Escolar Documentos
Profissional Documentos
Cultura Documentos
University
TERM PAPER
Of
OPERATING SYSTEM
SUBMITTED BY:-
ACKNOWLEDGEMENT
We cannot achieve anything worthwhile in the field of
technical education until or unless the theoretical
education acquired in the classroom is effectively
wedded to its practical approach that is taking place in
the modern industries and research institute. Although
an engineer can only be successful through sheer hard
work, but the contribution of his teachers and all those
who have been helpful cannot be over looked. I also
express thanks to my parents who put their great
valuable trust and helped me .Lastly, I offer my regards
and blessings to all of those specially who supported
me in respect during the completion of the project.
********
You shouldn't need to make manual changes to the registry because programs and
applications typically make all the necessary changes automatically. An incorrect change to
your computer's registry could render your computer inoperable. However, if a corrupt file
appears in the registry, you might be required to make changes.
We strongly recommend that you back up the registry before making any changes and that
you only change values in the registry that you understand or have been instructed to change
by a source you trust.
Ordinarily, you don't need to make changes to the registry. The registry contains complex
system information that's vital to your computer, and an incorrect change to your computer's
registry could render your computer inoperable. However, a corrupt registry file might
require changes. We strongly recommended that you back up the registry before making any
changes and that you only change values in the registry that you understand or have been
instructed to change.
You can also print the registry and control which accounts have permission to edit the
registry.
Initial security configuration is part of the installation instructions. This is a change from
previous versions of the information center. The information in this section assumes you have
already configured the user registry as part of the installation and deployment process. If you
are looking for instructions to initially setup your user registry, refer to the Installing
WebSphere Portal section of the information.
Clustered environment note: If you are running any of the following tasks after setting up
your clustered production environment, you will need to run an additional task to update the
security settings on the secondary nodes; see Configuring security after cluster creation for
information.
•
• Managing your user registry on an HP-UX
After installing and deploying IBM WebSphere Portal, which includes installing and
configuring the user registry, you can manage the user registry by running various
update and/or delete tasks. These tasks include, but are not limited to, adding a
property extension (lookaside) database, updating or deleting the entity type, and
deleting the registry.
• Managing your user registry on i5/OS
After installing and deploying IBM WebSphere Portal, which includes installing and
configuring the user registry, you can manage the user registry by running various
update and/or delete tasks. These tasks include, but are not limited to, adding a
property extension (lookaside) database, updating or deleting the entity type, and
deleting the registry.
• Managing your user registry on Linux
After installing and deploying IBM WebSphere Portal, which includes installing and
configuring the user registry, you can manage the user registry by running various
update and/or delete tasks. These tasks include, but are not limited to, adding a
property extension (lookaside) database, updating or deleting the entity type, and
deleting the registry.
• Managing your user registry on Solaris
After installing and deploying IBM WebSphere Portal, which includes installing and
configuring the user registry, you can manage the user registry by running various
update and/or delete tasks. These tasks include, but are not limited to, adding a
property extension (lookaside) database, updating or deleting the entity type, and
deleting the registry.
• Managing your user registry on Windows
After installing and deploying IBM WebSphere Portal, which includes installing and
configuring the user registry, you can manage the user registry by running various
update and/or delete tasks. These tasks include, but are not limited to, adding a
property extension (lookaside) database, updating or deleting the entity type, and
deleting the registry.
To find or change any entry in the registry, use Registry Editor. Once you have opened
Registry Editor, you can proceed to add a registry key.
Caution
Incorrectly editing the registry may severely damage your system. Before making
changes to the registry, you should back up any valued data on your computer.
Note
If you make a mistake that results in your computer not starting properly, you can
restore the registry. For instructions, see Restore the Registry.
To add a registry key
1. In Registry Editor, click the registry key under which you would like to add a new
key.
2. Click New on the Edit menu and then click Key.
3. Type a name for the new key and then press ENTER.
To change a value
Note
To make changes to a registry key, you must have the appropriate permissions. For more
information about permissions and security in this version of Windows, search Help and
Support for "Security best practices."
Note
To repeat the search, press F3.
Exporting registry files
To export all or part of the registry remotely, use Registry Editor. Once you have opened
Registry Editor, you can export the registry to a text file or to a hive file.
You can use a text editor like Notepad to work with registry files you create by exporting.
You can save registry files in the Windows format, as registration files, as binary hive files,
or as text files. Registry files are saved with .reg extensions, and text files are saved with .txt
extensions.
1. Open Registry Editor. If you want to save only a particular branch, select it.
2. On the File menu, click Export….
3. In File name, enter a name for the registry file.
4. In Save as type, select the file type you wish to use for the saved file (registration file,
registry hive file, text file, Windows 98/NT4.0 registration file).
5. In Export Range, use the radio buttons to select whether you want to export the entire
registry or only the selected branch.
6. Click Save.
Registry Editor provides a number of commands that are designed primarily for maintaining
your system. For example, Load Hive and Unload Hive allow a part of your system to be
temporarily downloaded onto another computer for maintenance. Before a hive can be loaded
or restored, it must be saved as a key, either to a floppy disk or to your hard disk.
Note
In Windows Explorer, double-clicking a file with the .reg extension imports the file into
the computer's registry.
Caution
A restored hive overwrites an existing registry key and becomes a permanent part of
your configuration. For example, to perform maintenance on part of your system, you
can use Export… to save a hive to a disk. When you are ready, you can then use
Import… on the File menu to restore the saved key to your system
o Click Selected Branch and type a particular branch in the text box to print only
part of the registry.
5. Click OK.
Note
The average registry can take hundreds of pages to print. Consider printing only those
branches you need.
To restore the
registry
1. Print these instructions. (If you are reading these instruction in Windows Help and
Support, click the print icon.) They will not be available after you shut down your
computer in step 3.
2. Open Registry Editor.
3. Click Start, point to the right-pointing arrow icon, and then click Shut Down.
4. Start the computer. When you see the message Please select the operating system to
start, press F8.
5. Use the arrow keys to highlight Last Known Good Configuration and then press
ENTER. NUM LOCK must be off before the arrow keys on the numeric keypad will
function.
6. Use the arrow keys to highlight an operating system, and then press ENTER.
7. The Windows security model enables you to control access to registry keys. For more
information about security, see Access-Control Model.
8. You can specify a security descriptor for a registry key when you call the
RegCreateKeyEx or RegSetKeySecurity function. If you specify NULL, the key gets
a default security descriptor. The ACLs in a default security descriptor for a key are
inherited from its direct parent key.
9. To get the security descriptor of a registry key, call the RegGetKeySecurity,
GetNamedSecurityInfo, or GetSecurityInfo function.
10. The valid access rights for registry keys include the DELETE, READ_CONTROL,
WRITE_DAC, and WRITE_OWNER standard access rights. Registry keys do not
support the SYNCHRONIZE standard access right.
11. The following table lists the specific access rights for registry key objects.
Value Meaning
Combines the STANDARD_RIGHTS_REQUIRED,
KEY_QUERY_VALUE, KEY_SET_VALUE,
KEY_ALL_ACCESS (0xF003F) KEY_CREATE_SUB_KEY,
KEY_ENUMERATE_SUB_KEYS, KEY_NOTIFY,
and KEY_CREATE_LINK access rights.
KEY_CREATE_LINK (0x0020) Reserved for system use.
KEY_CREATE_SUB_KEY
Required to create a subkey of a registry key.
(0x0004)
KEY_ENUMERATE_SUB_KEYS
Required to enumerate the subkeys of a registry key.
(0x0008)
KEY_EXECUTE (0x20019) Equivalent to KEY_READ.
Required to request change notifications for a registry
KEY_NOTIFY (0x0010)
key or for subkeys of a registry key.
KEY_QUERY_VALUE (0x0001) Required to query the values of a registry key.
Combines the STANDARD_RIGHTS_READ,
KEY_QUERY_VALUE,
KEY_READ (0x20019)
KEY_ENUMERATE_SUB_KEYS, and KEY_NOTIFY
values.
KEY_SET_VALUE (0x0002) Required to create, delete, or set a registry value.
Indicates that an application on 64-bit Windows should
operate on the 32-bit registry view. For more
information, see Accessing an Alternate Registry View.
KEY_WOW64_32KEY (0x0200) This flag must be combined using the OR operator with
the other flags in this table that either query or access
registry values.
12.
13. When you call the RegOpenKeyEx function, the system checks the requested access
rights against the key's security descriptor. If the user does not have the correct access
to the registry key, the open operation fails. If an administrator needs access to the
key, the solution is to enable the SE_TAKE_OWNERSHIP_NAME privilege and
open the registry key with WRITE_OWNER access. For more information, see
Enabling and Disabling Privileges.
14. You can request the ACCESS_SYSTEM_SECURITY access right to a registry key if
you want to read or write the key's system access control list (SACL). For more
information, see Access-Control Lists (ACLs) and SACL Access Right.
15. To view the current access rights for a key, including the predefined keys, use the
Registry Editor (Regedt32.exe). After navigating to the desired key, go to the Edit
menu and select Permissions.
For whatever reason, Microsoft uses ROT-13 to encrypt data in some registry keys. One such
key is: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist. Here’s an
example: “HRZR_EHACNGU:P:\AFYBBXHC.RKR.” Decrypted, that’s
“UEME_RUNPATH:C:\NSLOOKUP.EXE.” (We’ll look at the UserAssist key in Part 3.) A
better way to hide data is to encode text-based information in binary format and store it in
binary form as a string in registry values of type REG_SZ. Given that binary data is common
in the registry, the technique would make it extremely difficult to retrieve the hidden
information.
In addition to using ROT-13 and binary encoding to obfuscate data, a suspect could take
advantage of a flaw in the registry editor to also make the data invisible to anyone but a
forensics examiner who knows about the flaw. From “Forensic Analysis of the Windows
Registry:”
The Windows console registry tool (reg.exe) can display these overly long registry values so
the hidden data can be recovered as evidence; however, given the sheer number of entries in
the registry, this process is not trivial.
Very few people are aware about even the existence of the windows registry of the computer,
let alone the utility of registry cleaning. This is the central database of the system that stores
information about the computer. All the details about the hardware that make up the system
and the software that runs on the system as well as the software that runs the hardware stored
in this database called the registry. This system database records all the activity that takes
place on the system. This can be regarding which user logged on to the system to the time
when the user logged off. It even records what sites were visited and what was downloaded.
This means that the operating system keeps on adding to the information in its database and
so it must grow as the days go by. In the bargain the system database will grow to such a size
with redundant and useless information that the speed of scanning the registry for information
that is called up by some program will be much more than the speed of the processor and so
the system will become sluggish and slow. Here is where the knowledge of how to use a
registry repair software will come handy to you.
Starting in Windows 7, the following two running modes for the WMI shared host process
were added:
Secure mode
WMI provider host process resources are secured with a service SID. Only the service
SID has permissions for these resources.
Compatible mode
The WMI shared provider host process is not secured with a service SID. The
provider host process allows access to the NetworkService or LocalService accounts
depending on the hosting model. For more information about hosting models, see
Provider Hosting and Security.
Windows XP with SP2 and later, all versions of Windows Server 2003,
Windows Vista, and Windows Server 2008: To access the registry keys and
values for controlling secure and compatible modes for the provider host
process, you must install the security update in KB 959454. For more
information, see the Microsoft Security Bulletin MS09-012.
Once you have downloaded the registry cleaning program from the site onto your computer
you will have to install it. The program must be compatible to the resident operating system.
Installation of such programs is high on ease and takes a very less time. If you are using XP
you will not have to reboot the system for the program to work. Clicking on the exe program
will launch it. This is usually a link on the desktop. The program interface will prompt you to
scan the registry by clicking on 'scan registry' link. The scanning process will take about three
minutes to scan the registry and then display the redundant links on the page. Then it will ask
you to 'repair the registry by clicking on the 'repair' link. This process takes a couple of
seconds. When you reboot your system the computer will be running more smoothly and
efficiently because the junk has been removed from the system by the windows registry
cleaning software.
Author is admin and technical expert associated with development of computer security and
performance enhancing software like Registry Cleaner, Anti Spyware, Window Cleaner, Anti
Spam Filter. Learn how clean registry increase efficiency of computer. Visit our Home page
or Resource Center to read more about products and download free trial of a range of security
and performance enhancing software like
As the brain of the computer is said to be the CPU, the registry shall be called the heart of
your computing life. Without it or with a failing registry, you'll probably be failing as far as
your documentation and storage requirements are concerned. That's because with a bungled
registry, you have a bungling computer and everything just tends to fall down like a domino.
Needless to say, the registry has to be kept in perfect shape all the time lest you run the risk
of putting your precious files in danger. So what can you do to make your registry as perfect
as it could be? Clean it, of course, but this is not something you can can just take for granted.
When choosing a registry cleaner, make sure it's something that will actually make your
computer perform better and not have things ending up compromising the stability of your
system.
Unless you're a pro, you're definitely going to need a program that will clean your registry so
you can keep at a good size, meaning, free of unwanted elements such remnant files from
software you've installed and uninstalled previously or drivers you no longer need. This could
also mean ridding your system of possible digital contaminants you may have unknowingly
downloaded from the Internet like viruses, worms or Trojans.
It's important to realize that as you use your computer over time, your registry tends to
accumulate files that it doesn't really need. This is part of the computing experience as far as
that registry is concerned. However, you can do your part by cleaning it regularly so it could
be kept at a healthy size, a size that won't make your computer take forever to perform a task,
a size that will make you confident that you are going to finish before deadline because
you've got a registry that won't be giving you lagging problems.
If you care about time and the precious moments that you could be losing just by waiting for
your snail-paced computer to start up, you're going to have to install a registry cleaner. Just
don't get anything that sounds or looks good, though. You have to make a research on which
brands have been satisfying clients and to what degree. And how else to capture a very
accurate of this than to check review sites.
In spite of the fact that the Registry is an essential part of the Windows operating system and
is in constant use, most PC users have little knowledge of it. In fact, an aura of mystery has
grown up around the Registry. In order to help average PC users understand the Registry
better, here are some short answers to frequently asked questions. More details will be found
on the other pages of this site.
The Windows Registry is a central hierarchical database containing all the varied assortment
of information needed for the computer to run both the hardware and the software.
Why does Windows need a Registry? Other operating systems don't have one.
All operating systems need a way to store information about the system. There is more than
one way to do this and Apple and Linux have chosen a different method. Originally,
Windows kept information in a large number of separate INI files scattered throughout the
system. Then, beginning with Windows 95, Microsoft decided to centralize the information.
Everyone should know how to back up and restore the Registry. More experienced PC users
can learn how to make their system run better by maintaining and tweaking the Registry.
The Registry is actually a number of binary files. They are not directly accessible. However,
relevant parts are combined in a single hierarchical presentation that can be viewed with the
Windows utility called the Registry Editor.
As long as the Registry is always backed up first, judicious editing of the Registry can be
undertaken. Obviously, wholesale or random editing would not be advisable. Learn how to
safely edit or tweak the Registry on this page.
I can't find the Registry Editor in the Programs menu. Where is it?
Like a number of Windows system utilities, the Registry Editor is not listed in the Programs
menu. To open it, enter "regedit" in the Start-Run line or the Start search line.
Because the Registry is in constant use and has entries from almost anything installed on
Windows, it can gradually accumulate unnecessary, corrupted, or broken entries. This can
cause decreased system performance. Malware infections also affect the Registry.
Guard against spyware and adware. Avoid installing too many unneeded programs. Use
thorough ways to uninstall discarded programs. Use methods described on this page to keep
the Registry clean.
First, try using Windows System Restore to take the Registry back to a previous version. If
you have an additional backup, try that.. As a last resort, use a Registry cleaner to try to fix
the problem.