Team LiB   Previous Section   Next Section
   
•  Table of Contents
•  Index
•  Reviews
•  Examples
•  Reader Reviews
•  Errata
Managing the Windows 2000 Registry
By Paul Robichaux
 
Publisher : O'Reilly
Pub Date : August 2000
ISBN : 1-56592-943-8
Pages : 558
Slots : 1    


    Copyright
    Preface
      Keys and Values and Classes, Oh My!
      Who's This Book For?
      How This Book Is Organized
      Conventions Used in This Book
      Comments and Questions
      Acknowledgments
    Chapter 1.  A Gentle Introduction to the Registry
      Section 1.1.  A Brief History of the Registry
      Section 1.2.  What Does the Registry Do?
      Section 1.3.  Advantages Offered by the Registry
      Section 1.4.  Registry Zen
    Chapter 2.  Registry Nuts and Bolts
      Section 2.1.  How the Registry Is Structured
      Section 2.2.  What Goes in the Registry
      Section 2.3.  Getting Data In and Out
    Chapter 3.  In Case of Emergency
      Section 3.1.  Don't Panic!
      Section 3.2.  Safety Strategies
      Section 3.3.  All About Emergency Repair Disks
      Section 3.4.  Backing Up the Registry
      Section 3.5.  Restoring a Backed-up Registry
    Chapter 4.  Using RegEdit
      Section 4.1.  Know Your Limitations
      Section 4.2.  Learning the RegEdit Interface
      Section 4.3.  "Just Browsing, Thanks"
      Section 4.4.  Connecting to Other Machines' Registries
      Section 4.5.  Searching for Keys and Values
      Section 4.6.  Printing Registry Contents
      Section 4.7.  Working with Keys and Values
      Section 4.8.  Exporting and Importing Data
      Section 4.9.  RegEdit Command-Line Options
    Chapter 5.  Using RegEdt32
      Section 5.1.  How RegEdt32 and RegEdit Differ
      Section 5.2.  Learning the RegEdt32 Interface
      Section 5.3.  Browsing with RegEdt32
      Section 5.4.  Remote Registry Editing
      Section 5.5.  Searching for Keys
      Section 5.6.  Saving and Loading Registry Keys
      Section 5.7.  Printing Registry Contents
      Section 5.8.  Editing Keys and Values
      Section 5.9.  Registry Security Fundamentals
      Section 5.10.  Securing Registry Keys in Windows 2000
      Section 5.11.  figs/nt4icon.gif Securing Registry Keys in Windows NT
    Chapter 6.  Using the System Policy Editor
      Section 6.1.  All About System Policies
      Section 6.2.  Introducing the System Policy Editor
      Section 6.3.  Managing Policies with POLEDIT
      Section 6.4.  Distributing Policies
      Section 6.5.  What's in the Standard Policy Templates
      Section 6.6.  Picking the Right Policies
    Chapter 7.  Using Group Policies
      Section 7.1.  What Are Group Policies?
      Section 7.2.  Introducing the Group Policy Snap-in
      Section 7.3.  Managing Policies
      Section 7.4.  Distributing Policies
      Section 7.5.  What's in the Standard Policy Templates?
    Chapter 8.  Programming with the Registry
      Section 8.1.  The Registry API
      Section 8.2.  The Shell Utility API Routines
      Section 8.3.  Programming with C/C++
      Section 8.4.  Programming with Perl
      Section 8.5.  Programming with Visual Basic
    Chapter 9.  Administering the Registry
      Section 9.1.  Setting Defaults for New User Accounts
      Section 9.2.  Using Initialization File Mapping
      Section 9.3.  Limiting Remote Registry Access
      Section 9.4.  Fixing Registry Security ACLs in Windows NT
      Section 9.5.  Adding Registry ACLs to Group Policy Objects
      Section 9.6.  Encrypting HKLM\SAM with SYSKEY
      Section 9.7.  Miscellaneous Good Stuff
      Section 9.8.  Using the Resource Kit Registry Utilities
      Section 9.9.  reg: The One-Size-Fits-All Registry Tool
      Section 9.10.  Spying on the Registry with RegMon
    Chapter 10.  Registry Tweaks
      Section 10.1.  User Interface Tweaks
      Section 10.2.  Filesystem Tweaks
      Section 10.3.  Security Tweaks
      Section 10.4.  Performance Tweaks
      Section 10.5.  Network Tweaks
      Section 10.6.  Printing Tweaks
    Chapter 11.  The Registry Documented
      Section 11.1.  What's Here and What's Not
      Section 11.2.  HKLM\HARDWARE
      Section 11.3.  HKLM\SOFTWARE
      Section 11.4.  HKLM\SYSTEM
      Section 11.5.  HKU
      Section 11.6.  HKCR
      Section 11.7.  HKCU
      Section 11.8.  HKCC
      Section 11.9.  HKDD
    Appendix A.  User Configuration Group Policy Objects
      Section A.1.  Administrative Templates
    Appendix B.  Computer Configuration Group Policy Objects
      Section B.1.  Windows Settings
      Section B.2.  Administrative Templates
    Colophon
    Index
Team LiB   Previous Section   Next Section