The registry is a database system of Windows operating systems, hardware devices, and a tree-like hierarchy in which applications can run and save settings. It records the hardware configuration of the computer and the software information that the user installs on the machine.
Some applications do not delete relevant information in the registry after they are deleted, causing the registry to become bloated. Over and over, these redundant information not only affects the access efficiency of the registry itself, but also causes the overall performance of the system to be reduced. Therefore, it is necessary for Windows users to periodically clean up the registry.
Windows Optimizer Master's registry cleanup options are as follows:
1. Redundant information in scanning HKEY_CURRENT_USER
The HKEY_CURRENT_USER branch in the registry is a pointer to a HKEY_USERS branch that contains the login information for the current user. If you log on to Windows with the user Lujin (for example, windows9x), then it is mapped from Hkey_userslujin, and it is from HKEY_USERS if you do not have the user or enter the system as a user login. Default for mapping. The HKEY_CURRENT_USER branch involves the current user's personal interests, such as desktop, background, Start menu program buttons, application shortcuts, display fonts, power settings, and so on. Most of these settings can be modified in the Control Panel after the user logs in.
2. Redundant information in scanning HKEY_USERS
The HKEY_USERS branch in the registry is related to the personal interests of each user, such as desktop, background, Start menu program buttons, application shortcuts, display fonts, power settings, and so on. Most of these settings can be modified in the Control Panel after the user logs in.
3. Redundant information in scanning HKEY_LOCAL_MACHINE
The HKEY_LOCAL_MACHINE branch in the registry is the most important branch, containing the hardware and software information of the system. This information is generally not relevant to a particular user and applies to everyone. The Config001 in HKEY_LOCAL_MACHINE is mapped to the Hkey_current_config branch of the registry. If windows9x/nt/2000 does a multiple hardware configuration, Hkey_local_machineconfig (windows9x,windows2000/xp/2003 under Hkey_local_machinesystem) There will be 0001,0002, etc. corresponding to different hardware configurations. Which configuration is selected at startup, and which configuration is mapped by Hkey_current_config. The softwareclasses in HKEY_LOCAL_MACHINE is mapped to the HKEY_CLASSES_ROOT branch of the registry, where the file type (file name extension) and the application association are stored, and in addition, it includes the drive, icon, Information such as DDE and OLE.
The reason to select the three root keys for scanning is that HKEY_CLASSES_ROOT is exactly the same as the content under hkey_local_machinesoftwareclasses and can be considered a copy of it. The only HKEY_LOCAL_MACHINE and HKEY_USERS two primary keys that Windows really use when starting up. The other items are derived or dynamically generated by either of these two events. For Single-user Systems, the cleanup of registry files is concentrated in HKEY_CURRENT_USER and HKEY_LOCAL_MACHINE, and the additional HKEY_USERS for multi-user systems can be fully met.
4, scan the registry for redundant DLL information
Scanning the redundant DLLs in the registry differs greatly from the redundant DLL cleanup module. Redundant DLL cleanup in the registry it is easy to implement the principle by analyzing the registration information of the DLL file in the registry, and the analysis object in the redundant DLL cleanup module is all the DLL files on the hard disk, and the realization principle is more complicated.
5, scan Invalid installation and anti-installation information
Some applications may still have some installation or reverse installation information in the registry that is being uninstalled or deleted. Select this to scan it out.
6, scan the registry for other error messages
Select to analyze various software error messages in the registry. Recommended selection.
7, scan user run or operation history
This item has been moved to historical trace cleanup.
8, other optional items
(1), scanning can be deleted desktop and mouse appearance scheme. The Windows registry holds many desktop appearance schemes and the appearance of the mouse pointer, and users can delete their own appearance schemes that they do not use based on their own circumstances.
(2), scanning can be deleted in a multinational language. Windows is a worldwide operating system that, as a Chinese user, can delete other language (time zone, country code) information that it does not use. Note: Windows Optimizer does not scan registry information related to Chinese-language countries or regions (mainland, Taiwan, Hong Kong, Macau, Singapore, etc.) and English-speaking countries or regions (USA, UK, Australia, Canada, South Africa, New Zealand, etc.).
(3), scanning can be deleted in the multinational time zone. Ditto.
(4) Scan the Internet country and region code that can be deleted. Ditto.
After you select the item you want to scan in the list, click "Scan" and the Windows Optimizer master starts scanning the analysis registry. Note: During the registry parsing process, the Windows Optimizer master used multithreading to speed up the analysis.
Each check to a redundant registry information, Windows Optimization Master adds it to the analysis results list until the analysis is finished or terminated by the user.
You can expand the items in the analysis results list, which will be described in detail by Windows Optimizer Master. For example: Key name, key value, last modified time, and so on. Clicking on the scan results "Open Registry Editor and navigate to the registry location" will launch the Regedit Registry Editor and set it to the scan results to facilitate further analysis by advanced users.
After you have finished scanning, please click "Delete" to delete the selected analysis results and click "Delete all" to delete all items in the list.