About software for modifying the Registry

Source: Internet
Author: User

The following describes several Registry Modification software that allows you to manage your registry more intuitively and conveniently. These software can be downloaded from many download centers on the Internet.

I. Register Terminator

This software is a free software. After downloading the software, decompress it and run the decompressed file. The interface is displayed.

1. Register Terminator 1.8 features

This software is a registry modification software. The software allows you to easily modify windows 98 system settings, making it easy to become a master of registry modification. The software provides the following 30 major functions: hacker trojan detection and removal, IE background image settings, desktop and Icon functions, Start Menu, computer startup, network settings, control panel, disk and optical drive, security settings, personalized folders, and System icon Modification clear garbage, prohibit display control, automatic operation, modify input method, control IE Toolbar, password detector, OEM settings, change boot screen, right-click enhancement, send to folder, special hidden settings, restrictions the program runs, locks my computer, denies access to the system, backs up the registry, registers the terminator password settings, and fixes the system.

2. Register Terminator
Register Terminator is a software that helps you easily modify Windows 98 registry settings and other system settings. It allows you to further manipulate the operating system, expand Windows system functions, and create a completely personalized application interface, it facilitates routine operations and management.

Ii. Chivalrous guest system Modifier

This software is a shared software. After the software is downloaded, decompress it and run the decompressed file. The interface is displayed.

1. Introduction to the system modifier Function
Many registry options in Windows 9x/NT do not directly provide a setting interface, such as the pop-up speed of Start Menu items, hiding system icons on the desktop, and setting system security attributes. When we need to modify these options, we need to use the Windows Registry Editor to manually modify the registry information. This is not only troublesome, but also insecure, and requires a certain degree of registry knowledge. To make it easy for you to modify the Registry options, the Grand Guest System modifier can easily modify most of the Registry options in Windows and set some non-Registry options.

This software can automatically determine the current operating system environment to modify the registry, and disable some settings that are not supported by the current environment. By default, after you modify some options that require system restart to take effect, a dialog box is displayed and a system restart prompt is displayed when you exit. When you choose "expert" mode, the software will no longer prompt the restart information, and the dialog box for deleting an item or some operation information in the settings will not be displayed, you don't have to worry about these windows.

2. Menu operations of the chivalrous guest system Modifier

(1) Add/delete programs
Now, after most of the installation programs are successfully installed, a project is added to "Add/delete programs" on the "control panel" to provide the function of uninstalling the program. However, sometimes we manually delete this software or, for other reasons, this unmount item is invalid, and the system does not provide the unmount item deletion function. If the number of useless unmount items increases, it will make software management difficult. This dialog box allows you to add, delete, and edit unmounted items, allowing you to conveniently manage your own "Add/delete programs" list.

(2) system folder location
When you want to change the location of the "frequently used documents" folder, note that if you select the "automatically clear document menu upon exit" option in the "Start Menu" setting of this modifier, when you exit Windows, all files in this folder will be cleared.

(3) configuration file backup
After backing up the system file to a specified directory, you can run RestCfg. bat in this directory in Windows or DOS to restore the system file.

(4) Desktop
When you add a System icon to a desktop or my computer, you need to set the "folder" attribute to open many items.

(5) Context Menu editing
Edit the context menu (shortcut menu) of the specified file type, including:
Drive: context menu for all system drives.
Folder: the context menu of the folder. Its content is displayed on the drive menu at the same time.
Directory: folder context menu.
All files: context menu for all types of files.
Undefined file type: the context menu of undefined associated program file type.

(6) create a file template
When you add a new file type, you will be prompted to select a file of this type as the template. When you select this file type in the system new menu to create a new file, A file with the same content as the file template will be created.

Iii. Registration sword

This software is a shared software. After the software is downloaded, decompress it and run the decompressed file. The interface is displayed. The "registration sword" is a system setting modification tool developed for Windows 98. It can be used to set values that are difficult to modify or modify for some users in Windows 98, convenient and secure.

1. Main functions and usage of the registration sword
There are a lot of software similar to "register the Sword", but the biggest feature of this software is that it pays more attention to the security protection of the system. The main content and usage of this software are briefly described below:
(1) Start Menu: activity or forbid Menu Sub-item and create a shortcut project on the menu, you can allow or disable Start Menu items (such as programs, favorites, document settings, help, run, logout, close, and system ).
(2) Security management: including prohibiting the opening of any folder; forbidding. reg File Import registry; prohibit the change of folder sharing function; prohibit MS-DOS; use screen saver as the boot password; shield the Windows function key; prohibit registry editing tools; prohibit Dial Network Storage password; revoke the IE hierarchical review password, prohibit the address bar, and prohibit switching from the graphical mode to the DOS mode.
(3) drive: Hide the drive in the system (including the virtual optical drive generated using various tools ).
(4) Create Icons: Create System logout, System sleep, restart icon, Close System icon, screen protection icon, and register sword icon on the desktop and on my computer, normally, it cannot be deleted because it is directly added to the registry. It is the same as "My Computer", "recycle bin", "Network Neighbor", and other icons.
(5) desktop settings: The icons in "My Computer" are hidden; the icons on the desktop are hidden; The LNK file is prohibited; the PIF file is prohibited; shortcuts are prohibited; accelerate the menu pop-up speed; cancel the animation display of the window; accelerate and close the non-reactive program; display the thumbnail of the BMP file; point to the current window; Right-click the Start menu to display the shutdown command; add time description after the time.
(6) Control Panel: delete, run, rename, move, and browse the control panel, and create shortcuts to the desktop.
(7) boot options: do not generate boot logs; Disable Automatic hard disk scanning; Enable menu; Disable display of boot screen; enter Windows welcome text; you can add prompt or warning text when entering Windows. Do not display the user logon window, the default stop time of the Start menu, and the default options of the Start Menu.

4. Super Rabbit registry scan

The Super Rabbit registry scan can search for and clear garbage in the Windows 98 registry, which is similar to Microsoft's RegClean 4.1a and fixes the RegClean Bug. Since version V2.0, more registry garbage can be cleared, which cannot even be done by RegClean. It also fixes the error of System Mechanic IC V3.0a. RegScan is more powerful than them.

5. Reg2000 registry Modifier

This is a Registry Modification tool and password viewing tool. There are more than 20 options in four main menus, you can modify the menu pop-up speed, automatically clear history records in the Document menu, hide "logout", "favorites", and "document" in the "Start" menu, hide all desktop icons, and remove shortcut icon arrows, setting the time to wait for response when an application error occurs, preventing anonymous users from logging on, changing the default search engine and default mailbox location of IE. You can also view the forgotten password. You only need to move the icon to the password of the asterisk to display the password.

Vi. RegCleaner 3.4

It is a tool that can be used to clear Windows logon files. The advantage of this tool is that after you execute this tool, you will display the logon information of the Windows logon file in a detailed list, including: software name, publishing company, and a lot of useless software login materials. You can use RegCleaner to clear useless logon information through a detailed list. The cleanup method is convenient. You only need to check the information you want to delete to automatically clear the information at a time. After clearing these useless logon information, you can use other logon file refresh tools to refresh the logon file, which greatly reduces the workload of your Windows logon file, in this way, the system can be executed smoothly.

VII. Windows optimization master

The software can check the validity of the Registry, VXD file, help file, and DLL file, optimize File Cache, page, DMA buffer and breakpoint values, shorten program response time, and quickly shut down, accelerate menu speed, animation effect switch, and Windows automatic refresh, etc, accelerate the speed of file system and CD-ROM, optimize multimedia programs and optimize the soft drive read and write, optimize MaxMTU, DefaultRevWindows, DefaultTTL, NameSrvQueryTimeout, COM port buffer, etc, in Windows, attackers can set illegal user permissions for superusers, normal users, and press the ESC key, scan hacker programs, and perform virus immunity, scan and delete redundant DLL information, reverse installation information, and other redundant information to scan and delete junk files.


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.