Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Free Windows Registry Tools Bulletin, 2004


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

Windows 2000 Registry Management

Download the WinGuides.com Help Files

Windows Registry Guide 2003
Size: 1.4 MB
Platforms: Windows 95/98/ME/NT/2000/XP
Download now!

Windows XP Registry Backup 101

In this article we will cover the Windows XP Registry, its function importance and most importantly, how to apply a basic level of disaster prevention to your system in case a problem does occur. Backing up the Registry in Windows XP is simple, painless and can save you a headache when you need that backup.

RegEditX - Tweaks for the Windows Registry Editor (REGEDIT) free beta

RegEditX makes your registry editing more productive than ever. RegEditX extends the standard Windows Registry Editor (REGEDIT), so you don't have to learn new ways of accomplishing tasks you already know how to perform. Just keep using the same familiar Registry Editor --- more efficiently.

Once you've tried RegEditX, you won't want to edit the registry any other way.

PsExec Might be useful for remote operations on registry

PsExec is a command-line tool that lets you execute processes on remote systems and redirect console applications' output to the local system so that these applications appear to be running locally. You can download PsExec for free from the Sysinternals Web site (http://www.sysinternals.com). Here are some advanced tips and tricks to help you leverage the full potential of PsExec as a systems management utility.

The PsTools Suite
PsExec is a member of Sysinternals' PsTools suite, which contains 11 tools. To be in the suite, tools must conform to a set of specifications that includes supporting Windows NT 4.0 and later, being a console application, and having the ability to work on the local system as well as on a remote one. PsTools utilities require no manual installation of software on the remote system, and they let you specify alternative credentials to access the remote system.

Incidentally, the reason that the suite is named PsTools and that all the member tools have Ps as a prefix to their name is that the first tool I developed that satisfied the listed criteria was PsList, a program that lists running processes. I named the tool after the ps utility that performs the same function on UNIX systems.

Windows Registry Guide - Registry tweaks and fixes for Windows systems

Registry Hacks to secure Windows 2003

Elcor Software - Registry Defragmentation ( registry optimizer registry booster cleaning registry increases system )
"Registry Defragmentation" optimizes registry by removing fragmentation, deleting unused entries, compacting the registry and re-indexing registry for maximum speed.

Windows registry is its core, constantly modifying and growing in size. It's being altered each time you install/remove programs or config system settings. Such changes made to Windows registry cause it to grow in size, no matter whether new information is added or deleted from registry. Thus registry quickly loses its linear structure which results in increase of application response time and registry access time.

"Registry defragmentation" performs physical defragmentation of the Windows registry file. After defragmentation your registry will acquire linear structure which will reduce application response time and registry access time. "Registry defragmentation" also removes unused entries, thus making registry even smaller in size. Do not worry if sometimes after defragmentation the registry will become smaller only by 1-5%, the key is not in size but in its linear structure, hence it determines access time.

Usually you'll have to use "Registry defragmentation" when new program is installed/removed. You should perform defragmentations regularly, because registry's linear structure is quickly lost and as the time runs on it only becomes more non-linear. With this aim program package includes special scheduler which can help you to organize such regular optimizations.

Microsoft Windows 2000 Resource Kit: Registry Information -- several online books

This file provides detailed descriptions of Windows 2000 registry content, such as the subtrees, keys, subkeys, and entries that advanced users want to know about, including many entries that cannot be changed by using Windows 2000 tools or programming interfaces.

How to Restore the Registry Step-by-step instructions on how to restore the system registry.

Support Article: How To Use WinDiff to Compare Registry Files
How can you compare registry entries before and after an upgrade, the installation of a new software package, or between two computers?

Registry Settings Management in Deployment The Registry Editor allows you to specify registry keys and values to be added to the registry of the target computer.

Windows 2000 Registry Repair Utility

Office 2000 SR-1/Windows 2000 Utility: Registry Repair The Office 2000 SR-1/Windows 2000 Registry Repair Utility restores the registry settings for several important files that may cause Office 2000 SR-1 applications to behave oddly on Windows 2000.

SubInACL (SubInACL.exe) SubInACL is a command-line tool that enables administrators to obtain security information about files, registry keys, and services, and transfer this information from user to user, from local or global group to group, and from domain to domain.

Amazon.com/Microsoft Windows XP Registry Guide by Jerry Honeycutt See Sample Chapter about Tweak UI...

Download.com/Windows Registry Guide 2003

The Windows Registry Guide is a Windows help file that reveals all the best tips, tricks, and tweaks for the Windows XP, 95, 98, Me, NT and 2000 Registries. The Registry is a database used to store settings and options for the 32-bit versions of Microsoft Windows. It contains information and settings for all of the PC's hardware, software, users, and preferences. Whenever a user makes changes to Control Panel settings, file associations, system policies, or installed software, the changes are reflected and stored in the Registry.

Mystery behind windows registry

RegHance 2.1 by Lavasoft

Then RegHance is THE tool you can't afford to be without! RegHance is designed to give you better overview capabilities and greater control, from building multiple lists of important keys to easier navigation. You can comment and save large numbers of keys to disk with just a few clicks of your mouse. RegHance is compatible with Windows 9x/ME/NT4.0, Windows 2000 and Windows XP. Not only does RegHance include a powerful hexadecimal editor that allows the user to read and write binary data to and from disk, it also includes advanced search and book marking capabilities.

RegHance supports:

Search results can be:

You can use the quick-address bar to quickly jump to a particular key or you can save and restore your working desktop at any time.

In addition RegHance was also designed to work in conjunction with Ad-Aware to provide the user with the ability to quickly and easily investigate ANY suspicious registry key with a simple mouse click.

[Nov 14, 2004] PC Magazine Opinion Corruption at the Jersey Shore I also came across a freeware application that does a partial Winsock reset for you. WinSock XP Fix 1.2 creates a backup of your registry and then repairs any Registry entries that may have been affected by adware removal. Unlike the Microsoft solution, it doesn't remove the stack and force you to reload TCP/IP. You can find WinSock XP Fix at a number of shareware sites, including www.spychecker.com/program/winsockxpfix.html.

I did a little poking around in the Microsoft Knowledge Base and found that this was not an unusual problem and that it was caused by corruption of the Winsock. I hadn't thought about the Winsock-the Windows TCP/IP socket API and IP stack-in years, at least not since the advent of Windows XP. But it used to be a veritable Achilles' heel for Windows systems.

The Knowledge Base gave command line NetShell instructions that would reset the Winsock to its default configuration, and also listed Registry entries that I could remove to force a reload of the Winsock and TCP/IP stack. The two essential articles are 811259 and 299257. But before I did that, I decided to look further to figure out how the Winsock had become corrupted.

A little more investigation pointed to adware and spyware. Evidently some ad/spyware modifies the Winsock or installs itself into the IP stack to give ads access to your system-or to give a hacker free rein. When you run the removal programs (you do, don't you?), the shims inserted by the adware are not removed, but they no longer link to anything. The stack becomes unstable, and it begins reporting errors and behaving erratically.

I also came across a freeware application that does a partial Winsock reset for you. WinSock XP Fix 1.2 creates a backup of your registry and then repairs any Registry entries that may have been affected by adware removal. Unlike the Microsoft solution, it doesn't remove the stack and force you to reload TCP/IP.

I decided to try it (I had a recent, full backup of my system on one of Iomega's great new REV 35GB removable hard drives, so I didn't mind living dangerously), and it worked perfectly. No more dropped wireless connections and no more "cable unplugged" error messages. You can find WinSock XP Fix at a number of shareware sites, including www.spychecker.com/program/winsockxpfix.html.

[Nov 10, 2004] Viewing and Manipulating the Registry

Regdmp
Regdmp is a Resource Kit utility that works hand-in-hand with Regini. As its name implies, it is used to dump the contents of the Registry. It works similarly to the Regedit export feature and creates output that is compatible with Regini scripts. Regdmp uses the same subtree names as Regini to specify which Registry path you want to dump. Using Regdmp, you can create Regini input scripts based on actual Registry values. You can then modify the contents of Regdmp output to make any modifications you need to the Registry. Figure 10 shows an example of using Regdmp to export the contents of the HKEY_CURRENT_USER\Control Panel\Desktop key.

The command to generate this output and redirect it to a file is as follows:

regdmp "HKEY_CURRENT_USER\Control Panel\Desktop" >desktop.ini

Karen's Power Tools need Visual Basic Runtime v6.0

Jun 7, 2000 2.5 Registry Pruner Remove unneeded entries from Windows' Registry.
Mar 13, 2000 1.2 Registry Ripper Extract portions of Windows' Registry, and save them to a file.

NONAGS Command Line Tools - Freeware

RegDel 1.1 for Win9x/NT4/ME/Win2k (30 kb)
From NonagsPLUS (Members) (30 kb)
Updated: Jan 02, 2000
Homepage
Author: Douglas Good
Description: RegDel allows you to delete registry keys and/or values from within a batch file, since Windows Regedit lacks this feature. Easy to use 32 bit command line utility.

Command Line Registry Edits

Reg.exe
Simple usage: REG operation <Parameter List> operation [ QUERY | ADD | UPDATE | DELETE | COPY | SAVE | BACKUP | RESTORE | LOAD | UNLOAD ]

For example: Reg add hkcu\software\testkey\testvalue=1 reg_dword \\testsr

Reg can access the whole of the registry and uses the codes HKCU, HKLM, HKCR, HKU and HKCC to refer to the various hives in the registry. Reg is not case-sensitive.

The Reg operations can be used with remote machines by adding the UNC name of the server to the end of the command line (see reg add /? for more help).

Reg can be found on the Resource Kit supplements. It provides much of the functionality of the previous utilities in a series of commands that are much like the Net command. One of the advantages of using Reg is that the syntax remains the same throughout the tool. It will also back up and restore the registry and provide the options to load and unload parts of the registry on the fly. However, Reg can't search the registry as Regfind can, and it has had its problems and revisions. For example, there was a problem with it not recognizing UNC machine names over 13 characters long, as it counted the two \\s as part of the name. It is advisable to download the latest version from supplements at ftp://ftp.microsoft.com/bussys/winnt/winnt-public/reskit/nt40/i386 as reg_x86.exe.

Download Free Windows 2000 Resource Kit Tools

REG: This tool enables you to add, change, delete, search, backup, restore, and perform other operations on registry entries from the command prompt or a batch file. It can be used on both local and remote computers. Note: This version of REG is in fact version 1.10 from the NT4 Resource Kit. It works with Windows 2000 but is not the version 2 that comes with the 2000 Reskit and is very much updated and with differing syntax to version 1.10, nor is it the version 3 that comes bundled with Windows XP (Thanks Pete!)

REGBack: Registry Backup - Registry Backup (RegBack) is a tool for backing up the Windows Registry to files without use of a tape drive. RegBack allows you to back up Registry hives while the system is running and has the hive files open.

REGFind: RegFind is a command-line tool with which you can search the Windows 2000 registry for arbitrary data, key names, or value names and optionally replace any of these with new values.

322756 - How to back up, edit, and restore the registry in Windows XP and Windows Server 2003 For a Microsoft Windows NT 4.0 version of this article, see 323170.

Important This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

Dealing with Unwanted Spyware and Parasites Various Registry Fixes

To use: download - right-click and select: Edit to view in Notepad.
Right-click and select: Merge - to enter the info into the Registry, and reboot.

Note: always backup the Registry before making any changes. Also be aware these reg files are intended for stand-alone or home users. Corporate users are urged to check with their network supervisor before removing restrictions.

Continued: Free Windows Registry Tools Bulletin, 2003

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

Sites


Etc

Society

Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

Bulletin:

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to to buy a cup of coffee for authors of this site

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: March 12, 2019