Index Z

Chapter 1: Windows XP Registry Overview

Fig. 1.1: The uninstall utility deletes registry settings that correspond to the application to be uninstalled
Fig. 1.2: The Advanced tab of the System Properties window
Fig. 1.3: The User Profiles window
Fig. 1.4: The Hardware tab of the System Properties window
Fig. 1.5: The Hardware Profiles window
Fig. 1.6: Hierarchical structure of the registry
Fig. 1.7: The Performance Options window
Fig. 1.8: Setting the registry size limitation for Windows 2000
Fig. 1.9: In Windows XP, there is no option for setting the registry size limitation
Fig. 1.10: Windows XP automatically detects new hardware
Fig. 1.11: The newly detected device is successfully installed and configured
Fig. 1.12: The first window of the Add Hardware Wizard program
Fig. 1.13: The next screen of the Hardware Wizard
Fig. 1.14: Hardware Wizard enables you to view the list of installed devices and troubleshoot the devices that are not working properly
Fig. 1.15: When installing new hardware, the Hardware Wizard provides capabilities of searching the new hardware automatically or manually selecting an appropriate device from the list
Fig. 1.16: Hardware Wizard provides a list of device classes. Select Show All Devices if you don't see the hardware category that you require
Fig. 1.17: The Windows NT/2000-style list of supported devices
Fig. 1.18: The new Control Panel design provides a Category View, which displays only the most common options by default
Fig. 1.19: Classic view of the Control Panel window displays all available options
Fig. 1.20: The Taskbar tab of the Taskbar and Start Menu Properties window
Fig. 1.21: The Customize Notifications window
Fig. 1.22: The Start Menu tab of the Taskbar and Start Menu Properties window
Fig. 1.23: The Advanced tab of the System Properties window
Fig. 1.24: The Visual Effects tab of the Performance Options window
Fig. 1.25: The View tab of the Folder Options window

Chapter 2: Registry Backup and Recovery

Fig. 2.1: The System Restore Welcome screen
Fig. 2.2: Entering the restore point description
Fig. 2.3: Selecting the restore point in the Select a Restore Point window
Fig. 2.4: The Restoration Complete window
Fig. 2.5: The System Restore tab of the System Properties window
Fig. 2.6: System Restore settings for the system partition
Fig. 2.7: Any local hard drive, except the System partition, can be excluded from the list of disks used by System Restore
Fig. 2.8: When troubleshooting System Restore, first make sure that the System Restore service is started
Fig. 2.9: The Tools tab of the disk properties window
Fig. 2.10: The Backup or Restore Wizard window
Fig. 2.11: The Welcome tab of the Backup Utility window
Fig. 2.12: The ASR preparation wizard prompts you to specify the backup media type and select the backup media or file name
Fig. 2.13: The Backup Progress window
Fig. 2.14: As the final step of the ASR backup procedure, the wizard prompts you to provide a blank formatted diskette to store the recovery information
Fig. 2.15: The Backup Progress window informs you about completion of the backup operation and allows you to view the report
Fig. 2.16: To backup the System State Data, set the Only back up the System State data in the second dialog displayed by the Backup Wizard
Fig. 2.17: Set the System State checkbox to include the System State data into the backup
Fig. 2.18: The Backup Job Information window
Fig. 2.19: The Advanced Backup Options window
Fig. 2.20: The Restore and Manage Media tab of the Backup window
Fig. 2.21: The Welcome to Setup screen, prompting the user to select between installing Windows XP anew, repairing a damaged Windows 2000 installation, or exiting Setup
Fig. 2.22: The Export Registry File dialog. The whole process of exporting the registry file is very similar to the process of saving files
Fig. 2.23: Importing the registry file

Chapter 3: Using Registry Editor

Fig. 3.1: Regedit window
Fig. 3.2: The Export Registry File dialog
Fig. 3.3: By default, REG files are associated with the Regedit application
Fig. 3.4: Registry Editor prompts you to confirm if you really want to add the contents of the exported REG file into the registry
Fig. 3.5: Loading a registry hive
Fig. 3.6: The newly loaded copy of the SYSTEM hive now appears as a nested subkey under HKEY_LOCAL_MACHINE root key
Fig. 3.7: The Select Computer window now provides extended browsing and searching functionality
Fig. 3.8: The New command allows you to add new keys, string, binary, DWORD, multi-string, and expandable string values
Fig. 3.9: The Find dialog
Fig. 3.10: The Edit Binary Value window
Fig. 3.11: The Edit String window
Fig. 3.12: The Edit DWORD Value window
Fig. 3.13: The Edit Multi-String window
Fig. 3.14: The Resource Lists window
Fig. 3.15: The Resources window
Fig. 3.16: The system prompts you to confirm your intention to delete a registry key or value entry
Fig. 3.17: The Binary Data window
Fig. 3.18: The new version of Regedit utility contains a Favorites menu
Fig. 3.19: The Add to Favorites dialog
Fig. 3.20: The Permissions for <Keyname> window allows you to specify registry key permissions
Fig. 3.21: The Permissions tab of the Advanced Security Settings for <Keyname> window
Fig. 3.22: The Permission Entry window
Fig. 3.23: The Owner tab of the Advanced Security Settings for <Keyname>window
Fig. 3.24: Error message displayed if you attempt to set registry auditing without first activating the audit in the system
Fig. 3.25: System auditing in Windows 2000/XP is activated using the Local Security Policy MMC snap-in
Fig. 3.26: Like Windows NT/2000, Windows XP allows you to audit both successful and failed attempts
Fig. 3.27: The Auditing tab of the Advanced Security Settings for <Keyname>window
Fig. 3.28: The Auditing Entry for <Keyname> window

Chapter 4: The Easiest Ways to Customize Windows

Fig. 4.1: The View tab of the Folder Options window
Fig. 4.2: The Advanced tab of the System Properties window (Windows XP)
Fig. 4.3: Windows XP provides new error reporting options
Fig. 4.4: The Choose Programs window
Fig. 4.5: The Startup and Recovery window
Fig. 4.6: To specify the custom logo displayed at login time, edit the Wallpaper value under HKEY_USERS\.DEFAULT\Control Panel\Desktop
Fig. 4.7: Windows XP Welcome screen
Fig. 4.8: Disabling the Welcome screen in Windows XP
Fig. 4.9: The Offline Folders tab of the Folder Options window
Fig. 4.10: The Use Fast User Switching option is now available
Fig. 4.11: Using MMC for specifying a custom login message (Windows 2000 and Windows XP)
Fig. 4.12: The Winlogon registry key
Fig. 4.13: The HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system registry key (Windows XP)
Fig. 4.14: To enable automatic logon, the Interactive logon: Do not require CTRL+ALT+DEL local security setting must be disabled
Fig. 4.15: Registry values that specify the default path values for Windows 2000 and Windows XP shell folders
Fig. 4.16: Windows XP provides you with the capability of moving the My Documents folder
Fig. 4.18: The subkey that needs to be deleted in order to remove the shared documents folder
Fig. 4.17: The shared documents folder is always present at the top of the My Computer window
Fig. 4.19: The default settings of Windows XP UI provide a limited set of sharing options
Fig. 4.20: The View tab of the Folder Options window
Fig. 4.21: Now you can use Windows 2000-style sharing options
Fig. 4.22: Windows XP provides a rich set of options for configuring the AutoPlay function
Fig. 4.23: Now you can uninstall Windows XP components that you no longer need

Chapter 5: Plug and Play in Windows XP

Fig. 5.1: Plug and Play architecture in Windows 2000 and Windows XP
Fig. 5.2: The device tree displayed by the Device Manager is supported by the Plug and Play Manager
Fig. 5.3: Viewing devices by connection
Fig. 5.4: The Environment Variables window
Fig. 5.5: PnP device states
Fig. 5.6: Device Installation scheme
Fig. 5.7: The Driver tab of the device properties window now allows you to perform driver rollback
Fig. 5.8: The driver can't be rolled back, since there are no driver files backed up for the device
Fig. 5.9: The Hardware tab of the System Properties dialog
Fig. 5.10: Hardware profiles
Fig. 5.11: The Power Schemes tab of the Power Options Properties window
Fig. 5.12: The Hibernate tab of the Power Options Properties window
Fig. 5.13: When you enable hibernation support, the Shut Down Windows window will display a new option—Hibernate, allowing you to put the system to hibernation manually
Fig. 5.14: The Advanced tab of the Power Options Properties window
Fig. 5.15: The taskbar indicator provides quick access to the Power Options applet
Fig. 5.16: The APM tab of the Power Options Properties window
Fig. 5.17: APM data in the registry
Fig. 5.18: The UPS tab of the Power Options Properties window

Chapter 6: Registry and the System Boot Process

Fig. 6.1: The Shut Down Windows window
Fig. 6.2: Logical Prefetcher settings in the registry
Fig. 6.3: The advanced startup menu options in Windows 2000/XP are specified by the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot registry key
Fig. 6.4: The HKEY_LOCAL_MACHINE\SYSTEM\Select registry key
Fig. 6.5: The Hardware tab of the System Properties window
Fig. 6.6: The Driver Signing Options dialog
Fig. 6.7: The HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Driver Signing registry key
Fig. 6.8: The HKEY_CURRENT_USER\Software\Microsoft\Driver Signing registry key
Fig. 6.9: The initial dialog of the File Signature Verification program
Fig. 6.10: The Logging tab of the Advanced File Signature Verification Settings window
Fig. 6.11: Scanning is in progress
Fig. 6.12: The Signature Verification Results window
Fig. 6.13: Typical "blue screen of death" in Windows NT 4.0
Fig. 6.14: Typical "blue screen" in Windows 2000 and Windows XP
Fig. 6.15: Error Reporting service displays an alert when a user-mode error, such as an application error, occurs
Fig. 6.16: The Error Reporting service displays an alert informing you that Windows XP has encountered a serious problem (a STOP message, in this case)
Fig. 6.17: The Error Reporting window
Fig. 6.18: The Choose Programs window
Fig. 6.19: The Error Reporting options parameters in the registry

Chapter 7: Registry Key Reference

Fig. 7.1: The HKEY_LOCAL_MACHINE\HARDWARE registry key
Fig. 7.2: Viewing Windows XP hardware information using the System Information utility
Fig. 7.3: The HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter registry key
Fig. 7.4: The HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\VIDEO registry key
Fig. 7.5: The contents of the HKLM\SYSTEM\CurrentControlSet\Control\Video\{AFCB39E1–9FBB–4404–A3AE–29492CF7D79D}\0000 registry key
Fig. 7.6: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\nv4 registry key
Fig. 7.7: An example of the contents of the DeviceN nested key for the device driver subkey under HKEY_LOCAL_MACHINE\SYSTEM\ControlSetnnn\Services
Fig. 7.8: Registry settings that specify the video mode
Fig. 7.9: The RESOURCEMAP key in Windows XP
Fig. 7.10: Typical contents of the HKEY_LOCAL_MACHINE\SOFTWARE key
Fig. 7.11: The File Types tab of the Folder Options window
Fig. 7.12: The contents of the HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.avi registry key, which corresponds to the AVI filename association
Fig. 7.13: The shell properties for the AVIFile class under HKEY_LOCAL_MACHINE\Classes
Fig. 7.14: An example of application registration information under HKEY_LOCAL_MACHINE\Software registry key
Fig. 7.15: The HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WINDOWS NT\CurrentVersion registry key
Fig. 7.16: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\Select registry key
Fig. 7.17: Typical configuration of the Control Subkey for the CurrentControlSet
Fig. 7.18: The contents of the BackupRestore nested key
Fig. 7.19: The hivelist subkey
Fig. 7.20: The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum key structure
Fig. 7.21: The Root enumerator for a typical Windows XP computer
Fig. 7.22: An example of the contents of the HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\PointerClass registry key in Windows XP
Fig. 7.23: The Services key contains the key corresponding to the link provided under DEVICEMAP registry key
Fig. 7.24: The Alerter service parameters in Windows XP registry
Fig. 7.25: The contents of a typical HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles key
Fig. 7.26: The contents of the IDConfigDB subkey
Fig. 7.27: Hardware profiles store only changes introduced to the original configuration
Fig. 7.28: The HKEY_CURRENT_CONFIG and HKEY_LOCAL_MACHINE\System\CurrentControlSet\Hardware Profiles\Current registry keys
Fig. 7.29: The HKEY_USERS key structure

Chapter 8: Network Settings in the Registry

Fig. 8.1: The Network Connections window
Fig. 8.2: The Local Area Connection Properties window
Fig. 8.3: The network adapter properties window
Fig. 8.4: The taskbar indicator displays the local area connection status
Fig. 8.5: The New Connection Wizard welcome window
Fig. 8.6: The Network Connection Wizard provides capabilities of establishing various connections
Fig. 8.7: Enabling Internet Connection Firewall
Fig. 8.8: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\ {4D36E972-E325-11CE-BFC1-08002BE10318} registry key defines the settings of the class installer for the network adapter class
Fig. 8.9: Information on the notify object that configures the NWLink protocol
Fig. 8.10: The HKEY_LOCAL_MACHINE\SOETWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\2 registry key in the Windows XP registry
Fig. 8.11: Information on the Realtek RTL8139 Family PCI Fast Ethernet network adapter under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum
Fig. 8.12: The Network Connections applet in Control Panel displays the registry information stored under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum
Fig. 8.13: Network adapter settings in Windows XP registry
Fig. 8.14: Typical contents of the Linkage key for the network adapter driver
Fig. 8.15: The ..\Ndi\Service setting specifies the name of the service or driver associated with the network component
Fig. 8.16: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Network registry key
Fig. 8.17: Local Area Connection properties in the system registry
Fig. 8.18: Relationship between registry information and the Network and Dial-up Connections applet in Control Panel
Fig. 8.19: The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RTL8139 key contains configuration data for a Realtek RTL8139 network adapter
Fig. 8.20: The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services registry key contains subkeys for all installed network components
Fig. 8.21: The General tab of the Internet Protocol (TCP/IP) Properties window
Fig. 8.22: The Alternate Configuration tab of the Internet Protocol (TCP/IP) Properties window
Fig. 8.23: The DNS tab of the Advanced TCP/IP Settings window
Fig. 8.24: The HKEY_USERS\.DEFAULT\Software\Microsoft\WindowsNT\CurrentVersion\Network\Persistent Connections registry key

Chapter 9: Securing the Registry

Fig. 9.1: Default operating system options in relation to protected operating system files
Fig. 9.2: The Search command finds Regedit shortcuts
Fig. 9.3: The Simple File Sharing user interface
Fig. 9.4: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa registry key
Fig. 9.5: Restricting access to the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Perflib registry key
Fig. 9.6: Configuring the Access Control List for HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\Winreg
Fig. 9.7: When an attempt to copy the registry of the running Windows NT/2000/XP is made, the system displays an error message
Fig. 9.8: Editing the list of Windows 2000/XP user groups allowed to reboot the system
Fig. 9.9: Weak passwords are cracked by LC3 within a matter of minutes
Fig. 9.10: Restricting anonymous access using Local security Policy MMC snap-in (Windows 2000)
Fig. 9.11: Setting EveryonelncludesAnonymous registry value via Local Security Policy
Fig. 9.12: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa registry key
Fig. 9.13: Adding the Group Policy snap-in to the custom console
Fig. 9.14: The Select Group Policy Object window
Fig. 9.15: The Group Policy Object opened for editing

Chapter 10: Managing the User Working Environments

Fig. 10.1: The HKEY_USERS registry key contains a complete list of all existing user profiles identified by their associated SIDs
Fig. 10.2: Typical contents of the user profile folder
Fig. 10.3: The user profile structure
Fig. 10.4: The settings defining the working environment for the currently logged on user are stored under HKEY_CURRENT_USER
Fig. 10.5: The User Profiles tab of the System Properties window
Fig. 10.6: The Copy To window
Fig. 10.7: User Profile Policies have their own node in Group Policy Editor
Fig. 10.8: The list of user profiles is stored in the registry under the HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\ProfileList key

Chapter 11: Troubleshooting Common Problems

Fig. 11.1: Before installing a new device that isn't listed in the HCL, create additional hardware profile
Fig. 11.2: Despite the fact that the Device Manager states that This device is working properly, a newly installed device will cause problems. Disable it in the current hardware profile.
Fig. 11.3: To install the Zip Iomega parallel port device, set the Enable legacy Plug and Play detection on the Port Settings tab of the properties window for the port to which the device is connected
Fig. 11.4: Re-creating the missing ASR floppy disk
Fig. 11.5: This process doesn't respond within the default time-out, thus preventing Windows XP from shutting down
Fig. 11.6: Locking a workstation
Fig. 11.7: The Exclude Files tab of the Options window of the Backup built-in utility
Fig. 11.8: The HKLM\SYSTEM\CurrentControlSet\Control\BackupRestore\FilesNotToBackup registry key
Fig. 11.9: The contents of the HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\BackupRestore\AsrKeysNotToRestore registry key (new in Windows XP)
Fig. 11.10: The contents of the HKLM\SYSTEM\CurrentControlSet\Control\BackupRestore\KeysNotToRestore registry key
Fig. 11.11: The Add or Remove Programs window
Fig. 11.12: The HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall registry key
Fig. 11.13: The Quota tab of the NTFS drive properties window

Chapter 12: Advanced Customization and Troubleshooting Tips

Fig. 12.1: Editing Start menu and taskbar policies using Group Policy editor
Fig. 12.2: The Setting tab of the Force classic Start Menu Properties windows
Fig. 12.3: The Explain tab of the policy properties window explains the effect of applying the currently selected policy
Fig. 12.4: The effect of applying the Force classic Start Menu policy
Fig. 12.5: The HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer registry key reflects the effect of applying the Force classic Start Menu policy
Fig. 12.6: The Taskbar tab of the Taskbar and Start Menu Properties dialog
Fig. 12.7: An example of Notification Area balloon tip
Fig. 12.8: Windows XP Simple Start menu
Fig. 12.9: The General tab of the Customize Start Menu window
Fig. 12.10: By default, Welcome screen displays a hyperlink under a user name, indicating the number of unread e-mail messages
Fig. 12.11: The contents of the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\UnreadMail registry key
Fig. 12.12: To block the unread e-mail notification at the Welcome screen, provide the read-only permissions for the System account on the UnreadMail registry key
Fig. 12.13: Configuring System Restore using Group Policy Editor
Fig. 12.14: The contents of the HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\SystemRestore registry key
Fig. 12.15: In Windows XP, the Uninstall button is disabled when you select TC/IP protocol in the Local Area Connection Properties window
Fig. 12.16: The Remote tab of the System Properties window
Fig. 12.17: The Remote Assistance Settings window
Fig. 12.18: Enabling the Remote Assistance feature in the registry
Fig. 12.19: Configuring the system policy to enable Windows XP computer to receive Remote Assistance offers
Fig. 12.20: The Offer Remote Assistance Properties dialog
Fig. 12.21: The Event Properties window displaying the error message on the service startup failure due to logon failure
Fig. 12.22: Restoring the right for the user account to log on as service
Fig. 12.23: The Log on as service Properties dialog
Fig. 12.24: The Log On tab of the service properties window
Fig. 12.25: The General tab of the service properties window
Fig. 12.26: Configuring the service to start up with the Local System account
Fig. 12.27: The Alerter service depends on the Workstation service
Fig. 12.28: The dependencies list for RPC service is quite long
Fig. 12.29: The ObjectName value under HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\ServiceName

Chapter 13: Third-Party Registry Utilities

Fig. 13.1: Notice the Resize Pictures command in the right-click menu
Fig. 13.2: The Resize Pictures dialog
Fig. 13.3: Windows XP provides built-in Send Pictures via E-Mail functionality, but it provides fewer options that Bulk Resize PowerToy
Fig. 13.4: The Open Command Window Here PowerToy adds the Open Command Window Here command to the right-click menu in My Computer and Windows Explorer
Fig. 13.5: The Audio Player toolbar provides just another way to play music in Windows XP
Fig. 13.6: The PowerToy Calculator
Fig. 13.7: Tweak UI for Windows XP
Fig. 13.8: After you select an option in the left pane of the Tweak UI window, the right pane will display a set of available configuration settings
Fig. 13.9: Tweak UI provides a set of repairing options
Fig. 13.10: The RegMaid utility main window
Fig. 13.11: Regmon at work
Fig. 13.12: RegSafe is a powerful registry editor with extended functionality
Fig. 13.13: RegSafe prompts the user to confirm deletion of registry entries
Fig. 13.14: Great! it has Undo functionality
Fig. 13.15: ERD Commander 2000 Setup Wizard prompts you to select installation method
Fig. 13.16: Next, ERD Commander 2000 Setup Wizard prompts you to insert your Windows Nt/2000 distribution CD or specify an alternate location for the installation files

Chapter 14: Automating Registry Management with WSH

Fig. 14.1: Windows XP includes the latest version of Windows Script Host—version 5.6.0
Fig. 14.2: The dialog prompting the user to confirm creating of a new registry setting
Fig. 14.3: Displaying the contents of the newly created registry entry
Fig. 14.4: The dialog prompting the user to confirm deletion of the newly created registry setting(s)
Fig. 14.5: You can use Registry Editor to check modifications introduced to the registry at each step of the script
Fig. 14.6: Prompt for the user to unlock Start menu
Fig. 14.7: Prompt for the user to lock Start menu
Fig. 14.8: Dialog box prompting the user to specify whether System Restore must be enabled or disabled
Fig. 14.9: Dialog box prompting the user to specify the drive on which the specified action must be taken
Fig. 14.10: The message box informing the user of the result of the operation
Fig. 14.11: Use the System Restore UI to check if System Restore is actually turned off for the drive you have specified when running the script
Fig. 14.12: Dialog prompting the user to create a restore point
Fig. 14.13: The dialog prompting the user to provide a description for the restore point to be created
Fig. 14.14: The System Restore window displaying automatically created restore points
Fig. 14.15: The Group Policy window
Fig. 14.16: The Logon Properties window



Windows XP Registry
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors: Karl Kopper

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net