Use Regini.exe to modify registry commands _dos/bat

Source: Internet
Author: User
One, how to get Regini.exe
In the Windows XP installation CD (other versions of yourself), locate the Regini.ex_ file in the I386 directory and extract the Regini.exe with the Expand.exe command as follows:
%systemroot%\system32\expand. EXE "\\?\cdrom0\i386\regini.ex_" "C:\regini.exe"
Then copy the generated Regini.exe file from the C disk to where you need it.
Recommendation: Do not download regini.exe from untrusted websites.
second, simple examples
Open Regedit.exe first to see the changes that are made in each step, copy the following to Notepad, save as Example01.txt, Example02.txt file, and then use the following command:
REGINI. EXE Example01.txt
REGINI. EXE Example02.txt
::::::, Example01.txt:::: Do not copy me, I am dividing line to begin:::::::;: £ º::
Hkey_current_user\example0
Hkey_current_user\example0
"Example1" = REG_DWORD 1
Hkey_current_user\example0
"Example2" = REG_SZ "This is a example!"
Hkey_current_user\example0
"Example3" = REG_MULTI_SZ "This is the '" " "This is the second line!" "This is the third line!"
Hkey_current_user\example0
"Example4" = REG_EXPAND_SZ "This is a example! This is a example! This is a example! This is a example! This is a example! "
:::::: Example01.txt:::: Do not copy me, I am the split line ends:::::::;: £::
::::::, Example02.txt:::: Do not copy me, I am dividing line to begin:::::::;: £ º::
HKEY_CURRENT_USER\EXAMPLE0 [2 8 19]
:::::: Example02.txt:::: Do not copy me, I am the split line ends:::::::;: £::
Modify the first script and try again:
REGINI. EXE Example01.txt
No response, it seems to have worked, the key value becomes read-only!
Third, the Permission Code table
1-administrators Full Access
2-administrators Read access
3-administrators Read, Write access
4-administrators read, write, delete access
5-creator Full Access
6-creator Read, Write access
7-everyone Full Access
8-everyone Read access
9-everyone Read, Write access
10-everyone read, write, delete access
11-power Users Full Access
12-power Users Read, write access
13-power Users Read, write, delete access
14-system Operators Full Access
15-system Operators Read, write access
16-system Operators Read, write, delete access
17-system Full Access
18-system Read, Write access
19-system Read access
20-administrators read, write, execute access
21-interactive User Full Access
22-interactive User Read, write access
23-interactive User Read, write, delete access
four, where to use
Install the system, anti-virus software, delete some service keys, modify some from the start key, file association key permissions, etc. But then it came back to me,
Since we can easily modify the permissions, then the virus can also be modified back to prevent the method is to transfer regini.exe files, and then use the Registry monitoring software.
A registry monitoring software to change the name, it is best to add a shell (not anti-virus software, but antivirus malicious termination), added in the service, once there are changes to the police.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.