Books & Videos

Table of Contents

  1. Chapter 1 A Gentle Introduction to the Registry

    1. A Brief History of the Registry

    2. What Does the Registry Do?

    3. Advantages Offered by the Registry

    4. Registry Zen

  2. Chapter 2 Registry Nuts and Bolts

    1. How the Registry Is Structured

    2. What Goes in the Registry

    3. Getting Data In and Out

  3. Chapter 3 In Case of Emergency

    1. Don’t Panic!

    2. Safety Strategies

    3. All About Emergency Repair Disks

    4. Backing Up the Registry

    5. Restoring a Backed-up Registry

  4. Chapter 4 Using RegEdit

    1. Know Your Limitations

    2. Learning the RegEdit Interface

    3. “Just Browsing, Thanks”

    4. Connecting to Other Machines’ Registries

    5. Searching for Keys and Values

    6. Printing Registry Contents

    7. Working with Keys and Values

    8. Exporting and Importing Data

    9. RegEdit Command-Line Options

  5. Chapter 5 Using RegEdt32

    1. How RegEdt32 and RegEdit Differ

    2. Learning the RegEdt32 Interface

    3. Browsing with RegEdt32

    4. Remote Registry Editing

    5. Searching for Keys

    6. Saving and Loading Registry Keys

    7. Printing Registry Contents

    8. Editing Keys and Values

    9. Registry Security Fundamentals

    10. Securing Registry Keys in Windows 2000

    11. Securing Registry Keys in Windows NT

  6. Chapter 6 Using the System Policy Editor

    1. All About System Policies

    2. Introducing the System Policy Editor

    3. Managing Policies with POLEDIT

    4. Distributing Policies

    5. What’s in the Standard Policy Templates

    6. Picking the Right Policies

  7. Chapter 7 Using Group Policies

    1. What Are Group Policies?

    2. Introducing the Group Policy Snap-in

    3. Managing Policies

    4. Distributing Policies

    5. What’s in the Standard Policy Templates?

  8. Chapter 8 Programming with the Registry

    1. The Registry API

    2. The Shell Utility API Routines

    3. Programming with C/C++

    4. Programming with Perl

    5. Programming with Visual Basic

  9. Chapter 9 Administering the Registry

    1. Setting Defaults for New User Accounts

    2. Using Initialization File Mapping

    3. Limiting Remote Registry Access

    4. Fixing Registry Security ACLs in Windows NT

    5. Adding Registry ACLs to Group Policy Objects

    6. Encrypting HKLM\SAM with SYSKEY

    7. Miscellaneous Good Stuff

    8. Using the Resource Kit Registry Utilities

    9. reg: The One-Size-Fits-All Registry Tool

    10. Spying on the Registry with RegMon

  10. Chapter 10 Registry Tweaks

    1. User Interface Tweaks

    2. Filesystem Tweaks

    3. Security Tweaks

    4. Performance Tweaks

    5. Network Tweaks

    6. Printing Tweaks

  11. Chapter 11 The Registry Documented

    1. What’s Here and What’s Not

    2. HKLM\HARDWARE

    3. HKLM\SOFTWARE

    4. HKLM\SYSTEM

    5. HKU

    6. HKCR

    7. HKCU

    8. HKCC

    9. HKDD

  1. Appendix User Configuration Group Policy Objects

    1. Administrative Templates

  2. Appendix Computer Configuration Group Policy Objects

    1. Windows Settings

    2. Administrative Templates

  3. Colophon