SlideShare uma empresa Scribd logo
1 de 14
SEMINAR
REGISTRY
Mr.Alok Sharma
M.Tech Class Coordinator

Dr.Rajesh Bhagat
HOD (CSE/IT Department)
1
Yashpal (M.Tech) Roll No.-120530705022
What is Registry ?
The registry is nothing more then a central lace to store all settings on the computer.
You should not need to male manual change to the registry because programs and
application typically make all the necessary change automatically. The registry .INI
“interpretation” stored each program settings in to text file.
Windows comes with one to three different registry editing tools for you to use :1. Regedit
2. Regedit32/64
3. Reg
Why does Windows need a Registry :- All operating systems need a way to store
information about the system. There is more than one way to do
this and Apple
and Linux use a different method. Windows kept information in a large number of
separate INI files scattered throughout the system. Then, beginning with Windows 95,
Microsoft decided to centralize the information.

Yashpal (M.Tech) Roll No.-120530705022

2
Registry Key
Structure

The Registry has a hierarchal structure, like the directory structure on your
hard disk, the operating system the registry in regedit.exe you presented
with five to seven.
1.
2.
3.
4.
5.
6.
7.

HKEY_CLASSES_ROOT
HKEY_CURRENT_USER
HKEY_USER
HKEY LOCAL MACHINE
HKEY_CUNRRENT CONFIG
HKEY_DYN_DATA
HKRY_PERFORMANCE_DATA

Yashpal (M.Tech) Roll No.-120530705022

3
HKEY_CLASSES_ROO
T

Yashpal (M.Tech) Roll No.-120530705022

4
HKEY_CURRENT_USE
R
Contains the root of the configuration information for the
user who is currently logged on. The user's folders, screen
colors, and Control Panel settings are stored here. This
information is referred to as a user's profile.

Yashpal (M.Tech) Roll No.-120530705022

5
App Events:- This sub key contains paths to sound files that are loaded for specific
system events (for example, when an error message occurs).
Consol:- The Console key stores data for the console subsystem, which hosts all
character-mode applications, such as Command Processor. In addition,
the
Console key can contain sub keys for custom command windows.
Control Panel :- The Control Panel key and its sub keys contain entries that
specify the accessibility, regional, and desktop appearance settings “Keyboard,
Mouse,Color,ScreenSaver and plug-unplug etc.”.
Software :- The Software key stores program variables that are specific to the
current user. The system stores some of its variables in this key. In addition, the
Software key contains sub keys representing the vendors, including Microsoft,
who produced the software running on the system.
Network:- The Network key stores information about mapped network drives
“Connect and Reconnect at logon”.
Environment:- The Environment key stores the values of environment variables
that users can set. Each entry in this key associates an environment
variable with the path that is substituted for the variable. The user's profile
defines the default values for these entries.
%USERPROFILE%Temp
Yashpal (M.Tech) Roll No.-120530705022

6
HKEY_LOCAL_MACHINE
The Contains information about the Hardware and Software settings that
are used for all users of this computer.
Hardware:- Information passed to Windows from the BIOS (found under
System in NT “higher reliability use”).
SAM:- Holds the user names and password hashes for every account on the
local machine, or domain if it is a domain controller.
Software:-Software-specific information and settings.
System:- System startup and device driver information, and operating
system settings.
Network:- Information about networks installed to the machine.
Security:- Network security settings.

Yashpal (M.Tech) Roll No.-120530705022

7
HKEY_USERS

Contains the root of all user profiles on the computer.
HKEY_CURRENT_USER is a sub key of HKEY_USERS.
HKEY_USERS
contains
user-specific
configuration
information for all currently active users on the computer.

Yashpal (M.Tech) Roll No.-120530705022

8
HKEY_CURRENT_CONFI
This key handles Plug and Play and contains information
G the current configuration of a multiple hardware
about
configuration computer “contains information about the
current configuration of hardware attached to the computer”.

Yashpal (M.Tech) Roll No.-120530705022

9
HKEY_DYN_DATA
HKEY_DYN_DATA :- Contains information that must be keep in RAM.
or
HKRY_PERFORMANCE_DATA :- This key provides runtime information into
performance data provided by either the NT kernel itself, or
running system drivers, programs and services that provide
performance data.”

note:- are both services its hidden

Yashpal (M.Tech) Roll No.-120530705022

10
Registry Key
Elements

The registry contains two basic elements:-

1. Keys = The registry keys are similar to folder in addition to value
each key can contain sub keys.
2.Values = The registry value are Name / Data pairs stored within keys.
List of standard registry value types:They are normally mean the five main keys.
1. REG_BINARY VALUE
2. REG_DWORD VALUE
3. REG_STRING VALUE
4. REG_MULTI_STRING VALUE
5. REG_EXPANDABLE STRING VALUE

Yashpal (M.Tech) Roll No.-120530705022

11
1. REG_BINARY VALUE = The REG_BINARY VALUE raw binary data, The
most hardware component information is store as binary data and
is displayed in registry editor in hexadecimal format
2. REG_DWORD VALUE = The REG_DWORD VALUE data represented by a
number that is 4 byte long “32 bit integer”. The displayed in registry editor
binary, hexadecimal or decimal format.
a) DWORD_LITLE_ENDIAN “Lowest address”
b) DWORD_BIG_ENDIAN “highest address”
3. REG_STRING VALUE = REG_STRING VALUE is a finite sequence of
symbols that are chosen from set called an alphabet.
4. REG_MULTI_STRING VALUE = REG_MULTI_STRING VALUE that contain
lists or multiple value in a from that people can read are generally this type.
Entries are separated by space, commas or other marks.
5. REG_EXPANDABLE STRING VALUE = REG_EXPANDABLE STRING
VALUE
that can contain environment variable a variable length data string

Yashpal (M.Tech) Roll No.120530705022

12
…?
Yashpal (M.Tech) Roll No.-120530705022

13
Than
k
14

Mais conteúdo relacionado

Mais procurados

Mais procurados (18)

System calls
System callsSystem calls
System calls
 
Introduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHIIntroduction to computers MRS. SOWMYA JYOTHI
Introduction to computers MRS. SOWMYA JYOTHI
 
Operating system ppt
Operating system pptOperating system ppt
Operating system ppt
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Mac file recovery
Mac file recoveryMac file recovery
Mac file recovery
 
Security
SecuritySecurity
Security
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Ch07
Ch07Ch07
Ch07
 
Ch04
Ch04Ch04
Ch04
 
Features of windows
Features of windowsFeatures of windows
Features of windows
 
Operating System Seminar By Owonubi Job Sunday
Operating System Seminar By Owonubi Job SundayOperating System Seminar By Owonubi Job Sunday
Operating System Seminar By Owonubi Job Sunday
 
Stacey and molly.pptx
Stacey and molly.pptxStacey and molly.pptx
Stacey and molly.pptx
 
System call
System callSystem call
System call
 
What is a computer
What is a computerWhat is a computer
What is a computer
 
Windows 10
Windows 10Windows 10
Windows 10
 
Introduction to computers i
Introduction to computers iIntroduction to computers i
Introduction to computers i
 
SYSTEM CONCEPT
SYSTEM CONCEPTSYSTEM CONCEPT
SYSTEM CONCEPT
 
System protection in Operating System
System protection in Operating SystemSystem protection in Operating System
System protection in Operating System
 

Semelhante a Seminar Topic Registry (M.Tech)

Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts MD SAQUIB KHAN
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
Vlan capture setup
Vlan capture setupVlan capture setup
Vlan capture setup東原 李
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3willye83
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)James Konol
 
Windows xp and registery
Windows xp and registeryWindows xp and registery
Windows xp and registeryparekhjigarh
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolStacksol
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry AnalysisHimanshu0734
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration toolsDuggesh Talawar
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for managementShareef AP
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 

Semelhante a Seminar Topic Registry (M.Tech) (20)

Registry Forensics
Registry ForensicsRegistry Forensics
Registry Forensics
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Vlan capture setup
Vlan capture setupVlan capture setup
Vlan capture setup
 
Operatig System Tutorial Level3
Operatig System Tutorial Level3Operatig System Tutorial Level3
Operatig System Tutorial Level3
 
Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)Windows registry troubleshooting (2015)
Windows registry troubleshooting (2015)
 
Window architecture
Window architecture Window architecture
Window architecture
 
Windows xp and registery
Windows xp and registeryWindows xp and registery
Windows xp and registery
 
Windows Architecture Explained by Stacksol
Windows Architecture Explained by StacksolWindows Architecture Explained by Stacksol
Windows Architecture Explained by Stacksol
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry Analysis
 
Ch3
Ch3Ch3
Ch3
 
Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
10 resource kit remote administration tools
10 resource kit remote administration tools10 resource kit remote administration tools
10 resource kit remote administration tools
 
Windows 2000
Windows 2000Windows 2000
Windows 2000
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
Information Systems for management
Information Systems for managementInformation Systems for management
Information Systems for management
 
EE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptxEE8691 – EMBEDDED SYSTEMS.pptx
EE8691 – EMBEDDED SYSTEMS.pptx
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 

Último

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Último (20)

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

Seminar Topic Registry (M.Tech)

  • 1. SEMINAR REGISTRY Mr.Alok Sharma M.Tech Class Coordinator Dr.Rajesh Bhagat HOD (CSE/IT Department) 1 Yashpal (M.Tech) Roll No.-120530705022
  • 2. What is Registry ? The registry is nothing more then a central lace to store all settings on the computer. You should not need to male manual change to the registry because programs and application typically make all the necessary change automatically. The registry .INI “interpretation” stored each program settings in to text file. Windows comes with one to three different registry editing tools for you to use :1. Regedit 2. Regedit32/64 3. Reg Why does Windows need a Registry :- All operating systems need a way to store information about the system. There is more than one way to do this and Apple and Linux use a different method. Windows kept information in a large number of separate INI files scattered throughout the system. Then, beginning with Windows 95, Microsoft decided to centralize the information. Yashpal (M.Tech) Roll No.-120530705022 2
  • 3. Registry Key Structure The Registry has a hierarchal structure, like the directory structure on your hard disk, the operating system the registry in regedit.exe you presented with five to seven. 1. 2. 3. 4. 5. 6. 7. HKEY_CLASSES_ROOT HKEY_CURRENT_USER HKEY_USER HKEY LOCAL MACHINE HKEY_CUNRRENT CONFIG HKEY_DYN_DATA HKRY_PERFORMANCE_DATA Yashpal (M.Tech) Roll No.-120530705022 3
  • 5. HKEY_CURRENT_USE R Contains the root of the configuration information for the user who is currently logged on. The user's folders, screen colors, and Control Panel settings are stored here. This information is referred to as a user's profile. Yashpal (M.Tech) Roll No.-120530705022 5
  • 6. App Events:- This sub key contains paths to sound files that are loaded for specific system events (for example, when an error message occurs). Consol:- The Console key stores data for the console subsystem, which hosts all character-mode applications, such as Command Processor. In addition, the Console key can contain sub keys for custom command windows. Control Panel :- The Control Panel key and its sub keys contain entries that specify the accessibility, regional, and desktop appearance settings “Keyboard, Mouse,Color,ScreenSaver and plug-unplug etc.”. Software :- The Software key stores program variables that are specific to the current user. The system stores some of its variables in this key. In addition, the Software key contains sub keys representing the vendors, including Microsoft, who produced the software running on the system. Network:- The Network key stores information about mapped network drives “Connect and Reconnect at logon”. Environment:- The Environment key stores the values of environment variables that users can set. Each entry in this key associates an environment variable with the path that is substituted for the variable. The user's profile defines the default values for these entries. %USERPROFILE%Temp Yashpal (M.Tech) Roll No.-120530705022 6
  • 7. HKEY_LOCAL_MACHINE The Contains information about the Hardware and Software settings that are used for all users of this computer. Hardware:- Information passed to Windows from the BIOS (found under System in NT “higher reliability use”). SAM:- Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller. Software:-Software-specific information and settings. System:- System startup and device driver information, and operating system settings. Network:- Information about networks installed to the machine. Security:- Network security settings. Yashpal (M.Tech) Roll No.-120530705022 7
  • 8. HKEY_USERS Contains the root of all user profiles on the computer. HKEY_CURRENT_USER is a sub key of HKEY_USERS. HKEY_USERS contains user-specific configuration information for all currently active users on the computer. Yashpal (M.Tech) Roll No.-120530705022 8
  • 9. HKEY_CURRENT_CONFI This key handles Plug and Play and contains information G the current configuration of a multiple hardware about configuration computer “contains information about the current configuration of hardware attached to the computer”. Yashpal (M.Tech) Roll No.-120530705022 9
  • 10. HKEY_DYN_DATA HKEY_DYN_DATA :- Contains information that must be keep in RAM. or HKRY_PERFORMANCE_DATA :- This key provides runtime information into performance data provided by either the NT kernel itself, or running system drivers, programs and services that provide performance data.” note:- are both services its hidden Yashpal (M.Tech) Roll No.-120530705022 10
  • 11. Registry Key Elements The registry contains two basic elements:- 1. Keys = The registry keys are similar to folder in addition to value each key can contain sub keys. 2.Values = The registry value are Name / Data pairs stored within keys. List of standard registry value types:They are normally mean the five main keys. 1. REG_BINARY VALUE 2. REG_DWORD VALUE 3. REG_STRING VALUE 4. REG_MULTI_STRING VALUE 5. REG_EXPANDABLE STRING VALUE Yashpal (M.Tech) Roll No.-120530705022 11
  • 12. 1. REG_BINARY VALUE = The REG_BINARY VALUE raw binary data, The most hardware component information is store as binary data and is displayed in registry editor in hexadecimal format 2. REG_DWORD VALUE = The REG_DWORD VALUE data represented by a number that is 4 byte long “32 bit integer”. The displayed in registry editor binary, hexadecimal or decimal format. a) DWORD_LITLE_ENDIAN “Lowest address” b) DWORD_BIG_ENDIAN “highest address” 3. REG_STRING VALUE = REG_STRING VALUE is a finite sequence of symbols that are chosen from set called an alphabet. 4. REG_MULTI_STRING VALUE = REG_MULTI_STRING VALUE that contain lists or multiple value in a from that people can read are generally this type. Entries are separated by space, commas or other marks. 5. REG_EXPANDABLE STRING VALUE = REG_EXPANDABLE STRING VALUE that can contain environment variable a variable length data string Yashpal (M.Tech) Roll No.120530705022 12
  • 13. …? Yashpal (M.Tech) Roll No.-120530705022 13