BN.com Gift Guide

Managing the Windows 2000 Registry

Overview

The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:

  • What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? ...
See more details below
Paperback
$23.10
BN.com price
(Save 42%)$39.95 List Price
Other sellers (Paperback)
  • All (24) from $1.99   
  • New (11) from $11.04   
  • Used (13) from $1.99   
Sending request ...

Overview

The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:

  • What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.
  • What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to edit and secure the Registry both on local and on remote computers.
  • How can I access the Registry from a program? Regularly monitoring the Registry's contents is one way to preclude unpleasant surprises. Using examples in C++, Visual Basic, and Perl, Managing the Windows 2000 Registry demonstrates how to create Registry-aware tools and scripts.
  • What's in the Registry? Not all Registry keys are adequately documented by Microsoft or by the other vendors who store configuration data in the Registry. Managing the Windows 2000 Registry offers a guided tour of some of these undocumented keys.
This book is a "must have" for every 2000 system manager or administrator.

This is the system administrator's guide to maintaining, monitoring, and updating the Registry database. A "must-have" for every 2000 systems manager or administrator, it covers what the Registry is and where it lives on the disk, available tools, Registry access from programs, and Registry content.

Read More Show Less

Editorial Reviews

Booknews
Explains how to safely use the Registry database; how to administer, back up, and recover Registry data on computers running Windows 2000, both locally and over the network; and how to use the Registry editing tools Microsoft supplies, such as RegEdt32, the system policy editor, and group policies. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9781565929432
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 9/28/2000
  • Series: Windows 2000 Series
  • Edition number: 1
  • Pages: 558
  • Product dimensions: 7.12 (w) x 9.34 (h) x 1.08 (d)

Meet the Author

Paul Robichaux is an experienced software deveoper and author. He's worked on UNIX, Macintosh, and Win32 development projects over the past six years, including a stint on Intergraph's OLE team. He is the author of the Windows NT Server 4 Administrator's Guide.

Read More Show Less

Table of Contents

Preface;
Keys and Values and Classes, Oh My!;
Who’s This Book For?;
How This Book Is Organized;
Conventions Used in This Book;
Comments and Questions;
Acknowledgments;
Chapter 1: A Gentle Introduction to the Registry;
1.1 A Brief History of the Registry;
1.2 What Does the Registry Do?;
1.3 Advantages Offered by the Registry;
1.4 Registry Zen;
Chapter 2: Registry Nuts and Bolts;
2.1 How the Registry Is Structured;
2.2 What Goes in the Registry;
2.3 Getting Data In and Out;
Chapter 3: In Case of Emergency;
3.1 Don’t Panic!;
3.2 Safety Strategies;
3.3 All About Emergency Repair Disks;
3.4 Backing Up the Registry;
3.5 Restoring a Backed-up Registry;
Chapter 4: Using RegEdit;
4.1 Know Your Limitations;
4.2 Learning the RegEdit Interface;
4.3 “Just Browsing, Thanks”;
4.4 Connecting to Other Machines’ Registries;
4.5 Searching for Keys and Values;
4.6 Printing Registry Contents;
4.7 Working with Keys and Values;
4.8 Exporting and Importing Data;
4.9 RegEdit Command-Line Options;
Chapter 5: Using RegEdt32;
5.1 How RegEdt32 and RegEdit Differ;
5.2 Learning the RegEdt32 Interface;
5.3 Browsing with RegEdt32;
5.4 Remote Registry Editing;
5.5 Searching for Keys;
5.6 Saving and Loading Registry Keys;
5.7 Printing Registry Contents;
5.8 Editing Keys and Values;
5.9 Registry Security Fundamentals;
5.10 Securing Registry Keys in Windows 2000;
5.11 Securing Registry Keys in Windows NT;
Chapter 6: Using the System Policy Editor;
6.1 All About System Policies;
6.2 Introducing the System Policy Editor;
6.3 Managing Policies with POLEDIT;
6.4 Distributing Policies;
6.5 What’s in the Standard Policy Templates;
6.6 Picking the Right Policies;
Chapter 7: Using Group Policies;
7.1 What Are Group Policies?;
7.2 Introducing the Group Policy Snap-in;
7.3 Managing Policies;
7.4 Distributing Policies;
7.5 What’s in the Standard Policy Templates?;
Chapter 8: Programming with the Registry;
8.1 The Registry API;
8.2 The Shell Utility API Routines;
8.3 Programming with C/C++;
8.4 Programming with Perl;
8.5 Programming with Visual Basic;
Chapter 9: Administering the Registry;
9.1 Setting Defaults for New User Accounts;
9.2 Using Initialization File Mapping;
9.3 Limiting Remote Registry Access;
9.4 Fixing Registry Security ACLs in Windows NT;
9.5 Adding Registry ACLs to Group Policy Objects;
9.6 Encrypting HKLM\SAM with SYSKEY;
9.7 Miscellaneous Good Stuff;
9.8 Using the Resource Kit Registry Utilities;
9.9 reg: The One-Size-Fits-All Registry Tool;
9.10 Spying on the Registry with RegMon;
Chapter 10: Registry Tweaks;
10.1 User Interface Tweaks;
10.2 Filesystem Tweaks;
10.3 Security Tweaks;
10.4 Performance Tweaks;
10.5 Network Tweaks;
10.6 Printing Tweaks;
Chapter 11: The Registry Documented;
11.1 What’s Here and What’s Not;
11.2 HKLM\HARDWARE;
11.3 HKLM\SOFTWARE;
11.4 HKLM\SYSTEM;
11.5 HKU;
11.6 HKCR;
11.7 HKCU;
11.8 HKCC;
11.9 HKDD;
User Configuration Group Policy Objects;
Administrative Templates;
Computer Configuration Group Policy Objects;
Windows Settings;
Administrative Templates;
Colophon;

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)