDIT.EXE had a left-side tree view that begins at "My Computer" and lists all
loaded hives. REGEDT32.EXE had a left-side tree view, but each hive had its own
window, so the tree displays only keys.
REGEDIT.EXE represented the three components of a value (its name, type, and data) as
separate columns of a table. REGEDT32.EXE represented them as a list of strings.
REGEDIT.EXE supported right-clicking of entries in a tree view to adjust properties and
other settings. REGEDT32.EXE required all actions to be performed from the top menu
bar.
REGEDIT.EXE supported searching for key names, values, or data throughout the entire
registry, whereas REGEDT32.EXE only supported searching for key names in one hive
at a time.
Earlier versions of REGEDIT.EXE did not support editing permissions. Therefore, on
those early versions, only REGEDT32.EXE could access the full functionality of an NT
registry. REGEDIT.EXE in Windows XP, VISTA, and Windows 7, supported editing
permissions.
REGEDIT.EXE only supported string (REG_SZ), binary (REG_BINARY), and
DWORD (REG_DWORD) values. REGEDT32.EXE supported those, plus expandable
string (REG_EXPAND_SZ) and multi-string (REG_MULTI_SZ). Attempting to edit
unsupported key types with REGEDIT.EXE on Windows 2000 or Windows NT 4.0
would result in irreversible conversion to a supported type.
Windows XP was the first system to integrate these two programs into one, adopting the old
REGEDIT.EXE interface and adding the REGEDT32.EXE functionality. The differences
listed above are not applicable on Windows XP and newer systems; REGEDIT.EXE is the
improved editor, and REGEDT32.EXE is deprecated.
Mit B. Suthar Roll No. 507140Page No. 22
-
8/3/2019 Windows Registry (2)
23/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
The Registry Editor allows users to perform the following functions:
Creating, manipulating, renaming and deleting registry keys, subkeys, values and
value data
Importing and exporting .REG files, exporting data in the binary hive format
Loading, manipulating and unloading registry hive format files (Windows NT-based
systems only)
Setting permissions based on ACLs (Windows NT-based systems only)
Bookmarking user-selected registry keys as Favorites
Finding particular strings in key names, value names and value data
Remotely editing the registry on another networked computer
Mit B. Suthar Roll No. 507140Page No. 23
http://en.wikipedia.org/wiki/Access_control_listhttp://en.wikipedia.org/wiki/Access_control_list -
8/3/2019 Windows Registry (2)
24/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
(2) Reg Files
This step-by-step article describes how to add, modify, or delete registry subkeys and
values by using a Registration Entries (.reg) file. Regedit.exe uses .reg files to
import and export registry subkeys and values. You can use these .reg files to
remotely distribute registry changes to several Windows-based computers. When
you run a .reg file, the file contents merge into the local registry. Therefore, you
must distribute .reg files with caution.
Syntax of .Reg Files
A .reg file has the following syntax:
RegistryEditorVersion
Blank
[RegistryPath1]
"DataItemName1"="DataType1:DataValue1"
DataItemName2"="DataType2:DataValue2"
Blank
[RegistryPath2]
"DataItemName3"="DataType3:DataValue3"
where:
RegistryEditorVersion is either "Windows Registry Editor Version 5.00" for
Windows 2000, Windows XP, and Windows Server 2003, or "REGEDIT4" for
Windows 98 and Windows NT 4.0.
The "REGEDIT4" header also works on Windows 2000-based, Windows XP-based,
and Windows Server 2003-based computers.
Blank line is a blank line. This identifies the start of a new registry path. Each key
Mit B. Suthar Roll No. 507140Page No. 24
-
8/3/2019 Windows Registry (2)
25/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
or subkey is a new registry path. If you have several keys in your .reg file, blank
lines can help you to examine and to troubleshoot the contents.
RegistryPathxis the path of the subkey that holds the first value you are
importing. Enclose the path in square brackets, and separate each level of the
hierarchy by a backslash. Forexample:[HKEY_LOCAL_ MACHINE\SOFTWARE\Policies\Microsoft\Windows\System]
A .reg file can contain several registry paths. If the bottom of the hierarchy in the path
statement does not exist in the registry, a new subkey is created. The contents of the registryfiles are sent to the registry in the order you enter them. Therefore, if you want to create a
new subkey with another subkey below it, you must enter the lines in the correct order.
DataItemNamex is the name of the data item that you want to import. If a data item in your
file does not exist in the registry, the .reg file adds it (with the value of the data item). If a
data item does exist, the value in your .reg file overwrites the existing value. Quotation marks
enclose the name of the data item. An equal sign immediately follows the name of the data
item.
DataTypex is the data type for the registry value and immediately follows the equal sign. For
all the data types other than REG_SZ (a string value), a colon immediately follows the data
type. If the data type is REG_SZ , do not include the data type value or colon. In this case,
Regedit.exe assumes REG_SZ for the data type. The following table lists the typical registry
data types.
Mit B. Suthar Roll No. 507140Page No. 25
-
8/3/2019 Windows Registry (2)
26/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Table 2 Data types for Reg filess
Data Type DataType in .reg
REG_BINARY hexadecimal
REG_DWORD dword
REG_EXPAND_SZ hexadecimal(2)
REG_MULTI_SZ hexadecimal(7)
DataValueximmediately follows the colon (or the equal sign with REG_SZ) and must be
in the appropriate format (for example, string or hexadecimal). Use hexadecimal
format for binary data items.
Note: You can enter several data item lines for the same registry path.
Note: the registry file should contain a blank line at the bottom of the file.
Adding Registry Subkeys or Adding and Changing Registry Values
To add a registry subkey or add or change a registry value, make the appropriate changes in
the registry, and then export the appropriate subkey or subkeys. Exported registry subkeys are
automatically saved as .reg files. To make changes to the registry and export your changes to
a .reg file, follow these steps:
Mit B. Suthar Roll No. 507140Page No. 26
-
8/3/2019 Windows Registry (2)
27/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
1. ClickStart, clickRun, type regedit in the Open box, and then clickOK.
2. Locate and then click the subkey that holds the registry item or items that you want to
change.
3. ClickFile, and then clickExport.
This step backs up the subkey before you make any changes. You can import this file
back into the registry later if your changes cause a problem.
4. In the File name box, type a file name to use to save the .reg file with the original
registry items, and then clickSave.
Note Use a file name that reminds you of the contents, such as a reference to the name
of the subkey.
5. In the right pane, add or modify the registry items you want.
6. Repeat steps 3 and 4 to export the subkey again, but use a different file name for the
.reg file. You can use this .reg file to make your registry changes on anothercomputer.
7. Test your changes on the local computer. If they cause a problem, double-click the
file that holds the backup of the original registry data to return the registry to its
original state. If the changes work as expected, you can distribute the .reg you created
in step 6 to other computers by using the methods in the "Distributing Registry
Changes" section of this article.
Mit B. Suthar Roll No. 507140Page No. 27
-
8/3/2019 Windows Registry (2)
28/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Deleting Registry Keys and Values
To delete a registry key with a .reg file, put a hyphen (-) in front of the RegistryPath in the.reg file. For example, to delete the Test subkey from the following registry key:
HKEY_LOCAL_MACHINE\Software
put a hyphen in front of the following registry key in the .reg file:
HKEY_LOCAL_MACHINE\Software\Test
The following example has a .reg file that can perform this task.
[-HKEY_LOCAL_MACHINE\Software\Test]
To delete a registry value with a .reg file, put a hyphen (-) after the equals sign following
theDataItemName in the .reg file. For example, to delete the TestValue registry value from
the following registry key:
HKEY_LOCAL_MACHINE\Software\Test
put a hyphen after the "TestValue"= in the .reg file. The following example has a .reg file that
can perform this task.
HKEY_LOCAL_MACHINE\Software\Test
"TestValue"=-
To create the .reg file, use Regedit.exe to export the registry key that you want to delete, and
then use Notepad to edit the .reg file and insert the hyphen.
Distributing Registry Changes
You can send a .reg file to users in an e-mail message, put a .reg file on a network share and
direct users to the network share to run it, or you can add a command to the users' logon
scripts to automatically import the .reg file when they log on. When users run the .reg file,
they receive the following messages:
Registry Editor
Are you sure you want to add the information in path of .reg file to the registry?
Mit B. Suthar Roll No. 507140Page No. 28
-
8/3/2019 Windows Registry (2)
29/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
If the user clicks Yes, the user receives the following message:
Registry Editor
Information in path of .reg file has been successfully entered into the registry.
Regedit.exe supports a /s command-line switch to not display these messages. For example,
to silently run the .reg file (with the /s switch) from a login script batch file, use the following
syntax:
regedit.exe /spath of .reg file
You can also use Group Policy or System Policy to distribute registry changes across your
network.
Mit B. Suthar Roll No. 507140Page No. 29
-
8/3/2019 Windows Registry (2)
30/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Registry damage
Some registry cleaners make no distinction as to the severity of the errors, and many that do
may erroneously categorize errors as "critical" with little basis to support it.[2] Removing or
changing certain registry data can prevent the system from starting, or cause application
errors and crashes.
It is not always possible for a third party program to know whether any particular key is
invalid or redundant. Obviously, a poorly-designed registry cleaner may not be equipped to
know for sure whether a key is still being used by Windows or what detrimental effects
removing it may have. This may lead to loss of functionality and/or system instability, [3][4]
[5] as well as application compatibility updatesfrom Microsoft to block problematic registry
cleaners.[6] The Windows Installer CleanUp Utility was a Microsoft-supported utility for
addressing Windows Installerrelated issues,[7] however the program has subsequently been
deprecated because of unintended damage that it caused
Of course, many of these caveats apply to any type of software, especially freeware or
shareware, downloaded and installed from obscure or unknown sources; the dangers are by
no means peculiar to registry cleaners. In particular, if an unknown author boasts that the
software has been written in some variant of the C language "for greater efficiency", this
should be interpreted as a danger signal.
The level of skill necessary to use a registry cleaner to actually improve the performance of a
machine is higher than the level of skill necessary to configure an easyincremental
backup solution. With such a solution, the OS can be restored if any recent changes proved to
be bad ones. This is safer than most registry cleaners. While it is true that some registry
cleaners are safe, these cleaners do not improve performance. The rest are a mix of powerful
and dangerous tools unsuited to non-professionals, snake-oil, and actual malware.
Mit B. Suthar Roll No. 507140Page No. 30
http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-Symantec-1http://en.wikipedia.org/wiki/Third-party_developerhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-2http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-3http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-4http://en.wikipedia.org/wiki/Shim_(computing)http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-5http://en.wikipedia.org/wiki/Windows_Installerhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-6http://en.wikipedia.org/wiki/Incremental_backuphttp://en.wikipedia.org/wiki/Incremental_backuphttp://en.wikipedia.org/wiki/Incremental_backuphttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-Symantec-1http://en.wikipedia.org/wiki/Third-party_developerhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-2http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-3http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-4http://en.wikipedia.org/wiki/Shim_(computing)http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-5http://en.wikipedia.org/wiki/Windows_Installerhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-6http://en.wikipedia.org/wiki/Incremental_backuphttp://en.wikipedia.org/wiki/Incremental_backup -
8/3/2019 Windows Registry (2)
31/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Malware payloads
Registry cleaners have been used as a vehicle by a number oftrojan applications to
installmalware, typically through social engineering attacks that use websitepopups or free
downloads that falsely report problems that can be "rectified" by purchasing or downloading
a registry cleaner.[9]The worst of the breed are products that advertise and encourage a "free"
registry scan; however, the user typically finds the product has to be purchased for a
substantial sum, before it will effect any of the anticipated "repairs." Rogue registry cleaners
"WinFixer" have been ranked as one of the most prevalent pieces of malware currently in
circulation.
Scanners as scareware
Rogue registry cleaners are often marketed with alarmist advertisements that falsely claim to
have pre-analyzed your PC, displaying bogus warnings to take "corrective" action, hence the
reason that they are sometimes called "scareware". In October 2008,Microsoft and
the Washingtonattorney general filed a lawsuit against two Texas firms, Branch Software
and Alpha Red, producers of the "Registry Cleaner XP" scareware. [11] The lawsuit alleges that
the company sent incessant pop-ups resembling system warnings to consumers' personal
computers stating "CRITICAL ERROR MESSAGE! - REGISTRY DAMAGED AND
CORRUPTED", before instructing users to visit a web site to download Registry Cleaner XP
at a cost of $39.95.
Metrics of performance benefit
On Windows 9xcomputers, it was possible that a very large registry could slow down the
computer's startup time. However this is far less of an issue withNT-based operating systems
(includingWindows XP and Vista) due to a different on-disk structure of the registry,
improved memory management and indexing.[12] Slowdown due to registry bloat is thus far
less of an issue in modern versions of Windows. Defragmenting the registry files (e.g. using a
Microsoft-supported tool such asPageDefrag),[13] has likewise been de-emphasized due to
this increased efficiency, and is largely an automated process under Vista. Other Windows
Performance Tools are specifically designed to troubleshoot performance-related issues under
Windows.
Mit B. Suthar Roll No. 507140Page No. 31
http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Pop-up_adhttp://en.wikipedia.org/wiki/Pop-up_adhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-8http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-8http://en.wikipedia.org/wiki/WinFixerhttp://en.wikipedia.org/wiki/Scarewarehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Washington_(U.S._state)http://en.wikipedia.org/wiki/Attorney_generalhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-10http://en.wikipedia.org/wiki/Windows_9xhttp://en.wikipedia.org/wiki/Windows_9xhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/Windows_Vistahttp://en.wikipedia.org/wiki/Index_(database)http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-11http://en.wikipedia.org/wiki/PageDefraghttp://en.wikipedia.org/wiki/PageDefraghttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-12http://en.wikipedia.org/wiki/Trojan_horse_(computing)http://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Social_engineering_(security)http://en.wikipedia.org/wiki/Pop-up_adhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-8http://en.wikipedia.org/wiki/WinFixerhttp://en.wikipedia.org/wiki/Scarewarehttp://en.wikipedia.org/wiki/Microsofthttp://en.wikipedia.org/wiki/Washington_(U.S._state)http://en.wikipedia.org/wiki/Attorney_generalhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-10http://en.wikipedia.org/wiki/Windows_9xhttp://en.wikipedia.org/wiki/Windows_NThttp://en.wikipedia.org/wiki/Windows_XPhttp://en.wikipedia.org/wiki/Windows_Vistahttp://en.wikipedia.org/wiki/Index_(database)http://en.wikipedia.org/wiki/Registry_cleaner#cite_note-11http://en.wikipedia.org/wiki/PageDefraghttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-12 -
8/3/2019 Windows Registry (2)
32/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Undeletable registry keys
Registry cleaners cannot repair scenarios such as undeletable registry keys caused by
embedded null characters in their names; only specialized tools such as the RegDelNull
utility (part of theSysinternals software) are able to do this.[15]
Recovery capability limitations
A Registry cleaner cannot repair a Registry hive that can't be mounted by the system, making
the repair via "slave mounting" of a system disk impossible.
A corrupt registry can be recovered in a number of ways that are supported by Microsoft
(e.g.Automated System Recovery, from a "Last Known Good" boot menu, by re-runningsetup or by usingSystem Restore). "Last Known Good" restores the last System Registry hive
(containing driver and service configuration) that successfully booted the system.
Malware removal
These tools are also difficult to manage in a non-boot situation, or during an infestation,
compared to a full system restore from a backup. In the age of rapidly evolving malware,
even a full system restore may be unable to rid a hard drive of a bootkit.
Registry cleaners are likewise not designed for malware removal, although minor side-effects
can be repaired, such as a turned-offSystem Restore. However, in complex scenarios where
malware such as spyware, adwareand viruses are involved, the removal of system-critical
files may result.
Application virtualization
A registry cleaner is of no use for cleaning registry entries associated with a virtualised
applicationsince all registry entries in this scenario are written to an application-specific
virtual Registry instead of the real one. [17] Complications of detailed interactions of real-mode
with virtual, also leaves the potential for incorrect removal of shortcuts and registry entries
that point to "disappeared" files, and consequent confusion by the user of cleaner products.
There is little competent information about this specific interaction, and no integration. In
general, even if registry cleaners could be arguably considered safe in a normal end-user
environment, they should be avoided in an application virtualization environment
Mit B. Suthar Roll No. 507140Page No. 32
http://en.wikipedia.org/wiki/Winternalshttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-14http://en.wikipedia.org/wiki/Automated_System_Recoveryhttp://en.wikipedia.org/wiki/Automated_System_Recoveryhttp://en.wikipedia.org/wiki/System_Restorehttp://en.wikipedia.org/wiki/Bootkithttp://en.wikipedia.org/wiki/System_Restorehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-16http://en.wikipedia.org/wiki/Winternalshttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-14http://en.wikipedia.org/wiki/Automated_System_Recoveryhttp://en.wikipedia.org/wiki/System_Restorehttp://en.wikipedia.org/wiki/Bootkithttp://en.wikipedia.org/wiki/System_Restorehttp://en.wikipedia.org/wiki/Spywarehttp://en.wikipedia.org/wiki/Adwarehttp://en.wikipedia.org/wiki/Computer_virushttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Application_virtualizationhttp://en.wikipedia.org/wiki/Registry_cleaner#cite_note-16 -
8/3/2019 Windows Registry (2)
33/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Example of an REG file
Windows Registry Editor Version 5.00 // for windows xp,vista, Windows 7
Or
REGEDIT4 // for windows 95 and 98
[HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSIO
N\POLICIES\SYSTEM]
"LEGALNOTICECAPTION"="PC1"
"LEGALNOTICETEXT"="You are Logging into PC 1"
---------------END OF FILE-------------------
Note : we need to specify version of registry editor in the file first
: do not include comments in original file
: add a last line as blank (as syntax of .reg file suggests
: save it as .filename.reg and run it!!!
: it will enter desired registry entries in registry.
How to delete a key using a .reg file?
Windows Registry Editor Version 5.00
[~HKEY_LOCAL_MACHINE\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSI
ON\POLICIES\SYSTEM]
"LEGALNOTICECAPTION"=~"PC1"
"LEGALNOTICETEXT"=~"You are Logging into PC 1"
Note: if you need to add or remove registry entry else where specify registry entry path again
and enter values for registry entry again.
Mit B. Suthar Roll No. 507140Page No. 33
-
8/3/2019 Windows Registry (2)
34/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Table 3 Full list of Data types
Name Data type Description
BinaryValue
REG_BINARY Raw binary data. Most hardwarecomponent information is storedas binary data and is displayed inRegistry Editor in hexadecimalformat.
DWORDValue
REG_DWORD Data represented by a number that is 4 bytes long (a 32-bitinteger). Many parameters fordevice drivers and services arethis type and are displayed inRegistry Editor in binary,hexadecimal, or decimal format.
Related values areDWORD_LITTLE_ENDIAN(least significant byte is at thelowest address) andREG_DWORD_BIG_ENDIAN(least significant byte is at thehighest address).
ExpandableStringValue
REG_EXPAND_SZ A variable-length data string.This data type includes variablesthat are resolved when a program
or service uses the data.
Multi-StringValue
REG_MULTI_SZ A multiple string. Values thatcontain lists or multiple values ina form that people can read aregenerally this type. Entries areseparated by spaces, commas, orother marks.
StringValue
REG_SZ A fixed-length text string.
BinaryValue
REG_RESOURCE_LIST A series of nested arrays that isdesigned to store a resource listthat is used by a hardware devicedriver or one of the physicaldevices it controls. This data isdetected and written in the\ResourceMap tree by the systemand is displayed in Registry Editorin hexadecimal format as a BinaryValue.
Binary
Value
REG_RESOURCE_REQUIREMENTS_LIST A series of nested arrays that is
designed to store a device driver's
Mit B. Suthar Roll No. 507140Page No. 34
-
8/3/2019 Windows Registry (2)
35/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
list of possible hardwareresources the driver or one of the
physical devices it controls canuse. The system writes a subsetof this list in the \ResourceMap
tree. This data is detected by thesystem and is displayed inRegistry Editor in hexadecimalformat as a Binary Value.
BinaryValue
REG_FULL_RESOURCE_DESCRIPTOR A series of nested arrays that isdesigned to store a resource listthat is used by a physicalhardware device. This data isdetected and written in the\HardwareDescription tree by the
system and is displayed inRegistry Editor in hexadecimalformat as a Binary Value.
None REG_NONE Data without any particular type.This data is written to the registry
by the system or applications andis displayed in Registry Editor inhexadecimal format as a BinaryValue
Link REG_LINK A Unicode string naming asymbolic link.
QWORDValue
REG_QWORD Data represented by a number that is a 64-bit integer. This datais displayed in Registry Editor asa Binary Value and wasintroduced in Windows 2000.
Mit B. Suthar Roll No. 507140Page No. 35
-
8/3/2019 Windows Registry (2)
36/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Table 4 Descriptions of folder names used in Registry
Folder/predefined key Description
HKEY_CURRENT_USER Contains the root of the configuration information for the user whois currently logged on. The user's folders, screen colors, andControl Panel settings are stored here. This information isassociated with the user's profile. This key is sometimesabbreviated as "HKCU."
HKEY_USERS Contains all the actively loaded user profiles on the computer.HKEY_CURRENT_USER is a subkey of HKEY_USERS.HKEY_USERS is sometimes abbreviated as "HKU."
HKEY_LOCAL_MACHINE Contains configuration information particular to the computer (forany user). This key is sometimes abbreviated as "HKLM."
HKEY_CLASSES_ROOT Is a subkey of HKEY_LOCAL_MACHINE\Software. Theinformation that is stored here makes sure that the correct programopens when you open a file by using Windows Explorer. This keyis sometimes abbreviated as "HKCR." Starting with Windows2000, this information is stored under both theHKEY_LOCAL_MACHINE and HKEY_CURRENT_USERkeys. The HKEY_LOCAL_MACHINE\Software\Classes keycontains default settings that can apply to all users on the localcomputer. The HKEY_CURRENT_USER\Software\Classes keycontains settings that override the default settings and apply only
to the interactive user. The HKEY_CLASSES_ROOT keyprovides a view of the registry that merges the information fromthese two sources. HKEY_CLASSES_ROOT also provides thismerged view for programs that are designed for earlier versions ofWindows. To change the settings for the interactive user, changesmust be made under HKEY_CURRENT_USER\Software\Classesinstead of under HKEY_CLASSES_ROOT. To change the defaultsettings, changes must be made underHKEY_LOCAL_MACHINE\Software\Classes. If you write keysto a key under HKEY_CLASSES_ROOT, the system stores theinformation under HKEY_LOCAL_MACHINE\Software\Classes.If you write values to a key under HKEY_CLASSES_ROOT, andthe key already exists underHKEY_CURRENT_USER\Software\Classes, the system will storethe information there instead of underHKEY_LOCAL_MACHINE\Software\Classes.
HKEY_CURRENT_CONFIG Contains information about the hardware profile that is used by thelocal computer at system startup.
Some registry tricks to optimize your Windows :
Mit B. Suthar Roll No. 507140Page No. 36
-
8/3/2019 Windows Registry (2)
37/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Add Open With to all files
You can add "Open With..." to the Right click context menu of all files.This is great for when
you have several programs you want to open the same file types with. I use three different
text editors so I added it to the ".txt" key.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\*\Shell
3. Add a new Key named "OpenWith" by right clicking the "Shell" Key and selecting new
4. Set the (Default) to "Op&en With..."
5. Add a new Key named "Command" by right clicking the "OpenWith" Key and selecting
new
6. Set the (Default) to "C:\Windows\rundll32.exe shell32.dll,OpenAs_RunDLL %1", C:\
being your Windows drive. You must enter the "OpenAs_RunDLL %1" exactly this way.
Customize the System Tray
You can add your name or anything you like that consists of 8 characters or less. This will
replace the AM or PM next to the system time. But you can corrupt some trial licenses of
software that you may have downloaded.
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control Panel\International
3. Add two new String values, "s1159" and "s2359"
4. Right click the new value name and modify. Enter anything you like up to 8 characters.
If you enter two different values when modifying, you can have the system tray display the
two different values in the AM and PM.
Lock Out Unwanted Users
Mit B. Suthar Roll No. 507140Page No. 37
-
8/3/2019 Windows Registry (2)
38/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Want to keep people from accessing Windows, even as the default user? If you do not have a
domain do not attempt this.
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Network\Logon
3. Create a dword value "MustBeValidated"
4. Set the value to 1
This forced logon can be bypassed in Safe Mode on Windows 9x
Disable the Outlook Express Splash Screen
You can make OutLook Express load quicker by disabling the splash screen:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\OutLook Express
3. Add a string value "NoSplash"
4. Set the value data to 1 as a Dword value
Multiple Columns For the Start Menu
To make Windows use multiple Start Menu Columns instead of a single scrolling column,
like Windows 9x had, Also if you are using Classic Mode in XP
1. Open RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\
Advanced
3. Create a string value "StartMenuScrollPrograms"
4. Right click the new string value and select modify
5. Set the value to "FALSE"
Changing Windows' Icons
Mit B. Suthar Roll No. 507140Page No. 38
-
8/3/2019 Windows Registry (2)
39/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
You can change the Icons Windows uses for folders, the Start Menu, opened and closed
folder in the Explorer, and many more.
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\
Shell Icons
3. Add a string value for each Icon you wish to change.
Example: "3" ="C:\Windows\Icons\MyIcon.ico,0" This will change the closed folders in the
Explorer to "MyIcon.ico". Here is a complete list for each value.
0= Unknown file type
1= MSN file types
2= Applications Generic
3= Closed Folder
4= Open Folder
5= 5.25" Drive
6= 3.25" Drive
7= Removable Drive
8= Hard Drive
9= NetWork Drive
10= Network Drive Offline
11= CD-ROM Drive
12= RAM Drive
13= Entire Network
14= Network Hub
15= My Computer
16= Printer
17= Network Neighborhood
18= Network Workgroup
19= Start Menu's Program Folders
20= Start Menu's Documents
21= Start Menu's Setting
22= Start Menu's Find
23= Start Menu's Help
24= Start Menu's Run
25= Start Menu's Suspend
26= Start Menu's PC Undock
27= Start Menu's Shutdown
28= Shared
29= Shortcut Arrow
30= (Unknown Overlay)
31= Recycle Bin Empty
32= Recycle Bin Full
33= Dial-up Network
34= DeskTop
35= Control Panel
36= Start Menu's Programs
37= Printer Folder
38= Fonts Folder
39= Taskbar Icon
40= Audio CD
You need to reboot after making changes. You may need to delete the hidden file
ShellIconCache if after rebooting the desired Icons are not displayed.
Change Default Folder Locations
Mit B. Suthar Roll No. 507140Page No. 39
-
8/3/2019 Windows Registry (2)
40/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
You can change or delete the Windows mandatory locations of folder like My Documents:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\ Software\ Microsoft\ Windows\ CurrentVersion\
Explorer\ Shell Folders
3. Change the desired folder location, My Documents is normally list as "Personal"
4. Open the Explorer and rename or create the folder you wish.
To change the desired location of the Program Files folder
1. Go to
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion
2. Change the value of "ProgramFiles", or "ProgramFilesDir"
Now when you install a new program it will default to the new location you have selected.
Change the Registered Change the User Information
You can change the Registered Owner or Registered Organization to anything you want even
after Windows is installed.
1) Open RegEdit
2) Got to
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion.
3) Change the value of "RegisteredOrganization" or "RegisteredOwner", to what ever you
want
Mit B. Suthar Roll No. 507140Page No. 40
-
8/3/2019 Windows Registry (2)
41/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Opening a DOS Window to either the Drive or Directory in Explorer
Add the following Registry Keys for a Directory:
HKEY_CLASSES_ROOT\Directory\shell\opennew
@="Dos Prompt in that
Directory"HKEY_CLASSES_ROOT\Directory\shell\opennew\command
@="command.com /k cd %1"
Add or Edit the following Registry Keys for a Drive:
HKEY_CLASSES_ROOT\Drive\shell\opennew
@="Dos Prompt in that Drive"
HKEY_CLASSES_ROOT\Drive\shell\opennew\command
@="command.com /k cd %1"
These will allow you to right click on either the drive or the directory and the option of
starting the dos prompt will pop up.
Changing Exchange/Outlook Mailbox Location
To change the location of your mailbox for Exchange:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\ Microsoft\Windows Messaging Subsystem\ Profiles
3. Go to the profile you want to change
4. Go to the value name that has the file location for your mailbox (*.PST) file
5. Make the change to file location or name
Mit B. Suthar Roll No. 507140Page No. 41
-
8/3/2019 Windows Registry (2)
42/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
To change the location of your mailbox for Outlook
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Outlook (or Outlook Express if
Outlook Express)
3. Go to the section "Store Root"
4. Make the change to file location
Add/Remove Sound Events from Control Panel
You can Add and delete sounds events in the Control Panel. In order to do that:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\AppEvents\Schemes\Apps and
HKEY_CURRENT_USER\AppEvents\Schemes\Eventlabels. If this key does not exist you
can create it and add events.
3. You can add/delete any items you want to or delete the ones you no longer want.
Adding an Application to the Right Click on Every Folder
Here is how to add any application to the Context Menu when you right click on any Folder.
This way you do not have to always go to the Start Menu. When you right click on any
folder, you can have access to that application, the same as using Sent To.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key to the "Shell" Key and name it anything you like.
4. Give it a default value that will appear when you right click a folder, i.e. NewKey (use an
"&" without the quotes, in front of any character and it will allow you to use the keyboard)
5. Click on the Key HKEY_CLASSES_ROOT\Folder\shell\NewKey
6. Add a New Key named Command
7. Set the (Default) value of the application you want to run
Mit B. Suthar Roll No. 507140Page No. 42
-
8/3/2019 Windows Registry (2)
43/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
8. For example: c:\program files\internet explorer\iexplore.exe (Include the full path and
parameters if you need them)
Adding Explore From Here to Every Folder
When you want to right click on any folder and want to open up an Explorer window of that
folder.
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Folder\shell
3. Add a new Key "RootExplore " under the "Shell" Key
4. Set the (Default) value to "E&xplore From Here "
5. Right Click the "RootExplore " Key and add a new Key "Command"to the RootExplore
6. Set the (Default) value of Explorer.exe /e,/root,/idlist,%i
Changing the Location of Windows' Installation Files
If you need to change the drive and or path where Windows looks for its installation files:
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Setup
3.Edit the value next to SourcePath
Creating a Logon Banner
If you want to create a Logon Banner: A message box to appear below your logon on.
1.Open RegEdit
2.Go To
For Windows 9x and ME -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon
Mit B. Suthar Roll No. 507140Page No. 43
-
8/3/2019 Windows Registry (2)
44/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
For Windows 2000 XP 2003 Vista -
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Winlogon
3.Create a new String value"LegalNoticeCaption "
4. Enter the Title of the window. What is displayed in the Title Bar.
5. Create a new string value "LegalNoticeText"
6. Enter the text for your message box that will appear even before the Logon window.
Creating a Default File Opener
If you have a un-registered file type and want to view it instead of having to select Open
With. Use Explorer's Right-click and add your program to the right-click options by:
1. Open RegEdit
2. Go to HKEY_CLASSES_ROOT\Unknown\Shell
3. Right click on "Shell" and create a New Key and name it "Open "
4. Create a New Key under the "Open" key you just created and name it "Command"
5. Set the (Default) value to the path and filename of the program you want to use to open the
file type
6. For example: C:\Windows\NOTEPAD.EXE %1
You must use the "%1" for this to work.and a space between the exe and the %1
Deleting Registry Keys from the Command Line
There are two ways to delete a key from the Registry from the Command line. At the
Windows Command line:
RegEdit /l location of System.dat /R location of User.dat /D Registry key to delete
You cannot be in Windows at the time you use this switch.
Mit B. Suthar Roll No. 507140Page No. 44
-
8/3/2019 Windows Registry (2)
45/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Or you can create a reg file as such:
REGEDIT4
[-HKEY_LOCAL_MACHINE\the key you want to delete]
Note the negative sign just behind the[
Then at the Command line type:
1. RegEdit C:\Windows\(name of the regfile).
Change/Add Restrictions And Features
If you want to make restrictions to what users can do or use on their computer without having
to run Poledit, you can edit the Registry. You can add and delete Windows features in this
Key shown below.
Zero is Off and the value 1 is On. Example: to Save Windows settings add or modify the
value name NoSaveSettings to 0, if set to1 Windows will not save settings. AndNoDeletePrinter set to 1 will prevent the user from deleting a printer.
The same key shows up at:
HKEY_USERS\(yourprofilename)\ Software\ Microsoft\ Windows\ CurrentVersion\
Policies\ Explorer so change it there also if you are using different profiles.
1.Open RegEdit
2.Go to
HKEY_CURRENT_USER\Software\Microsoft\ CurrentVersion\ Policies
3.Go to the Explorer Key (Additional keys that can be created under Policies are System,
Explorer, Network and WinOldApp )
4.You can then add DWORD or binary values set to 1 in the appropriate keys for ON and 0
for off.
NoDeletePrinter - Disables Deletion of Printers
Mit B. Suthar Roll No. 507140Page No. 45
-
8/3/2019 Windows Registry (2)
46/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
NoAddPrinter - Disables Addition of Printers
NoRun - Disables Run Command
NoSetFolders - Removes Folders from Settings on Start Menu
NoSetTaskbar - Removes Taskbar from Settings on Start Menu
NoFind - Removes the Find Command
NoDrives - Hides Drives in My Computers
NoNetHood - Hides the Network Neighborhood
NoDesktop - Hides all icons on the Desktop
NoClose - Disables Shutdown
NoSaveSettings - Don't save settings on exit
DisableRegistryTools - Disable Registry Editing Tools
NoRecentDocsMenu - Hides the Documents shortcut at the Start button
NoRecentDocsHistory- Clears history of Documents
NoFileMenu _ Hides the Files Menu in Explorer
NoActiveDesktop - No Active Desktop
NoActiveDesktopChanges- No changes allowed
NoInternetIcon - No Internet Explorer Icon on the Desktop
NoFavoritesMenu - Hides the Favorites menu
NoChangeStartMenu _ Disables changes to the Start Menu
NoFolderOptions _ Hides the Folder Options in the Explorer
ClearRecentDocsOnExit - Empty the recent Docs folder on reboot
NoLogoff - Hides the Log Off .... in the Start Menu
And here are a few more you can play with
ShowInfoTip
NoTrayContextMenu
NoStartMenuSubFolders
NoWindowsUpdate
NoViewContextMenu
Mit B. Suthar Roll No. 507140Page No. 46
-
8/3/2019 Windows Registry (2)
47/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
EnforceShellExtensionSecurity
LinkResolveIgnoreLinkInfo
NoDriveTypeAutoRun
NoStartBanner
NoSetActiveDesktop
EditLevel
NoNetConnectDisconnect
RestrictRun - Disables all exe programs except those listed in the RestrictRun subkey
This key has many other available keys, there is one to even hide the taskbar, one to hide the
control panel and more. I'm not telling you how, as someone may want to play a trick on you.
The policies key has a great deal of control over how and what program can run and how one
can access what feature.
In the System key you can enter:
NoDispCPL - Disable Display Control Panel
NoDispBackgroundPage - Hide Background PageNoDispScrSavPage - Hide Screen Saver Page
NoDispAppearancePage - Hide Appearance Page
NoDispSettingsPage - Hide Settings Page
NoSecCPL - Disable Password Control Panel
NoPwdPage - Hide Password Change Page
NoAdminPage - Hide Remote Administration Page
NoProfilePage - Hide User Profiles Page
NoDevMgrPage - Hide Device Manager Page
NoConfigPage - Hide Hardware Profiles Page
NoFileSysPage - Hide File System Button
NoVirtMemPage - Hide Virtual Memory Button
Mit B. Suthar Roll No. 507140Page No. 47
-
8/3/2019 Windows Registry (2)
48/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
In the Network key you can enter:
NoNetSetup - Disable the Network Control Panel
NoNetSetupIDPage - Hide Identification Page
NoNetSetupSecurityPage - Hide Access Control Page
NoFileSharingControl - Disable File Sharing Controls
NoPrintSharing - Disable Print Sharing Controls
In the WinOldApp key you can enter:
Disabled - Disable MS-DOS Prompt
NoRealMode - Disables Single-Mode MS-DOS
Automatic Screen Refresh
When you make changes to your file system and use Explorer, the changes are not usually
displayed until you press the F5 key
To refresh automatically:
1. Open RegEdit
2. Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Update
3. Set the value name "UpdateMode" to 1
Disable Password Caching
To disable password caching, which allows for the single Network login and eliminates the
secondary Windows logon screen. Either use the same password or:
1. Open RegEdit
2. Go to the key
HKEY_LOCAL_MACHINE\SOFTWARE \Microsoft\ Windows\ CurrentVersion\ Policies\
Network
3. Add a Dword value "DisablePwdCaching" and set the value to 1
Mit B. Suthar Roll No. 507140Page No. 48
-
8/3/2019 Windows Registry (2)
49/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Changing the MaxMTU for faster Downloads
There are four Internet settings that can be configured, you can get greater throughput (faster
Internet downloads) by modifying a few settings.
They are the MaxMTU, MaxMSS and DefaultRcvWindow, and DefaultTTL
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\System\CurrentControlset\ Services\ Class\ net\ 000x
(where x is your particular network adapter binding.)
3.Right click on the right panel
4.Select New\String Value and create the value name IPMTU
5.Double click on it and enter then the number you want. The usual change is to 576
6.Similarly, you can add IPMSS and give it a value of 536
(Windows 9X)You can set DefaultRcvWindow, and DefaultTTL by adding these string
values to HKEY_LOCAL_MACHINE\ System\ CurrentControlset\ Services\ VXD\ MSTCP
Set the DefaultRcvWindow to"5840"and the DefaultTTL to "128"
Note: These settings will slow down your network access speed slightly, but you will
probably not even see the difference if you are using a network card. If you are using Direct
Cable you should see a sight difference.
Adding Items to the Start Button
To add items when you right-click on the Start Button:
1.Open RegEdit
2.Go to HKEY_CLASSES_ROOT\Directory\Shell
3.Right-click on Shell and select New Key
Mit B. Suthar Roll No. 507140Page No. 49
-
8/3/2019 Windows Registry (2)
50/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
4.Type in the name of the key and press the Enter key
5.In the Default name that shows in the right hand panel, you can add a title with a "&"
character in front of the letter for a shortcut
6.Right-click on the key you just created and create another key under it called command
7.For the value of this command, enter the full path and program you want to execute
8.Now when you right click on the Start Button, your new program will be there.
9.For example, if you want Word to be added, you would add that as the first key, the default
in the right panel would be &Word so when you right click on the Start Button, the W would
be the Hot Key on your keyboard. The value of the key would be C:\Program
Files\Office\Winword\Winword.exe
Remove Open, Explore & Find from Start Button
When you right click on the Start Button, you can select Open, Explore or Find.
Open shows your Programs folder. Explore starts the Explorer and allows access to all
drives.
Find allows you to search and then run programs. In certain situations you might want to
disable this feature.
To remove them:
1.Open RegEdit
2.Go to HKEY_CLASSES_ROOT\Directory\Shell\Find
3.Delete Find
4.Scroll down below Directory to Folder
5.Expand this section under shell
6.Delete Explore and Open
Caution: - When you remove Open, you cannot open any folders.
Mit B. Suthar Roll No. 507140Page No. 50
-
8/3/2019 Windows Registry (2)
51/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Removing Items from NEW Context Menu
When you right-click on the desktop and select New, or use the File Menu item in the
Explore and select New a list of default templates you can open up are listed.
To remove items from that list:
1. Open RegEdit
2. Do a Search for the string ShellNew in the HKEY_CLASSES_ROOT Hive
3. Delete the ShellNew command key for the items you want to remove.
Changing Telnet Window
You can view more data if you increase the line count of Telnet. By Default it has a window
size of 25 lines. To increase this so you can scroll back and look at a larger number on lines:
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Software\Microsoft\Telnet
3. Modify the value data of "Rows"
Changing the Tips of the Day
You can edit the Tips of the day in the Registry by going to:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\ Windows\ CurrentVersion\ explorer\
Tips
Disabling Drives in My Computer
To turn off the display of local or networked drives when you click on My Computer:
1.Open RegEdit
2.Go to
HKEY_CURRENT_USER\Software\ Microsoft\ Windows\ CurrentVersion\ Policies\
Explorer
Mit B. Suthar Roll No. 507140Page No. 51
-
8/3/2019 Windows Registry (2)
52/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
3.Add a New DWORD item and name it NoDrives
4.Give it a value of 3FFFFFF
5.Now when you click on My Computer, none of your drives will show.
Changing the caption on the Title Bar
Change the Caption on the Title Bar for OutLook Express or the Internet Explorer:
For Outlook Express:
1. Open RegEdit
2. Go to
HKEY_CURRENT_USER\Software\Microsoft\OutLook Express
For IE5 and up use:
HKEY_CURRENT_USER\IDENTITIES \{9DDDACCO-38F2-11D6-93CA-
812B1F3493B}\ SOFTWARE\ MICROSOFT\ OUTLOOK EXPRESS\5.0
3. Add a string value "WindowTitle" (no space)
4. Modify the value to what ever you like.
For no splash screen, add a dword value "NoSplash" set to 1
The Key {9DDDACCO-38F2-11D6-93CA-812B1F3493B} can be any key you find here.
Each user has his own Key number.
The Key 5.0 is whatever version of IE you have
For Internet Explorer:
1. Open RegEdit
2. Go to HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Main
3. Add a string value "Window Title" (use a space)
4. Modify the value to what ever you like.
Mit B. Suthar Roll No. 507140Page No. 52
-
8/3/2019 Windows Registry (2)
53/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Disabling the Right-Click on the Start Button
Normally, when you right button click on the Start button, it allows you to open your
programs folder, the Explorer and run Find.
In situations where you don't want to allow users to be able to do this in order to secure your
computer.
1.Open RegEdit
2.Search for Desktop
3.This should bring you to HKEY_CLASSES_ROOT\Directory
4.Expand this section
5.Under Shell is Find
6.Delete Find
7.Move down a little in the Registry to Folder
8.Expand this section and remove Explore and Open
Now when you right click on the Start button, nothing should happen.
You can delete only those items that you need.
Note: - On Microsoft keyboards, this also disables the Window-E (for Explorer) and
Window-F
(for Find) keys.
See the section on Installation in the RESKIT to see how to do this automatically during an
install.
Disabling My Computer
In areas where you are trying to restrict what users can do on the computer, it might be
beneficial to disable the ability to click on My Computer and have access to the drives,
control panel etc.
To disable this:
Mit B. Suthar Roll No. 507140Page No. 53
-
8/3/2019 Windows Registry (2)
54/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
1.Open RegEdit
2.Search for 20D04FE0-3AEA-1069-A2D8-08002B30309D
3.This should bring you to the HKEY_CLASSES_ROOT\CLSID section
4.Delete the entire section.
Now when you click on My Computer, nothing will happen.
You might want to export this section to a Registry file before deleting it just in case you
want to enable it again. Or you can rename it to 20D0HideMyComputer4FE0-3AEA-1069-
A2D8-08002B30309D. You can also hide all the Desktop Icons, see Change/Add restrictions.
Opening Explorer from My Computer
By default, when you click on the My Computer icon, you get a display of all your drives, the
Control Panel etc. If you would like to have this open the Explorer:
1. Open RegEdit
2. Go to
HKEY_CLASSES_ROOT\CLSID\ {20D04FE0-3AEA-1069-A2D8-08002B30309D}\ Shell
3 . Add a new Key named "Open" if it does not exists by right clicking "Shell" and selecting
new.
4. . Add a new Key named "Command" by right clicking "Open" and selecting new
5. Set the (Default) value for the Command Key to "Explorer.exe" or
"C:\Windows\Explorer.exe"
Recycle Bin Edits
Fooling with the recycle bin. Why not make the icon context menu act like other icon context
menus.
Add rename to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\
ShellFolder
"Attributes"=hex:50,01,00,20
Mit B. Suthar Roll No. 507140Page No. 54
-
8/3/2019 Windows Registry (2)
55/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Add delete to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\
ShellFolder
"Attributes"=hex:60,01,00,20
Add rename and delete to the menu:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}
\ShellFolder
"Attributes"=hex:70,01,00,20
Restore the recycle bin to Windows defaults including un-deleting the icon after deletion:
Restore the icon.
HKEY_LOCAL_MACHINE\SOFTWARE\ Microsoft\ Windows \CurrentVersion\ explorer\
Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E}
@="Recycle Bin"
Reset Windows defaults.
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}
\ShellFolder
"Attributes"=hex:40,01,00,20
Other edits to the recycle bin icon:
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F08-00AA002F954E}\
ShellFolder
"Attributes"=hex:40,01,01,20 ... standard shortcut arrow
"Attributes"=hex:40,01,02,20 ... a different shortcut arrow
"Attributes"=hex:40,01,04,20 ... and still another shortcut arrow
"Attributes"=hex:40,01,08,20 ... make it look disabled (like it's been cut)
For Windows XP and 2000 also edit HKEY_CURRENT_USER\ Software\ Microsoft\
Windows\ CurrentVersion\ Explorer\ CLSID\ {645FF040-5081-101B-9F08-
00AA002F954E}
Mit B. Suthar Roll No. 507140Page No. 55
-
8/3/2019 Windows Registry (2)
56/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
For Windows ME also edit HKEY_CURRENT_USER \Software\ Classes\ CLSID\
{645FF040-5081-101B-9F08-00AA002F954E}
Setting the Minimum Password Length
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Policies\
Network
3. Now, choose the Edit/New/Binary value command and call the new value MinPwdLen.
Press Enter twice and Assign it a value equal to your minimum password length.
Add\delete programs to run every time Windows starts
You can start or stop programs from executing at boot up by adding or deleting them to/from
the run Keys in the Registry. Windows loads programs to start in the following order;
Program listed in the Local Machine hive, then the Current User hive, then theWin.ini Run=
and Load = lines. then finally programs in your Start Up folder.
To add or remove programs in the Registry
1.Open RegEdit
2.Go to the desired Key
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion \Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows \CurrentVersion
\RunServices
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows \CurrentVersion \RunServices
3. Add a new String Value and name it anything you like
4. For the value data, enter the path and executable for the program you want to run.
Mit B. Suthar Roll No. 507140Page No. 56
-
8/3/2019 Windows Registry (2)
57/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
By adding the value to the HKEY_CURRENT_USER hive instead allows the program to
start only when that user is logged on.
If you add the value to the RunOnce key the program will run once and be removed from the
key by Windows.
Removing the Shortcut Icon Arrows
1.Open RegEdit
2.Open the Key HKEY_CLASSES_ROOT
3.Open the Key LNKFILE
4.Delete the value IsShortcut
5.Open the next Key PIFFILE
6.Delete the value IsShortcut
7.Restart the Windows
Turn Off Window Animation
You can shut off the animation displayed when you minimize and maximize Windows.
1. Open RegEdit
2. Go to HKEY_CURRENT_USER\Control panel \Desktop\ WindowMetrics
3. Create a new string value "MinAnimate".
4. Set the value data of 0 for Off or 1 for On
Changing your Modem's Initialization String
1.Open RegEdit
2.Go to
HKEY_LOCAL_MACHINE\System\CurrentControlSet \Services \Class \Modem \0000
\Init
3.Change the settings to the new values
Mit B. Suthar Roll No. 507140Page No. 57
-
8/3/2019 Windows Registry (2)
58/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
Increasing the Modem Timeout
If your modem it is timing out during file transfers or loading Web Pages, you might try
increasing the timeout period. To change the Time Out::
1.Open RegEdit
2.Go to HKEY_LOCAL_MACHINE\System\CurrentControlSet\ Services\ Class\ Modem\
XXXX\ Settings Where XXXX is the number of your modem
3. In the right panel and double click on Inactivity Timeout
4.The number of minutes for a timeout should be entered between the brackets.
5.For example, a setting could have S19= to set it to 10 minutes.
Removing Programs from Control Panel's Add/Remove Programs Section
If you uninstalled a program by deleting the files, it may still show up in the Add/Remove
programs list in the Control Panel.
In order to remove it from the list.
1.Open RegEdit
2.Go to HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\
Uninstall
3.Delete any programs here.
If you have a problem locating the desired program open each key and view the
DisplayName value
The Fix for Grayed Out Boxes
The File Types tab in Explorer's View / Options menu lets you edit most of your file types,
but certain settings cannot be changed. The default action for a batch file, for instance, runs
the batch file instead of opening it via Notepad or Wordpad. Thus, when you double-click on
AUTOEXEC.BAT, a DOS window opens, and the file executes. If you want to change this
Mit B. Suthar Roll No. 507140Page No. 58
-
8/3/2019 Windows Registry (2)
59/62
L.D. College of Engineering Computer Engineering5th Semester (Div. A)
default action and edit a batch file when you double-click on it, however, the File Types tab
does not let you do so; the Set Default button for the file type called MS-DOS Batch File is
always grayed out.
The button is grayed out because HKEY_CLASSES_ROOT's batfile key contains an
EditFlag value entry. Such entries are used throughout the Registry to prevent novice users
from altering certain system settings. The binary data in batfile's EditFlag reads d0 04 00 00.
If you change this value to 00 00 00 00, you can then change any of the batch file settings. Do
not, however, indiscriminately zero out EditFlag; if you do so in a system ProgID such as
Drive or AudioCD, it completely disappears from the File Types list. For ProgIDs that are
linked to extensions, set all EditFlags to 00 00 00 00. For system ProgIDs, replace EditFlag
data with 02 00 00 00.
If you wish to have access to some buttons while leaving others grayed out, you must know
the function of each EditFlag bit. The last two bytes of data are always zero, but most bits
within the first two bytes have a specific effect:
Byte 1, bit 1: Removes the file type from the master list in the File Types tab (select
View / Options under Explorer) if it has an associated extension.
Byte 1, bit 2: Adds the file type to the File Types tab if it does not have an associated
extension.
Byte 1, bit 3: Iden