Microsoft Windows 7 Your Way
Chapter 27: Tweaking the Windows Registry
How the Registry Works
Every time you make a configuration change, that information is automatically written to the Registry. Change the system time, and the Registry is updated; change your desktop wallpaper, the Registry is updated; change the home page in Internet Explorer, the Registry is updated. The Registry is also updated whenever you install a new software program or hardware device. And it all happens automatically, in the background.
When Windows needs to do just about anything, it accesses the Registry to obtain the proper configuration information. In this sense, the Registry functions like a control center for your entire computer system; it defines how every part of your system looks and works.
Organizing the Registry
The Registry is organized into five major sections, called hives. Each hive is stored in its own system file on your PC’s hard disk.
These hives include the following:
HKEY_CLASSES_ROOT. Contains information about registered applications, including file associations and OLE object classes. (This hive displays the same settings as the HKEY_LOCAL_MACHINE\Software\Classes key.)
HKEY_CURRENT_USER. This hive is a subset of the HKEY_USERS hive, pertaining to the current user of the PC. It contains all attributes for the desktop environment and network connections.
HKEY_LOCAL_MACHINE. Contains most of the settings for your PC’s hardware, system software, and individual applications.
HKEY_USERS. Contains subkeys corresponding to the HKEY_CURRENT_USER hives for all users of the PC, not just the current user.
HKEY_CURRENT_CONFIG. Contains information gathered when Windows first launches, such as settings pertaining to your PC’s display and printers. The data stored in this hive is not permanently stored on disk, but rather is regenerated each time your PC boots.
Each hive is further organized into a variety of keys and subkeys that can be represented by a series of folders and subfolders. For example, if you want to find configuration information for which programs Windows loads at launch, you would look in the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run.
The settings or data for each individual key or subkey is called the value. Each value in the Registry is defined by a value name (often called just the value), the type of data used for that entry, and the value of that data.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.