SoFunction
Updated on 2025-04-14

Registry Basics—One of the complete guide to using the registry


1. Registration Basics
Microsoft uses the registry to manage software and hardware configurations in a unified manner, which greatly improves the stability and security of the system, and also makes it easier for us to maintain and manage the system.

(I) Registry Basics ABC

In general, the registry is actually a huge database, which contains all configuration information, initialization information and other important data of the application and system software and hardware. From the perspective of general users, the registry system consists of two parts: the registry database and the registry editor. The registry database includes two files: and. The former is used to save computer system information, such as the installed hardware and device driver information, etc.; the latter is used to save information unique to each user, such as desktop settings, wallpaper or window color settings, etc. They are usually placed in the Windows directory of C drive. At the same time, in order to prevent corruption of the registry file, Microsoft specially prepared two backup files System.da0 and User.da0 (the file type is .da), which are also placed in the Windows directory of the C drive.
There is also a folder in Windows 98 that is specially used to store backup files, namely C:\Windows\Bak. In contrast, the registry editor is a tool used to edit the registry in various ways. You can click Run in the Start menu and fill in "Regedit" in the Run dialog box to see the Registry Editor.
If you find that the small hook before ScanRegistry is not removed in the startup item of the "System Configuration Utility", the system will automatically call the registry to backup once a day. The backup registry is labeled as a cab package and placed in the C:\Windows\sy**ckup directory. The file name is and the hidden attributes are added (generally there are five).
Let's take a look at the six predefined main keywords (i.e. root keys) in detail:
(1) HKEY_CLASSES_ROOT: The base-level category key defines all registered file extensions, file types, file icons, etc. in the system.
(2) HKEY_CURRENT_USER: Defines all permissions of the current user, which is actually part of the content below HKEY_USERS\.Default, which contains the login information of the current user.
(3) HKEY_LOCAL_MACHINE: Defines all information about the software and hardware of the local computer (relative to the network environment). When the system configuration and settings change, the login items below will also change.
(4)HKEY_USERS: Defines all user information, some branches will be mapped to the HKEY_CURRENT_USER keyword, and most of its settings can be modified through the control panel.
(5)HKEY_CURRENT_CONFIG: Defines the current configuration of the computer, such as optional external devices such as monitors and printers, and their settings information. It is actually a pointer to a branch in the HKEY_LOCAL_MACHINE\Config structure.
(6) HKEY-DYN-4DATA: Defines dynamic data during system operation, that is, information about events that have occurred. It not only contains the current state of the system hardware, but also contains the data that needs to be updated and retrieved. This keyword is created every time the system starts.
In addition, each root key is composed of several primary keys. The key name represents a specific registration item. The key value can be divided into string value, binary value and DWORD value, and can all be modified using the registry editor.
The Windows registry is the lowest-level setting that controls the startup and operation of the system. Its files are and are not only crucial, but also extremely fragile.

(II) Basic methods to modify the registry

The command string "REGEDIT" must be used in the first line of the registry text file, which is used to notify the system call regedit to complete the merge of the registration information. Each next line represents a declaration of a key value or is annotative explanation information.
The declaration format of the primary key and its default key value is:
Root key\first primary key\second primary key\...=Default key value
For example, if you want to add a "compressed" primary key under the "*" primary key of the root key HKEY_CLASSES_ROOT, in order to directly compress the selected file through the context menu, the declaration of its primary key is as follows:
HKEY_CLASSES_ROOT\*\shell\Compression (&U)\command = C:\dos\ a Temp$%1 Where "shell" and "command" are both fixed and cannot be changed or replaced. "shell" indicates that the command will be added to the context menu, and "command" indicates the specific command line information. Also note that in the key-value string on the right side of the equal sign, if you want to specify the path of the file, the "\" character should be replaced by "\\" and a space that separates the equal sign should be added before and after the equal sign.
Any line starting with a semicolon is an explanatory information line. Users can use the explanatory line to give necessary annotations to the commands in the file to make the commands easy to understand.
Using any editor, editing generates a list of primary key declaration lines and descriptive lines, and saves the file as a text file with the extension ".reg", that is, a registry text file is created.

2. Elementary registry application

The importance of registry in Win 9x is well known. So for this reason, Win 98 has added a new gadget - Registry Checker (Scanregw). Scanreg automatically runs every time Win 98 is started every time you boot, check the system registry, and make a backup once for each boot day, package the four files into Cab files to rb00? .Cab is named, stored in the system backup folder Sy**ckup, and the 5 most recent backup documents are saved by default. When an error occurs in the registry, it is restored with a backup. Usually, if there is a problem with the registry or it is not up to our own opinion, we can also use it to recover.

(1) Make good use of the "registry checker program"

Commonly used commands for Scanreg are as follows:
Scanreg /backup /restore /comment /fix
Parameters include:
/Backup: Backup the registry and related system configuration files.
/Restore: Select a spare part file for system recovery.
/Fix: Fix the registry
/Comment="<Comment>": When making system backups, add specific comments and labeled text to the CAB package.
/Autoscan: Automatically scan the registry and back up automatically (if there is already a backup for the same day, there is no prompt)
/Scanonly: Scan the registry, if there is an error, it will prompt that the registry will not be backed up.
/opt: Compress the registry, and execute automatically if there is more than 500KB of space during each boot check. This command will also run when running /Fix.

1. Manually start the "registry checker program"
In some cases (if the user has artificially banned the automatic running function of the "registry checker"), we still need to manually start the "registry checker" to check the system.
"Start" - "Run" - "Scanregw" - "OK", start the "registry checker program", and the registry database will be automatically checked. If it is correct, it will ask the user whether to back up the registry database again. If there is any problem, it will recommend that the user use the information backed up the last time to restore it to ensure that Windows 98 is running normally.
It should be noted that the inspection and backup scope of the "registry checker program" is not limited to the registry database. It also processes and etc. files to ensure the safe operation of Windows 98. In addition, the "registry checker" uses a compressed backup method when backing up files. It compresses all files that need to be backed up into a CAB compressed package, and then saves them in the Sy**ackup subdirectory of Windows 98 under the name Rb???.cab (the serial number of the CAB compressed package file). This not only saves disk space, but also improves the security of backup files.

2. DOS runs the registry checker program
The registry checker under MS_DOS can be used to back up and restore the registry.

(II) Use registry maintenance and optimization software

The best registry maintenance and optimization tools are of course the Windows Doctor provided by Norton Utilities and Registry Sweep provided by Norton Cleansweep. The former focuses on diagnosis and repair, while the latter is good at weight loss and optimization. For Windows Doctor, its advantage is that it not only provides a powerful self-test function for system registry error settings, but also can be fully automatic. Registry Sweep can completely lose weight for your registry and completely remove the useless system garbage in the registry. They are all quite smart. Even if you know nothing about the maintenance of the registry, just by "Next" all the way, you can easily repair and optimize the registry, which is a complete "fool".

Registry Wizard in Nuts & Bolts is also a very satisfactory registry maintenance tool. It also has repair and weight loss functions, and cleansing the registry is fast and good.

Of course, if you don't want to choose an integrated system maintenance tool, you can use a dedicated registry maintenance and optimization software. Optimization Master and Super Rabbit registry optimization software are very good. It can not only fix errors, but also remove a lot of registry garbage.

The classic registry optimization tool RegClean is also the first choice. With Microsoft's dominant position in the operating system field, its registry cleaning tool is worthy of your trust.

There are other things not to be introduced

(III) Manual registry modification BBK

Sometimes we really hope that the computer's interface and settings can change, so that it can also satisfy our ostentatious personality. Modifying the registry is a good method. Most of the principles of tool software are used to make changes to the system through operations on the registry, but you don’t need to do these tasks and you don’t see them. If you really want to become a computer expert, how can you not learn to modify the registry?

1. Add warning title or greeting information when starting Windows
Create two new string values ​​under Hkey-Local-Machine\Software\Microsoft\Windows\CurrentVersion\Winlogon. One is the title of the information box: "LegalNoticeCaption", and its value may be set to "Please pay attention!"; the other is naturally the content of the information box: "LegalNoticeText" = "It doesn't matter if you go to the computer, but don't have to be too long. You still have a lot of things to do!". In this way, when you start the system, there will be a message box to remind you to pay attention to the time and efficiency of getting on the computer so that you will not lose your ambition. Of course, you can enter other mottos or greetings to give a very personalized "opening remark".

2. Delete unwanted subitems in the start menu
Sometimes when you no longer need a child in the Start menu for some reason, you can modify the registry to delete it. Under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Add the corresponding DWORD value, among which the subkeys that can be deleted are: Favorites, Documents, Control Panel, Find, Run, Logout, Close the system and click the active icon starting from here. The corresponding keys are: "NoFavoritesMenu", "NoRecentDocsMenu", "NoSetFolders", "NoFind", "NoRun", "NoLogoff", "NoClose" and "NoStartBanner". All key values ​​are "1" for off and "0" for activation (that is, the original Windows default status). The settings of HKEY_CURRENT_USER correspond to all users. If you want to target the currently logged in user, you can change it in the corresponding directory of the HKEY_USERS subtree.

3. Hide the drive and disable the taskbar
You can even hide a drive when necessary to prevent others from peeking at your privacy or confidential documents. Create a new binary string value "NoDrives" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. The relationship between this key value and the corresponding drive to be hidden is: "01 00 00 00" is the hidden A drive, "02 00 00 00" is the B drive, "04 00 00 00" is the C drive, "05 00 00 00" is the D drive, and all hidden is "FF FF FF FF". "NoSetTaskbar" with DWORD value "1" under the same path can prevent others from using your taskbar.

4. Lock the desktop and prohibit the use of the registry editor
When you don't want others to modify personal settings on your machine, you can lock the desktop directly, or even disable Regedit, the registry editor, to others (but don't forget to leave a way out for yourself and reserve a second modifier). Add "NoSaveSettings" and "NoChangeStartMenu" with DWORD value of "1" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. After that, the system will not save the changes made to the user, which means that some changes made by the user to the system are only valid for the current run, and will automatically return to the state before the modification after restart. Create a new primary key "System" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies. You can use "DisableRegistryTools" with a DWORD value of "1" to prohibit the use of regedit.

5. Cancel the automatic playback function of the CD, or disable the AUTORUN (automatic run) function but retain the automatic playback function of the CD.
Set the binary value "AutoInserNotification" under the primary key of HKEY_LOCAL_MACHINE\Enum\SCSI\LITEON__CD-ROM_LTN403L__F (This is the optical drive information, yours may be different from me)\MF & CHILD0000 & PCI & VEN_1106 & DEV_0571 & SUBSYS_0000000 & REV_06 & BUS_00 & DEV_07 & FUNC_01 to 00. Or delete the content of the primary key "play" under HKEY_CLASSES_ROOT\AudioCD\shell.
The Autorun function is disabled, but the automatic playback of the CD can be changed to "bd 00 00 00" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.

6. Manual control system automatically loads the running program when it starts
Several primary keys of Run under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion are the automatic running programs loaded when the system starts. The corresponding Run- can be flexibly handled according to different situations and controls the automatically run programs by yourself.
It should be noted that the programs in RunServies start loading when the operating system starts, and the programs under Run are run after Windows is initialized, so the programs in Runservies must run before the programs in Run. Be careful when deleting them!

7. Delete incompletely deleted software messages
Sometimes when we directly delete certain folders or manually uninstall the software, we do not completely clear the software information we want to delete from the system. In addition to using the anti-installation software to help you clean up the garbage, you can also use the registry editor to delete the primary key of the corresponding software under HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Uninstall. From now on, I will no longer be afraid of garbage pollution!

8. Set multiplexed opening of associated files
Now take the BMP file as an example to briefly describe its setting method. You can learn from one example and use it flexibly. Under HKEY_CLASSES_ROOT\* Click * Create a new primary key and name it "Shell". Right-click "Shell" and create a new primary key and enter your favorite name. Here, take "Opening" as an example. Next, right-click "Open With" and create a new primary key and name it "Command", edit "Default" and enter "OpenAs_RunDLL %1". When there is a BMP file in the future, right-click the icon, and an additional "Open Method" we just built will appear in the pop-up menu. Click it and you will find the usefulness.
3. Advanced Registration Application

The tool software can perform a series of optimizations on the registry and other operations. But when encountering special cases, they will not work, and we still need to do it manually. Before operating the registry, remember to make a backup, otherwise it is very easy to "fall into eternal regret".

(I) Modify the registry to express personality

Change the general icon size (pixel): Change [HKEY-CURRENT-USER\Control Panel\desktop\WindowMetrics] and make Shell Icon Size=″32″.

Change the size of the small icon (pixel): In [HKEY-CURRENT-USER\Control Panel\desktop\WindowMetrics], just change or create a new Shell Small Icon Size=″16″.

The system is prohibited from right-clicking the pop-up menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create the key value NoViewContextMenu= 01 00 00 00.

The taskbar is prohibited from right-clicking to pop up menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoTrayContextMenu=01 00 00 00.

Hide the [Control Panel] and [Printer] menu items in the [Settings] menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new key value NoSetFolders=01 00 00 00.

Hide the [Taskbar and Start Menu] menu item in the [Settings] menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new key value NoChangeStartMenu=01 00 00 00, NoSetTaskbar=01 00 00 00.

Hide [Folder Options...] in the [Settings] menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoFolderOptions=01 00 00 00.

Hide the [Active Desktop] item in the [Settings] menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoSetActiveDesktop=01 00 00 00.

Hide the [Windows Update] item in the [Settings] menu: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoWindowsUpdate=01 00 00 00.

Disable the "document" recording function: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoRecentDocsHistory=01 00 00 00.

Automatically clear document content when exiting: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new ClearRecentDocsOnExit= 01 00 00 00.

Disable the automatic operation of the data disc: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer], create a new NoDriveTypeAutoRun=00 00 00.

Disable the CD disc to run automatically: In [HKEY-CLASSES-ROOT\AudioCD\shell], create a new key value @=″ ″

Remove the "shortcut" string that is automatically added when creating a new shortcut: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Explorer], let Link=00 00 00 00. or
    HKEY-LOCAL-MACHINE\Software\Classes\lnkfile
HKEY-LOCAL-MACHINE\Software\Classes\piffile
There is a string value of "IsShortCut" in the above two key values. Delete it.

MS-DOS is prohibited: In [HKEY-CURRENT-USER\Software\Microsoft\Windows\CurrentVersion\Policies\WinOldApp], create the key value Disabled=01 00 00 00.

Wait time (milliseconds) for closing the "Unresponsive Application": In [HKEY-CURRENT-USER\Control Panel\desktop], create a new WaitToKillAppTimeOut=″10000″

Close the waiting response time (milliseconds): In [HKEY-CURRENT-USER\Control Panel\desktop], create a new HungAppTimeout=″10000″.

Change the Windows 98 startup box. Open HKEY_LOCAL-MACHINE/SOFTWARE/Microsoft/Windows/Current Version, select the Version string, double-click to change Windows 98 to the name you want.

Start the Explorer directly through "My Computer". Open HKEY_CLASS_ROOT/CLSID/{20D04FE0-3AEA-1069-A2D8-08002B30309D}/shell, right-click the shell to create the new primary key "Open", and then create the "Command" primary key under Open, and change the key value to "explorer /e c:\" (the default opening path is "c:\". If you want to change, change "c:\" to the specified path name). After the effect occurs, double-clicking "My Computer" will open the "My Computer" window, but the Explorer.

Change the installation path of Windows 98. Open HKEY-LOCAL-MACHINE\Software\Microsoft\Windows\CurrentVersion\Setup. Find "SourcePath" in the window on the right, and then change it to what you want.

Clear file names accumulated in the Run and Find dialogs
Open HKEY_USERS/Default/Software/Microsoft/Windows/Current Version/Explorer/Runmru and delete it in the "Run..." dialog box in the right window;
Open HKEY_USERS/Default/Software/Microsoft/Windows/CurrnetVersion/Explorer/DOC Find Spec MRU and delete it in the "Find..." dialog box in the right window.

Let the "Recycle Bin" change its name or delete it from the desktop. Open HKEY-CLASSES-ROOT/CLSID/{645FF040-5081-101B-9F08-00AA002F954E} to change the key value of the "default" string from "Recycle Bin" to other.
Open HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/Explorer/Desktop/Namespace/{645FF040-5081-101B-9F08-00AA002F954E}, right-click the "Default" string in the right window and select "Delete". You can delete the "Recycle Bin". If you want to recover, perform its reverse process. Create a new primary key named {645FF040-5081-101B-9F08-00AA002F954E} under the NameSpace primary key.

Hide all icons of the desktop HKEY-CURRENT_USER/Software/Microsoft/Windows/CurrentVersion/Policies/Explorer, create a new /Dword in the blank space of the right window, and change its key value to 1. When restoring, just change the value to 0 or delete Nodesktop directly. If you change the name to Nosavesettings and double-click to change its key value to 1, it will keep the desktop in its state when it was set for the first time, that is, lock the desktop. If you change the name to Noclose, double-click to change its key value to 1, then there is no "Close System" option on the Start menu after it takes effect. The recovery method is the same as above.

Accelerate the speed of hierarchical menus
Open HKEY-CURRENT-USER/control Panel/desktop, click Edit, select "Add", select "Serial Value", name it MenuShowDelay, double-click it, set the value 1-10 in the adjustment column, and 1 is the fastest

Automatically log in to the username and password when starting Windows
Open HKEY-LOCAL-MACHINE\Software\Microsoft\Windows\Current Version\Winlogon, create a string "Default Password", and change its value to the default user port.
The default username location is: HKEY-LOCAL-MACHINE\etwork\Logon.

Change the icons of "My Computer" and "Recycle Bin"
"HKEY-LOCAL-MACHINE\SOFTWARE\Classes\CLSID" option, then select "Edit"\"Find", type "Recycle Bin" and confirm. When you find this item, select the DefaultIcon option of the item, double-click "Full" (or "Deafult" and "Empty") in the name bar. The icon file corresponding to "Recycle Bin" is displayed in the pop-up dialog box. Change this value to the icon file you like (note that you need to write the full file path). You can modify the "My Computer" icon in the same way, just type "My Computer" when searching and confirm.

Add "Quick Clear Recycle Bin" to the folder menu. Enter "HKEY—CLASSES—ROOT\*\shellex \ContextMenuHandlers", right-click the ContextMenuHandlers folder in the left column, and then "New" \"Primary key", change the name of the new folder to "{645FF040-5081-101B-9 F08-00AA002F954E}", and then press Enter to confirm.

Delete unnecessary options in the run window. Save these operations in the right window of HKEY—USER\.Default\Software\Microsoft\Windows\CurrentVersion\Exploer\RunMRU, just delete the unnecessary string values.

Add each component in the control panel directly to the "Run" menu. Use the resource manager to create a folder called "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309d}" under c: \Windows\Start Menu (Note: input spaces, periods, and braces, there must be no errors. The numbers in the braces here are the class identifiers corresponding to the control panel in the registry. They can be found under HKEY_CLASSES_ROOT\CLSID in the registry editor. The values ​​of each machine may vary, and the results should be based on the searched results.

Delete the "system level" icon on the desktop. When you cannot use the general method to delete the icons of the Recycle Bin, Inbox, or Online Neighbors, first record the keywords of the branch under HKEY-LOCAL-MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace and the string value of the right window (using paper and pen) (for recovery), and then delete the unnecessary branches.

Modify the ownership name of the software. Modify the ownership key value of HKEY—LOCAL—MACHINE\SOFTWARE\Microsoft\Deveoper\Setup right window

Animation effect when changing the window. HKEY—CURRENT—USER\Control Panel\Desktop\WindowsMetrics. On the right, enter Minanimate and press Enter, and change the key value of Minanimate to 0.

Set two IP addresses for a machine. HKEY—LOCAL—MACHINE\System\CurrentControlSet\Services\Class\NetTrans, 0000, 0001, 0002... directories, which are used to record the installation of the protocol. Find the directory where DriverDesc is "TCP/IP", and modify the two keys IPAddress and IPMask. Where IPAddress is multiple IP addresses separated by commas, and IPMask is the corresponding mask. For example, when setting IPAddress to "202.10.1.10, 202.10.1.25" and IPMask to "255.255.255.0, 255.255.255.0", it means that two IP addresses 202.10.1.10 and 202.10.1.25 are set for the system.

Time can be personalized
Open HKEY_CURRENT_USER\ControlPanel\International primary key and create a new string named "sTimeFormat" in the blank space of the window on the right. Modify its key value to "hh dot mm points".

Let your beloved wallpaper stay on the desktop forever
HKEY_CURRENT_USER\Software\ Microsoft\Windows\CurrentVersion\Policies subkey, create a new subkey named "ActiveDesktop", and create a new double-byte value (that is, WORD value) under it, name it "NoChangingWallPaper", and set the value to "1".

Prevent others from changing user desktop settings
Open "NoSaveSettings" in HKEY_CURRENT_USER\Software\Microsoft\WindowsCurrentVersion\Policies\Explorer (if there is no such key, the user can add it by himself), and change its key value from 0 to 1, and you can lock all desktop settings.

View thumbnails
Win 2K users can directly view the thumbnails of image files in Explorer, while Win 98 users cannot directly view them, but it is enough to use the following modifications.
Open HKEY_CLASSES_ROOT\\DefaultIcon, double-click "Default" in the right pane, change "1" at the end of the key value parameter to "%1", and restart.

Retrieve lost prompt message
In Windows, when you stick your mouse over icons such as "My Computer", a line of prompt message will appear. What should I do if the prompt is gone?
Open the HKEY_CURRENT_USER\Software\Microsoft\WindowsCurrentVersion\Explorer\Advanced subkey, in the window on the right, double-click "showInfoTip", set its value to 1 in the pop-up dialog box, and the prompt is back.

Terminate locked program
When we shut down or restart the computer, an error dialog sometimes pops up, reminding the user that "a program is still running, please close all programs first, and then exit Windows". This shows that because a program is in a locked state, the user cannot exit the system. The usual method is to use three hotkeys and click the end task to force the locked program. We can terminate the locked program by modifying the registry, and let the system safely close the system to open HKEY_CURRENT_USER\Controlpanel\desktop, double-click the "AutoEndTasks" item in the right window, and change its value to 1. If this item is not available, you can create it and modify it.

Delete redundant .dll files
Open the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Currentversion\SharedDlls subkey. In the window on the right, the data of each value item indicates that there are several programs that share the .dll file of the value item. If the data is 0, you can know that the file is not shared by the program and can be deleted.

Remove excess color scheme
Open the HKEY_CURRENT_USER\Control Panel\Appearance\Schemes subkey, and the various color schemes that come with the system are displayed in the window on the right. Select a plan and then delete it. Be careful to keep the "default" item when deleting.
(II) Network and security settings for actual registry combat

1. Network settings

Set up the connection to resume when logging in
In Windows, remote shared directories can be mapped to a local drive, which will facilitate daily operations of LAN users. If you want to use network resources frequently, you can set the computer to automatically resume connection the next time you log in.
Open the HKEY_LOCAL_MACHINE\SYSTEM\Current ControlSet\Control\NetworkProvider subkey, create a new double-byte value, and name it Restore Connection. Just set the value to 1.

Speed ​​up the Internet
Open the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\MSTCP subkey, set the value to 128 in the window on the right. Then open the HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Class\NetTrans subkeys, and set the values ​​of the MaxMTU and MaxMSS terms to 576 and 536 respectively.

Set up automatic dialing function
Open the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVesion\Internet Settings subkey, double-click NoNetAutodial in the right window, and set the value to 01000000.

2. Security settings

Set Win 98 boot password
When Win 98 is started and logged out, it will require the user to enter the user name and password, but click "Cancel" to enter, which cannot prevent unauthorized users from using it. Just adjust a few settings to prevent illegal users from using it.
(1) You need to change the login method to "Microsoft Friendly Login". Open the control panel, double-click the network icon, select "Microsoft Friendly Login" in the drop-down list under "Basic Network Login Method", and then click "OK", so that it will set it as the basic login method. If not found, it means that it is not installed, then you need to add it.
(2) Next create a user. In Control Panel, double-click the User icon. Click the "New" button to create a username for each user who can use this machine. You can enter your password immediately, or you can leave it until the user logs in and modify your password yourself.
(3) Open HKEY_LOCAL_MACHINE\Network\Logon, create a new DWORD value on the right, change it to "MustBeValidated", double-click it, change the value to 1, and just restart and see if you can enter the system with "Cancel".

Security requirements for setting passwords
The Windows system allows any character or string as passwords, including spaces, under the default configuration, which is quite unsafe. Let’s modify the registry to make the password set by the user include letters and numbers, thereby enhancing the security of the system.

Open HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies, create a new Network subkey, and create a new double-byte value named AlphanumPwds in the right window, with the value of 1.

Clear * Horse Program BO
BO's file is a file with a fully transparent icon. It copies itself to the hard drive and renames itself to "Space.EXE".
Open the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run subkey. If the default under this key is .exe, it means that you have been hit by the BO * and delete the key. Then restart the computer and delete the spaces.exe and under Windows\system. Clearing other *s is similar to this and will not be described in detail.

Automatically run screen security on the power
Open the HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run subkey, create a new string item named "Password Confirmation", and enter the path and name of the screensaver program in the value column.

Uninstall the screen saver password
Open HKEY_USERS\.Default\Control Panel\ desktop, find ScreenSave_Data in the right window, and delete the key. In this way, the screen saver's password will be easily uninstalled.

(III) Flexible backup and rapid recovery of the registry

Since the registry is open when Windows is run, we cannot write it, that is, we cannot restore and repair the registry. In actual use, a more flexible and fast method can be used to maintain the registry.

Flexible backup
1. The registry checker's self-start privilege was cancelled, and it was allowed to be on call, completely obeyed me, and only took action when it was time to take action. This also has other benefits, which is to speed up Win 98 startup.
2. After installing and debugging Win 98 and commonly used applications and optimizing the registry, run the Scanregw program to make a backup document. This backup is the most basic document and is generally not moved.
3. After the system changes in the future, after the normal operation is confirmed, it will make another backup. This time it is an active backup, but only 1 is retained, that is, the latter always replaces the previous one, which is rb001 or rb002.
In this way, 2 backups are always retained, which not only saves a certain amount of disk space, but also meets our wishes and shortens the startup time of Win 98. And when recovering, choose between rb000 and rb001 (or rb002), which is simple and clear, saving time and effort.

Quick recovery
When the registry is damaged or must be restored in case of our wishes, in pure DOS mode, type scanreg/restore, and follow the prompts. This method is really easy to do, you can do this:
Enter the pure DOS mode ("Shut down the system" → "Restart the computer and switch to MS-DOS mode"), and type under C:\WINDOWS:
attrib -s -h -r *.dat
extract/e/y sy**ckup\ *.dat
If the versus is also to be restored, change *.dat to *.*, that is:
attrib -s -h -r *.*
extract/e/y sy**ckup\ *.*
(Where x in rb00x is an unknown number, the specific backup file name should be used during operation)
After finishing, type exit or press Ctrl+Alt+Del to restart Win 98.


(IV) The method of restoring the registry is disclosed

1、Scanreg
If your system is Windows 98, you can use it to backup and restore the system, and its biggest advantage is that it is simple and fast. Its default directory is C:\Windows\command.

2. Export and import method under dos
Run "Regedit" to open the registry editor, click the "Register" menu, select "Export Registry File", enter the file name in the open dialog box, and save it. When you need to restore your registry, "Import registry files" from the backup path is done.

Export registry file Command format:
Regedit /L:system /R:user /E Regpath
Detailed explanation of parameters:
/L:system specifies the path to which the file resides.
/R:user specifies the path to which the file is located.
/E: This parameter specifies that the registry editor will export the registry operation. After this parameter, one space is left, enter the file name of the export registry.
Regpath specifies which registry branch to export, and if not specified, all registry branches will be exported.
Notes:
The /L:system and /R:user parameters are optional. If default, the registry editor considers it to operate on the sum in the Windows directory. But if you start from the floppy disk, you must use the /L and /R parameters to specify the specific path to the file, otherwise the registry editor will not be able to find them.

Import registry file Command format:
Regedit /L:system /R:user
Detailed explanation of parameters:
/L:system specifies the path to which the file resides.
/R:user specifies the path to which the file is located.
Notes:
Importing the registry and exporting the registry are different in parameters. It only needs to specify the path to the imported .reg file, without parameters like "/E" and "/C".

3. Rebuild the registry under dos command format:
Regedit /L:system /R:user /C
Detailed explanation of parameters:
/L:system specifies the path to which the file resides.
/R:user specifies the path to which the file is located.
/C: This parameter will tell the registry editor to re-create the registry with the contents in the specified .reg file.
Notes:
Parameters/C are dangerous options, which will import the entire contents of the specified registry file and create a new registry from beginning to end.

Delete the registry branch below
This command can delete a subkey branch in the registry.
Command format:
Regedit /L:system /R:user /D REGPATH
Detailed explanation of parameters:
/L:system specifies the path to which the file resides.
/R:user specifies the path to which the file is located.
/C: This parameter tells the registry editor to delete the registry subkey branch specified by REGPATH.
Notes:
Parameters/C will delete all contents contained under the specified subkey, including all subkeys, key-value items and key values.

5. Repair the registry file under DOS (see Primary Application) Command format:

6. Coverage reduction method. Specifically, it can be divided into two types.
The first type is to restore using two DAT files. If you can no longer enter the Win 98 system, you can boot with DOS or Win 98 boot disk, or simply boot from "DOS Prompt", enter the C:\Windows directory, modify the properties of these two files and delete them, and then overwrite the two backup files.da0 on the corresponding .dat file (leave one without overwriting). If you are familiar with the Xcopy command under DOS, you can use it. Of course, if you can still enter the system, isn't it easier to operate directly under Windows? Modify properties, delete the source file, and change the name of the backup file.
The second type is to extract the files in Sy**ackup. Since Sy**ackup is an implicit directory, if you cannot enter the system, you also need to use the Attrib command to remove hidden attributes. When you use the Win 98 boot disk to enter DOS, you can use the commands provided in the boot disk to decompress the C:\Windows\sy**ackup\ to C:\Windows\, and overwrite the source file to complete the recovery of the registry. What you should note is that there are generally 5 files, and try to choose the one with the date closest to the stable period. For example, A:\>extract/e/l dir C:\Windows C:\Windows\sy**ackup\ *.*. Of course, you may not start with a startup disk, so go to C:\Windows\Command\ and find the Extract command, which will be easy to do. As for unzipping the compressed package under Win 98, it is even easier. Just find the file you want to restore, double-click to open it, and unzip the four files (and two system configuration files) to C:\Windows\ respectively.

4. Windows 2000 registry skills

(I) Backup Win 2000 Registration

1. Use backup tools
Win 2000 backup program) is a highly compatible tool. The backup process is simple and clear. It can be used as a regular backup tool and can be backed up at any time. When the backup function is started, select the system status in the backup tree. The backup tool will save the registry file, startup system file, COM+ class database, server public shared directory, etc. The backup file is based on the .bkf extension, and the backup file is placed on an infrequently accessible and relatively safe disk. During recovery, you can directly execute the .bkf file, and the wizard will prompt you how to complete the entire restore process.

2. Use the Registry Editor
Registry editing tool Regedit is another registry tool for Win 2000. Open the "Run" window of the "Start" menu, enter Regedit in the open bar and you will see the screen as shown in Figure 2. Select the "Export Registration File" item in the "Registration" menu, and a window will pop up. Select the path and file name to save the registry file, and then click Save and it will be OK. The backup file has the .reg extension. It is worth reminding that this method does not back up the security registry file and the security account manager registry file. When restoring, just double-click the backup .reg file, or type: Start .reg in the command line.

3. Use the recovery console
The Recovery Console is a newly added tool for Win 2000 to restore the system from multiple failures. The Recovery Console is not the default installation of Win 2000 and must be installed before it can be used. The steps to install the recovery console are to insert the Win 2000 installation CD, type: Install CD letter\i386\/Cmdcons in the run window, and start the recovery console installation program. After the Recovery Console is installed, the "Recovery Console" option appears in the Start menu. After starting the Recovery Console, use the Copy command of the Recovery Console to copy the files under the %Systemroot%\System32\Config directory to a secure directory. During recovery, overwrite the files in the backup directory in the files in the %systemroot%\system32\config directory, and the registry file is restored. It is worth reminding that the COPY command under the recovery console does not support wildcard characters "" and "?", so you can only copy one file at a time, which is more troublesome to use.

4. Use the installation disk
Installer recovery registry is the best choice when there is no other registry backup. Insert the Win 2000 installation disk into the optical drive, enter CMOS settings, and set the system to boot from the optical disk. When the installer starts, first detect the hard drive and view the installed Win 2000 and its repair path. Then the interface for selecting operations will appear. Press "R" to repair Win 2000. In the next interface, there are four options, select "Check Registry Files" (to fully restore the system, it is best to select all four items). The installer begins to repair the selected installation. After repairing the registry file, the system restarts and Win 2000 will work properly.

5. Use emergency repair disk
The method to create an emergency repair disk is to use the NTBackup tool and select "Emergency Repair Disk" in the welcome tag. Select the option "Copy registry file into repair directory" check box, and the current registry file will be automatically backed up to the %Systemroot%\Repair folder while creating an emergency repair disk. The process of repairing the registry with an emergency repair disk is basically similar to using an installation CD, and will not be described.


(II) In-depth analysis of the Win 2000 registration form

1. Main features of Win 2000 registry

Center storage address
Summary of configuration information previously scattered on the computer hard drive.
Software Information
One of the functions of the Win 2000 registry is to record the system's software configuration, including Win 2000 itself.
Hardware information
The registry records all the hardware status of the PC in Win 2000.

2. The main role of the Win 2000 registry

Record installation selection
Set up hardware
Set up Win 2000
Run the startup program
Define how Win 2000 is displayed
Determine the component method
Report configuration data to administrators

3. Five major functions of Win 2000 registry

Correct Win 2000 errors.
Recover the crashed system
Improve operation speed and ease of use
Improve safety
Control the server


(III) Practical Tips for Win2K Registry

Remove "My Computer" from the desktop
Open the registry utility RegEdit and find the subkey
HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}
When opening it, we can see that the key's meaning and default key value are listed on the right. Delete the subkey, then refresh the desktop and look for this icon on my computer.

Replace "My Computer" with the current computer name and user name
HEKY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} subkey, copy its subkey LocalizedString key value to Notepad (for example, @C:\winnt\system32\, -9216@1033, my computer). Remove subkey LocalizedString. Then rebuild it with data type REG_EXPAND_SZ. Copy the contents of the Notepad to the newly created key and change "My Computer" to "%username% on %computername%".

Hide the most recently logged in users
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
Find the key DontDisplayLastUserName, the value is set to 1. 1 means True (yes), and 0 means False (no).

Speed ​​up your Start Menu and Taskbar
HKEY_CURRENT_USER\Control Panel\Desktop Change the value of MenuShowDelay from 400 to 100

Disable the automatic operation of CD-ROM
Remember that in Win98, you can prevent the automatic operation of CD-ROM by setting the system => Device Management => Cdrom => Properties => Settings => Automatic insertion of the notification in Win98 can prevent the automatic operation of CD-ROM, but each time we modify it, it must be restarted before it can take effect. In WIN2K, it can be implemented by modifying the registry, opening the registry management program, and finding the subkey
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Cdrom Set the AutoRun value to 0.

Change the Welcome dialog box
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon, change the value of LegalNoticeText to what you need to display, and if you change the title of the dialog box, you can change the value of LeagalNoticeCaption to what you need.

Setting up login wallpaper
Find the string value "Wallpaper" in the window on the right of the item "HKEY_USERS\.DEFAULT\Control Panel\desktop" and change its value to the full path of a BMP-format image file, and then display it as wallpaper when logging in; modify the value of the string value "TileWallpaper" to change its display method, where "0" means centering, "1" means tiling, and "2" means stretching.

Modify the login background color
If the login wallpaper is not set, in "HKEY_
By modifying the value of the string value "Background" in the USERS\.DEFAULT\Control Panel\Colors" item, you can change the background color when logging in (the default value is "58 110 165", which represents the values ​​of R, G, and B respectively, and are separated by spaces).

Add information in the login window
Create a new string value "LogonPrompt" in the "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersionWinlogon" item, and enter the prompt information you want to add.

Automatically display login options
When the "Login to Windows" window appears during startup, press the [Options] button to display the "Login with dial-up network connection" check box. Change the value of the double-byte value "ShowLogonOptions" in the "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" item to "1", and the login option can be automatically displayed.

Cancel the last login name
If multiple users are set up in Windows 2000 system, each time you press the [Ctrl+Alt+Delete] key combination, the user name you logged in the login window will be displayed. Set "HKEY_LOCAL_MACHINE\SOFT-
If the string value "DontDisplayLastUserName" in the WARE\Microsoft\Windows NT\CurrentVersion\Winlogon" item is set to "1", the last logged-in user will not be displayed in the login window.


(Source: Hot Network)