C ++ uses the Registry to add a desktop right-click to create a menu, and the Registry Desktop
For programmers, it is no longer frequent to create a cpp file.
For convenience, we are used to right-click the desktop to create a file, instead of creating a text document, and then modify the suffix.
Baidu Google looked up and finally learned how to add a registry.
I
out a user login window, if the password was lost, then every time the computer starts will jump out of this login box to let you lose the password. In fact, in the registry does not change some of the key values, this login box is a fake, anyone just press the "ESC" key to successfully enter the system. Therefore, if it is a single user, you can completely remove this login box to speed up your boot speed. Perhaps you do not know how to remove the l
Friends, have you ever found your Windows XP system fast enough? Is it that although the hardware configuration is already high, some places seem to be "unavoidable" to wait? In fact, there are many system settings to wait for a longer timeout condition, resulting in you can only "wait" with it, as long as in the registry of these places wait for the delay to change the smaller, especially when the switch machine, the system speed will be significantl
Desktop Setup Chapter
When you want to delete the "Recycle Bin" on the desktop, "Internet Explorer" and other system-set icons, you will find that they can not be the same as other icons in the normal way to delete, in fact, you can modify in the registry, shielding them off.
To screen the Network Places icon on the desktop:
Open the Hkey_current_usersoftware microsoftwindowscurrentversionpolicies Explorer (*) subkey branch and create a new DWORD va
Use Registry Win2000 security Settings-the registry uses the full Raiders 16
Note: The changed registry entries are located in HKEY_CURRENT_USER.
If the corresponding key value under Hkey_users\ (s-1-5-21-746137067-507921405-1060284298-500) (user code) is changed for a user.
1. Prevent others from getting access to Web pages
HKEY_CURRENT_USER\Software\Microsoft
An Oracle database startup issue that results from the loss of registry entries in the Windows registry.Environment Description:1.windows 2008 Operating System X64bit2.Oracle Database 11.2.0.1 32bit3.sqlplus/as sysdba not go in, error:C:\user\administrator>sqlplus/as sysdbaerror 6 initializing sql*plusmessage file SP1Episode:Perhaps some people will ask: Sqlplus can't enter, how do you conclude that this Oracle database is 32bit, I use the following m
In Windows XP, you are allowed to use registry modifications to set up your printer:
To enable the printer alert sound:
When a remote print job returns a message with a print server error, Windows XP allows the Beep alert user to be enabled every time the job is retried (once every 10 seconds). To enable Beep events, open the Hkey_local_machinesystemcurrentcontrolsetcontrolprint subkey branch in the registry
Regcreatekeyex
This function is used to create a registry key. If the key already exists, open it (the registry key is case-insensitive)
Long regcreatekeyex (Hkey,Lptstr lpsubkey,DWORD reserved,Lptstr lpclass,DWORD dwoptions,Regsam samdesired,Lpsecurity_attributes lpsecurityattributes,Phkey phkresult,Lpdword lpdwdisposition);
Parameters:HkeyInput parameter, a handle to open the key. The process that calls t
Use Win2000 security settings in the Registry-16th full guide to registry usage
Note: The changed registry project is located in HKEY_CURRENT_USER.If for a user, change is located at HKEY_USERS \ (S-1-5-21-746137067-507921405-1060284298-500) (UserCode.
1. prevent others from obtaining access information on the Web PageHKEY_CURRENT_USER \ Software \ Microsof
When we modify the registry, in many cases just pressing the F5 key to refresh the registry is not enough to make the changes take effect, and the computer needs to be restarted. In fact, we don't have to reboot the machine every time, just run Windows Shell Explorer (the operations in Windows 9x/me and Windows 2000/xp are different).
In Windows 9x/me
Press the "Ctrl+alt+delete" key combination, in t
Everybody must have such experience, after browsing So-and-so website, browser and system configuration changed beyond recognition, the most hateful is sometimes also the registry to lock. Of course, there are many ways to deal with, you can use Super Rabbit, 3721 online, such as repair, but if your computer is not installed temporarily, and not on the network, then how to do? Did you reinstall the system?! In fact, the system's own policy editor can
Author: Alpine
Wix9x to prevent anonymous users from logging in
Although "Win9x" can customize each user interface and specify a password, anyone can enter the system by clicking "Cancel" in the login window or by pressing "ESC", the so-called anonymous login. The following methods prevent anonymous users from logging on: Choose Run from the Start menu, type the regedit command in the Run Command dialog box, and press ENTER. Open the Registry Editor.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ Run]"File name" = "E: \ GAME Menu \ net \ netghost.exe"The preceding method can be added to the startup Item, And the deletion method is available below.
To delete the key or entry of the Registry, you must use the registry file.Delete an entry in the R
Modify registry boot login page, Registry Modification login page
Start-> Run-> regedit press enter, and find OEMBackground in the Registry directory by following the path below
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ Authentication \ LogonUI \ Background and modify the value of OEMBackground to 1. If not, create an OEMBackground an
Once you know the root keys, let's take a look at the primary subkeys under the Windows XP root key. Here, we mainly introduce some of the system's appearance, interface, user functions, application software, etc. have an impact, that is, users want to customize, clean, set the registry key modifications.Located under the root key HKEY_CURRENT_USER:(Note: The following subkeys are hkey_users/.) Default also, the meaning of the two functions the same,
Win7 and Win8 Backup registry methods
1, in the keyboard press "Win+r" and then in the following run box we enter "regedit" after the click OK or enter:
2, in the carriage return or click OK will enter into the System Registry Management window. As shown in the following illustration:
3, now we click on the registry "file" and then click "Expo
1VC statement
12345678
LONGRegQueryValueEx(HKEYhKey,// handle to keyLPCTSTRlpValueName,// value nameLPDWORDlpReserved,// reservedLPDWORDlpType,// type bufferLPBYTE lpData,// data bufferLPDWORDlpcbData// size of data buffer);
2 parameter descriptionRetrieves an open registry handle, specifying the type of registry key and setting the value. The return value long, 0 (ERROR_SUCCESS) in
The registry usage example of the zf framework. The code for simply copying the code is as follows :? Phprequire_once (ZendLoader. php); Zend_Loader: loadClass (Zend_Registry); $ Arrarray (host127.0.0.1, usernameroot, pa simple to use
The code is as follows:
Require_once ("Zend/Loader. php ");Zend_Loader: loadClass ("Zend_Registry ");$ Arr = array('Host' => '2017. 0.0.1 ','Username' => 'root ','Password' => '123 ','Dbname' => 'test');$ Reg = new Z
Modifications to the optical drive problem
After the virtual optical drive is installed, one more CD-ROM drive will appear in My computer. Some users do not like others to use their own computer CD-ROM drive, now even worse. We can use the registry to modify the virtual out of the optical drive icon to remove, and then use a simple way to the original physical optical drive shielding, so that your optical drive is not easy to be used by others. In a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.