9/11/2023 0 Comments Resource hacker tricks windows 7![]() ![]() However, if you're browsing around HKCU and HKLM, you'll see a lot of values with fairly self-explanatory names, and to be honest if you want to experiment with changing them, the danger is minimal. There are keys and values in the Registry that could, if deleted, cause applications to stop working properly, or prevent Windows from booting. If you're creating a new value, make sure you set the correct data type, or Windows is likely to ignore it if you're editing a value within a Registry key, you won't be allowed to enter a value that isn't of the right type. You can also create new keys and values from the context menu that appears when you right-click on an existing key (or anywhere in the right-hand pane). You can edit these values in the Registry Editor, by double-clicking on the name of one and typing in new data. Strings are abbreviated as SZ" short for String-Zero, because the text is terminated with a zero-value byte. ![]() The most common file format in the Registry is DWORD, or "double word", which is Microsoft jargon for a 32-bit number However, using the Registry Editor, you can access options that aren't available via the user-friendly apps: for example, as you'll see below, you can customise context menus, and modify which icons appear in Explorer. These bits of software then access and update the Registry behind the scenes. When the likes of you and me want to configure our Windows settings, we're expected to use the friendly graphical interfaces built into Windows, such as the PC Settings app or the Device Manager. ![]() The Registry isn't really designed for users to tinker with. Why might I want to edit the Registry directly? You might like to think of these values as analogous to data files inside a folder in this case, each "file" contains data specifying something about the appearance and behaviour of a command prompt window. What's more, while Registry keys can contain subkeys, they can also store values: for example, click once on HKCU\Console and you will see a big long list of values appear in the right-hand pane. You'll notice that the structure of the Registry looks a lot like a familiar tree of folders and files, and nested keys are addressed in a similar way, using backslashes to indicate their paths. Some of these keys will themselves have arrows, indicating that you can open them up to reveal further nested keys. If you launch the Registry Editor and click on the arrow next to HKEY_CURRENT_USER (or double-click on its name), you'll see about a dozen items Registry keys appear below it, mostly with meaningful names such as Network, Printers, Software and so on. However, Since their names are a bit of a mouthful, they're commonly abbreviated to HKCR, HKCU, HKLM, HKU and HKCC.Īs we've mentioned, the Registry has a tree structure. Unhelpfully, these sections are also often referred to as hives, although they don't perfectly correspond to the hive files on your hard disk. HKEY_CURRENT_CONFIG Contains information about which hardware and drivers are installed and running at the moment HKEY_USERS Stores the personal settings of all registered users, including special system accounts that are used for administrative tasks HKEY_LOCAL_MACHINE Contains system-wide settings that apply regardless of who's logged in HKEY_CURRENT_USER Contains personal settings for the currently logged-in user HKEY_CLASSES_ROOT Contains technical information that enables applications to exchange information with one another How is the Registry structured?Īt its highest level, the Registry is split into five sections: From here on, we'll focus on that tree structure, since that's how Registry locations are normally described but if, in the future, you come across a reference to the hive files themselves, you'll know what they are. While it may be useful to know the locations of these hives, once you open the Registry Editor, you'll see that the database is internally structured as a virtual tree that doesn't directly correspond to the arrangement of the on-disk hives. You'll find your own copy sitting in your user folder, although you'll have to enable "Hidden items" in Windows Explorer to see it. Additionally, for every registered Windows user, there's a hive called NTUSER.DAT file that contains information about their identity, personal settings and so forth. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |