Windows xp userprofile registry




















Contents Exit focus mode. Please rate your experience Yes No. Any additional feedback? In this article. Only the System key has an. A backup copy of a hive. Setup has two stages: text mode and graphics mode. The hive is copied to a. For help with the Reg. To restore registry subkeys that you exported, double-click the Registration Entries. Or, you can restore the whole registry from a backup.

For more information about how to restore the whole registry, see the Method 2: Restore the whole registry section later in this article. To restore the whole registry, restore the system state from a backup. For more information about how to restore the system state from a backup, see How to use Backup to protect data and restore files and folders on your computer in Windows XP and Windows Vista.

Windows Server Resources Kit. Inside the Registry. DPM is the new standard for Windows backup and recovery and delivers continuous data protection for Microsoft application and file servers that use seamlessly integrated disk and tape media. For more information about how to back up and restore the registry, see How to back up and restore the registry in Windows XP and Windows Vista.

Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Please rate your experience Yes No. Any additional feedback? Note Security features in Windows let an administrator control access to registry keys. Note There is a 64K limit for the total size of all values of a key. Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method.

In this article. Contains the root of the configuration information for the user who is currently logged on. The user's folders, screen colors, and Control Panel settings are stored here. This information is associated with the user's profile. This key is sometimes abbreviated as HKCU.

Contains all the actively loaded user profiles on the computer. Contains configuration information particular to the computer for any user.

This key is sometimes abbreviated as HKLM. The information that is stored here makes sure that the correct program opens when you open a file by using Windows Explorer. This key is sometimes abbreviated as HKCR.

Contains information about the hardware profile that is used by the local computer at system startup. Raw binary data. Most hardware component information is stored as binary data and is displayed in Registry Editor in hexadecimal format. This profile folder is for the built-in LocalService account, which Service Control Manager uses to host services that don't need to run in the LocalSystem account.

This is a normal user profile with limited data. You don't see it in the User Profiles dialog box, and the LocalService folder is super-hidden. This profile folder is for the built-in NetworkService account, which the Service Control Manager uses to host network services that don't need to run in the LocalSystem account. This is a normal user profile. You don't see it in the User Profiles dialog box, and the NetworkService folder is super-hidden.

In the previous list, the first two profile folders are far more interesting than the last two. IT professionals often customize the All Users profile folder on disk images. The customization, such as a shortcut on the Start menu, affects all users who log on to the computer. Doing so is a great way to create custom settings that you don't want to manage. In other words, it's one method for deploying common user preferences while still allowing users to change those preferences if necessary.

As you'll learn throughout this chapter, customizing the Default User folder on a disk image isn't necessarily the most efficient means to deploy default user settings. See the section "Deploying Default User Profiles," later in this chapter.

Many programs install themselves for use by a single user when you really want all users who share the computer to use them. You can tell when a program is installed per-user because its shortcut is in the profile folder belonging to the account you used to install it. If the program re-creates missing settings as it starts, you can change the program from per-user to per-computer by simply moving its shortcut from the user profile folder in which it installed the shortcut to the All Users profile folder.

This works the other way, too. You can move a shortcut from the All Users profile folder to a specific user's profile folder so that only a single user sees the shortcut. Improvements to User Profiles In Windows , poorly written applications and services that keep registry keys open during logoff prevent Windows from unloading the user's registry hive.

When this occurs, changes that a user made to his or her profile are not saved to the server. This has three symptoms:. The user experience is affected because changes are not saved when users log on to another computer.

Because locked profiles never get unloaded, they end up using a lot of memory on a terminal server that has many users logging on to it. If a profile is marked for deletion at logoff to clean up the machine or for temporary profiles , profiles do not get deleted. The three symptoms are solved as follows:. In Windows XP, when a user logs off and the profile is locked, the operating system polls the profile for 60 seconds before giving up. Windows XP then saves the user's profile hive and roams the profile correctly.

When the application or service closes the registry key and unlocks the profile, Windows XP unloads the users profile hive, freeing memory used by the profile. If a profile is marked for deletion, when the reference count drops to zero, Windows XP unloads and deletes it.

In the event that the application never releases the registry key, Windows XP deletes all profiles marked for deletion at the next machine boot. Previous page. Table of content. Next page. Note In enterprises that use Windows NT 4. Tip You can load and edit profile hives in Registry Editor Regedit without logging on to the computer using the account that owns that user profile.

Some of the folders are hidden; show the hidden files in Windows Explorer if you want to see all the following folders for yourself: Application Data. This folder contains Internet Explorer cookies. This folder contains four interesting subfolders: Application Data.

This subfolder contains computer-specific application data. This subfolder contains Internet Explorer history. This subfolder contains per-user temporary files.

Temporary Internet Files. This subfolder contains Internet Explorer offline files. The figure shows four special user profiles about which any IT professional should learn: All Users.

Tip Many programs install themselves for use by a single user when you really want all users who share the computer to use them. This has three symptoms: The user experience is affected because changes are not saved when users log on to another computer. The three symptoms are solved as follows: In Windows XP, when a user logs off and the profile is locked, the operating system polls the profile for 60 seconds before giving up.

Authors: Jerry Honeycutt. Beginning Cryptography with Java. Mastering Windows XP Registry. NET 3. Adobe After Effects 7. If you may any questions please contact us: flylib qtcs. Privacy policy.



0コメント

  • 1000 / 1000