IT tutorials
 
Windows
 

Windows 7 : Editing the Registry - Using Regedit (part 3) - Editing Registry Entries for Another Windows Installation, Editing Registry Security

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
6/7/2013 7:35:41 PM

5. Editing Registry Entries for Another Windows Installation

If you need to retrieve Registry entries from an installation of Windows installed on another hard disk or partition, you can load any of that installation’s hive files for editing or exporting.

To edit the other installation’s Registry, you need to locate its hive files. They are usually found in the locations shown in Table 2.

Table 2. Usual Location of Hive Files
KeyDefault Location and Hive File
HKEY_LOCAL_MACHINE\SAM\windows\system32\config\sam
HKEY_LOCAL_MACHINE\Security\windows\system32\config\security
HKEY_LOCAL_MACHINE\Software\windows\system32\config\software
HKEY_LOCAL_MACHINE\System\windows\system32\config\system
HKEY_LOCAL_MACHINE\Components\windows\system32\config\components
HKEY_USERS\.Default\windows\system32\config\default

To edit another Windows installation’s Registry, use the technique I described under “Editing Registry Entries for Another User,” but instead of locating a user’s NTUSER.DAT file, locate the desired hive file on the other hard drive or partition. Unload it after you’ve exported or corrected the desired information.

In some cases, you will find that you cannot view or modify keys loaded from another installation. This occurs if the keys are protected with security attributes that list specific users or groups defined in the other installation. In this case, you need to first take ownership of the keys and then add yourself as a user who is authorized to read or change the keys. The next section describes this.

Note

You rarely should have to modify Registry security settings, but it does happen. The usual case is that an incorrectly designed program places information in a subkey of HKEY_LOCAL_MACHINE\Software that is intended to be shared and modified by all users running the program. Because Windows does not permit standard users to modify any keys in HKEY_LOCAL_MACHINE\Software by default, the program might malfunction. Modifying permissions so that standard users can edit the shared key is sometimes necessary to fix the problem. Microsoft also sometimes recommends modifying Registry security in emergency security bulletins.


6. Editing Registry Security

Just as files and folders in an NTFS-formatted disk partition have security attributes to control access based on user and group identity, Registry keys and values also have a complete set of Access Control attributes that determine who has rights to read, write, and modify each entry.

If you absolutely must change permissions or auditing controls, locate the desired key or value, right-click it, and select Permissions. The Permissions dialog box looks just like the comparable dialog box for files and folders (see Figure 3), and lets you set read, write, and modify rights for specific groups and users. You’ll find a corresponding set of audit settings.

Figure 3. Registry key permissions control which users or groups are allowed to see or modify the Registry key and its values.


In most cases, a software vendor supplies precise instructions for making changes necessary to work around an application problem. Here, I describe a general procedure to make a given key readable and writeable by all users. You might do this to make a key capable of sharing information between users, or to repair an alternate Windows installation, as mentioned in the previous section. To set more generous permissions, follow these steps:

1.
Locate and select the key in the left pane.

2.
Right-click it and select Permissions.

3.
Select the Users entry in the top Group or User Names section. If Users is not listed, click Add, type Users, and click OK.

4.
In the lower section, check Full Control and then click Apply. If this is successful, click OK.

5.
If you are unable to make the changes even though you’re running the Registry Editor as an Administrator, click Advanced and select the Owner tab.

6.
If the Current Owner is listed as unknown, select Administrators in the lower list and click OK.

7.
Click OK to close the Advanced Security Settings dialog box, and return to Step 3.

This is a risky procedure because it could result in another user or application being unable to access its own Registry keys. Use this as a procedure of last resort.

 
Others
 
- Windows 7 : Editing the Registry - Using Regedit (part 2) - Editing Keys and Values, Editing Registry Entries for Another User
- Windows 7 : Editing the Registry - Using Regedit (part 1) - Viewing the Registry
- Windows Server 2008 : Basic Rules When Using the Command Prompt - Understanding Paths, Using Basic Commands, Redirecting Output to Files
- Windows Server 2008 : Basic Rules When Using the Command Prompt - Understanding Wildcards, Getting Help
- Windows Small Business Server 2011 : Windows Storage Server 2008 R2 Essentials (part 2) - Connecting to Windows Storage Server 2008 R2 Essentials
- Windows Small Business Server 2011 : Windows Storage Server 2008 R2 Essentials (part 1) - Connecting Windows Storage Server Essentials to the SBS Domain
- Windows Small Business Server 2011 : Using the Command Line to Manage Backups
- Windows 8 : Security - Securing Internet Explorer
- Windows 8 : Security - Encrypting File System
- Windows 8 : Security - BitLocker Drive Encryption
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us