Functions of the six key columns
The Registry uses the "keyword" and "key value" to describe logon items and their data. All keywords start with "hkey. For example, a keyword is more like a file in the directory of a browser under Windows 9X. Each file has its own unique content and attributes. We You can easily add, modify, query, and delete keywords in the Registry Editor. Keywords can be divided into two categories: one is defined by the system, which is generally called "pre-defined keywords", and the other is defined by the application Program Defined. The logon items vary depending on the application software. In the registry, all data is organized by a tree structure in the form of keys and subkeys, very similar to the directory structure. Each key contains a specific set of information. The key name of each key is related to the information contained in it. If the key contains a subkey, the "+" symbol is displayed on the left of the folder that represents the key in the registry editor window to show more content in the folder. If the folder is opened by the user, the "+" will be changed to "-". Next we will briefly introduce the six predefined system root keys.
1. HKEY_USERS
The root key stores the user ID and password list in the password list of the local computer, that is, user settings. The pre-configuration information of each user is stored in the HKEY_USERS Root Key. HKEY_USERS is one of the root keys accessed from a remote computer. The content depends on whether the user configuration file is activated on the computer. If the user configuration file is not activated, you can see that it is called. A single sub-Key of default, which includes various settings related to all users and. the DAT file is used together. If the user configuration file is activated and the logon is performed correctly, there is a sub-Key of "User Name", which is the user login name.
2. HKEY_CURRENT_USER
The root key contains information about the currently logged-on users stored in the local workstation, including the User Logon username and temporary password (note: this password is hidden when entered ). When a user logs on to Windows 98, the information is copied from the corresponding items in HKEY_USERS to HKEY_CURRENT_USER. There are 7 subkeywords under HKEY_CURRENT_USER. Except RemoteAccess, the remaining six are pre-defined by the system.
In the subkey appevents Registration Various registered application events.
Controlpanel involves the control panel settings.
Installlocationsmru information about the Windows installation path.
Keyboardlayout information about keyboard settings.
Network Information about network settings.
The subkeyword created when RemoteAccess installs IE, which contains information about the application.
Software information.
3. hkey_current_config
The root key stores data that defines the current user's desktop configuration (such as a display), the final used document list (MRU), and other information about the current user's Windows 98 Chinese version installation.
4. hkey_classes_root
The key is composed of multiple subkeys, which can be divided into two types: one is the extension of various types of registered files, and the other is the information about various file types. The sub-keys in the left column are various registered file extensions. There are system default and application-defined extensions in the file extensions registered in the registry. The application only registers the custom extension in the registry. Talent The system can identify and associate relevant documents, but the system can automatically associate only the registered extension. The Root Key specifies the name of the file type based on the extension of the application installed in Windows 98.
When Windows 98 Chinese version is installed for the first time, the Rich Text Format File is associated with the WordPad (wordpad). However, when you double-click an RTF file after the Chinese Word 6.0 is installed, the word is automatically activated. Stored in system. in dat, hkey_classes_root will replace win. the setting item in the [extensions] section of the INI file, which associates the application with the file extension and replaces Windows 3. reg. similar settings in the DAT file.
5. HKEY_LOCAL_MACHINE
The core of the Registry and various hardware and software configurations of the Computer exist here. It consists of the following eight parts: config configuration, driver, Enum plug-and-play, hardware, network, security Security Software and system. Each part contains many subkeys. The root key stores hardware data of the local computer. The sub-keywords under this root key are included in system. dat, used to provide information required by HKEY_LOCAL_MACHINE, or a group of keys that can be accessed on a remote computer. Many subkeys in the Root Key are similar to those in the system. ini file.
6. hkey_dyn_data
The root key stores the dynamic data during running. The data changes every time it is displayed. Therefore, the information under this root key is not stored in the registry.
From: http://www.qqread.com/registry/s781124061.html