![]() For more information, see HKEY_LOCAL_MACHINE. It contains subkeys that hold current configuration data, including Plug and Play information (the Enum branch, which includes a complete list of all hardware that has ever been on the system), network logon preferences, network security information, software-related information (such as server names and the location of the server), and other system information. Registry entries subordinate to this key define the physical state of the computer, including data about the bus type, system memory, and installed hardware and software. Windows Server 2008, Windows Vista, Windows Server 2003 and Windows XP/2000: This key is supported starting with Windows 7 and Windows Server 2008 R2. These entries are not included in the per-user registry portion of a roaming user profile. Registry entries subordinate to this key define preferences of the current user that are local to the machine. ![]() For more information, see HKEY_CURRENT_USER. Instead, call the RegOpenCurrentUser function. ![]() This handle should not be used in a service or an application that impersonates different users. To exclude other entries from a roaming user profile, store them in HKEY_CURRENT_USER_LOCAL_SETTINGS. All registry entries in HKEY_CURRENT_USER except those under HKEY_CURRENT_USER\Software\Classes are included in the per-user registry portion of a roaming user profile. After this mapping is established it persists, even if the security context of the thread changes. If this security context does not have a registry hive loaded in HKEY_USERS, the mapping is established with HKEY_USERS\.Default. The mapping is based on the security context of the first thread to reference HKEY_CURRENT_USER. The mapping between HKEY_CURRENT_USER and HKEY_USERS is per process and is established the first time the process references HKEY_CURRENT_USER. Microsoft, for example, creates the HKEY_CURRENT_USER\Software\Microsoft key for its applications to use, with each application creating its own subkey under the Microsoft key. In HKEY_CURRENT_USER, software vendors store the current user-specific preferences to be used within their applications. This key makes it easier to establish the current user's settings the key maps to the current user's branch in HKEY_USERS. These preferences include the settings of environment variables, data about program groups, colors, printers, network connections, and application preferences. Registry entries subordinate to this key define the preferences of the current user. For more information, see HKEY_CURRENT_CONFIG. HKEY_CURRENT_CONFIG is an alias for HKEY_LOCAL_MACHINE\System\CurrentControlSet\Hardware Profiles\Current. Information about the standard hardware configuration is stored under the Software and System keys of HKEY_LOCAL_MACHINE. The information under HKEY_CURRENT_CONFIG describes only the differences between the current hardware configuration and the standard configuration. For more information, see HKEY_CLASSES_ROOT.Ĭontains information about the current hardware profile of the local computer system. File viewers and user interface extensions store their OLE class identifiers in HKEY_CLASSES_ROOT, and in-process servers are registered in this key. This key also provides backward compatibility with the Windows 3.1 registration database by storing information for DDE and OLE support. Shell and COM applications use the information stored under this key. Registry entries subordinate to this key define types (or classes) of documents and the properties associated with those types. The following are handles to the predefined keys. In addition, other predefined handles have been defined for specific platforms. These handles are valid for all implementations of the registry, although the use of the handles may vary from platform to platform. Applications that add data to the registry should always work within the framework of predefined keys, so administrative tools can find and use the new data.Īn application can use handles to these keys as entry points to the registry. ![]() Predefined keys help an application navigate in the registry and make it possible to develop tools that allow a system administrator to manipulate categories of data. The system defines predefined keys that are always open. To open a key, an application must supply a handle to another key in the registry that is already open. An application must open a key before it can add data to the registry.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |