Brought to you by EarthWeb
ITKnowledge Logo Login Graphic Click Here!
Click Here!
ITKnowledge
Search this book:
 
Search the site:
 

Search Tips
EXPERT SEARCH
nav
arrow FEEDBACK

Dice Job Search EarthWeb Direct Fatbrain Auctions Support Source Answers Intraware

EarthWeb sites
Crossnodes
Datamation
Developer.com
DICE
EarthWeb.com
EarthWeb Direct
EarthWeb Events
ERP Hub
Gamelan
GoCertify.com
HTMLGoodies
Intranet Journal
IT Knowledge
IT Library
JavaGoodies
JARS
JavaScripts.com
open source IT
Perl Journal
RoadCoders
SysOpt.com
Y2K Info

EarthWeb
International

Previous Table of Contents Next


The Registry

The Registry acts as a configuration database and contains virtually all of the Windows NT user and system configuration data. The data contained in the Registry is organized in a tree format, similar to how folders and files are stored on a disk.

The Registry is split into five subtrees, which contain keys and subkeys. These keys can contain data items known as value entries. The value entries are constructed in three parts: the value name, the data type of the value, and the actual value data. For example, you can see these parts in the Registry entry ServiceName:REG_SZ:Browser. Table 1.2 lists the data types used by the Registry.

Table 1.2 Registry data types.

Data Type Description

REG_BINARY Contains binary data. Hardware configuration data is stored in this format. Windows NT Diagnostics provides an easy-to-understand display of data stored in this way.
REG_DWORD Contains data that is represented by a 4-byte number. Service values and interrupt levels are stored in this format.
REG_EXPAND_SZ An expandable data string containing a logical assignment that is evaluated when the Registry value is accessed by an application.
REG_MULTI_SZ Contains multiple strings in plaintext. Entries are separated by null characters.
REG_SZ Contains a plaintext string. These are often the values changed manually by the system administrator.

In addition, the Registry has collections of keys, subkeys, and value entries called hives that start at the root of the Registry. The HKEY_LOCAL_MACHINE\System hive is shown in Figure 1.1. A hive is contained in a single file contained in the %SYSTEMROOT%\SYSTEM32\CONFIG folder. Table 1.3 provides an overview of each Registry subtree.


Figure 1.1  The system hive.

Table 1.3 Registry subtrees.

Subtree Description

HKEY_LOCAL_MACHINE Holds the local computer information, including the hardware configuration data, the Security Account Manager database, and the software configuration. The information held in this subtree is the same no matter who is actually logged on to the computer system.
HKEY_CLASSES_ROOT Holds the associations between file types and applications. This subtree is an alias from HKEY_LOCAL_MACHINE\ SOFTWARE\Classes; the associations held here can be defined by using the Windows NT Explorer Options menu.
HKEY_CURRENT_CONFIG Holds the configuration information for the hardware profile currently in use.
HKEY_CURRENT_USER Holds the user profile for the user who is currently logged on, and contains data on the user’s desktop and network share configuration.
HKEY_USERS Holds all loaded user profiles, including the profile for the user who is currently logged on. The default profile held here will be used as a template for users who don’t have a profile the first time they log on.

The administrator usually manages the Registry indirectly by using the system administration tools that automatically perform the necessary configuration changes to the Registry. If the change you require can’t be achieved with the administration tools, you can use the Registry Editor REGEDT32 to make manual changes. Great care should be taken when using the Registry Editor; Windows NT can be rendered inoperative by incorrect changes to the Registry.

Because of the importance of the Registry to Windows NT, all changes to the Registry are either completed or not made. In other words, should the system fail for any reason while several Registry entries are being changed (often an administration tool must change several Registry entries for a new configuration to be implemented), the Registry would ensure that all the required entries are changed or that no changes are made, thus leaving the Registry in a known state.

Workgroups And Domains

Windows NT can be used in either a workgroup or domain configuration. The main points of both configurations are pointed out in the following sections.

Workgroup

Each computer participating in a workgroup is considered to be equal. A Security Account Manager (SAM) database is held on each computer in the workgroup. The workgroup is defined as functioning on a peer-to-peer basis.

Because each computer holds its own SAM, the administration of the workgroup must be performed locally on each computer in the workgroup. The security policies are set on a system-wide basis. A workgroup configuration is usually only suitable for small numbers of users and computers.

Domain

All computers participating in a domain use a central domain SAM. The domain database is managed by Windows NT servers. (Details of the roles played by Windows NT servers in a domain can be found in Chapter 7.) Because a central domain database is used, the administration of the domain is also centralized, making the domain model suitable for larger numbers of computers and users. The security policies are set on a domain-wide basis.

Projects:
Practical Guide To Windows NT

The following section provides real-life examples and step-by-step instructions on how to change some of the key components of Windows NT. As with any configuration changes to a working system, make sure you know what you’re changing and why.


Previous Table of Contents Next
HomeAbout UsSearchSubscribeAdvertising InfoContact UsFAQs
Use of this site is subject to certain Terms & Conditions.
ITKnowledge.com Copyright (c) 1996-1999 EarthWeb Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement.