The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:
What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.
What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to edit and secure the Registry both on local and on remote computers.
How can I access the Registry from a program? Regularly monitoring the Registry's contents is one way to preclude unpleasant surprises. Using examples in C++, Visual Basic, and Perl, Managing the Windows 2000 Registry demonstrates how to create Registry-aware tools and scripts.
What's in the Registry? Not all Registry keys are adequately documented by Microsoft or by the other vendors who store configuration data in the Registry. Managing the Windows 2000 Registry offers a guided tour of some of these undocumented keys.
This book is a "must have" for every 2000 system manager or administrator.
Chapter 1 A Gentle Introduction to the Registry
A Brief History of the Registry
What Does the Registry Do?
Advantages Offered by the Registry
Chapter 2 Registry Nuts and Bolts
How the Registry Is Structured
What Goes in the Registry
Getting Data In and Out
Chapter 3 In Case of Emergency
All About Emergency Repair Disks
Backing Up the Registry
Restoring a Backed-up Registry
Chapter 4 Using RegEdit
Know Your Limitations
Learning the RegEdit Interface
“Just Browsing, Thanks”
Connecting to Other Machines’ Registries
Searching for Keys and Values
Printing Registry Contents
Working with Keys and Values
Exporting and Importing Data
RegEdit Command-Line Options
Chapter 5 Using RegEdt32
How RegEdt32 and RegEdit Differ
Learning the RegEdt32 Interface
Browsing with RegEdt32
Remote Registry Editing
Searching for Keys
Saving and Loading Registry Keys
Printing Registry Contents
Editing Keys and Values
Registry Security Fundamentals
Securing Registry Keys in Windows 2000
Securing Registry Keys in Windows NT
Chapter 6 Using the System Policy Editor
All About System Policies
Introducing the System Policy Editor
Managing Policies with POLEDIT
What’s in the Standard Policy Templates
Picking the Right Policies
Chapter 7 Using Group Policies
What Are Group Policies?
Introducing the Group Policy Snap-in
What’s in the Standard Policy Templates?
Chapter 8 Programming with the Registry
The Registry API
The Shell Utility API Routines
Programming with C/C++
Programming with Perl
Programming with Visual Basic
Chapter 9 Administering the Registry
Setting Defaults for New User Accounts
Using Initialization File Mapping
Limiting Remote Registry Access
Fixing Registry Security ACLs in Windows NT
Adding Registry ACLs to Group Policy Objects
Encrypting HKLM\SAM with SYSKEY
Miscellaneous Good Stuff
Using the Resource Kit Registry Utilities
reg: The One-Size-Fits-All Registry Tool
Spying on the Registry with RegMon
Chapter 10 Registry Tweaks
User Interface Tweaks
Chapter 11 The Registry Documented
What’s Here and What’s Not
Appendix User Configuration Group Policy Objects
Appendix Computer Configuration Group Policy Objects
Paul Robichaux is an experienced software deveoper and author. He's worked on UNIX, Macintosh, and Win32 development projects over the past six years, including a stint on Intergraph's OLE team. He is the author of the Windows NT Server 4 Administrator's Guide.
Our look is the result of reader comments, our own experimentation, and feedback from distribution channels. Distinctive covers complement our distinctive approach to technical topics, breathing personality and life into potentially dry subjects. The animal on the cover of Managing the Windows 2000 Registry is a female or juvenile orangutan. The word "orangutan" comes from the Malay word for "man of the woods." Ancient legend has it that orangutans have the ability to speak, but choose not to because they are afraid that if humans find out, they will put the orangutans to work.Orangutans are native to the forests of Borneo and Sumatra. Male adults have long beards and mustaches and highly developed cheek pads and throat pouches. The throat pouches are used as resonators for mating calls and calls to mark territory. Human males have a similar throat pouch, called the "Morgagnitic pouch," but it is very small in most men. It becomes well developed in trumpet players, bass singers, and Muslim prayer callers.These great apes are almost completely arboreal. They move by swinging from one tree branch to the next, and descend to the ground only when there is no branch to swing to, or occasionally to gather branches for building sleeping nests. Because of the orangutans' method of locomotion, their arms are very strong and long, measuring up to 7.8 feet when outspread and reaching to the ankles when standing upright. Their legs, in contrast, are relatively weak. They eat primarily fruit, but will also eat bark, leaves, flowers, and eggs. They get their drinking water by scooping it out of holes in the trees.Orangutans mate while swinging from tree branches. Infants weigh approximately 3.5 pounds at birth. For about the first year the infant is completely dependent on its mother and clings to her by entwining its fingers in her fur. If orangutan babies are orphaned, they need to be given a substitute to cling to, and they usually display great affection for their surrogate mothers. Development in the first year is similar to that of human babies.Other than humans, orangutans have no natural enemies. However, as a result of hunting and habitat destruction, they are in danger of becoming extinct. Mary Anne Weeks Mayo was the copyeditor and production editor forManaging the Windows 2000 Registry. Ellie Cutler proofread the book. Jeff Holcomb, Madeleine Newell, and Jane Ellin provided quality control. Mary Sheehan and Emily Quill provided production support. Bruce Tracy wrote the index.Edie Freedman designed the cover of this book, using a 19th-century engraving from the Dover Pictorial Archive. Emma Colby produced the cover layout with QuarkXPress 4.1 using Adobe's ITC Garamond font.Alicia Cech and David Futato designed the interior layout based on a series design by Nancy Priest. Mike Sierra implemented the design in FrameMaker 5.5.6. The text and heading fonts are ITC Garamond Light and Garamond Book. The illustrations that appear in the book were produced by Robert Romano and Rhon Porter using Macromedia FreeHand 8 and Adobe Photoshop 5. This colophon was written by Clairemarie Fisher O'Leary.