Use regini.exe to modify the Registry

Source: Internet
Author: User

1. How to obtain regini.exe?
In Windows Firewall, the command is as follows:
% SystemRoot % \ System32 \ EXPAND. EXE "\\? \ CDROM0 \ I386 \ regini. ex _ "C: \ regini.exe"
Copy the generated regini.exe file to the desired location from the C drive.
Suggestion: Do not download regini.exe from a trusted website.
Ii. Simple examples
And then use the following command:
REGINI. EXE example01.txt
REGINI. EXE example02.txt
::::::: Example01.txt :::::::::: do not copy me. I am the start of the split line :::::::::::::: ::::::
HKEY_CURRENT_USER \ example0
HKEY_CURRENT_USER \ example0
"Example1" = REG_DWORD 1
HKEY_CURRENT_USER \ example0
"Example2" = REG_SZ "This is an example! "
HKEY_CURRENT_USER \ example0
"Example3" = REG_MULTI_SZ "This is the first line! "" This is the second line! "" This is the third line! "
HKEY_CURRENT_USER \ example0
"Example4" = REG_EXPAND_SZ "This is an example! This is an example! This is an example! This is an example! This is an example! "
::::::: Example01.txt :::::::::: do not copy me. I am the end of the split line :::::::::::::: ::::::
::::::: Example02.txt ::::::::::: do not copy me, I am a split line start :::::::::::::: ::::::
HKEY_CURRENT_USER \ example0 [2 8 19]
::::::: Example02.txt ::::::::::: do not copy me, I am the end of the split line :::::::::::::: ::::::
Modify the first script and try again:
REGINI. EXE example01.txt
No response. It seems that it has taken effect. The key value is read-only!
Iii. Permission code table
1-full access by Administrators
2-access read by Administrators
3-Access to read and write by Administrators
4-access read, write, and delete by Administrators
5-full access by Creator
6-Creator read and write access
7-everyone full access
8-everyone read access
9-everyone read and write access
10-everyone reads, writes, and deletes access
11-full access to Power Users
12-Power Users read and write access
13-Power Users read, write, and delete access
14-full access to System Operators
15-System Operators read and write access
16-System Operators read, write, and delete access
17-System full access
18-System read and write access
19-System read access
20-Administrators read, write, and execute access
21-full access by Interactive User
22-Interactive User Read and Write Access
23-Interactive User reads, writes, and deletes access
4. Where can I use it?
After installing the system and anti-virus software, delete some service keys, modify the permissions of some self-start keys and file association keys, and so on. But then again,
Now, we can easily modify the permission limit, and the virus can also be modified back. The defense model is to transfer the regini.exe file and then use the registry monitoring software.
Modify the name of a registry monitoring software and add a shell (not anti-virus software, but malicious termination of anti-virus software). Add the software to the service and send an alarm once it is modified.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.