•
Table of Contents
•
Index
•
Reviews
•
Examples
•
Reader Reviews
•
Errata
Managing the Windows 2000 Registry
By
Paul Robichaux
Publisher
: O'Reilly
Pub Date
: August 2000
ISBN
: 1-56592-943-8
Pages
: 558
Slots
: 1
Copyright
Preface
Keys and Values and Classes, Oh My!
Who's This Book For?
How This Book Is Organized
Conventions Used in This Book
Comments and Questions
Acknowledgments
Chapter 1. A Gentle Introduction to the Registry
Section 1.1. A Brief History of the Registry
Section 1.2. What Does the Registry Do?
Section 1.3. Advantages Offered by the Registry
Section 1.4. Registry Zen
Chapter 2. Registry Nuts and Bolts
Section 2.1. How the Registry Is Structured
Section 2.2. What Goes in the Registry
Section 2.3. Getting Data In and Out
Chapter 3. In Case of Emergency
Section 3.1. Don't Panic!
Section 3.2. Safety Strategies
Section 3.3. All About Emergency Repair Disks
Section 3.4. Backing Up the Registry
Section 3.5. Restoring a Backed-up Registry
Chapter 4. Using RegEdit
Section 4.1. Know Your Limitations
Section 4.2. Learning the RegEdit Interface
Section 4.3. "Just Browsing, Thanks"
Section 4.4. Connecting to Other Machines' Registries
Section 4.5. Searching for Keys and Values
Section 4.6. Printing Registry Contents
Section 4.7. Working with Keys and Values
Section 4.8. Exporting and Importing Data
Section 4.9. RegEdit Command-Line Options
Chapter 5. Using RegEdt32
Section 5.1. How RegEdt32 and RegEdit Differ
Section 5.2. Learning the RegEdt32 Interface
Section 5.3. Browsing with RegEdt32
Section 5.4. Remote Registry Editing
Section 5.5. Searching for Keys
Section 5.6. Saving and Loading Registry Keys
Section 5.7. Printing Registry Contents
Section 5.8. Editing Keys and Values
Section 5.9. Registry Security Fundamentals
Section 5.10. Securing Registry Keys in Windows 2000
Section 5.11.
Securing Registry Keys in Windows NT
Chapter 6. Using the System Policy Editor
Section 6.1. All About System Policies
Section 6.2. Introducing the System Policy Editor
Section 6.3. Managing Policies with POLEDIT
Section 6.4. Distributing Policies
Section 6.5. What's in the Standard Policy Templates
Section 6.6. Picking the Right Policies
Chapter 7. Using Group Policies
Section 7.1. What Are Group Policies?
Section 7.2. Introducing the Group Policy Snap-in
Section 7.3. Managing Policies
Section 7.4. Distributing Policies
Section 7.5. What's in the Standard Policy Templates?
Chapter 8. Programming with the Registry
Section 8.1. The Registry API
Section 8.2. The Shell Utility API Routines
Section 8.3. Programming with C/C++
Section 8.4. Programming with Perl
Section 8.5. Programming with Visual Basic
Chapter 9. Administering the Registry
Section 9.1. Setting Defaults for New User Accounts
Section 9.2. Using Initialization File Mapping
Section 9.3. Limiting Remote Registry Access
Section 9.4. Fixing Registry Security ACLs in Windows NT
Section 9.5. Adding Registry ACLs to Group Policy Objects
Section 9.6. Encrypting HKLM\SAM with SYSKEY
Section 9.7. Miscellaneous Good Stuff
Section 9.8. Using the Resource Kit Registry Utilities
Section 9.9. reg: The One-Size-Fits-All Registry Tool
Section 9.10. Spying on the Registry with RegMon
Chapter 10. Registry Tweaks
Section 10.1. User Interface Tweaks
Section 10.2. Filesystem Tweaks
Section 10.3. Security Tweaks
Section 10.4. Performance Tweaks
Section 10.5. Network Tweaks
Section 10.6. Printing Tweaks
Chapter 11. The Registry Documented
Section 11.1. What's Here and What's Not
Section 11.2. HKLM\HARDWARE
Section 11.3. HKLM\SOFTWARE
Section 11.4. HKLM\SYSTEM
Section 11.5. HKU
Section 11.6. HKCR
Section 11.7. HKCU
Section 11.8. HKCC
Section 11.9. HKDD
Appendix A. User Configuration Group Policy Objects
Section A.1. Administrative Templates
Appendix B. Computer Configuration Group Policy Objects
Section B.1. Windows Settings
Section B.2. Administrative Templates
Colophon
Index