Previous | Table of Contents | Next |
The registry is the central storehouse for all configuration information for Windows NT Server. It replaces the Windows 3.x INI files, although applications can still make use of INI files if desired. The registry contains information about the hardware platform; performance data; the installed software; all OLE, DDE, and file associations; and all configuration settings for the services and device drivers. Some of this information is backed up by files stored on your hard disk, which are located in your SystemRoot\System32\Config subdirectory, while the rest of the keys are created and stored only in memory. Table 13.1 summarizes the relationship between the primary registry keys and the files used to store these keys. The registry, like the NTFS file system or an SQL Server database, makes use of a transaction log (the LOG version of the file) to ensure that any change to the registry is guaranteed to either succeed or fail in entirety. This helps to maintain the integrity of the registry. Another interesting use of the registry files is the SYSTEM.ALT file that contains a copy of the previous system registry hive since the last time a user logged on to the system. This file is used by the Last Known Good operation to replace a failed or corrupted system registry hive.
Registry Key | File Name |
---|---|
SOFTWARE | SOFTWARE, SOFTWARE.LOG |
SYSTEM | SYSTEM, SYSTEM.LOG, SYSTEM.ALT |
SAM | SAM, SAM.LOG |
SECURITY | SECURITY, SECURITY.LOG |
USER | AAAAA###, AAAAA###.LOG * |
DEFAULT | DEFAULT, DEFAULT.LOG |
User profiles are stored in the form of the first five characters of the user name plus three digits (starting with 000) to create a unique file name. For example, my user name is Arthur, and my local user profile is stored in the files ARTHU000 and ARTHU000.LOG while my domain user profile is stored in the files ARTHU001 and ARTHU001.LOG. I use the same user name for both my local and domain user accounts.
The registry is basically composed of eight hives. A registry hive is a collection of registry keys, subkeys, values, and data. HKEY_LOCAL_MACHINE is the root key for the configuration information of a computer. HKEY_LOCAL_MACHINE has several subkeys of importance. These subkeys are:
The SAM and SECURITY keys are protected keys and inaccessible (which is why they display as gray folders in the Registry Editor rather than yellow folders). The only way to see the data in these keys is to take ownership of the keys. However, if you do that, the system will be unable to access the keys and essentially make your system unusable until you restore the keys from the repair disk or a previous tape backup (where you also backed up the registry).
Now that weve defined the registry, lets look at using the Registry Editor.
Previous | Table of Contents | Next |