(ebook - pdf) windows xp registry guide book - microsoft press

VIP免费
2024-12-06 0 0 6.1MB 440 页 5.9玖币
侵权投诉
Microsoft Windows XP Registry Guide
Table of Contents
Microsoft Windows XP Registry Guide..........................................................................................1
Introduction........................................................................................................................................4
This Book Is Different—Really.................................................................................................4
Power Users First; Then IT Professionals...............................................................................5
Some Terminology...................................................................................................................6
Gotta Love Windows XP..........................................................................................................7
Final Note.................................................................................................................................7
Part I: Registry Overview..................................................................................................................9
Chapter List..............................................................................................................................9
Part Overview.....................................................................................................................9
Chapter 1: Learning the Basics......................................................................................................10
Overview................................................................................................................................10
Heart and Soul of Windows XP..............................................................................................10
For Power Users..............................................................................................................11
For IT Professionals.........................................................................................................12
Registry Warnings and Myths................................................................................................14
Must−Know Concepts............................................................................................................14
Security Identifiers............................................................................................................14
Globally Unique Identifiers...............................................................................................17
Hexadecimal Notation......................................................................................................17
Bits and Bit Masks............................................................................................................18
Little−Endian and Big−Endian..........................................................................................19
ANSI and Unicode Encoding............................................................................................20
Null and Empty Strings.....................................................................................................20
Structure of the Registry........................................................................................................20
Keys.................................................................................................................................22
Values..............................................................................................................................23
Types...............................................................................................................................24
Organization of the Registry..................................................................................................26
HKEY_USERS.................................................................................................................27
HKEY_CURRENT_USER................................................................................................28
HKEY_LOCAL_MACHINE...............................................................................................29
HKEY_CLASSES_ROOT................................................................................................29
HKEY_CURRENT_CONFIG............................................................................................30
Registry Management Tools..................................................................................................30
Registry Hive Files.................................................................................................................31
Hives in HKLM.................................................................................................................31
Hives in HKU....................................................................................................................32
Chapter 2: Using the Registry Editor.............................................................................................33
Overview................................................................................................................................33
Running Regedit....................................................................................................................33
Exploring Regedit...................................................................................................................34
Key Pane.........................................................................................................................35
Value Pane......................................................................................................................36
Searching for Data.................................................................................................................37
Searching Incrementally...................................................................................................38
i
Table of Contents
Chapter 2: Using the Registry Editor
Searching in Binary Values..............................................................................................38
Bookmarking Favorite Keys.............................................................................................39
Using Better Techniques..................................................................................................40
Editing the Registry................................................................................................................41
Changing Values..............................................................................................................41
Adding Keys or Values.....................................................................................................44
Deleting Keys or Values...................................................................................................45
Renaming Keys or Values................................................................................................45
Printing the Registry...............................................................................................................46
Exporting Settings to Files.....................................................................................................47
Registration Files.............................................................................................................48
Win9x/NT4 Registration Files...........................................................................................49
Hive Files.........................................................................................................................50
Text Files..........................................................................................................................51
Working with Hive Files..........................................................................................................51
Getting Beyond Basics...........................................................................................................52
Chapter 3: Backing up the Registry...............................................................................................53
Overview................................................................................................................................53
Editing the Registry Safely.....................................................................................................53
Copying Single Values.....................................................................................................54
Backing Up to REG Files.................................................................................................55
Backing Up to Hive Files..................................................................................................55
Fixing Corrupt Settings..........................................................................................................57
Allowing Windows XP to Fix Errors..................................................................................58
Repairing an Application's Settings..................................................................................59
Removing Programs from the Registry............................................................................61
Using Another Computer's Settings.................................................................................62
Using System Restore...........................................................................................................62
Taking Configuration Snapshots......................................................................................63
Peeking Under the Covers...............................................................................................64
Managing System Restore...............................................................................................66
Hacking System Restore..................................................................................................66
Scripting System Restore.................................................................................................67
Backing Up the Registry Regularly........................................................................................68
Planning a Backup Strategy.............................................................................................69
Backing Up System State Data........................................................................................70
Restoring System State Data...........................................................................................71
Backing Up User Settings......................................................................................................72
Recovering from Disasters.....................................................................................................73
Advanced Options Menu..................................................................................................73
Recovery Console............................................................................................................74
Automated System Recovery...........................................................................................76
Chapter 4: Hacking the Registry....................................................................................................78
Overview................................................................................................................................78
Redirecting Special Folders...................................................................................................78
Customizing Shell Folders.....................................................................................................80
Renaming Desktop Icons.................................................................................................82
ii
Table of Contents
Chapter 4: Hacking the Registry
Using Custom Icon Images..............................................................................................83
Adding Desktop Icons......................................................................................................83
Hiding Desktop Icons.......................................................................................................85
Customizing File Associations...............................................................................................85
Running Programs from My Computer............................................................................86
Open Command Prompts at Folders...............................................................................88
Rooting Windows Explorer at a Folder.............................................................................89
Adding InfoTips to Program Classes................................................................................90
Adding File Templates...........................................................................................................92
Preventing Messenger from Running....................................................................................93
Personalizing the Start Menu.................................................................................................93
Configuring the Menu's Contents.....................................................................................94
Trimming the Frequently Used Programs List..................................................................96
Restoring the Sort Order..................................................................................................97
Customizing Internet Explorer................................................................................................98
Extending the Shortcut Menus.........................................................................................98
Changing the Toolbar Background..................................................................................99
Customizing Search URLs...............................................................................................99
Clearing History Lists...........................................................................................................102
Running Programs at Startup..............................................................................................102
Controlling Registry Editor...................................................................................................103
Default Action for REG Files..........................................................................................103
Storing Window Position and Size.................................................................................103
Logging On Automatically....................................................................................................104
Changing User Information..................................................................................................104
Looking for More Hacks.......................................................................................................105
Chapter 5: Mapping Tweak UI.......................................................................................................106
Overview..............................................................................................................................106
General................................................................................................................................106
Focus.............................................................................................................................108
Mouse..................................................................................................................................109
Hover..............................................................................................................................110
Wheel.............................................................................................................................110
X−Mouse........................................................................................................................110
Explorer................................................................................................................................111
Shortcut..........................................................................................................................112
Colors.............................................................................................................................113
Thumbnails.....................................................................................................................113
Command Keys..............................................................................................................114
Common Dialog Boxes........................................................................................................115
Taskbar................................................................................................................................116
Grouping........................................................................................................................116
XP Start Menu................................................................................................................117
Desktop................................................................................................................................118
First Icon........................................................................................................................119
My Computer.......................................................................................................................119
Drives.............................................................................................................................119
Special Folders..............................................................................................................120
iii
Table of Contents
Chapter 5: Mapping Tweak UI
AutoPlay.........................................................................................................................121
Control Panel.......................................................................................................................122
Templates............................................................................................................................122
Internet Explorer..................................................................................................................123
Search............................................................................................................................123
View Source...................................................................................................................124
Command Prompt................................................................................................................125
Logon...................................................................................................................................125
Autologon.......................................................................................................................125
Part II: Registry in Management...................................................................................................127
Chapter List..........................................................................................................................127
Part Overview.................................................................................................................127
Chapter 6: Using Registry−Based Policy....................................................................................128
Overview..............................................................................................................................128
Editing Local Policies...........................................................................................................128
Group Policy Extensions................................................................................................130
Registry−Based Policy...................................................................................................131
Group Policy Storage.....................................................................................................134
Extending Registry−Based Policy........................................................................................135
Comments......................................................................................................................137
Strings............................................................................................................................137
CLASS...........................................................................................................................138
CATEGORY...................................................................................................................139
KEYNAME......................................................................................................................140
POLICY..........................................................................................................................140
EXPLAIN........................................................................................................................142
VALUENAME.................................................................................................................142
VALUEON and VALUEOFF...........................................................................................142
ACTIONLIST..................................................................................................................142
PART..............................................................................................................................143
CHECKBOX...................................................................................................................145
COMBOBOX..................................................................................................................147
DROPDOWNLIST..........................................................................................................148
EDITTEXT......................................................................................................................150
LISTBOX........................................................................................................................151
NUMERIC......................................................................................................................152
TEXT..............................................................................................................................154
Deploying Registry−Based Policy........................................................................................155
Windows 2000 Server−Based Networks........................................................................155
Windows NT−Based and Other Networks.....................................................................156
Customizing Windows XP....................................................................................................157
Using the Group Policy Tools..............................................................................................159
Gpresult..........................................................................................................................159
Gpupdate.......................................................................................................................160
Help and Support Center...............................................................................................161
Resultant Set of Policy...................................................................................................162
Finding More Resources......................................................................................................163
iv
Table of Contents
Chapter 7: Managing Registry Security.......................................................................................164
Overview..............................................................................................................................164
Setting Keys' Permissions....................................................................................................164
Adding Users to ACLs....................................................................................................166
Removing Users from ACLs...........................................................................................166
Assigning Special Permissions......................................................................................167
Mapping Default Permissions..............................................................................................168
Taking Ownership of Keys...................................................................................................172
Auditing Registry Access.....................................................................................................173
Preventing Local Registry Access.......................................................................................174
Restricting Remote Registry Access....................................................................................175
Deploying Security Templates.............................................................................................175
Creating a Security Management Console....................................................................176
Choosing a Predefined Security Template.....................................................................177
Building a Custom Security Template............................................................................178
Analyzing a Computer's Configuration...........................................................................179
Modifying a Computer's Configuration...........................................................................180
Deploying Security Templates on the Network..............................................................181
Chapter 8: Finding Registry Settings..........................................................................................182
Comparing REG Files..........................................................................................................182
Using WinDiff.................................................................................................................184
Using Word 2002...........................................................................................................185
Comparing with Reg.exe......................................................................................................186
Auditing the Registry............................................................................................................187
Setting Audit Policy........................................................................................................188
Auditing Registry Keys...................................................................................................188
Analyzing the Results.....................................................................................................189
Monitoring the Registry........................................................................................................189
Using Winternals Regmon.............................................................................................189
Filtering for Better Results..............................................................................................191
Part III: Registry in Deployment...................................................................................................192
Chapter List..........................................................................................................................192
Part Overview.................................................................................................................192
Chapter 9: Scripting Registry Changes.......................................................................................193
Overview..............................................................................................................................193
Choosing a Technique.........................................................................................................193
Installing INF Files...............................................................................................................194
Starting with a Template................................................................................................195
Linking Sections Together..............................................................................................197
Adding Keys and Values................................................................................................198
Deleting Keys and Values..............................................................................................200
Setting and Clearing Bits................................................................................................200
Using Strings in INF Files...............................................................................................202
Setting Values with REG Files.............................................................................................203
Exporting Settings to REG Files.....................................................................................204
Creating REG Files Manually.........................................................................................205
Encoding Special Characters.........................................................................................206
v
Table of Contents
Chapter 9: Scripting Registry Changes
Deleting Keys Using a REG File....................................................................................207
Editing from the Command Prompt......................................................................................207
Adding Keys and Values................................................................................................208
Querying Values.............................................................................................................209
Deleting Keys and Values..............................................................................................209
Comparing Keys and Values..........................................................................................210
Copying Keys and Values..............................................................................................211
Exporting Keys to REG Files..........................................................................................211
Importing REG Files.......................................................................................................212
Saving Keys to Hive Files..............................................................................................212
Restoring Hive Files to Keys..........................................................................................212
Loading Hive Files..........................................................................................................212
Unloading Hive Files......................................................................................................213
Scripting Using Windows Script Host...................................................................................213
Creating Script Files.......................................................................................................214
Running Script Files.......................................................................................................215
Formatting Key and Value Names.................................................................................217
Adding and Updating Values..........................................................................................218
Removing Keys and Values...........................................................................................218
Querying Registry Values..............................................................................................219
Creating Windows Installer Packages.................................................................................219
Chapter 10: Deploying User Profiles...........................................................................................221
Overview..............................................................................................................................221
Exploring User Profiles........................................................................................................221
Profile Hives...................................................................................................................224
Profile Folders................................................................................................................224
Special Profiles..............................................................................................................227
Getting User Profiles............................................................................................................228
Local Profiles..................................................................................................................228
Roaming Profiles............................................................................................................229
Using Roaming User Profiles...............................................................................................230
Managing Roaming User Profiles..................................................................................232
Understanding Fast Network Logon...............................................................................233
Understanding the New Merge......................................................................................234
Deploying Default User Profiles...........................................................................................235
Customizing User Settings.............................................................................................236
Cleaning User Profiles...................................................................................................237
Creating Default User Folders........................................................................................239
Deploying Default User Folders.....................................................................................240
Coexisting with Earlier Versions of Windows.......................................................................240
Migrating User Settings to Windows XP..............................................................................241
Files And Settings Transfer Wizard................................................................................241
User State Migration Tool..............................................................................................242
Chapter 11: Mapping Windows Installer......................................................................................243
Overview..............................................................................................................................243
Repairing Registry Settings.................................................................................................243
Managing Windows Installer with Policies...........................................................................244
vi
Table of Contents
Chapter 11: Mapping Windows Installer
Installing with Elevated Privileges..................................................................................246
Caching Transforms in Secure Location........................................................................247
Locking Down Windows Installer...................................................................................247
Removing Windows Installer Data.......................................................................................248
Msizap.exe.....................................................................................................................248
Msicuu.exe.....................................................................................................................249
Inventorying Applications.....................................................................................................250
Chapter 12: Deploying with Answer Files...................................................................................253
Overview..............................................................................................................................253
Creating Distribution Folders...............................................................................................253
Customizing Answer Files....................................................................................................255
Setup Manager...............................................................................................................258
Notepad and Other Text Editors....................................................................................260
Adding Settings to Unattend.txt...........................................................................................262
[GuiRunOnce]................................................................................................................262
Cmdlines.txt...................................................................................................................263
Logging On Automatically After Installation.........................................................................264
Chapter 13: Cloning Disks with Sysprep.....................................................................................266
Overview..............................................................................................................................266
Cloning Windows XP...........................................................................................................266
Windows XP Tools.........................................................................................................268
Sysprep Limitations........................................................................................................268
Building a Disk Image..........................................................................................................269
Customizing Mini−Setup................................................................................................270
Preparing for Duplication................................................................................................272
Cloning the Disk Image..................................................................................................272
Reducing Image Count........................................................................................................275
Filling SysprepMassStorage Manually...........................................................................275
Filling SysprepMassStorage Automatically....................................................................276
Cleaning Up After Sysprep.............................................................................................276
Mapping Sysprep Settings...................................................................................................277
Keeping Perspective............................................................................................................278
Chapter 14: Microsoft Office XP User Settings...........................................................................280
Overview..............................................................................................................................280
Profile Wizard.......................................................................................................................280
Customizing the Wizard.................................................................................................281
Capturing Settings..........................................................................................................288
Deploying Settings.........................................................................................................289
Custom Installation Wizard..................................................................................................290
Add/Remove Registry Entries........................................................................................291
Customize Default Application Settings.........................................................................292
Change Office User Settings..........................................................................................293
Add Installations and Run Programs..............................................................................294
Custom Maintenance Wizard...............................................................................................295
Group and System Policy....................................................................................................295
vii
Table of Contents
Chapter 15: Working Around IT Problems..................................................................................298
Controlling Just−in−Time Setup...........................................................................................298
Outlook Express.............................................................................................................299
Windows Media Player...................................................................................................300
Desktop Themes............................................................................................................300
Other Shortcuts..............................................................................................................301
Removing Components.......................................................................................................302
Answer File [Components] Section................................................................................302
Extending Windows Components Wizard......................................................................304
Removing Components After Installation.......................................................................305
Hiding Non−Removable Components............................................................................306
Removing Policy Tattoos.....................................................................................................307
Elevating Processes' Privileges...........................................................................................309
Group Policy...................................................................................................................309
Secondary Logon...........................................................................................................310
Scheduled Tasks............................................................................................................310
AutoLogon......................................................................................................................311
Severing File Associations...................................................................................................313
Deploying Office XP Trusted Sources.................................................................................314
Enabling Remote Desktop Remotely...................................................................................314
Customizing the Windows XP Logon...................................................................................315
Part IV: Appendices.......................................................................................................................316
Appendix List.......................................................................................................................316
Part Overview.................................................................................................................316
Appendix A: File Associations.....................................................................................................317
Overview..............................................................................................................................317
Merge Algorithm...................................................................................................................317
File Extension Keys.............................................................................................................317
OpenWithList..................................................................................................................318
PerceivedType...............................................................................................................319
ShellNew........................................................................................................................319
Program Class Keys............................................................................................................319
DefaultIcon.....................................................................................................................321
EditFlags........................................................................................................................321
Shell...............................................................................................................................322
Specialized Keys..................................................................................................................323
Applications....................................................................................................................324
SystemFileAssociations.................................................................................................324
Unknown........................................................................................................................324
COM Class Keys..................................................................................................................324
Appendix B: Per−User Settings...................................................................................................327
Overview..............................................................................................................................327
AppEvents............................................................................................................................327
Console................................................................................................................................328
Control Panel.......................................................................................................................329
Desktop..........................................................................................................................330
Desktop\Window Metrics................................................................................................333
viii
Table of Contents
Appendix B: Per−User Settings
Mouse............................................................................................................................335
Environment.........................................................................................................................336
Keyboard Layout..................................................................................................................336
Network................................................................................................................................337
Printers.................................................................................................................................337
SessionInformation..............................................................................................................337
Software...............................................................................................................................337
Classes..........................................................................................................................338
Microsoft\Command Processor......................................................................................338
Microsoft\Internet Connection Wizard............................................................................339
Microsoft\Internet Explorer.............................................................................................339
Microsoft\Internet Explorer\MenuExt..............................................................................340
Microsoft\Internet Explorer\SearchURL.........................................................................341
Microsoft\MessengerService..........................................................................................342
Microsoft\Office..............................................................................................................343
Microsoft\Search Assistant.............................................................................................344
Microsoft\VBA\Trusted...................................................................................................344
Policies...........................................................................................................................345
Software\Microsoft\Windows\CurrentVersion.....................................................................346
Explorer\Advanced.........................................................................................................346
Explorer\AutoComplete..................................................................................................350
Explorer\ComDlg32........................................................................................................350
Explorer\HideDesktopIcons............................................................................................350
Explorer\HideMyComputerIcons....................................................................................350
Explorer\MenuOrder.......................................................................................................350
Explorer\RecentDocs.....................................................................................................351
Explorer\RunMRU..........................................................................................................351
Explorer\User Shell Folders...........................................................................................351
Appendix C: Per−Computer Settings..........................................................................................353
Overview..............................................................................................................................353
HARDWARE........................................................................................................................353
DESCRIPTION...............................................................................................................354
DEVICEMAP..................................................................................................................354
SAM.....................................................................................................................................355
SECURITY...........................................................................................................................355
SOFTWARE.........................................................................................................................356
Classes..........................................................................................................................356
Clients............................................................................................................................356
Microsoft\Active Setup...................................................................................................357
Microsoft\Command Processor......................................................................................358
Microsoft\Driver Signing.................................................................................................359
Microsoft\InternetExplorer..............................................................................................360
Microsoft\Sysprep..........................................................................................................360
Microsoft\Windows NT\CurrentVersion..........................................................................360
Policies...........................................................................................................................361
SOFTWARE\Microsoft\Windows\CurrentVersion...............................................................361
App Paths......................................................................................................................362
Applets...........................................................................................................................362
ix
摘要:

MicrosoftWindowsXPRegistryGuideTableofContentsMicrosoftWindowsXPRegistryGuide..........................................................................................1Introduction...........................................................................................................................

展开>> 收起<<
(ebook - pdf) windows xp registry guide book - microsoft press.pdf

共440页,预览10页

还剩页未读, 继续阅读

声明:本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。玖贝云文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知玖贝云文库,我们立即给予删除!
分类:外语学习 价格:5.9玖币 属性:440 页 大小:6.1MB 格式:PDF 时间:2024-12-06

开通VIP享超值会员特权

  • 多端同步记录
  • 高速下载文档
  • 免费文档工具
  • 分享文档赚钱
  • 每日登录抽奖
  • 优质衍生服务
/ 440
客服
关注