Organizational structure of the registry _ registration Form

Source: Internet
Author: User

As one of the cores of the computer, the registry has been a mystery to ordinary users. What is a program that allows users to configure the hardware and software of a computer system according to their own requirements (after reading this sentence really laborious)?
The registry is used primarily to manage application and file associations, hardware device descriptions, status attributes, and various state information and data.

It has the following characteristics:

1. The registry allows for tracking configuration of hardware, system parameters, applications, and device drivers, which makes it possible to modify certain settings without restarting.

2. The hardware part of the login in the registry can support the Plug and Play characteristics of a newer version of Windows. When Windows detects a new device on the machine, it saves the data to the registry, and also avoids resource conflicts between the new device and the original device.

3. Administrators and users can check the configuration and settings of the system on the network through the registry, enabling remote management to be implemented.

I. Organizational structure of the Registry

First, enter Regedit in the Run dialog box, which runs as a menu, to run the registry program
We'll see an interface as shown in Figure 1.



The registry system is organized according to a three-tier structure, arranged in a cascade structure, consisting of the [root key]-[key]-[]-[key value].

Root key: A system-defined hive that is represented by "HKEY_".
HKEY_CLASSES_ROOT: Defines all registered file extensions, file types, file icons, and so on in the system.



HKEY_CURRENT_USER: Defines all the permissions of the current user, which is actually hkey_user\. Defalut The following section contains the login information for the current user.



HKEY_LOCAL_MACHINE: Defines all the information about the hardware and software of the local computer (relative to the network environment). The following login entries change as the system's configuration and settings change



Hkey_user: All user information is defined, and some of the branches are mapped to the HKEY_CURRNET_USRE keyword, and most of its settings can be modified by the Control Panel.



Hkey_current_config: Defines the current configuration of the computer, such as the display, printer and other optional peripherals and their settings information. is actually a pointer to a branch in the hkey_local_machine\config structure.



Note: The key value is divided into string value, binary value and double byte value three kinds

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.