This is why Windows will often display less physical memory present than is actually installed on the motherboard. A multipurpose I/O port used by many different devices including printers, mice, keyboards, hard drives, scanners, and cameras.

When applications fail to execute because they request more privileges than they require (and are denied those privileges), this is known as a limited user application (LUA) bug. Windows 2000 Resource Kit contained an unsupported pair of utilities called Regback.exe and RegRest.exe for backup and recovery of the registry.

Windows NT 4.0 included RDISK.EXE, a utility to back up and restore the entire registry. Windows also supports remote access to the registry of another computer via the RegConnectRegistry function if the Remote Registry service is running, correctly configured and its network traffic is not firewalled. Other command line options include a VBScript or JScript together with CScript, WMI or WMIC.exe and Windows PowerShell. Windows Registry can be edited manually using programs such as RegEdit.exe, although these tools do not expose some of the registry’s metadata such as the last modified date.

Types Of Information In The Registry

Prior to starting How-To Geek, Lowell spent 15 years working in IT doing consulting, cybersecurity, database management, and programming work. You can find most of them in the Windows\System32\Config folder. We should note that this is not a good idea, and you should usually stay away from keys that require this much work to edit.

Right-clicking on any key in the left-hand side of the window will give you a set of options, most of which are fairly straightforward and easy to understand. Stores all of the information about the current hardware configuration. This one isn’t used very often, and it just a link to HKLM\SYSTEM\CurrentControlSet\Hardware Profiles\Current. The interesting thing that most people don’t know is that three of the five items on the root level aren’t actually there… they are just linked to items further down in one of the other keys. The root-level keys that you see in the left-hand side of the screenshot are important.

Each one houses a different set of information, so depending on what you are trying to do, you’ll need to know which section to browse down into. The most important thing to know about the registry is that you probably shouldn’t just mess around and delete or change things for no reason.

  • This is especially useful when you’re looking for options that aren’t normally exposed in Windows.
  • On Windows 10, you can also just copy-paste an address into the Registry Editor’s address bar and press Enter.
  • To get started, you’ll open the Registry Editor application.
  • You are more likely to get an answer if you edit your post with information regarding precisely what the Windows registry change was (and, if you know, what the effect of the change is).
  • Some things you can only achieve by hacking the registry.

How Is The Registry Structured?

Deleting a big portion of the registry is never going to make your computer run faster, and there’s no registry hack that will speed up your computer or give you some major new functionality that doesn’t exist. Windows 2000 keeps a backup copy of the HKEY_LOCAL_MACHINE System key that it uses to troubleshoot a problem with the existing one.

It’s also a great way to bookmark something in the registry if you are looking around in multiple locations, so you can easily flip back to the last place you were at. QWORD (64-bit) Value (REG_QWORD) – These are not used very often for registry hacking purposes, but it’s basically a 64-bit integer value.

An example of this is the hive of branch starting at HKLM\HARDWARE. This hive records information about system hardware and is created each time the system boots and performs hardware detection. E.g. HKEY_LOCAL_MACHINE\Software\Microsoft\Windows refers to the subkey "Windows" of the subkey "Microsoft" of the subkey "Software" of the HKEY_LOCAL_MACHINE root key. The memory might be contained on a video card or be part of system wing32.dll memory. When part of system memory, the memory is dedicated by Windows, and is not available to the system.

Backup, Add, Modify And Delete
Registry Keys And Values

At boot time, only a minimal set of hives are loaded, and after that, hives are loaded as the operating system initializes and as users log in or whenever a hive is explicitly loaded by an application. Some hives are volatile and are not stored on disk at all.