Halsey / Bettany | Windows Registry Troubleshooting | E-Book | sack.de
E-Book

E-Book, Englisch, 124 Seiten, eBook

Halsey / Bettany Windows Registry Troubleshooting


1. Auflage 2015
ISBN: 978-1-4842-0992-9
Verlag: APRESS
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 124 Seiten, eBook

ISBN: 978-1-4842-0992-9
Verlag: APRESS
Format: PDF
Kopierschutz: 1 - PDF Watermark



Whatever version of Windows you’re using--from Vista up to Windows 8.1--the registry is at the heart of your desktop experience. Software installs and compatibility, hardware operation and more are managed by a complex database of codes and numbers. When something goes wrong it can seem impossible to diagnose and repair the problem, and harder still to prevent a recurrence or make the subtle changes and tweaks required to fix the problem. In this book we’ll take you inside the workings of the Registry, and teach you how to repair, modify and clean it to keep your PCs running smoothly.
Halsey / Bettany Windows Registry Troubleshooting jetzt bestellen!

Zielgruppe


Popular/general

Weitere Infos & Material


1;Windows Registry Troubleshooting;116
1.1;Contents at a Glance;3
1.2;Contents;118
1.3;About the Authors;123
1.4;About the Technical Reviewer;124
1.5;Introduction;4
1.6;Chapter 1: The Architecture of the Windows Registry;5
1.6.1;What Is the Windows Registry?;6
1.6.2;Windows Registry Files;6
1.6.3;Registry Keys and Values;8
1.6.3.1;HKEY_CLASSES_ROOT (HKCR);8
1.6.3.2;HKEY_CURRENT_USER ( HKCU);8
1.6.3.3;HKEY_LOCAL_MACHINE ( HKLM);8
1.6.3.3.1;SAM;9
1.6.3.3.2;SECURITY;9
1.6.3.3.3;SYSTEM;9
1.6.3.3.4;SOFTWARE;9
1.6.3.4;HKEY_USERS ( HKU);9
1.6.3.5;HKEY_CURRENT_CONFIG (HKCC);9
1.6.3.6;HKEY_PERFORMANCE_DATA;10
1.6.3.7;Registry Value Types;10
1.6.4;.reg Files;11
1.6.5;Summary;13
1.7;Chapter 2: Registry Tools and Utilities;14
1.7.1;RegEdit;14
1.7.1.1;File Menu;16
1.7.1.2;Edit Menu;18
1.7.2;REG.EXE and REGINI.EXE;21
1.7.3;Modifying the Registry Using PowerShell;25
1.7.4;ScanReg;27
1.7.5;Process Monitor;28
1.7.6;Registry Cleaners;33
1.7.7;Summary;35
1.8;Chapter 3: Troubleshooting a Corrupted Registry;36
1.8.1;Sec1;36
1.8.1.1;Windows Registry Corruption;36
1.8.1.2;Software Installation or Application Failure;37
1.8.1.3;Hardware or Device Driver Failure;38
1.8.2;Resolving Registry Corruption;39
1.8.2.1;System File Checker;39
1.8.2.2;ChkDsk;40
1.8.2.3;CCleaner;42
1.8.2.4;System Restore;43
1.8.2.4.1;Launch System Restore from Within the GUI;45
1.8.2.4.2;Launch System Restore from the Advanced Options Menu at Startup;46
1.8.2.5;Automatic Startup Repair;48
1.8.2.6;Last Known Good Configuration;50
1.8.2.7;Roll Back Driver;51
1.8.3;Summary;53
1.9;Chapter 4: Working with Other Users’ Registry Files/ Advanced Troubleshooting;54
1.9.1;Working on Other Users’ Registry Files;54
1.9.1.1;RegEdit.exe;55
1.9.1.2;Remote Administration;57
1.9.1.3;Connecting to a Remote Registry;60
1.9.1.4;Windows PowerShell;62
1.9.1.5;Using Group Policy Preferences;62
1.9.2;Comparing Registries;65
1.9.3;Advanced Troubleshooting;66
1.9.3.1;Running RegEdit from Windows Installation Media;66
1.9.3.1.1;Booting into the Recovery Options in Vista and Windows 7;66
1.9.3.1.2;Booting into the Recovery Options in Windows 8 and Windows 8.1;67
1.9.3.1.3;Using RegEdit from the Recovery Environment;68
1.9.3.1.4;Repairing the Registry using a Portable OS;69
1.9.3.1.5;Creating a Portable Windows OS USB Flash Drive;71
1.9.3.2;Repair the Registry Without Booting Windows;72
1.9.4;Summary;74
1.10;Chapter 5: Securing the Registry;75
1.10.1;Physical Security—Locking the Door;75
1.10.1.1;Disable the Remote Registry Service;75
1.10.1.2;Restrict Remote Users;76
1.10.1.3;Driver Signature Enforcement;77
1.10.1.4;Restrict Physical Access;79
1.10.2;Anti-Malware: Location, Location, Location;80
1.10.3;User Protection —User Account Control;82
1.10.4;Encryption—BitLocker;86
1.10.5;Password Security;90
1.10.6;Summary;93
1.11;Chapter 6: Hacks, Tweaks, and Common Changes;94
1.11.1;User Interface Tweaks;94
1.11.1.1;Add Never Combine / Hide Labels to the Taskbar;95
1.11.1.2;Change Taskbar Program Preview Icons;95
1.11.1.3;Change Taskbar Icons to Reopen Last Active Window;95
1.11.1.4;Change Peek Operation Time;95
1.11.1.5;Speed Up Appearance of Taskbar Thumbnail Icons;96
1.11.1.6;Show Classic “All Programs” in Start Menu;96
1.11.1.7;Pin Folders to the Start Menu;96
1.11.1.8;Disable Desktop Shake;96
1.11.1.9;Remove “Shortcut” Text from Shortcuts;96
1.11.1.10;Get Rid of Shortcut Arrow Icons;97
1.11.1.11;Show Drive Letter Before Volume Name in File Explorer;97
1.11.1.12;Hide Drives in File Explorer;97
1.11.1.13;Show Recycle Bin in Computer View of File Explorer;99
1.11.1.14;Remove the “Use the Web Service to Find the Correct Program” Dialog;99
1.11.1.15;Add Copy to…/Move to… to the File Explorer Context Menu;99
1.11.1.16;Add Open with Notepad to File Explorer Context Menu;100
1.11.1.17;Add Defragment to the File Explorer Context Menu;100
1.11.1.18;Add Command Prompt to the File Explorer Context Menu;100
1.11.1.19;Disable the Send to… Menu in File Explorer;100
1.11.1.20;Hide Unwanted Apps from the File Explorer Context Menus;100
1.11.1.21;Remove Troubleshoot Compatibility from File Explorer Context Menu;101
1.11.1.22;Remove Programs from Open with… Context Menu;101
1.11.1.23;Add Copy to Clipboard Option to File Explorer Context Menu;101
1.11.1.24;Remove Items from IE Context Menu;101
1.11.2;App Tweaks;102
1.11.2.1;Remove AMD Catalyst Control Center from Desktop Context Menu;102
1.11.2.2;Remove NVIDIA Control Panel from Desktop Context Menu;102
1.11.3;Administrative Tweaks;102
1.11.3.1;Prevent Windows Update from Restarting the PC Automatically;102
1.11.3.2;Stop Windows Update from Hijacking Your Shut Down/Restart Options;102
1.11.3.3;Disable the Shut Down Command;103
1.11.3.4;Hide Unwanted Items from the Control Panel;103
1.11.3.5;Add RegEdit to the Control Panel;104
1.11.3.6;Add Control Panel to Computer Display in File Explorer;104
1.11.3.7;Add Control Panel to the Desktop Context Menu;105
1.11.3.8;Add Take Ownership to File Explorer Context Menu;105
1.11.3.9;Disable all Taskbar Balloon Notifications;105
1.11.3.10;Change the Registered Owner Name for Your Windows Installation;105
1.11.3.11;Disable the Mobility Center;106
1.11.3.12;Force Disk Cleanup to Delete All Temporary Files;106
1.11.3.13;Add Encrypt/Decrypt Options to File Explorer Context Menu;106
1.11.3.14;Force Verbose Message During Startup and Shutdown;106
1.11.3.15;Enable/Disable Task Manager link from Taskbar Context Menu;106
1.11.3.16;Display a Message During Windows Startup;107
1.11.3.17;Disable the Last Access File Timest107
1.11.3.18;Disable Low Disk Space Warning;107
1.11.3.19;Disable the Windows Security Center/Action Center;107
1.11.3.20;Disable Windows Malicious Software Removal Tool Anonymous Reporting;107
1.11.3.21;Disable IPv6;108
1.11.3.22;Force Windows Drives to Use AHCI;108
1.11.3.23;Disable “Do You Want to Run This File” Dialog;108
1.11.3.24;Force-Writing to “Write Protected” USB Flash Drives;108
1.11.3.25;Activate “God Mode” in Windows;109
1.11.4;Performance Tweaks;109
1.11.4.1;Increase the Maximum Allowed HTTP File Transfers;109
1.11.4.2;Maximize Your Internet Bandwidth;109
1.11.4.3;Force Windows to Auto-End Tasks on Shutdown;109
1.11.4.4;Reduce the WaitToKill Time for Closing Apps;110
1.11.4.5;Reduce Time to Kill a Hung App or Process;110
1.11.4.6;Reduce the Time Taken to Stop a Windows Service;110
1.11.5;Fun Tweaks;110
1.11.5.1;Enable More Fonts in Command Prompt;110
1.11.5.2;Disable the Caps Lock Key;110
1.11.5.3;Force Windows XP-Style Classic Login Dialog;111
1.11.5.4;Control System Tray Icons Using the Registry;111
1.11.5.5;Force a Blue Screen of Death in Three Keystrokes;111
1.11.6;Summary;111
1.12;Index;112


Mike Halsey is a Microsoft MVP (Most Valuable Professional) awardee and technical expert. As the author of Windows 7, 8 and 10 Troubleshooting books and associated videos he’s well versed in the problems and issues that PC users, IT Pros and System Administrators face when administering and maintaining all aspects of a PC ecosystem.Mike is a teacher and prolific author who uses his training in educating people about sometimes complex subjects in simple and straightforward ways to great effect in his books and training videos. Mike is very active on social media, which he has used for several years for promotion and education purposes.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.