The Registry

The Registry

The registry is a central, secure database in which Windows stores all hard- ware configuration information, software configuration information, and sys- tem security policies. Components that use the registry include the Windows kernel, device drivers, setup programs, hardware profiles, and user profiles.

You shouldn’t need to make manual changes to the registry because programs and applications typically make all the necessary changes automatically. An incorrect change to your computer’s registry could render your computer inoperable. However, if a corrupt file appears in the registry, you might be required to make changes or to make a change that does not have a program to change. Typically if you are changing the registry, you are following instructions from a reliable source. The Registry Editor (Regedit.exe) is a tool used to manually view and change settings in the system registry, as shown in Figure 3.23.

FIGURE 3.23 Using Regedit.exe to view the Registry.

The registry contains two basic elements: keys and values. Registry Keys are similar to folders; in addition to values, each key can contain subkeys, which may contain further subkeys, and so on. Keys are referenced with a syntax sim- ilar to Windows’s path names, using backslashes to indicate levels of hierarchy. For example, HKEY_LOCAL_MACHINE\Software\Microsoft\Windows

CHAPTER 3: System Management

refers to the subkey “Windows” of the subkey “Microsoft” of the subkey “Software” of the HKEY_LOCAL_MACHINE key. Windows 7 has five Root Keys:

. HKEY_CLASSES_ROOT: Stores information about registered applications, such as file associations.

. HKEY_CURRENT_USER: Stores settings that are specific to the currently logged-in user.

. HKEY_LOCAL_MACHINE: Stores settings that are specific to the local computer.

. HKEY_USERS: Contains subkeys corresponding to the HKEY_CUR- RENT_USER keys for each user profile actively loaded on the machine, though user hives are usually only loaded for currently logged-in users.

. HKEY_CURRENT_CONFIG: Contains information gathered at run- time. Information stored in this key is not permanently stored on disk, but rather regenerated at boot time.

Registry Values are name/data pairs stored within keys. Values are referenced separately from keys. There are multiple types of values. Some of the com- mon ones include the following:

. REG_SZ: A string value . REG_BINARY: Binary data . REG DWORD: A 32-bit unsigned integer (numbers between 0 and

4294967295 decimal) . REG_MULTI_SZ: A multi-string value, which is an array of unique

strings Reg files (also known as Registration entries) are text files for storing portions

of the registry. They have a .reg filename extension. If you double-click a reg file, it adds the Registry entries into the Registry. You can export any Registry subkey by right-clicking the subkey and choosing Export. You can back up the entire Registry to a reg file by right-clicking Computer at the top of Regedit and selecting Export.

Advanced Windows Configuration

Cram Quiz

1. Where do you find the Windows Firewall with Advanced Security?

❍ A. Administrative Tools ❍ B. Registry Editor ❍ C. Program Manager ❍ D. File Manager

2. Which Registry Root Key stores settings that are specific to the local computer?

❍ A. HKEY_CLASSES_ROOT ❍ B. HKEY_CURRENT_USER ❍ C. HKEY_LOCAL_MACHINE ❍ D. HKEY_USERS

Cram Quiz Answers

1. A is correct. The Administrative Tools include the Computer Management Console, Event Viewer, Local Security Policy, Services console, Task Scheduler, and Windows Firewall with Advanced Security. Answer B is incorrect because the Registry Editor is used to configure the Registry, which is Windows’s data- base of computer and user settings. Answers C and D are incorrect because there is no Program Manager or File Manager in Windows 7 to access the Windows Firewall.

2. C is correct. The HKEY_LOCAL_MACHINE stores settings that are specific to the local computer. Answer A is incorrect because the HKEY_CLASSES_ROOT stores information about registered applications, such as file associated. Answer

B is incorrect because the HKEY_CURRENT_USER stores settings that are specific to the currently logged-in user. Answer D is incorrect because the HKEY_USERS contains subkeys corresponding to the HKEY_CURRENT_USER keys for each user profile actively loaded on the machine.

CHAPTER 3: System Management

Review Questions

1. Which of the following is not a good place to get device drivers? (Choose the best answer.)

❍ A. Using a peer-to-peer search engine ❍ B. Bundled with Windows 7 ❍ C. Supplied with a device ❍ D. Updated with Windows Update ❍ E. Updated from the manufacturer’s website

2. In the Windows 7 Device Manager, how do you know if there is a problem with a driver? (Choose the best answer.)

❍ A. The driver icon has a red X. ❍ B. The driver icon has an exclamation point. ❍ C. The driver icon has a down arrow. ❍ D. The driver icon is flashing.

3. You work as a desktop support technician at Acme.com. You are tasked to install Windows 7 Enterprise Edition on computers that have been running Windows XP. You verified the video cards are WDDM-compatible. What else do you need to do to support Aero? (Each correct answer presents part of the solution. Choose three.)

❍ A. Set the monitor settings to a refresh rate higher than 10 ❍ B. Press the Windows key + Tab ❍ C. Set the resolution to 1280×1024 or higher ❍ D. Set Color to 32 bit ❍ E. Select a Windows Aero theme ❍ F. Set the Color Scheme to Windows Aero

4. You are logged in with an administrator account on each Windows 7 Home Basic Edition. You have enabled Parental Controls, which restricts certain websites and only allows certain programs to run on the machine. You noticed that when you log in, you can access the restricted websites and run any software. What is the problem? (Choose the best answer.)

❍ A. The system must be part of the domain, so the option is not avail- able. ❍ B. You just upgraded to the Windows 7 Ultimate edition.

❍ C. Parental Controls only apply to standard users, and not administrative accounts. ❍ D. Someone disabled the Parental Control on the system.

Review Questions

5. You work as a technician at Acme.com. You need to install a fingerprint reader. What should you do next? (Choose two answers.)

❍ A. Make sure that the application that uses the fingerprint reader is digi- tally signed

❍ B. Make sure that the driver that you are installing is digitally signed ❍ C. Connect the device before you load the driver ❍ D. Load the driver before you connect the device

6. You were able to download a new printer driver from the Internet. How can you check the driver to make sure it is compatible with Windows 7?

❍ A. Right-click the driver and click Verify signing ❍ B. Run the File Signature verification to verify that the new driver has a

Microsoft digital signature ❍ C. Install the driver and click the Verify Certificate button in the Device

Manager ❍ D. Install the driver and check the device logs in the Event Viewer

7. You have a report generator that uses .rep filename extensions. You want to modify Windows 7 so that when you double-click a file with the .rep filename extension, Internet Explorer opens with the report being displayed. What do you need to do?

❍ A. Open the Default Programs and select Set Association from the Control Panel

❍ B. Right-click IExplore.exe and select Properties ❍ C. Modify the filename association using registry ❍ D. Modify the filename association using the local security policies

8. You have purchased some devices that have been sitting on the shelf at a store for several months and are about ready to be discontinued. You installed the drivers for those devices and now your system has some sporadic errors. What should you do?

❍ A. Look on the Windows CD for more up-to-date drivers ❍ B. Check with the manufacturer’s website and the Windows update

website for more up-to-date drivers ❍ C. Upgrade Windows 7 to the Ultimate edition so that it can make prop-

er use of the drivers ❍ D. Disable the prompting of unsigned driver warnings

CHAPTER 3: System Management

9. You are a parent who wants your children to only run certain programs that you allow on the computer. What can you do?

❍ A. You should use Parental Controls on your computer to allow only cer- tain programs.

❍ B. You should use Ease of Access on your computer to allow only cer- tain programs.

❍ C. You should adjust your NTFS permissions so that they cannot install applications on your computer.

❍ D. You should configure the firewall to block all ports not being used. 10. What console do you use to manage accessibility technology?

❍ A. Ease of Access Center ❍ B. Accessibility ❍ C. Disability ❍ D. Computer Management

Review Question Answers

1. Answer A is correct. Answers B, C, D, and E are recommended places to get drivers. Answer A is not a good place because you cannot verify where the driv- er came from or if it has been tampered with.

2. Answer B is correct. Problems with drivers are indicated by an exclamation point. Answer A is incorrect because a red X indicates a disabled device in Windows XP. Answer C is incorrect because a down arrow indicates a device is disabled. Answer D is incorrect because Device Manager does not flash.

3. Answers A, D, and E are correct. To enable Windows Aero, you must have set the monitor settings to a refresh rate higher than 10, set Color to 32 bit, and select a Windows Aero theme. Answer B is incorrect because the key combina- tion does not enable or disable Windows Aero. Answer C is incorrect because the resolution is not a direct factor for Windows Aero. Different from Windows Vista, you do not have to select the Windows Aero color scheme (Answer F).

4. Answer C is correct. Parental Controls only affect standard users, not adminis- trative users. Answer A is incorrect because Parental Controls would not have been enabled if it was part of a domain. Answer B is incorrect because you don’t need to upgrade as Parental Controls are available in the Windows 7 Home Basic edition. Answer D requires an administrative account to disable Parental Controls. Therefore, it is unlikely this is correct.

Review Question Answers

5. Answers B and C are correct. To load drivers, you must have the device con- nected first. Then it is always recommended that you use signed drivers. Answer

A is incorrect because applications do not have to be digitally signed. Answer D is incorrect because you have to have the device connected before you load the driver.

6. Answer B is correct. When you install new software, system files, and device drivers, unsigned or incompatible versions can cause system instability. Therefore, you should use the File Signature Verification to identify unsigned files on your computer, and you should not install drivers that do not have a proper driver signature. Answer A is incorrect because you cannot right-click the driver and click Verify signing. Answer C is incorrect because there is not a Verify Certificate button to click. Answer D is incorrect because there are no device logs in the Event Viewer and such information is not typically found in the Event Viewer.

7. Answer A is correct. When you want to change what program opens a particular type of data file, you should use the Control Panel’s Default Program and select Set Association. Answer B is incorrect because there is no file associated or related option in the Internet Explorer properties. Answer C is incorrect because you could configure the filename association with the registry, but it is much more complicated than using the Control Panel. Answer D is incorrect because the local security policy cannot be used for filename association.

8. Answer B is correct because it is obvious that these drivers are not the newest. Therefore, you should check the Windows update website and manufacturer websites for newer drivers. Answer A is not the best answer because it might not have the newest drivers. Answer C is incorrect because the edition has no effect on how a driver is loaded. Answer D is incorrect because it is always rec- ommended to load only signed drivers whenever possible.

9. Answer A is correct because if the computer is not part of the domain, you can use Parental Controls. Answer B is incorrect because you configure access to certain programs with Parental Controls and not Ease of Access. Answer C is incorrect because configuring NTFS is not the best way to configure accessibility options for children in this scenario. Answer D is incorrect because blocking ports is only partially effective and that would only block programs from commu- nicating over the network.

10. Answer A is correct because the Ease of Access Center enables you to control the accessibility options. Answers B and C are incorrect because there are no such consoles with those names. Answer D is incorrect because the computer management is a powerful console but does not include accessibility options.

This page intentionally left blank

CHAPTER 4