Team LiB   Previous Section
[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

RAS
    autodialer settings 
    monitor settings 
    phonebook settings 
    RasMan service 
    Registry settings for 
RAS Autodial key 
RAS key 
RAS Monitor key 
RAS Phonebook key 
RasForce key 
RasMan key 
RDISK utility  2nd 
Read Control permission  2nd 
Read permission 
reading Registry data 
    exporting data with RegEdit  2nd 
    obtaining security data 
    saving keys 
    Win32 API routines for 
rebooting NT after crash 
RedButton exploit 
RedialAttempts key 
RedialOnLinkFailure key 
RedialSeconds key 
RefusePasswordChange key 
.REG files
    contents of 
    creating 
    restoring Registry data 
reg utility 
REG_BINARY data type 
    modifying in Registry  2nd 
REG_DWORD data type 
    modifying in Registry  2nd 
REG_DWORD_BIG_ENDIAN data type 
REG_EXPAND_SZ data type 
    modifying in Registry  2nd 
REG_FULL_RESOURCE_DESCRIPTOR data type 
REG_LINK data type 
REG_MULTI_SZ data type 
    modifying in Registry  2nd 
REG_NONE data type 
REG_RESOURCE_LIST data type 
REG_SZ data type 
    modifying in Registry  2nd 
REGBACK, REGREST utilities  2nd 
REGCLEAN utility 
RegCloseKey() 
    flushing Registry changes and 
RegConnectRegistry() 
RegCreateKey()  2nd 
RegCreateKeyEx()  2nd 
RegDeleteKey 
RegDeleteKey() 
RegDeleteValue 
RegDeleteValue()  2nd 
REGDUMP utility 
RegEdit utility
    backing up/restoring Registry with  2nd 
    command-line options 
    connecting to remote Registries 
    context menus 
    exporting/importing Registry data 
    interface of 
    limitations of 
    modifying Registry with 
    navigating with keyboard 
    printing Registry contents 
    RegEdt32 vs. 
    searching for keys and values 
    viewing Registry with 
    Visual Basic version of 
RegEdt32 utility 
    accessing remote Registries 
    auditing key activity 
    backing up/restoring Registry with  2nd 
    interface of 
    modifying Registry with 
    printing Registry contents 
    reg utility vs. 
    RegEdit vs. 
    restoring data from ERD 
    searching for keys and values 
    spying on Registry with 
    viewing Registry with 
RegEnumKey() 
RegEnumKeyEx 
RegEnumKeyEx() 
RegEnumValue 
RegEnumValue() 
regfind utility 
RegFlushKey()  2nd 
RegGetKeySecurity() 
REGINI.EXE utility 
RegisteredOrganization key 
RegisteredOwner key 
RegisteredProcessors key 
Registry API  [See Win32 API]
Registry APIs
    access control via 
    calling routines directly 
Registry Control for Visual Basic library 
Registry keys
    access controls and permissions 
    adding  2nd 
        reg utility for 
    auditing activity  2nd 
        reviewing records 
    comparing with compreg utility 
    copying reg.exe 
    creating 
        Perl methods for 
    deleting  2nd  3rd 
        API routines for 
        with reg.exe 
    dumping as text (example) 
    editing  [See editing Registry]
        API routines for 
    enumerating keys and values 
    exporting and importing 
        RegEdit switches for 
    getting information on 
        Perl methods for 
    hierarchy of  [See hierarchy, Registry]
    hives  2nd 
    links  [See links, Registry]
    moving to/from hives 
    opening and closing
        Perl methods for 
        Win32 API routines for 
    ownership  2nd 
    permissions  2nd 
        setting 
    program-specific subkeys  2nd 
    querying with reg.exe  2nd 
    reading security data of 
    renaming 
    restriction key 
    root keys  2nd  3rd 
    saving in/restoring from files 
        reg.exe for 
    saving/loading  2nd 
    searching for  2nd  3rd 
    stack-based key classes (example) 
    subkeys  2nd 
    updating with reg.exe 
    values for 
        enumerating 
        listing (example) 
        modifying  2nd 
        searching for specific  2nd 
    what to back up 
Registry, Windows NT
    advantages of 
    auditing access to 
    backing up  2nd 
        determining what to back up 
        NTBACKUP utility  2nd  3rd  4th 
        REGBACK, REGREST utilities  2nd 
        RegEdt32 for  2nd 
        restoring from backups 
        simple copy onto disk 
        text files for 
    changing size of 
    contents of, in general 
    editing  [See editing Registry]
    error codes 
    exporting/importing data of 
    flushing changes 
    hierarchy of  [See hierarchy, Registry]
    history of 
    limiting remote access 
    monitoring with NTREGMON 
    notification of changes to 
        WatchKey utility (example) 
    philosphy behind 
    printing contents of  2nd 
    programs for
        in C and/or C++ 
        in Perl 
        in Visual Basic 
    reading data from 
        exporting data with RegEdit  2nd 
        getting key security data 
        saving keys 
        Win32 API routines for 
    responding to problems with 
    role of 
    security and  2nd  [See also security]
    structure of 
    SYSKEY-protected, restoring 
    viewing data as binary 
    viewing with RegEdit 
    viewing with RegEdt32 
    writing data to
        importing data with RegEdit 
        loading keys from files 
RegLoadKey()  2nd 
RegNotifyChangeKeyValue() 
    WatchKey utility (example) 
RegOpenCurrentUser 
RegOpenKey() 
RegOpenKeyEx() 
RegOpenUserClassesRoot 
RegQueryInfoKey 
RegQueryInfoKey() 
    enumeration and 
RegQueryMultipleValues() 
RegQueryValue() 
RegQueryValueEx  2nd  3rd 
RegQueryValueEx() 
REGREST utility 
RegRestoreKey() 
REGSAM data type 
RegSaveKey()  2nd 
RegSetKeySecurity() 
RegSetValue() 
RegSetValueEx 
RegSetValueEx() 
RegUnloadKey() 
remote machines
    connecting to, API routines for 
remote Registries
    accessing with RegEdit 
    accessing with RegEdt32 
    controlling access to  2nd 
    managing 
renaming Registry keys 
repair disks  [See ERDs]
REPAIR subdirectory 
Replicate key 
ReplicationGovernor key 
Replicator key 
replicator service 
ReportBootOk key 
resolution, video 
Resource Kit 
RESOURCEMAP key  2nd 
resources
    allocation information 
    map of available 
RestoreFlag key 
restoring Registry  2nd 
    protected by SYSKEY 
    reg utility for 
restriction key 
RestrictNullSessionAccess key 
Retention key 
rings for incoming DUN calls 
roaming user profiles 
ROOT key 
root keys  2nd  3rd 
    origination of names for 
routines, Win32 API
    C/C++ programs for manipulating Registry 
    connecting to remote machines 
    creating keys  2nd 
    deleting keys/values 
    editing Registry values 
    enumeration 
    error codes 
    getting information on keys  2nd 
    moving keys to/from hives 
    names of 
    notifying of Registry changes  2nd 
    opening and closing keys  2nd 
    parameters of 
    Perl programming examples 
        Perl Win32\:\:RegXXX functions 
    reading Registry data 
    security-related 
    Visual Basic programming examples 
RSL (Registry Size Limit) parameter 
RunLoginScriptSync key 
RunLogonScriptSync key 

Team LiB   Previous Section