Modify the registry to improve system security-Registry use all 17
One, hide a server
To ensure that the resources on the local area network are not illegally accessed and attacked by others, it is sometimes necessary to hide the name of the server computer specified in the LAN so that other LAN users cannot access
1, open Registry Editor, Hkey_local_ MACHINE \
To show hidden files, follow these steps:
Under normal circumstances, follow the steps below: Open the "Tools" menu of "My Computer"-"Folder Options", and in the "View" tab, select "show all files and folders" and find "Hide protected operating system files (recommended)" to remove the preceding check box. As shown in:
Solution:If it is caused by viruses, there are many cases. Here we will talk about the two commonly used methods.
Method 1: Open the Regist
Regardless of Windows 98 or Windows XP, the default registry Editor for the system cannot escape the fact that, as long as you modify the registry key, you must expand the key values in Registry Editor. As you may have thought, if the Registry Editor has an address bar like IE, simply type or copy the path of the key v
This paper will discuss several ways to modify IE browser and registry, and the corresponding solutions
This article requires your knowledge of the registry inkling
One, IE title bar was modified
Please open your Registry tool (enter Regedit in the Run menu, do not use Regedit to see after)
Find:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main
HKEY
A backup is something you have to do before you modify anything, not to mention the registration form. So where is the registry? Is it regedit.exe? Oh, of course not.
In the Windows 98/me system, the registry consists mainly of the two files System.dat and User.dat, hidden in C:\windows. Where System.dat contains hardware and software settings, User.dat holds user-related information. (Don't tell me you can
Modify registry to improve system security-Guide to registry use
1. Hide a serverTo prevent unauthorized access and attacks to the server resources on the LAN, you may need to hide the name of the server computer specified in the LAN so that other LAN users cannot access the server.1. Open the Registry Editor and set the hkey_local _ machine \ System \ Current
Modify the registry to enhance the network function-the registry uses the full introduction of the five
1, the designated preferred network server
In the registry, expand [Hkey_local_machine\system\currentcontrolset\services\nwnp32\networkprovider] sequentially, and creates or changes the string value Authenticatingagent under its primary key, with a value of t
In Windows XP, you are allowed to use registry modifications to set up your printer:
To enable the printer alert sound:
When a remote print job returns a message with a print server error, Windows XP allows the Beep alert user to be enabled every time the job is retried (once every 10 seconds). To enable Beep events, open the Hkey_local_machinesystemcurrentcontrolsetcontrolprint subkey branch in the registry
The V3 specification proposes a new UDDI system framework. the V3 specification assumes that there will be many different UDDI registries, and each UDDI registry is composed of many or one node (which can be seen as equivalent to the operator site in the V2 Specification. these registries form a large system. if the V2 standard system framework is still used, it is difficult to ensure that the key-value keys of all registries do not conflict with coll
● Automatic refresh settings of Registry Editor:
Open the HKEY_CURRENT_USER \ Software \ Microsoft \ regedt32 \ Settings sub-key branch, create a new string value "autorefresh" in the window on the right, and set its value to 1.
● Read-only function of registry modification:
The 32-bit Registry Editor of Windows NT/2000 provides read-only settings for
Trojan hiding place and general investigation technology Trojan Horse from the ancient Greek mythology, is a remote control based on the hacker tool, has a strong hidden and harmful. In order to achieve the purpose of controlling the server host, Trojans often have to use various means to activate themselves and load the running. Here, we briefly introduce the Trojan common activation way, their hiding place, and through some examples to let you experience the manual removal of Trojan method.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]"File name" = "E: \ GAME Menu \ net \ netghost.exe"The preceding method can be added to the startup Item, And the deletion method is available below.
To delete the key or entry of the Registry, you must use the registry file.Delete an entry in the R
Modify registry boot login page, Registry Modification login page
Start-> Run-> regedit press enter, and find OEMBackground in the Registry directory by following the path below
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Authentication \ LogonUI \ Background and modify the value of OEMBackground to 1. If not, create an OEMBackground an
Once you know the root keys, let's take a look at the primary subkeys under the Windows XP root key. Here, we mainly introduce some of the system's appearance, interface, user functions, application software, etc. have an impact, that is, users want to customize, clean, set the registry key modifications.Located under the root key HKEY_CURRENT_USER:(Note: The following subkeys are hkey_users/.) Default also, the meaning of the two functions the same,
Win7 and Win8 Backup registry methods
1, in the keyboard press "Win+r" and then in the following run box we enter "regedit" after the click OK or enter:
2, in the carriage return or click OK will enter into the System Registry Management window. As shown in the following illustration:
3, now we click on the registry "file" and then click "Expo
If you have time, edit it into a Reg. After you do XP Master direct import on OK cc!Thank you for the support of the top force! If you have any questions, please post this post, I will give my full answer!I have been in the past few days, from the morning to the evening to change the registry, while on the internet to collect research, now basically put online to download the XP registry optimization and ac
The registry is a core database in the Windows operating system that holds a variety of parameters that directly control the startup of Windows, the loading of hardware drivers, and the operation of some Windows applications, which play a central role throughout the system. These effects include soft, configuration and status information about the hardware, such as the initial conditions, preferences, and unload data for the application and Resource M
A, Windows XP registry backup and restore
The registry holds a variety of parameters that directly control the startup of Windows, the loading of hardware drivers, and the running parameters of some Windows applications. If the registry is compromised, the light will cause the Windows system to run abnormally, which can cause the entire system to become paralyz
1VC statement
12345678
LONGRegQueryValueEx(HKEYhKey,// handle to keyLPCTSTRlpValueName,// value nameLPDWORDlpReserved,// reservedLPDWORDlpType,// type bufferLPBYTE lpData,// data bufferLPDWORDlpcbData// size of data buffer);
2 parameter descriptionRetrieves an open registry handle, specifying the type of registry key and setting the value. The return value long, 0 (ERROR_SUCCESS) in
The registry usage example of the zf framework. The code for simply copying the code is as follows :? Phprequire_once (ZendLoader. php); Zend_Loader: loadClass (Zend_Registry); $ Arrarray (host127.0.0.1, usernameroot, pa simple to use
The code is as follows:
Require_once ("Zend/Loader. php ");Zend_Loader: loadClass ("Zend_Registry ");$ Arr = array('Host' => '2017. 0.0.1 ','Username' => 'root ','Password' => '123 ','Dbname' => 'test');$ Reg = new Z
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.