. However, you can add information to the registry project, some malicious websites use this to succeed: they change the key value under the string value window title to their website name or more advertisement information, to change the title bar of the Browser IE.
Specifically, the modified registry project is:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Intern
Like windows, Windows CE also uses registry to store application, driver, user settings, and other configuration information. The Windows CE registry also uses a tree structure to manage configuration information. Because the structure and functions of the Windows CE registry are almost the same as those of windows, we will not detail them here, readers can refer
is unique. For example, when there is a problem with the system can not start Windows, its role is reflected. First of all, the actual physical file of the registry is System.dat and User.dat, which means that the data in the registry is stored in these two files. With that in mind, let's take a look at the role of MS-DOS Registry Editor in the end.
1. Exp
similar to that of the resource manager. Each folder icon in the left window represents a key, just as there are subfolders in the folder, and the registry key also has a subkey. To completely represent a sub-key, it is customary to use the path representation of the folder. For example, the "software" subkey under HKEY_LOCAL_MACHINE represents hkey_local _Machine/software, and the "Microsoft" sub-key under "software" indicates hkey_local _Machine/so
the is registry panel.
Assume that I want to create an item: HKEY_LOCAL_MACHINE // software // nnlltest. Under nnlltest, there are two string value keys: Install (record the installation path) soft (record that this software is a test version and the value is 0)
The procedure is as follows:
1. Click the Registry panel and expand default. You can see the five root types, which are fixed and unchanged.
2. Se
Now the computer gives people a feeling of fragile, not today by this virus raid, is tomorrow by the hacker attack, error, panic became like a potluck. In order to make the computer "strong" up, many people find anti-virus software, firewalls, hope that through these software to enhance the computer's immune power. Indeed, the software has, to some extent, enhanced the ability of the computer to resist foreign attacks, but there is nothing to do about the vulnerabilities in the computer's intern
to change their read-only and hidden properties.
3, the use of Microsoft Configuration Backup to back up your registry files
Cfgback. EXE is the backup software that comes with Win95 (not in Win98). It's on the Win95cd-rom othermisccfgback this directory. Copy all the files to any directory on the system, and then create a CFGBACK.EXE shortcut on the desktop.
To do a backup of the registry, start Cfgbac
can be used in that case. The reg command is provided by Windows XP to add, change, and display registry subkey information and values in registry keys. 1,reg Add new subkeys or items to the registrySyntax: REG ADD KeyName [/V entryname|/ve] [/t DataType] [/s separator] [/d] [/f]ParametersKeyNameSpecifies the full path of the subkey. For a remote computer, include the computer
A recordThe A (Address) record is used to specify the IP address record corresponding to the Host Name (or domain name. You can direct the website server under this domain name to your web server. You can also set a subdomain name for your domain name. In general, a record i
some problems to be aware of: The method used to read the primary key, subkey, and key values in the program: in order to read the key values in the sub-keys and subkeys under the specified primary key, the main use of the four methods in the RegistryKey class: OpenSubKey, Getsubkeynames,getvaluenames,getvalue. The specific usage and meaning are as follows: The OpenSubKey (string name) method is primarily to open the specified subkey. The Getsubkeyna
(Java. Lang. String subkey, int access)
Open the subkey of the key with the specified permission.
Java. Lang. String regenumkey (INT index)
Obtain the subkey of the key at the index.
Java. Lang. String regenumvalue (INT index)
Obtain the value of the subkey at the index.
Void setcreated (Boolean created)
Set the created status of the key.
Void setvalue (registryvalue value)
Set the value of the key.
Void setvalue (Java. Lang. String va
value in the program: to read the key values of the subkey under the specified primary key, it mainly uses four methods in the registrykey class: opensubkey, getsubkeynames, getvaluenames, and getvalue. The usage and meaning are as follows:
Opensubkey (string name) is used to open a specified subkey. The getsubkeynames () method is used to obtain the names of all subkeys under the primary key. The returned value is a string array. The getvaluenames (
information in HKEY_CURRENT_USER so that you can view and edit the information.In fact, HKEY_LOCAL_MACHINE/software/classes is hkey_classes_root. To facilitate viewing and editing, the system uses it as a root key. Similarly, hkey_current_config/SY-STEM/current control is HKEY_LOCAL_MACHINE/system/current control.HKEY_USERS stores the information of the default user and the current user. HKEY_CURRENT_USER saves the user information of the current logon user.Hkey_dyn_data stores the dynamic data
with the suffix ". inf". You only need to right-click it and select "Install" in the pop-up menu to unlock the Registry (2 ).
Figure 2
First, open notepad and edit the reg file as follows:
REGEDIT4
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersion
NetworkLanmanC $] // here I only share the C drive. You can add more
"Path" = "C :\"
"Remark" = ""
"Type" = dword: 00000000
"Flags" = dword: 00000192
"Parm1enc" = hex:
"Parm2enc" = hex:
Sav
also contains two important files: system. ini and win. ini.1. the system automatically backs up the registry at the first boot every day, or manually backs up the registry. Run scanregw.exe and the system prompts "you have backed up the system registry today. Do you want to back up the Registry again ?", Select Yes t
to import the Registry. This option must be removed.Another type of modification will generate a. vbs suffix file in C: \ WINDOWS \ or a. dll file. In fact, the. dll file is actually a. reg file.Now you need to check c: \ windows \ win. INI file, check whether load =, run =, these two options should be empty behind, if there are other programs to modify load =, run =, Will = after the program is deleted, before deletion, check the path and file
The popularity of the Internet has brought a lot of convenience to our lives. However, how to prevent malicious attacks or damages and ensure system security is even more important. I have accumulated a lot of security experience in the process of using the computer. Now I want to sort out some of the operation skills on how to use the registry to enhance system security as follows for your reference only.
1. Leave the user
When the Docker Registry V2 comes out, it's really good to be simple and practical, but when you change port 5000 to something else, or use a domain name binding, it's a mistake. Here is a detailed record of the process of your own experience.First, the installation of Docker Registry V2 (distribution).Here I chose to use the official provided image to install, p
. reg file
At this time you want to look at the C:\Windows\Win.ini file, look at the load=,run=, these two options should be empty, if there are other programs to modify load=,run=, will = after the program to delete, delete before the path and file name, Delete the corresponding file under system after deletion
There is also a way, if you repeatedly modify the restart and return, you can search all the. vbs files under C disk, there may be hidden, op
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.