SlideShare une entreprise Scribd logo
1  sur  14
SEMINAR
REGISTRY
Mr.Alok Sharma
M.Tech Class Coordinator

Dr.Rajesh Bhagat
HOD (CSE/IT Department)
1
Yashpal (M.Tech) Roll No.-120530705022
What is Registry ?
The registry is nothing more then a central lace to store all settings on the computer.
You should not need to male manual change to the registry because programs and
application typically make all the necessary change automatically. The registry .INI
“interpretation” stored each program settings in to text file.
Windows comes with one to three different registry editing tools for you to use :1. Regedit
2. Regedit32/64
3. Reg
Why does Windows need a Registry :- All operating systems need a way to store
information about the system. There is more than one way to do
this and Apple
and Linux use a different method. Windows kept information in a large number of
separate INI files scattered throughout the system. Then, beginning with Windows 95,
Microsoft decided to centralize the information.

Yashpal (M.Tech) Roll No.-120530705022

2
Registry Key
Structure

The Registry has a hierarchal structure, like the directory structure on your
hard disk, the operating system the registry in regedit.exe you presented
with five to seven.
1.
2.
3.
4.
5.
6.
7.

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_USER
HKEY LOCAL MACHINE
HKEY_CUNRRENT CONFIG
HKEY_DYN_DATA
HKRY_PERFORMANCE_DATA

Yashpal (M.Tech) Roll No.-120530705022

3
HKEY_CLASSES_ROO
T

Yashpal (M.Tech) Roll No.-120530705022

4
HKEY_CURRENT_USE
R
Contains the root of the configuration information for the
user who is currently logged on. The user's folders, screen
colors, and Control Panel settings are stored here. This
information is referred to as a user's profile.

Yashpal (M.Tech) Roll No.-120530705022

5
App Events:- This sub key contains paths to sound files that are loaded for specific
system events (for example, when an error message occurs).
Consol:- The Console key stores data for the console subsystem, which hosts all
character-mode applications, such as Command Processor. In addition,
the
Console key can contain sub keys for custom command windows.
Control Panel :- The Control Panel key and its sub keys contain entries that
specify the accessibility, regional, and desktop appearance settings “Keyboard,
Mouse,Color,ScreenSaver and plug-unplug etc.”.
Software :- The Software key stores program variables that are specific to the
current user. The system stores some of its variables in this key. In addition, the
Software key contains sub keys representing the vendors, including Microsoft,
who produced the software running on the system.
Network:- The Network key stores information about mapped network drives
“Connect and Reconnect at logon”.
Environment:- The Environment key stores the values of environment variables
that users can set. Each entry in this key associates an environment
variable with the path that is substituted for the variable. The user's profile
defines the default values for these entries.
%USERPROFILE%Temp
Yashpal (M.Tech) Roll No.-120530705022

6
HKEY_LOCAL_MACHINE
The Contains information about the Hardware and Software settings that
are used for all users of this computer.
Hardware:- Information passed to Windows from the BIOS (found under
System in NT “higher reliability use”).
SAM:- Holds the user names and password hashes for every account on the
local machine, or domain if it is a domain controller.
Software:-Software-specific information and settings.
System:- System startup and device driver information, and operating
system settings.
Network:- Information about networks installed to the machine.
Security:- Network security settings.

Yashpal (M.Tech) Roll No.-120530705022

7
HKEY_USERS

Contains the root of all user profiles on the computer.
HKEY_CURRENT_USER is a sub key of HKEY_USERS.
HKEY_USERS
contains
user-specific
configuration
information for all currently active users on the computer.

Yashpal (M.Tech) Roll No.-120530705022

8
HKEY_CURRENT_CONFI
This key handles Plug and Play and contains information
G the current configuration of a multiple hardware
about
configuration computer “contains information about the
current configuration of hardware attached to the computer”.

Yashpal (M.Tech) Roll No.-120530705022

9
HKEY_DYN_DATA
HKEY_DYN_DATA :- Contains information that must be keep in RAM.
or
HKRY_PERFORMANCE_DATA :- This key provides runtime information into
performance data provided by either the NT kernel itself, or
running system drivers, programs and services that provide
performance data.”

note:- are both services its hidden

Yashpal (M.Tech) Roll No.-120530705022

10
Registry Key
Elements

The registry contains two basic elements:-

1. Keys = The registry keys are similar to folder in addition to value
each key can contain sub keys.
2.Values = The registry value are Name / Data pairs stored within keys.
List of standard registry value types:They are normally mean the five main keys.
1. REG_BINARY VALUE
2. REG_DWORD VALUE
3. REG_STRING VALUE
4. REG_MULTI_STRING VALUE
5. REG_EXPANDABLE STRING VALUE

Yashpal (M.Tech) Roll No.-120530705022

11
1. REG_BINARY VALUE = The REG_BINARY VALUE raw binary data, The
most hardware component information is store as binary data and
is displayed in registry editor in hexadecimal format
2. REG_DWORD VALUE = The REG_DWORD VALUE data represented by a
number that is 4 byte long “32 bit integer”. The displayed in registry editor
binary, hexadecimal or decimal format.
a) DWORD_LITLE_ENDIAN “Lowest address”
b) DWORD_BIG_ENDIAN “highest address”
3. REG_STRING VALUE = REG_STRING VALUE is a finite sequence of
symbols that are chosen from set called an alphabet.
4. REG_MULTI_STRING VALUE = REG_MULTI_STRING VALUE that contain
lists or multiple value in a from that people can read are generally this type.
Entries are separated by space, commas or other marks.
5. REG_EXPANDABLE STRING VALUE = REG_EXPANDABLE STRING
VALUE
that can contain environment variable a variable length data string

Yashpal (M.Tech) Roll No.120530705022

12
…?
Yashpal (M.Tech) Roll No.-120530705022

13
Than
k
14

Contenu connexe

Tendances (18)

System calls
System callsSystem calls
System calls
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Mac file recovery
Mac file recoveryMac file recovery
Mac file recovery
 
Security
SecuritySecurity
Security
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Ch07
Ch07Ch07
Ch07
 
Ch04
Ch04Ch04
Ch04
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Operating System Seminar By Owonubi Job Sunday
Operating System Seminar By Owonubi Job SundayOperating System Seminar By Owonubi Job Sunday
Operating System Seminar By Owonubi Job Sunday
 
Stacey and molly.pptx
Stacey and molly.pptxStacey and molly.pptx
Stacey and molly.pptx
 
System call
System callSystem call
System call
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Windows 10
Windows 10Windows 10
Windows 10
 
Introduction to computers i
Introduction to computers iIntroduction to computers i
Introduction to computers i
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 

Similaire à Seminar Topic Registry (M.Tech)

Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts MD SAQUIB KHAN
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
Vlan capture setup
Vlan capture setupVlan capture setup
Vlan capture setup東原 李
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3willye83
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)James Konol
 
Windows xp and registery
Windows xp and registeryWindows xp and registery
Windows xp and registeryparekhjigarh
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolStacksol
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry AnalysisHimanshu0734
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration toolsDuggesh Talawar
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for managementShareef AP
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 

Similaire à Seminar Topic Registry (M.Tech) (20)

Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Vlan capture setup
Vlan capture setupVlan capture setup
Vlan capture setup
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)
 
Window architecture
Window architecture Window architecture
Window architecture
 
Windows xp and registery
Windows xp and registeryWindows xp and registery
Windows xp and registery
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry Analysis
 
Ch3
Ch3Ch3
Ch3
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration tools
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
 
EE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptxEE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptx
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 

Dernier

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 

Dernier (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Seminar Topic Registry (M.Tech)

  • 1. SEMINAR REGISTRY Mr.Alok Sharma M.Tech Class Coordinator Dr.Rajesh Bhagat HOD (CSE/IT Department) 1 Yashpal (M.Tech) Roll No.-120530705022
  • 2. What is Registry ? The registry is nothing more then a central lace to store all settings on the computer. You should not need to male manual change to the registry because programs and application typically make all the necessary change automatically. The registry .INI “interpretation” stored each program settings in to text file. Windows comes with one to three different registry editing tools for you to use :1. Regedit 2. Regedit32/64 3. Reg Why does Windows need a Registry :- All operating systems need a way to store information about the system. There is more than one way to do this and Apple and Linux use a different method. Windows kept information in a large number of separate INI files scattered throughout the system. Then, beginning with Windows 95, Microsoft decided to centralize the information. Yashpal (M.Tech) Roll No.-120530705022 2
  • 3. Registry Key Structure The Registry has a hierarchal structure, like the directory structure on your hard disk, the operating system the registry in regedit.exe you presented with five to seven. 1. 2. 3. 4. 5. 6. 7. HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_USER HKEY LOCAL MACHINE HKEY_CUNRRENT CONFIG HKEY_DYN_DATA HKRY_PERFORMANCE_DATA Yashpal (M.Tech) Roll No.-120530705022 3
  • 5. HKEY_CURRENT_USE R Contains the root of the configuration information for the user who is currently logged on. The user's folders, screen colors, and Control Panel settings are stored here. This information is referred to as a user's profile. Yashpal (M.Tech) Roll No.-120530705022 5
  • 6. App Events:- This sub key contains paths to sound files that are loaded for specific system events (for example, when an error message occurs). Consol:- The Console key stores data for the console subsystem, which hosts all character-mode applications, such as Command Processor. In addition, the Console key can contain sub keys for custom command windows. Control Panel :- The Control Panel key and its sub keys contain entries that specify the accessibility, regional, and desktop appearance settings “Keyboard, Mouse,Color,ScreenSaver and plug-unplug etc.”. Software :- The Software key stores program variables that are specific to the current user. The system stores some of its variables in this key. In addition, the Software key contains sub keys representing the vendors, including Microsoft, who produced the software running on the system. Network:- The Network key stores information about mapped network drives “Connect and Reconnect at logon”. Environment:- The Environment key stores the values of environment variables that users can set. Each entry in this key associates an environment variable with the path that is substituted for the variable. The user's profile defines the default values for these entries. %USERPROFILE%Temp Yashpal (M.Tech) Roll No.-120530705022 6
  • 7. HKEY_LOCAL_MACHINE The Contains information about the Hardware and Software settings that are used for all users of this computer. Hardware:- Information passed to Windows from the BIOS (found under System in NT “higher reliability use”). SAM:- Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller. Software:-Software-specific information and settings. System:- System startup and device driver information, and operating system settings. Network:- Information about networks installed to the machine. Security:- Network security settings. Yashpal (M.Tech) Roll No.-120530705022 7
  • 8. HKEY_USERS Contains the root of all user profiles on the computer. HKEY_CURRENT_USER is a sub key of HKEY_USERS. HKEY_USERS contains user-specific configuration information for all currently active users on the computer. Yashpal (M.Tech) Roll No.-120530705022 8
  • 9. HKEY_CURRENT_CONFI This key handles Plug and Play and contains information G the current configuration of a multiple hardware about configuration computer “contains information about the current configuration of hardware attached to the computer”. Yashpal (M.Tech) Roll No.-120530705022 9
  • 10. HKEY_DYN_DATA HKEY_DYN_DATA :- Contains information that must be keep in RAM. or HKRY_PERFORMANCE_DATA :- This key provides runtime information into performance data provided by either the NT kernel itself, or running system drivers, programs and services that provide performance data.” note:- are both services its hidden Yashpal (M.Tech) Roll No.-120530705022 10
  • 11. Registry Key Elements The registry contains two basic elements:- 1. Keys = The registry keys are similar to folder in addition to value each key can contain sub keys. 2.Values = The registry value are Name / Data pairs stored within keys. List of standard registry value types:They are normally mean the five main keys. 1. REG_BINARY VALUE 2. REG_DWORD VALUE 3. REG_STRING VALUE 4. REG_MULTI_STRING VALUE 5. REG_EXPANDABLE STRING VALUE Yashpal (M.Tech) Roll No.-120530705022 11
  • 12. 1. REG_BINARY VALUE = The REG_BINARY VALUE raw binary data, The most hardware component information is store as binary data and is displayed in registry editor in hexadecimal format 2. REG_DWORD VALUE = The REG_DWORD VALUE data represented by a number that is 4 byte long “32 bit integer”. The displayed in registry editor binary, hexadecimal or decimal format. a) DWORD_LITLE_ENDIAN “Lowest address” b) DWORD_BIG_ENDIAN “highest address” 3. REG_STRING VALUE = REG_STRING VALUE is a finite sequence of symbols that are chosen from set called an alphabet. 4. REG_MULTI_STRING VALUE = REG_MULTI_STRING VALUE that contain lists or multiple value in a from that people can read are generally this type. Entries are separated by space, commas or other marks. 5. REG_EXPANDABLE STRING VALUE = REG_EXPANDABLE STRING VALUE that can contain environment variable a variable length data string Yashpal (M.Tech) Roll No.120530705022 12
  • 13. …? Yashpal (M.Tech) Roll No.-120530705022 13