windows 7 home premium iso free downloadtrackmania download pcsony acid pro 7 free download with cracktuneup utilities 2014 free download with product key
You have Windows 10, but these pages is to get a previous version of Windows. Get Windows 10 help
Windows XP support ends. Keep your PC protected. Learn more
Hi thereyoure trying to find Windows 10 info! We put that stuff inside a new spot.
Get strategies to your questions inside the Windows forum.
Get aid from a support professional on the phone, email, or chat.
Get techniques to your questions inside Windows7 forum.
Get aid from a support professional by telephone, email, or chat.
Get techniques to your questions from the WindowsVista forum.
Get the help of a support professional by telephone, email, or chat.
Get solutions to your questions inside WindowsXP forum.
Your feedback helps improve this website.
We thank you for feedback.
Get the term out. Share this site with your family and friends.
Stay hold of Windows.
Farbar Recovery Scan Tool, or FRST, is often a portable application built to diagnose malware issues.
Vine for Android is a simple platform where you can share your fun looping videos. Express your humor and creativity inside your Vines.
Cherrytree is usually a hierarchical note taking application, featuring rich text and syntax highlighting, storing data inside a single xml or sqlite file.
Uber is the best private driver in many than 50 countries.
Slimjet will depend on the Chromium open-source project and integrates many smart and convenient features to enable you to get more done in a lot less time.
EMDB is really a small cataloging utility designed for keeping track of the DVD collection.
FlashFXP is really a FTP, FTPS, SFTP client for Windows with secure, reliable, and efficient file transfers.
MediaMonkey will be the music organizer for that serious collector, it helps you manage a music library made up of small to substantial collections 50, 000 of audio recordings and playlists.
Portable Firefox can be a fully functional package of Mozilla Firefox optimized to use on any drive.
Farbar Recovery Scan Tool, or FRST, is often a portable application meant to diagnose malware issues.
Vine for Android is a simple platform where you can share your fun looping videos. Express your humor and creativity in your Vines.
Cherrytree can be a hierarchical note taking application, featuring rich text and syntax highlighting, storing data inside a single xml or sqlite file.
Uber is the private driver in than 50 countries.
Slimjet is founded on the Chromium open-source project and integrates many smart and convenient features to enable you to get more done in a smaller amount time.
EMDB is really a small cataloging utility created for keeping track of your respective DVD collection.
FlashFXP is usually a FTP, FTPS, SFTP client for Windows with secure, reliable, and efficient file transfers.
MediaMonkey would be the music organizer with the serious collector, will help you you manage a music library made up of small to very big collections 50, 000 of audio recordings and playlists.
Portable Firefox can be a fully functional package of Mozilla Firefox optimized to be used on any drive.
This site uses cookies to further improve your experience. By viewing our content, you're accepting the utilization of cookies. To find out more and change your cookie settings, please view our cookie policy.
Microsoft is adding new suggested contact and automatic flight notifications to Outlook around the Web and starting in 2016.
JBoss middleware is coming to Red Hat OpenShift in Docker containers.
First Walmart, and today Target, are missing portion of the point of digital payments: Reduced friction with the point of sale. Why are retailers attempting to reinvent the wheel any time a trio of better systems exist?
Microsoft has bought analytics firm Metanautix and promises to integrate its technology with SQL Server as well as the Cortana Analytics Suite.
Updated: Before you do just about anything on your new iPhone or iPad, you must lock it down. Here are the key tweaks you must protect your privacy.
Got a Mac this isn't behaving itself? Here are two simple things it is best to try before it with a Genius for your nearest Apple Store.
2015 was the starting of the end for SSDs within the data center. Why? Because researchers have delved deep inside their actual behavior determined multiple problems. Heres what you must know.
The company carries on build and lease data center space in Nevada.
Telstra has turned on services inside first three communities to obtain coverage within the governments mobile blackspot program.
Beyond recognizing handwritten characters, the software program also drew its as part of your visual Turing Test. Most from the judges werent capable to tell the characters were drawn with a machine.
Broadband connections and adoption is slowly improving nevertheless the world remains to be well in short supply of a UN goal of universal access by 2015.
Tech execs are sometimes asked to justify their existence: below are some ways they are able to prove their value with their organisation.
Facebook delivers facial recognition and frozen stickers for Christmas.
Netflix releases a brand new Windows 10 universal app however the update for Windows 10 smartphones is still inside the works.
TechnologyOne defended its tax rate throughout the 2013-14 income year, saying whether or not this had not applied the best R D tax offset to its revenue, its effective tax rate would've been 30 %.
You happen to be successfully joined. To sign up for more newsletters or manage your bank account, check out the Newsletter Subscription Center.
A complete tweaking program for Windows.
Now designed for Windows 10.
Version 7.3.6, posted on August 7, 2015
The Registry is usually a heart and soul associated with a Windows system. It contains information that controls how your Windows appears and just how it behaves. Most applications today use registry to hold configuration along with other important data. When you install application, new registry entries created. These entries must be deleted automatically whenever you uninstall the appliance. Unfortunately, it doesn't always work because of this. Sometimes you will find that several applications are not able to remove their unique registry entries. These entries will end up obsolete. read
Version 4.6.0, posted on July 29, 2015
TweakNow PowerPack can be a fully-integrated suite of utilities than enable you to fine-tune every facet of your computers computer and Web browser. The Registry Cleaner module will give you a safe and easy way to completely clean Windows Registry. To keep your computer always at top performance, we recommend to clean up your registry at least a month. For Windows tweaking lovers, the suite provides over 100 hidden Windows settings from the Windows Secret section. read
Version 1.0.0, posted on December 24, 2014
With improved support from major internet browsers for CSS 3 and HTML 5, developer today would prefer to create button using CSS and HTML than using static image. With CSS, button can readily adapt with a different size without losing any quality and definately will greatly reduce bandwidth usage. Creating button with CSS is fairly easy. Everyone can code it having a simple text editor, however it will be cumbersome and a serious tedious work. Using Quick CSS Button, setting up a button is a lot more fun Just a few clicks every now and then than your button is just about to use. Give it a try. read
Version 1.3.0, posted on November 4, 2013
Your computer might feature one or two terabyte of hard disk drive capacity. It looks like plenty of space to begin with, but soon you are going to realize that including the largest hard disk drive capacity on the market is not enough in your case. How is that possible? Computer today is over just a practical device. People apply it more for social activity and entertainment than for performing a real job. Not really surprising that in just a year or two, most portion of your disk drive is already populated with a large number of photos, videos, music, applications, and games collections. read
Version 1.0.0, posted on September 29, 2013
If one photo just isn't enough to share with your whole story, than have you thought to combine multiple photos and make up a beautiful photo collage. With TweakNow PerfectFrame you'll be able to combine around ten 10 photos and judge from in excess of one hundred 100 different layout to generate a unique and exquisite photo collage. read
Version 1.0.1, posted on July 16, 2013
TweakNow FileRenamer is often a simple even so the most advanced file renamer utility inside market. Designing with user under consideration, this system enable you to start a complex renaming task easily. Adding, removing, inserting, indexing, or replacing characters and numbers can be achieved swiftly. If youre a photographer with 1000s of imported photos from camera, you are going to appreciate how this program can certainly turn those IMG files into a more meaningful name. Just try it out, youll discover how this little program can save a great deal of your some time and effort. read
Version 1.2.0, posted on April 30, 2013
On Mac or Ubuntu, each and every time you plug an external disk drive into your computer, an icon to display the newly plugged disk drive added to your desktop. This icon will likely be automatically removed if the drive is unplugged. The same thing happens for CD or DVD. That is usually a simple but neat feature. With TweakNow DriveShortcut we try to take this feature to Windows. read
Version 1.0.0, posted on September 24, 2010
As you know that there are many free and commercial undelete programs about on the internet. You may wonder how those undelete programs can magically restore deleted files. Well, it is really not really a magic in any respect. When you empty trash in order to permanently remove deleted files from your hard disk drive, Windows isn't going to actually take them off. Instead, for performance reason, Windows simply mark the venue of deleted files on harddrive as unoccupied and reserve them for future writing. read
A complete tweaking program for Windows.
Now accessible for Windows 10.
Version 7.3.6, posted on August 7, 2015
The Registry is usually a heart and soul of the Windows system. It contains information that controls how your Windows appears and ways in which it behaves. Most applications today use registry to keep configuration along with other important data. When you install application, new registry entries created. These entries ought to be deleted automatically after you uninstall the applying. Unfortunately, no always work doing this. Sometimes you discover that several applications don't remove their very own registry entries. These entries can become obsolete. read
Version 4.6.0, posted on July 29, 2015
TweakNow PowerPack is usually a fully-integrated suite of utilities that allow you to fine-tune every factors of your computers computer and Web browser. The Registry Cleaner module gives you a safe and easy way to completely clean Windows Registry. To keep your computer always at top performance, we recommend to clean up your registry at least a month. For Windows tweaking lovers, the suite provides a lot more than 100 hidden Windows settings from the Windows Secret section. read
Version 1.0.0, posted on December 24, 2014
With improved support from major internet browsers for CSS 3 and HTML 5, developer today would rather create button using CSS and HTML than using static image. With CSS, button can certainly adapt into a different size without losing any quality and can greatly reduce bandwidth usage. Creating button with CSS is actually comparatively easy. Everyone can code it utilizing a simple text editor, nevertheless it will be frustrating and a significant tedious work. Using Quick CSS Button, developing a button is far more fun Just a few clicks every now and then than your button is getting ready to use. Give it a try. read
Version 1.3.0, posted on November 4, 2013
Your computer might have one or two terabyte of disk drive capacity. It looks like lots of space initially, but soon you may realize that even largest harddrive capacity on the market today is not enough available for you. How is that possible? Computer today is in excess of just a functional device. People make use of it more for social activity and entertainment than for performing a real job. Not really surprising that in just a year or two, most portion of your hard drive is already populated with a large number of photos, videos, music, applications, and games collections. read
Version 1.0.0, posted on September 29, 2013
If one photo will not be enough to see your whole story, than you will want to combine multiple photos and make up a beautiful photo collage. With TweakNow PerfectFrame you may combine around ten 10 photos and judge from greater than one hundred 100 different layout to develop a unique and delightful photo collage. read
Version 1.0.1, posted on July 16, 2013
TweakNow FileRenamer is really a simple though the most advanced file renamer utility inside market. Designing with user planned, this program enable you to carry out a complex renaming task easily. Adding, removing, inserting, indexing, or replacing characters and numbers can be carried out swiftly. If youre a photographer with countless imported photos from camera, you'll appreciate how this program can simply turn those IMG files with a more meaningful name. Just check it out, youll find out how this little program can save lots of your some time to effort. read
Version 1.2.0, posted on April 30, 2013
On Mac or Ubuntu, each time you plug an external hard disk drive into your computer, an icon to show off the newly plugged hard disk drive added for the desktop. This icon will likely be automatically removed if your drive is unplugged. The same thing happens for CD or DVD. That is really a simple but neat feature. With TweakNow DriveShortcut we try to create this feature to Windows. read
Version 1.0.0, posted on September 24, 2010
As everbody knows that there are lots of free and commercial undelete programs around on the internet. You may wonder how those undelete programs can magically reestablish deleted files. Well, this isn't really a magic whatsoever. When you empty trash in order to permanently remove deleted files from your hard disk drive, Windows will not actually take them of. Instead, for performance reason, Windows simply mark the venue of deleted files on disk drive as unoccupied and reserve them for future writing. read
By ab muscles nature that XP is substantially more complex than an amoeba, it's likely that good that eventually it will need repairing. This page investigates a number of repair options which might be frequently mentioned in forums and self-help websites. Understanding what choices are available and exactly how to access those options makes all the repair scenario less daunting and raises the chance from the repair achieving success. This is just not an in-depth help guide the nuances of each different repair option, but really a roadmap for the available options to assist in repairing an XP system. Often times half the battle is knowing what tools and methods can be obtained and how to locate them. Use this guide when someone says pop inside CD and pick the repair function plus you've got no idea learn how to get to what anyone is speaking about.
In order to utilize this option the files you want must are already backed up previously and stored on numerous different mediums for retrieval afterwards.
Click Start Control Panel Performance and Maintenance System.
On the Hardware tab, click Device Manager.
Right-click the product for which you desire to reinstall the first sort version on the driver.
Click Start Control Panel Performance and Maintenance System.
On the Hardware tab, click Device Manager.
Right-click it suspected of allowing the problem and then click Disabled.
Allow this list to populate and select this system to be removed.
If after utilizing the previously mentioned repair options no success has become achieved, System Restore may very well be the best next option available. Even if you have elected changes to data since last restore point appeared, turning it back will not likely impact those changes. Changes to applications will likely be impacted, but it really s likely those changes are that which you re looking to reverse anyway so that it becomes less connected with an issue.
There are two strategies of accessing System Restore; one from inside XP once the system will boot normally and another method called Safe Mode and System Restore, accessed from your Windows Advanced Options Menu.
Access System Restore from Within XP - Click Start Control Panel Performance and Maintenance. On the left side in the screen under See Also, click System Restore.
Access System Restore from Safe Mode - See the Safe Mode section below for a way to start XP in safe mode. Once the system may be booted, click Start Control Panel Performance and Maintenance. On the left side on the screen under See Also, click System Restore.
One on the most regularly employed options when wanting to repair an XP installation is Safe Mode. Before you may use Safe Mode you will need to actually arrive at where it s located knowning that s around the Windows Advanced Options Menu. To gain access, boot laptop computer and watch for Please select the computer to start to appear within the boot screen. When it can, press F8 and it is best to be taken towards the Windows Advanced Options Menu screen.
If for reasons uknown you miss the screen, enable the machine boot normally, then shut it down and try again. On the boot screen, it is possible to start repeatedly tapping the F8 key once the detection on the hard drives is complete and virtually ensure success in locating the Windows Advanced Options Menu. Once it opens you might have access with a number of several options.
Safe Mode: This is often looked at as a singular item, truly it s actually three different items because the screen capture below illustrates.
Safe Mode - Starts XP using only basic files and drivers including mouse except serial mice, monitor, keyboard, basic video, mass storage devices, default system services, without network connections.
Safe Mode with Networking - Includes all items listed under Safe Mode plus network connections.
Safe Mode with Command Prompt - Includes all items listed under Safe Mode. Once logon may be accomplished, a command prompt is displayed as opposed to the Graphical User Interface GUI.
Recovery Console: In the continuing development of repair items for XP, Recovery Console could be the next logical step if Last Known Good Configuration and Safe Mode failed in allowing the computer to boot. As Microsoft states, This method is suggested only if that you are an advanced user who are able to use basic commands to spot and locate problem drivers and files.
Access the Recovery Console: Start laptop with the Windows XP installation CD within the CD drive. When prompted during text-mode setup, press R to begin the Recovery Console. See screen capture below.
Rather than feel the process of booting on the XP CD to get on the Recovery Console, it might be installed for the hard drive in order that it will appear being an option each time the machine boots. If you frequently access Recovery Console it might be a great timesaver. Click Instructions and Screen Captures for directions.
Automated System Recovery: Before you arrived on the screen shown above, should you have been watching the gray bar on the bottom on the window you should have seen another possible option for XP Pro users. ASR is not designed for XP Home users.
F2 - Pressing F2 allows running Automated System Recovery ASR. See the screen capture below.
I think the Microsoft explanation of Automated System Recovery essentially says everthing. In dealing with ASR and if you might want to apply it on a damaged system, they state, After all other attempts at recovery fail, or if you've got replaced a damaged system disk drive. You should have previously used Backup to produce an Automated System Recovery set. There you go; not really a confidence builder i think, especially since not many users I know actually use Backup that s incorporated with Windows XP.
Windows Installation CD - Repair Current Installation: The process begins by booting the machine with the XP installation CD. The CD drive have to be set since the initial boot device within the computer BIOS. There are many different ways to access the BIOS, but pressing Delete for the initial boot screen is one on the most common methods. Watch the boot screen and it also normally displays a message using the appropriate key sequence to grant BIOS access.
The boot sequence continue. Again, watch the screen to get a message show up that the computer is trying to find a bootable CD ROM. Watch the monitor with the message how the CD may be auto-detected, then the Press any key to start CD message. Dont fall for your old joke about seeking the Any key and simply hit the spacebar or another key thats convenient inside the five second span of time the message will likely be displayed. The screen shown in Figure 01 will show up while Windows inspects the hardware configuration.
Once the inspection is complete, files will begin to load from your CD to start out the installation. Eventually the screen shown in Figure 02 will likely be displayed offering three options. This may be the point in which the majority of confusion occurs about repairing an active installation. The second asks if you would like to repair an XP installation using Recovery Console. In some situations this is the desired strategy, in this case we desire to repair XP without the need for Recovery Console. Rather than the other, pick the first choice to set up Windows by pressing Enter.
More files will load through the CD until you happen to be taken on the screen shown in Figure 03. A list of the many current installations of Windows XP are going to be displayed from the lower portion in the window. Use the arrow tips for select one of them if you have over one installation. Once the selection has become made, press the R critical for begin the repair process. If you wish to install yet another copy of XP as an alternative to repair a current copy, press Escape.
Note that after you perform a repair of an ongoing installation you are going to be inspired to enter the Product Key that came using the CD. In essence you might be installing an innovative copy of XP above the existing copy. While data and settings are certainly not destroyed, any Service Packs will have to become reinstalled following repair process has completed. Repairing an existing installation will not be a replacement reformatting a drive and doing clean installation. It may help eliminate some problems while using current installation, nevertheless it will not restore an ailing system to enjoy new condition and gratification that a clean installation will give you.
Share Folders, Files, and Printers in XP Home and Professional
Tips to set up Quick Launch, Search, and Windows Explorer for easier, efficient use.
Windows Update Catalog offers centralized XP Critical Updates, Service Pack, and Hardware Driver Downloads
For several months now I ve been posting a reminder about Patch Tuesday or Second Tuesday mainly because it has come to become known when Microsoft releases the modern round of updates for Windows XP and also other products.
As always, I strongly suggest you learn about any update ahead of installation, especially updates carrying a under Critical rating, and have an ongoing system and data backup obtainable in case it s required to restore the system to some pre-patch condition.
The Elder Geek sites contain many articles and ideas for modifying the Windows computer. Ive tried these tweaks and suggestions about many systems. Sometimes they work, sometimes not. The point is, ensure you've got a current, tested backup of the system and documents and find out how to restore it in case something goes very wrong. You can still yell at me, but I assume no responsibility to your actions and use on the information and disclaim any risk for any consequences for these actions.
Copyright 2002/2003/2004/2005/2006/2007/2008/2009/2010/2011/2012/2013, Jim Foley/The Elder Geek, All Rights Reserved Worldwide
Reproduction, of all sorts, of real information on this great site is prohibited without express written permission.
Microsoft is certainly affiliated with, nor offers endorsement of, this website.
By the actual nature that XP is substantially more advanced than an amoeba, odds are good that sooner or later it will need repairing. This page discusses a number of various repair options which are frequently mentioned in forums and self-help websites. Understanding what option is available and the way to access those options makes all the repair scenario less daunting and raises the chance in the repair getting good results. This just isn't an in-depth secrets and techniques for the nuances of each different repair option, but even more of a roadmap on the available options that can help in repairing an XP system. Often times half the battle is knowing what tools and methods can be found and how to find them. Use this guide when someone says pop inside the CD and find the repair function plus you've got no idea learn how to get to what anyone is discussing.
In order to utilize this option the files showcased must are actually backed up previously and stored on several different mediums for retrieval at a later stage.
Click Start Control Panel Performance and Maintenance System.
On the Hardware tab, click Device Manager.
Right-click the product for which you need to reinstall the prior version in the driver.
Click Start Control Panel Performance and Maintenance System.
On the Hardware tab, click Device Manager.
Right-click these devices suspected of inducing the problem and click on Disabled.
Allow their email list to populate and after that select this course to be removed.
If after utilizing the previously mentioned repair options no success has become achieved, System Restore could be the best next option available. Even if you have elected changes to data since last restore point was developed, turning the machine back is not going to impact those changes. Changes to applications will probably be impacted, nonetheless it s likely those changes are whatever you re looking to reverse anyway in order that it becomes less of your issue.
There are two types of accessing System Restore; one from inside XP in the event the system will boot normally and another method often known as Safe Mode and System Restore, accessed on the Windows Advanced Options Menu.
Access System Restore from Within XP - Click Start Control Panel Performance and Maintenance. On the left side with the screen under See Also, click System Restore.
Access System Restore from Safe Mode - See the Safe Mode section below depending on how to start XP in safe mode. Once the system may be booted, click Start Control Panel Performance and Maintenance. On the left side on the screen under See Also, click System Restore.
One on the most commonly used options when looking to repair an XP installation is Safe Mode. Before you'll be able to use Safe Mode you must actually be able to where it s located understanding that s around the Windows Advanced Options Menu. To gain access, boot your computer and watch for Please select the operating-system to start to appear about the boot screen. When it can do, press F8 and it is best to be taken for the Windows Advanced Options Menu screen.
If for reasons uknown you miss the screen, permit the machine boot normally, then shut it down and try again. On the boot screen, you are able to start repeatedly tapping the F8 key once the detection with the hard drives is complete and virtually ensure success in locating the Windows Advanced Options Menu. Once it opens you've access into a number of various options.
Safe Mode: This is often looked at as a singular item, but usually it s actually three different items as being the screen capture below illustrates.
Safe Mode - Starts XP using only basic files and drivers including mouse except serial mice, monitor, keyboard, basic video, mass storage devices, default system services, with no network connections.
Safe Mode with Networking - Includes all items listed under Safe Mode plus network connections.
Safe Mode with Command Prompt - Includes all items listed under Safe Mode. Once logon may be accomplished, a command prompt is displayed as opposed to the Graphical User Interface GUI.
Recovery Console: In the progress of repair items for XP, Recovery Console could be the next logical step if Last Known Good Configuration and Safe Mode failed in allowing the machine to boot. As Microsoft states, This method is suggested only if you happen to be an advanced user who will use basic commands to recognize and locate problem drivers and files.
Access the Recovery Console: Start laptop computer with the Windows XP installation CD inside CD drive. When prompted during text-mode setup, press R to get started on the Recovery Console. See screen capture below.
Rather than check out process of booting through the XP CD to get for the Recovery Console, it is usually installed towards the hard drive so that it will appear just as one option each time the computer boots. If you frequently access Recovery Console it could be a great timesaver. Click Instructions and Screen Captures for directions.
Automated System Recovery: Before you arrived on the screen shown above, should you have been watching the gray bar for the bottom with the window you should have seen another possible selection for XP Pro users. ASR is not accessible for XP Home users.
F2 - Pressing F2 allows running Automated System Recovery ASR. See the screen capture below.
I think the Microsoft explanation of Automated System Recovery virtually says everything. In discussing ASR and if you might want to apply it on a damaged system, they state, After all other attempts at recovery fail, or if you've replaced a damaged system disk drive. You will need to have previously used Backup to generate an Automated System Recovery set. There you go; not quite a confidence builder in my view, especially since not many users I know actually use Backup that s added to Windows XP.
Windows Installation CD - Repair Current Installation: The process begins by booting it with the XP installation CD. The CD drive has to be set since the initial boot device from the computer BIOS. There are many different ways to access the BIOS, but pressing Delete for the initial boot screen is one with the most common methods. Watch the boot screen and yes it normally displays a message with all the appropriate key sequence to grant BIOS access.
The boot sequence continues. Again, watch the screen for just a message to look that the machine is searching for a bootable CD ROM. Watch the monitor with the message the CD has become auto-detected, and then the Press any key as well CD message. Dont fall with the old joke about in search of the Any key and easily hit the spacebar or other key thats convenient inside five second life span the message is going to be displayed. The screen shown in Figure 01 look while Windows inspects the hardware configuration.
Once the inspection is complete, files are going to load on the CD to start the installation. Eventually the screen shown in Figure 02 are going to be displayed offering three options. This could be the point the place that the majority of confusion occurs about repairing an existing installation. The other asks if you would like to repair an XP installation using Recovery Console. In some situations this might be the desired strategy, playing with this case we desire to repair XP without the need for Recovery Console. Rather than the second item, pick the first solution to set up Windows by pressing Enter.
More files will load through the CD until you happen to be taken on the screen shown in Figure 03. A list of the many current installations of Windows XP are going to be displayed within the lower portion on the window. Use the arrow secrets to select particularly if you have a lot more than one installation. Once the selection is made, press the R critical for begin the repair process. If you wish to install one more copy of XP as an alternative to repair a preexisting copy, press Escape.
Note that after you perform a repair of an existing installation you might be inspired to enter the Product Key that came using the CD. In essence you might be installing a new copy of XP above the existing copy. While data and settings usually are not destroyed, any Service Packs will have for being reinstalled following repair process has completed. Repairing an ongoing installation will not be a replacement reformatting a drive and performing a clean installation. It may help solve some problems with all the current installation, however it will not restore an ailing system to adore new condition and satisfaction that a clean installation can provide.
Share Folders, Files, and Printers in XP Home and Professional
Tips to get ready Quick Launch, Search, and Windows Explorer for easier, efficient use.
Windows Update Catalog offers centralized XP Critical Updates, Service Pack, and Hardware Driver Downloads
For almost a year now I ve been posting a reminder about Patch Tuesday or Second Tuesday mainly because it has come being known when Microsoft releases the most up-to-date round of updates for Windows XP and also other products.
As always, I strongly suggest you learn about any update ahead of installation, especially updates carrying a under Critical rating, and have an active system and data backup obtainable in case it s required to restore the system with a pre-patch condition.
The Elder Geek sites contain many articles and strategies for modifying the Windows operating-system. Ive tried these tweaks and tips about many systems. Sometimes they work, sometimes not. The point is, ensure you've got a current, tested backup coming from all system and data and learn how to restore it in case something goes very wrong. You can still yell at me, but I assume no responsibility to your actions and use on the information and disclaim any culpability for any consequences for these actions.
Copyright 2002/2003/2004/2005/2006/2007/2008/2009/2010/2011/2012/2013, Jim Foley/The Elder Geek, All Rights Reserved Worldwide
Reproduction, of any type, of knowledge on this page is prohibited without express written permission.
Microsoft is definitely affiliated with, nor offers endorsement of, this web site.
It wasn t for an extended time after I installed XP that I was messing around with all the registry. I suspect you re probably going being doing the same principle or else you wouldn t stay in this area with the site. Before you're making any changes, make time to read over it. It s pretty dry reading material, nonetheless it might help you save from finding yourself using a putty colored box that merely sits there doing nothing instead of firing up XP as you should expect.
There are two methods for working while using registry; software based and direct access. The software based technique is generally considered being safe, although a badly behaved software application that mangles the registry forces you to doubt the wisdom on this statement. Anyone who has used a pc is familiar with the program based means of making changes. Control Panel is a great example. Make a switch to one with the Control Panel settings and almost assuredly you've initiated a change inside the registry. It s just that you might be insulated by Control Panel from seeing what took behind the scenes within the registry.
Directly accessing the registry is actually dangerous. There used for being two versions of Registry Editor, regedit and regedt32, except for XP they have already been incorporated in Microsoft Registry Editor Version 5.1. Type either name inside the Run box and Version 5.1 is what we re gonna end up with. The only real issue with not having regedt32 anymore could be the lack of read-only mode in Version 5.1, but it really just means you'll want to be careful to not make any unintended changes when going through the registry. And make sure you've a valid backup and restore point.
Open the Registry Editor Fig. 01 using Start Run and typing regedit from the Open: line and you also ll view it s put into two panes. Understanding Registry Editor is less difficult if you think in the left pane as being the Keys Pane as well as the right side since the Values Pane. In the left pane you will find five 5 main divisions or root keys as shown below. I ve inserted the main key abbreviations in red text behind each key.
Registry Editor utilizes a hierarchical structure just like Windows Explorer however with one major difference. In Windows Explorer you've folders within the all over the place hand panes, however in Registry Editor you'll find never any folder icons inside the right hand section. In Registry Editor the yellow folder icon really denotes an outside and distinct key. Since the right hand pane is available to values only you will find no folders displayed because pane.
Each from the five main keys may be expanded to disclose additional keys or what some talk about as sub-keys. Many sub-keys have sub-keys below them, sometimes the amount of sub-keys becoming almost unbelievably long, but inside same manner that Windows Explorer works, registry locations are defined by the path. Just remember that any reference to some registry location commences with one with the five root keys.
Notice on the bottom of Registry Editor that My ComputerHKEYCLASSESROOT is displayed. This display will vary as you navigate down throughout the registry structure; very handy for monitoring where you might be rather than requiring you to scroll upward in the event the mind momentarily goes blank while you might be editing.
It s critical that prior to deciding to do any editing you create a backup in the current registry. The temptation to produce one little change without storing is great. It can even be deadly. I speak from experience here, and the majority likely you re gonna ignore this warning the same as I did, but hopefully you ll certainly be a little bit smarter than I was. That said, you'll find different options for backing up so let s have a look at each one individually.
Backing up is merely exporting information from your registry in a file that is certainly saved on the system. When you invoke the export function that you are given a choice of numerous file types that could be saved.
Each one on the different file types above plays a crucial role in the way the data you export is saved. Choosing the wrong type can provide unexpected results. Understanding each type and once to make use of it is essential.
Registration Files: The Registration Files option creates file. This is probably probably the most well known formatting used for burning the registry. The Registration File might be used by 50 % ways. As a text file it might be read and edited using Notepad outside Registry Editor. Once the changes happen to be made and saved, right clicking the file and with all the Merge command adds the changed file back into your registry. If you will be making additions to your registry using regedit after which merge the previously saved Registration File, any situation that you ve added via regedit will not likely be removed, but changes you are making to data using regedit that previously existed within the saved Registration File will likely be overwritten if it's merged.
Registry Hive Files: Unlike the Registration Files option above, the Registry Hive Files option makes a binary image from the selected registry key. The image file just isn't editable via Notepad nor are you able to view its contents by using a text editor. However, just what the Registry Hive Files format does is create a picture perfect view from the selected key and permit you to import it back in the registry to make sure any problematic changes you have made are eliminated.
Text Files: This option does just because name suggests. It generates a text file containing the information inside selected key. It s most successful purpose is setting up a record or snapshot of any key for a particular opportunity that you may refer returning to if necessary. It cannot be merged back to the registry just like a Registration File.
Win9x/NT4 Registration Files: This option creates file from the same manner utilised by the Registration Files option. It s made use of by previous Windows versions and serves no purpose in XP unless you need to merge an important from XP in to a previous version of Windows.
Considering several choices above, essentially the most effective and safest way of backing within the registry is to make use of the Registry Hive Files option. No matter what fails in your editing, importing the image on the key will eliminate all changes, additions, or some other things that will often have occurred.
If you wish to edit outside of the confines of regedit, or if that you are sure you would like your additions for the registry to stay even if you must merge, use Registration Files for the backup.
If you simply want a copy in the key that is usually referenced having a text editor, but wish to eliminate any possibility of the file being accidentally merged back in the registry, use Text Files.
The actual means of backing the registry is pretty simple when you ve decided the file type for that backup and whether you would like to back up somebody key or entire registry. In the left hand pane of regedit, find the key to be duplicated, right click and select Export to look at the Export Registry File Property Sheet. From there, it s only a matter of assigning the backup a descriptive filename and choosing the type of backup file you wish based for the discussion above. To be for the safe side, it certainly wouldn t hurt for making a backup within Registry Hive Files and Registration Files formats.
There are two notes you need to be aware of regarding what things can be copied using specific file types.
If My Computer is selected from the left pane of regedit, you'll not be allowed for making a backup utilizing the Registry Hive Files format. This is equivalent to storing the entire registry. XP requires you to work with the System State backup in such cases. Backing within the System State is discussed further down in this particular article
If My Computer is selected inside the left pane of regedit, you could select Registration Files since the backup formatting but this isn't the recommended method for the complete registry backup.
In the next sections I m gonna refer to this screen capture frequently to help you illustrate the different ways of backup.
Take a quick examine Fig. 03 therefore you ll note it displays the HKEYCURRENTUSERControl PanelDesktop key. In the Values Pane you ll understand the WaitToKillAppTimeout value which is currently set to 4000. It will likely be the subject of storing individual values.
It s important to remember how the registry is absolutely just a big compilation of internet data and settings that sits there waiting for being accessed by XP itself or by an installed application. By itself it will nothing. At first glance which will not seem to become of much importance, nevertheless it can be useful whenever you consider that this truly useful information inside the registry is stored from the values. Look on the majority of registry edits so you ll see they require changing values, not adding or removing keys. Combine that knowledge together with the fact that XP or even an application has to get programmed to access the values otherwise they are useless understanding that provides a fast, easy way to support individual values.
Fig. 04 illustrates how the first sort information is applied to in reverse values of keys that may be modified. It s important to note that this applies to values, not keys. For this example I have made a decision to modify the value from the string WaitToKillAppTimeout. The WaitToKillAppTimeout string value highlighted in red will be the original string value which has a value of 5000 that I m planning to modify. Once I replace the value I might forget exactly what the original value was 5000 before I decide in the event the change I make is acceptable. To guard from the original value being forgotten, I ve came up with string value TEGWaitToKillAppTimeout that s shown highlighted in green. For this tutorial I ve used TEG prior to the real value name but you'll be able to use anything convenient. If your dog was named Fido, you could use Fido ahead of the real value name.
Now, looking for the screen capture below, I can go back on the original string value usually the one highlighted in red to make the change for the new 4000 value. At this point absolutely suit often asked why finding the two values listed from the registry doesn t create a conflict. Remember the thing that was said previously; XP or perhaps an application has to become programmed to access the values otherwise they are useless. There is no application or section of XP that's programmed to look for the string value named TEGWaitToKillAppTimeout in order that it can happily co-exist with WaitToKillAppTimeout, providing a journal or record of the changes have already been made on the registry. For a better record you may add a date on the prefix which can look like TEG08252003WaitToKillAppTimeout which is shown highlighted in blue.
If the progres doesn t determine all you need to do is reference the supported entry normally the one highlighted in green or blue to the original value and change the additional value that was modified normally the one in red back towards the original value. An easier approach to revert back for the original value is always to delete the modified string normally the one in red then right select the backup strings green or blue and select Rename. Eliminate the prefix that was included with return the string to its original configuration.
If you do lots of registry tweaking and modification of existing values this is a good method because it supplies a visual record associated with a modifications that are actually made towards the registry values. Two months from so if instead I desire to know if I created a modification on the WaitToKillAppTimeout value, all I ought to do is open Registry Editor, navigate to your HKEYCURRENTUSERControl PanelDesktop key and compare the WaitToKillAppTimeout together with the backup entries. By with all the dated prefix I can not only tell what change is made but what date it had been modified. After the worthiness modification is tested you'll be able to go back and take off the new prefixed values that had been created if this bothers you obtaining remain from the registry. I always leave them being a permanent record and possess never noticed any problems or system performance penalty.
One from the first questions have a tendency to comes up after reading the first sort section -Backing Up Individual Values- is the thing that happens should the prefix technique is used to support keys rather than simply individual values. It s a fantastic question and I ll experience another example to try to explain one possible scenario.
In the prior section there we were working inside HKEYCURRENTUSERControl PanelDesktop key so lets apply a prefix to your Desktop key and pay attention to what happens.
Open Fig. 06 to find out HKEYCURRENTUSERControl PanelDesktop before any changes are designed. Note that HKEYCURRENTUSERControl PanelDesktop has a sub-key WindowMetrics.
Open Fig. 07 to view the change meant to HKEYCURRENTUSERControl PanelDesktop. Nothing has become altered apart from adding the TEG prefix for the Desktop key. No changes were made for the sub-key WindowMetrics.
What ya think happened in the event the change was made as well as the user logged off and back on?
Open Fig. 08 so you ll note that XP automatically recreated the HKEYCURRENTUSERControl PanelDesktop key that's shown with all the green highlight. However, it s a far cry from the original HKEYCURRENTUSERControl PanelDesktop key appeared to be before that it was modified to TEGHKEYCURRENTUSERControl PanelDesktop. There is one entry inside Values Pane understanding that is Default, plus there isn't a sub-key for WindowMetrics. You can also see that this default Bliss background is usually missing through the desktop.
So, simply what does this inform us about adding a prefix as a technique of backing up keys? First and foremost it demonstrates that while it yields some interesting results it s not really a suitable method for copying registry keys. The results are unpredictable at best and once you re dealing using the registry you need a method that s trustworthy. That s not to ever say though how the procedure is entirely without merit in relation to keys. As a troubleshooting tool it might be handy to rename a key having a prefix after which see if XP as well as an application will recreate the essential key. In effect the prefix hides the registry key from XP so you'll be able to see what effect deleting the true secret would have while still supplying you with a means of restoring the key that had been hidden from the prefix.
The final point here is; fiddle with this process but make sure you've another proven backup constantly in place first.
Unlike the prior methods discussed, files to support individual keys and entire branches from the registry is really a well established, proven method that may be used daily by an incredible number of registry tinker er s. Refer back in Fig. 03 as well as the HKEYCURRENTUSERControl PanelDesktop key that is certainly highlighted inside the Key Pane.
The actual backup procedure is not difficult. In the Keys Pane, right click for the individual key in this example Desktop you wish to back up, click Export, assign the backup a descriptive filename and pick the type of backup file being created. In Fig. 09 I used the file name Desktop also, since we are backups I selected Registration Files because file type.
Notice radio stations button by Selected Branch that details what key's actually being saved. A quick check on this information will help prevent ending up which has a backup with the wrong key that may not be discovered until it s past too far. Once Save is clicked the key will probably be saved with a file named from the location you specify. Some additional points;
When the true secret entry point to the backup is set, in this example HKEYCURRENTUSERControl PanelDesktop, the many sub-keys beneath that period will also be secured. In this example, this means in addition to HKEYCURRENTUSERControl PanelDesktop you'll also be storing HKEYCURRENTUSERControl PanelDesktopWindowMetrics.
Often times users accidentally move higher up inside registry hierarchy when in reverse than is important. In this example, if I d set the true secret entry point for HKEYCURRENTUSERControl Panel, the intended key HKEYCURRENTUSERControl PanelDesktop would be copied, playing with addition all kinds of other unnecessary keys would be also a section of the backup. Keep specific key backups as compact as is possible by not traveling up the main element hierarchy further than is required. To illustrate how file can rapidly increase in size automobile incorrect access point is selected take a look with the table below. It s quickly apparent that this last choice highlighted in red will be the way to go. Not only will it require less disk space just to save, it may be merged quickly and is particularly easier to edit, as appropriate, with less prospects for error.
There are four methods for restoring file backup. I would like to look in the methods within a bit more detail.
Method One - From the Registry Editor menu bar select File and after that navigate to where file is saved. Select the file and then click Open. The valuables in file will probably be merged into the latest registry followed by way of a confirmation dialog stating the information within the file has become successfully entered in to the registry. This is really a low risk method because doing so forces you to definitely consciously select file you desire to import. Hopefully your brain is focused around the task at hand and also the file is selected.
Method Two - By default, Windows XP is configured so any time file is double-clicked it s automatically merged to the registry. To my state of mind this is usually a rather high-risk method, particularly if you happen to double-click on the file. Fortunately, this approach does present a dialog box that states the naming of file and asks in case you re sure you wish to add the contents in the file towards the registry, then waits for ones Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information inside the file has become successfully entered to the registry. Clicking No will finish the process without any information being entered inside the registry.
Method Three - Navigate to where file is saved and right go through the file to spread out the context menu. Select Merge plus a dialog box appears that states the naming of file and asks in case you re sure you need to add the contents on the file on the registry, then waits for ones Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information within the file has become successfully entered into your registry. Clicking No will finish the process without information being entered within the registry.
Method Four - Navigate to where file is saved and right go through the file to spread out the context menu. Select Open With Registry Editor plus a dialog box appears that states the domain name of file and asks in the event you re sure you desire to add the contents on the file towards the registry, then waits to your Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information inside the file has become successfully entered in the registry. Clicking No can easily the process without having information being entered within the registry.
It s essentially a consensus among experienced registry editing users that allowing a double-click on file to initiate the merging process may be dangerous in spite from the warning dialog box. Many have changed the default double-click action to open up file in Notepad as opposed to start the merge process. To change the default behavior, right click file, select Open With Choose and select Notepad from this list of programs displayed. Place a cheque mark within the Always Use The Selected Program To Open This Kind of File selection and click on OK. From now on, double clicking file will lead to it opening in Notepad. Much safer.
I touched briefly with this information inside Types of Registry Backups section for the beginning of the tutorial however it bears a repeat visit. The basic weakness in file backup boils down to some two word war; Merge versus Replace. Assume for the moment you ve made backup and safely tucked it away. You go ahead and edit the registry using Registry Editor, unfortunately your changes don t be planned. You choose backup file and expect that running it is going to restore the registry towards the way it was just before your edits. Will it go about doing so or are the expectations about for being dashed?
The response is; Maybe, based on what edits you've made. This is how Merge versus Replace is important. let s have a look at some If/Then statements.
If a price exists in file and as well exists inside the modified registry Then the value will probably be changed inside registry.
If something exists in file but not within the modified registry Then the value will likely be added for the registry.
If a value isn't going to exist in file but does exist within the modified registry Then the value is not going to be removed or changed within the registry.
If a value won't exist in file and isn't going to exist from the modified registry Then there isn't any action to become taken from the registry.
The third item above, highlighted in red, is in which the trouble or weakness backup files occurs. As long because modifications made to your registry don t stray beyond your bounds of the concepts included in backup situations are fine. But in case you ve added a whole new key or value in the editing process there may be trouble. Importing backup file doesn't replace or remove additions towards the registry which are not referenced in backup file.
Ultimately, it s approximately you to discover if File Method are going to be suitable for that particular changes you re going for being making. Unless you re 100% certain you re only going for being modifying existing values instead of creating any new keys or values you re more satisfied using Hive File Backups that will likely be discussed within the next section.
Hopefully you merely read the section above about Files for registry backups. Except for the couple of faults they do an admirable job of registry backup. The Hive File Method, while very comparable to File Method, eliminates the disadvantages and needs to be your preferred means of backing in the registry. I m still using Fig. 03 as being the basis for this discussion.
files, the particular backup process of creating hive files is not difficult. In the Keys Pane, right click within the individual key in it Desktop you desire to back up, click Export, assign the backup a descriptive filename and find the type of backup file being created. In Fig. 10 I used the file name Desktop and since we are discussing hive file backups I selected Registry Hive Files. as being the file type. When creating hive file backups you'll want to supply an extension for your file being created. The two most frequent extensions used As shown below I opted to utilize extension, making the file name
Notice the air button by Selected Branch that details what key's actually being saved. A quick check in this information will help prevent ending up which has a backup on the wrong key that may not be discovered until it s too far gone. Once Save is clicked the key will likely be saved to your file named inside location you specify. Some additional points;
When the true secret entry point to the backup is resolute, in it HKEYCURRENTUSERControl PanelDesktop, every one of the sub-keys beneath that period will also be supported. In this example, this means in addition to HKEYCURRENTUSERControl PanelDesktop you'll also be copying HKEYCURRENTUSERControl PanelDesktopWindowMetrics.
Often times users accidentally move higher up from the registry hierarchy when copying than is critical. In this example, if I d set the real key entry point for HKEYCURRENTUSERControl Panel, the intended key HKEYCURRENTUSERControl PanelDesktop would be supported, but also in addition a great many other unnecessary keys would be a the main backup. Keep specific key backups as compact as is possible by not traveling up the important thing hierarchy further than is critical. To illustrate that this hive file backup can rapidly increase in size if the incorrect feeder point is selected take a look for the table below. It s quickly apparent that this last choice highlighted in red may be the way to go. Not only will it require less disk space in order to save, it could be imported quickly.
Navigate on the location inside the Key Pane left pane in which the hive file backup is being imported. This is an absolutely critical step. Do not ignore it or perhaps the hive file backup will probably be imported for the wrong location.
Make sure Files of Type is scheduled to Registry Hive Files.
Navigate to the venue where the hive file backup is saved, go through the file, then click Open.
The dialog box shown in Fig. 11 are going to be displayed.
Verify the info in Confirm Restore Key dialog is correct and click on Yes. If it s incorrect, click No.
A Yes response will generate a confirmation dialog stating the information within the file is successfully entered to the registry. Clicking No can certainly the process without having information being entered within the registry.
There s many red cautionary text inside restore instructions above, is actually good reason. Look at Fig.11 again and note the cloths line The Key Will Be Restored On Top Of Key: Desktop. Now have a look at Fig.12 below. Notice exactly the same line now reads The Key Will Be Restored On Top Of Key: Control Panel. If you re thinking to yourself, huge problem, just click here and look for the comparison registry screen captures with the explanation of how a disaster occurred.
Restoring a Hive File Backup on the wrong location can obliterate substantial chunks on the registry and virtually ensure it will not function. I don t determine if there is often a best approach to protect using this happening, but I can let you know how I minimize an opportunity. Whenever I make a Hive File Backup I always provide a descriptive file name dependant on its intended restore location. A good choice within this example could be I also store each backup file inside a separate folder and include inside folder, along while using file, another small text file created in Notepad that details when and why I come up with backup file along with the registry path in which the file really should be imported. Is my method overkill? Probably, even so I ve yet to import a hive backup towards the wrong location so in the meantime I ll keep with overkill.
Backing inside the System State includes the registry, the COM Class Registration Database, and boot files. Windows XP incorporates Backup Utility accessible via Start All Programs Accessories System Tools Backup. In the Advanced Backup Wizard there can be a setting to back the System State either to one from the hard drives or an alternative media of the choosing. If the registry does become corrupt, the System State backup is utilized to restore the computer.
12/29/2004 - I received an email from TEG visitor Dave stating The backup utility just isn't included inside initial install of xp, you will need to add it in the disk yourself. What Dave says is true from the Home Edition of XP as backup isn t installed automatically. In the Professional Edition of XP the backup utility is usually accessed as I stated above. If the backup utility is missing through your installation I suggest going through The Backup Utilities in Windows XP section here. Dave also included a link to your page that provides more info on what this is accomplished. Thanks for your reminder Dave.
The last approach to backing in the registry is employing System Restore, another utility that is added to Windows XP. System Restore is better likened to some camera taking a total snapshot of your respective computer system at one opportunity and storing that image using what is called a restore point. This restore point might be recalled at some point within the future, effectively overwriting any changes that are actually made towards the computer because the restore point was developed. A more complete description of System Restore can be acquired here.
Truthfully, I think it s a few personal preference, and also since this is my website I ll go ahead and take liberty of providing you my choice plus the reason why. All on the methods are great and offer some a higher level protection against disaster. None on the methods require an undue period of time to complete and therefore are well worth the security and reassurance they supply. Bearing that in your mind, I d recommend using as much methods as a serious amounts of practicality allow before editing the registry.
If I was limited to only 1 choice of backup before editing the registry I d probably select the Hive File method, but System Restore would also be described as a contender. The changes that occur once you edit the registry is usually far reaching, well beyond just your key which is edited, and may even not arrive immediately. For that reason alone, System Restore affords protection on the entire system rather than only a single key, if I do notice a side issue hours or days later after an editing session I can restore to some well tuned system.
Now that you simply ve formulated your personal best plan and methods for in reverse the registry just in the event things don t go because you d planned, it s time for it to move onward to:
Share Folders, Files, and Printers in XP Home and Professional
Tips to set up Quick Launch, Search, and Windows Explorer for easier, efficient use.
Windows Update Catalog offers centralized XP Critical Updates, Service Pack, and Hardware Driver Downloads
For nearly a year now I ve been posting a reminder about Patch Tuesday or Second Tuesday because it has come being known when Microsoft releases the newest round of updates for Windows XP and also other products.
As always, I strongly suggest you find about any update ahead of installation, especially updates carrying a under Critical rating, and have an ongoing system and data backup accessible in case it s important to restore the system into a pre-patch condition.
The Elder Geek sites contain many articles and strategies for modifying the Windows os. Ive tried these tweaks and recommendations on many systems. Sometimes they work, sometimes not. The point is, ensure you could have a current, tested backup coming from all system and records and realize how to restore the machine in case something goes very wrong. You can still yell at me, but I assume no responsibility for the actions and use on the information and disclaim any the liability for any consequences of those actions.
Copyright 2002/2003/2004/2005/2006/2007/2008/2009/2010/2011/2012/2013, Jim Foley/The Elder Geek, All Rights Reserved Worldwide
Reproduction, of all sorts, of data on this website is prohibited without express written permission.
Microsoft is definitely affiliated with, nor offers endorsement of, this great site.
It wasn t lengthy after I installed XP that I was messing around while using registry. I suspect you re probably going to get doing the same or else you wouldn t have this area with the site. Before you're making any changes, make time to read over this. It s pretty dry reading material, nonetheless it might help you save from finding yourself which has a putty colored box that simply sits there doing nothing as an alternative to firing up XP as you should expect.
There are two methods for working together with the registry; software based and direct access. The software based technique is generally considered to get safe, although a badly behaved computer program that mangles the registry could make you doubt the wisdom with this statement. Anyone who has used a pc is familiar with it based technique of making changes. Control Panel is a great example. Make a switch the signal from one in the Control Panel settings and almost assuredly you've got initiated a change inside registry. It s just that you might be insulated by Control Panel from seeing what proceeded behind the scenes from the registry.
Directly accessing the registry is way more dangerous. There used being two versions of Registry Editor, regedit and regedt32, except for XP they have already been incorporated in Microsoft Registry Editor Version 5.1. Type either name inside the Run box and Version 5.1 is what we re about to end up with. The only real drawback to not having regedt32 anymore would be the lack of read-only mode in Version 5.1, nonetheless it just means you should be careful never to make any unintended changes when looking at the registry. And make sure you've a valid backup and restore point.
Open the Registry Editor Fig. 01 using Start Run and typing regedit from the Open: line so you ll visualize it s put into two panes. Understanding Registry Editor is less difficult if you think with the left pane because Keys Pane as well as the right side as being the Values Pane. In the left pane you will find five 5 main divisions or root keys as shown below. I ve inserted the fundamental key abbreviations in red text behind each key.
Registry Editor works on the hierarchical structure much like Windows Explorer but one major difference. In Windows Explorer you might have folders in the the all over the place hand panes, however in Registry Editor you'll find never any folder icons from the right hand section. In Registry Editor the yellow folder icon really denotes an outside and distinct key. Since the right hand pane is available to values only you will find no folders displayed for the reason that pane.
Each with the five main keys could be expanded to disclose additional keys or what some consider as sub-keys. Many sub-keys have sub-keys below them, sometimes the amount of sub-keys becoming almost unbelievably long, but inside same manner that Windows Explorer works, registry locations are defined with a path. Just remember that any reference with a registry location starts off with one with the five root keys.
Notice with the bottom of Registry Editor that My ComputerHKEYCLASSESROOT is displayed. This display will vary as you navigate down over the registry structure; very handy for checking where you might be rather than needing to scroll upward in the event the mind momentarily goes blank while you're editing.
It s critical that when you do any editing you create a backup from the current registry. The temptation for making one little change without in reverse is great. It can be also deadly. I speak from experience here, and a lot likely you re gonna ignore this warning much like I did, but hopefully you ll be considered a little bit smarter than I was. That said, you will discover different strategies to backing up so let s have a look at each one individually.
Backing up is merely exporting information through the registry in a file that is certainly saved with your system. When you invoke the export function you happen to be given a choice of file types that could be saved.
Each one from the different file types above plays a huge role in how a data you export is saved. Choosing the wrong type can present you with unexpected results. Understanding each type then when to make use of it is essential.
Registration Files: The Registration Files option creates file. This is probably by far the most well known formatting used for copying the registry. The Registration File is usually used by 50 % ways. As a text file it could be read and edited using Notepad outside Registry Editor. Once the changes have already been made and saved, right clicking the file and while using the Merge command adds the changed file back in to the registry. If you create additions for the registry using regedit then merge the previously saved Registration File, any situation that you ve added via regedit will not likely be removed, but changes you create to data using regedit that previously existed from the saved Registration File will likely be overwritten if it's merged.
Registry Hive Files: Unlike the Registration Files option above, the Registry Hive Files option generates a binary image from the selected registry key. The image file just isn't editable via Notepad nor are you able to view its contents having a text editor. However, what are the Registry Hive Files format does is create a graphic perfect view in the selected key and permit you to import it back to the registry to be sure any problematic changes you have made are eliminated.
Text Files: This option does just since the name suggests. It results in a text file containing the information inside the selected key. It s very useful purpose is building a record or snapshot of any key with a particular time that you are able to refer to if necessary. It cannot be merged back in the registry just like a Registration File.
Win9x/NT4 Registration Files: This option creates file inside the same manner made use of by the Registration Files option. It s employed by previous Windows versions and serves no purpose in XP unless you wish to merge an essential from XP in to a previous version of Windows.
Considering several choices above, probably the most effective and safest technique of backing within the registry is make use of the Registry Hive Files option. No matter what fails in your editing, importing the image in the key will eliminate all changes, additions, and other things that may have occurred.
If you desire to edit away from confines of regedit, or if that you are sure you need your additions on the registry to even if you must merge, use Registration Files to your backup.
If you simply want a copy from the key that may be referenced having a text editor, but need to eliminate any probability of the file being accidentally merged back in the registry, use Text Files.
The actual means of backing inside the registry is pretty simple when you ve decided the file type to the backup and whether you wish to back up anyone key or perhaps the entire registry. In the left hand pane of regedit, simply select the key to be secured, right click and select Export to open up the Export Registry File Property Sheet. From there, it s just a matter of assigning the backup a descriptive filename and choosing the type of backup file you need based around the discussion above. To be within the safe side, it certainly wouldn t hurt to generate a backup in the Registry Hive Files and Registration Files formats.
There are two notes it is best to be aware of regarding what things can be supported using specific file types.
If My Computer is selected inside the left pane of regedit, you might not be allowed for making a backup while using Registry Hive Files format. This is equivalent to copying the entire registry. XP requires you to utilize the System State backup in this situation. Backing in the System State is discussed further down with this article
If My Computer is selected inside the left pane of regedit, you might select Registration Files since the backup extendable but this isn't the recommended method to get a complete registry backup.
In this sections I m planning to refer to this screen capture frequently to assist illustrate the different strategies of backup.
Take a quick examine Fig. 03 therefore you ll note it displays the HKEYCURRENTUSERControl PanelDesktop key. In the Values Pane you ll view the WaitToKillAppTimeout value that is certainly currently set to 4000. It is going to be the subject of storing individual values.
It s important to remember the registry is very just a big compilation of information and settings that sits there waiting to become accessed by XP itself or by an installed application. By itself it lets you do nothing. At first glance that will not seem for being of much importance, nonetheless it can be useful if you consider the truly useful information inside registry is stored from the values. Look in the majority of registry edits and you also ll see they call for changing values, not adding or removing keys. Combine that knowledge while using fact that XP or perhaps an application has to become programmed to access the values in any other case they are useless knowning that provides a rapid, easy way to support individual values.
Fig. 04 illustrates how the last information is applied to storing values of keys that you will find modified. It s important to note that this applies to values, not keys. For this example I have chose to modify the value on the string WaitToKillAppTimeout. The WaitToKillAppTimeout string value highlighted in red could be the original string value using a value of 5000 that I m planning to modify. Once I get a new value I might forget just what the original value was 5000 before I decide if your change I make is suitable. To guard contrary to the original value being forgotten, I ve come up with string value TEGWaitToKillAppTimeout that s shown highlighted in green. For this tutorial I ve used TEG prior to a real value name but you may use anything convenient. If your dog was named Fido, you would possibly use Fido prior to the real value name.
Now, looking for the screen capture below, I can go back on the original string value the main one highlighted in red and produce the change to your new 4000 value. At this point absolutely suit often asked why keeping the two values listed within the registry doesn t spark a conflict. Remember the fact that was said previously; XP or perhaps application has to become programmed to access the values in any other case they are useless. There is no application or portion of XP that's programmed to look for the string value named TEGWaitToKillAppTimeout so that it can happily co-exist with WaitToKillAppTimeout, providing a journal or record of the changes are already made for the registry. For a better record you are able to add a date for the prefix that may look like TEG08252003WaitToKillAppTimeout that's shown highlighted in blue.
If the modification doesn t figure out all you must do is reference the copied entry usually the one highlighted in green or blue for your original value and change the worth that was modified usually the one in red back for the original value. An easier method to revert back on the original value would be to delete the modified string one in red and right select the backup strings green or blue and select Rename. Eliminate the prefix that was combined with return the string to its original configuration.
If you do a great deal of registry tweaking and modification of existing values this is a good method because it gives a visual record from a modifications that happen to be made for the registry values. Two months from if I would like to know if I created a modification to your WaitToKillAppTimeout value, all I ought to do is open Registry Editor, navigate on the HKEYCURRENTUSERControl PanelDesktop key and compare the WaitToKillAppTimeout while using backup entries. By with all the dated prefix I can not only tell what change was created but what date it absolutely was modified. After the worthiness modification has become tested you may go back and take the new prefixed values which were created if this bothers you getting them remain within the registry. I always leave them being a permanent record and have absolutely never noticed any problems or system performance penalty.
One from the first questions very often comes up after reading the last section - Backing Up Individual Values- is the thing that happens in the event the prefix way is used to backup keys rather than only individual values. It s a great question and I ll undergo another example in an attempt to explain one possible scenario.
In the prior section i was working from the HKEYCURRENTUSERControl PanelDesktop key so lets apply a prefix on the Desktop key to see what happens.
Open Fig. 06 to view HKEYCURRENTUSERControl PanelDesktop before any changes are produced. Note that HKEYCURRENTUSERControl PanelDesktop has a sub-key WindowMetrics.
Open Fig. 07 to understand the change meant to HKEYCURRENTUSERControl PanelDesktop. Nothing is altered besides adding the TEG prefix for the Desktop key. No changes were made towards the sub-key WindowMetrics.
What do you consider happened once the change was made and also the user logged off and back on?
Open Fig. 08 and you also ll identify that XP automatically recreated the HKEYCURRENTUSERControl PanelDesktop key that is certainly shown while using green highlight. However, it s a far cry from exactly what the original HKEYCURRENTUSERControl PanelDesktop key appeared to be before it had been modified to TEGHKEYCURRENTUSERControl PanelDesktop. There is merely one entry inside Values Pane understanding that is Default, plus there is absolutely no sub-key for WindowMetrics. You can also see the default Bliss background can also be missing through the desktop.
So, precisely what does this show about adding a prefix as a technique of backing up keys? First and foremost it implies that while it yields some interesting results it s not only a suitable method for in reverse registry keys. The results are unpredictable at best and whenever you re dealing together with the registry you would like a method that s unshakable. That s never to say though which the procedure seemingly without merit with regards to keys. As a troubleshooting tool it may be handy to rename a key having a prefix then see if XP as well as an application will recreate the essential key. In effect the prefix hides the registry key from XP so you are able to see what effect deleting the true secret would have while still providing you with a way of restoring the key which was hidden because of the prefix.
The point is; fiddle with this approach but make sure you could have another proven backup set up first.
Unlike the earlier methods discussed, files to back individual keys and entire branches with the registry can be a well established, proven method that is certainly used daily by numerous registry tinker er s. Refer time for Fig. 03 plus the HKEYCURRENTUSERControl PanelDesktop key that is certainly highlighted within the Key Pane.
The actual backup procedure is not difficult. In the Keys Pane, right click for the individual key in it Desktop you wish to back up, click Export, assign the backup a descriptive filename and choose the type of backup file being created. In Fig. 09 I used the file name Desktop also, since we are backups I selected Registration Files since the file type.
Notice radio stations button by Selected Branch that details what secret's actually being saved. A quick check with this information can assist prevent ending up using a backup on the wrong key that may not be discovered until it s past too far. Once Save is clicked the key is going to be saved to some file named inside location you specify. Some additional points;
When the main element entry point for that backup is set, in this example HKEYCURRENTUSERControl PanelDesktop, the many sub-keys beneath this time will also be duplicated. In this example, which means that in addition to HKEYCURRENTUSERControl PanelDesktop you may also be storing HKEYCURRENTUSERControl PanelDesktopWindowMetrics.
Often times users accidentally move higher up inside the registry hierarchy when burning than is important. In this example, if I d set the true secret entry point for HKEYCURRENTUSERControl Panel, the intended key HKEYCURRENTUSERControl PanelDesktop would be duplicated, however in addition a number of other unnecessary keys would be also a section of the backup. Keep specific key backups as compact as you can by not traveling up the real key hierarchy further than is important. To illustrate how file can easily increase in size appears to be incorrect entry way is selected take a look on the table below. It s quickly apparent that this last choice highlighted in red could be the way to go. Not only will it require less disk space to avoid wasting, it could be merged quickly and it is easier to edit, as appropriate, with less probability of error.
There are four options for restoring file backup. I need to look with the methods within a bit more detail.
Method One - From the Registry Editor menu bar select File and after that navigate to where file is saved. Select the file and then click Open. The belongings in file will probably be merged into the present registry followed with a confirmation dialog stating the information from the file has become successfully entered in to the registry. This is usually a low risk method since it forces someone to consciously select file you need to import. Hopefully your thoughts is focused within the task at hand along with the file is selected.
Method Two - By default, Windows XP is configured so anytime file is double-clicked it s automatically merged into your registry. To my thought processes this is usually a rather dangerous method, notably if you happen to double-go through the file. Fortunately, this technique does present a dialog box that states the file and asks should you re sure you would like to add the contents with the file on the registry, then waits for ones Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information inside file is successfully entered in to the registry. Clicking No can easily the process without having information being entered inside the registry.
Method Three - Navigate to where file is saved and right go through the file to look at the context menu. Select Merge as well as a dialog box appears that states the naming of file and asks in the event you re sure you would like to add the contents with the file for the registry, then waits to your Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information from the file is successfully entered in the registry. Clicking No can finish the process without any information being entered inside registry.
Method Four - Navigate to where file is saved and right click on the file to look at the context menu. Select Open With Registry Editor as well as a dialog box appears that states the file and asks when you re sure you wish to add the contents in the file for the registry, then waits for the Yes or No confirmation. A Yes response will generate a confirmation dialog stating the information within the file may be successfully entered in to the registry. Clicking No can easily the process without information being entered inside the registry.
It s essentially a consensus among experienced registry editing users that allowing a double-click on file to initiate the merging process may be dangerous in spite with the warning dialog box. Many have changed the default double-click action to start file in Notepad instead of start the merge process. To change the default behavior, right click file, select Open With Choose and select Notepad from their email list of programs displayed. Place a cheque mark inside the Always Use The Selected Program To Open This Kind of File selection and then click OK. From now on, double clicking file can result in it opening in Notepad. Much safer.
I touched briefly with this information within the Types of Registry Backups section in the beginning with this tutorial nevertheless it bears a repeat visit. The basic weakness in file backup boils down with a two word war; Merge versus Replace. Assume for any moment you ve made backup and safely tucked it away. You go ahead and edit the registry using Registry Editor, unfortunately your changes don t act as planned. You consider backup file and expect that running it'll restore the registry for the way it was just before your edits. Will it go about doing so or are the expectations about for being dashed?
The fact is; Maybe, determined by what edits you've made. This is the place where Merge versus Replace is important. let s take a look at some If/Then statements.
If something exists in file and as well exists within the modified registry Then the value will probably be changed within the registry.
If a price exists in file but not from the modified registry Then the value will probably be added to your registry.
If a value will not exist in file but does exist within the modified registry Then the value is not going to be removed or changed inside the registry.
If a value isn't going to exist in file and won't exist within the modified registry Then there isn't a action to get taken within the registry.
The third item above, highlighted in red, is the location where the trouble or weakness backup files occurs. As long because the modifications made to your registry don t stray away from bounds of the thing that was included in backup the situation is fine. But in case you ve added a brand new key or value throughout the editing process there is usually trouble. Importing backup file won't replace or remove additions towards the registry which might be not referenced in backup file.
Ultimately, it s nearly you to ascertain if File Method is going to be suitable for that particular changes you re going to become making. Unless you re 100% certain you re only going for being modifying existing values rather than creating any new keys or values you re happier using Hive File Backups that will likely be discussed from the next section.
Hopefully you only read the section above about Files for registry backups. Except for just a couple of flaws they do an admirable job of registry backup. The Hive File Method, while very comparable to File Method, eliminates the flaws and must be your preferred way of backing in the registry. I m still using Fig. 03 as being the basis for this discussion.
files, the specific backup strategy of creating hive files is easy. In the Keys Pane, right click around the individual key in this example Desktop you would like to back up, click Export, assign the backup a descriptive filename and pick the type of backup file being created. In Fig. 10 I used the file name Desktop and since we are discussing hive file backups I selected Registry Hive Files. since the file type. When creating hive file backups you'll want to supply an extension to the file being created. The two most popular extensions used As shown below I opted to utilize extension, making the file name
Notice radio stations button by Selected Branch that details what secret's actually being saved. A quick check with this information might help prevent ending up that has a backup in the wrong key that will not be discovered until it s past too far. Once Save is clicked the key will probably be saved to your file named inside location you specify. Some additional points;
When the main element entry point for your backup is set, in this example HKEYCURRENTUSERControl PanelDesktop, the many sub-keys beneath the period will also be copied. In this example, which means that in addition to HKEYCURRENTUSERControl PanelDesktop you are going to also be in reverse HKEYCURRENTUSERControl PanelDesktopWindowMetrics.
Often times users accidentally move higher up inside the registry hierarchy when storing than is important. In this example, if I d set the main element entry point for HKEYCURRENTUSERControl Panel, the intended key HKEYCURRENTUSERControl PanelDesktop would be supported, however in addition all kinds of other unnecessary keys would be a portion of the backup. Keep specific key backups as compact as it can be by not traveling up the real key hierarchy further than is essential. To illustrate how a hive file backup can easily increase in size appears to be incorrect access point is selected take a look in the table below. It s quickly apparent that this last choice highlighted in red could be the way to go. Not only will it require less disk space in order to save, it might be imported quickly.
Navigate for the location within the Key Pane left pane the spot that the hive file backup is for being imported. This is an absolutely critical step. Do not ignore it and the hive file backup will likely be imported for the wrong location.
Make sure Files of Type is defined to Registry Hive Files.
Navigate to the placement where the hive file backup is saved, click on the file, then click Open.
The dialog box shown in Fig. 11 are going to be displayed.
Verify the data in Confirm Restore Key dialog is correct and then click Yes. If it s incorrect, click No.
A Yes response will generate a confirmation dialog stating the information from the file is successfully entered in to the registry. Clicking No will finish the process without the need of information being entered inside the registry.
There s plenty of red cautionary text inside the restore instructions above, sufficient reason for good reason. Look at Fig.11 again and note the cloths line The Key Will Be Restored On Top Of Key: Desktop. Now have a look at Fig.12 below. Notice exactly the same line now reads The Key Will Be Restored On Top Of Key: Control Panel. If you re thinking to yourself, problem, simply click here and look with the comparison registry screen captures with the explanation of how a disaster occurred.
Restoring a Hive File Backup on the wrong location can get rid of substantial chunks with the registry and virtually ensure the computer will not function. I don t determine if there can be a best strategy to protect using this happening, but I let you know how I minimize the likelihood. Whenever I develop a Hive File Backup I always provide it with a descriptive file name dependant on its intended restore location. A good choice with this example may be I also store each backup file within a separate folder and include inside folder, along while using file, another small text file created in Notepad that details when and why I made the backup file and also the registry path the location where the file really should be imported. Is my method overkill? Probably, however I ve yet to import a hive backup to your wrong location so for the present time I ll keep with overkill.
Backing the System State includes the registry, the COM Class Registration Database, and boot files. Windows XP includes Backup Utility accessible via Start All Programs Accessories System Tools Backup. In the Advanced Backup Wizard there is often a setting to back the System State either to one in the hard drives or a new media of your respective choosing. If the registry does become corrupt, the System State backup is utilized to restore it.
12/29/2004 - I received a communication from TEG visitor Dave stating The backup utility is just not included inside initial install of xp, you should add it from your disk yourself. What Dave says is true inside the Home Edition of XP as backup isn t installed automatically. In the Professional Edition of XP the backup utility might be accessed as I stated above. If the backup utility is missing through your installation I suggest studying The Backup Utilities in Windows XP section here. Dave also included a link into a page giving more info about how this is accomplished. Thanks to the reminder Dave.
The last approach to backing the registry is applying System Restore, another utility that is added with Windows XP. System Restore is most beneficial likened to some camera taking an extensive snapshot of the computer system at one stage and storing that image of what is called a restore point. This restore point are able to be recalled at some point within the future, effectively overwriting any changes that are actually made to your computer since restore point appeared. A more complete description of System Restore is accessible here.
Truthfully, I think it s a couple of personal preference, and also since this is my website I ll grab the liberty of providing you with my choice and also the reason why. All on the methods are fantastic and offer some a higher level protection against disaster. None on the methods require an undue length of time to complete and so are well worth the security and relief they supply. Bearing that planned, I d recommend using several methods as some time and practicality allow before editing the registry.
If I was limited to merely one choice of backup before editing the registry I d probably select the Hive File method, but System Restore would also be described as a contender. The changes that occur once you edit the registry is usually far reaching, well beyond just the specific key that's edited, and might not arrive immediately. For that reason alone, System Restore affords protection for the entire system rather than simply a single key, of course, if I do notice a side issue hours or days later after an editing session I can restore with a well tuned system.
Now you ve formulated your own personal best plan and methods for copying the registry just should things don t go because you d planned, it s time for you to move onward to:
Share Folders, Files, and Printers in XP Home and Professional
Tips to prepare Quick Launch, Search, and Windows Explorer for easier, efficient use.
Windows Update Catalog offers centralized XP Critical Updates, Service Pack, and Hardware Driver Downloads
For almost a year now I ve been posting a reminder about Patch Tuesday or Second Tuesday the way it has come to become known when Microsoft releases the newest round of updates for Windows XP as well as other products.
As always, I strongly suggest you find about any update previous to installation, especially updates carrying a under Critical rating, and have an existing system and data backup accessible in case it s required to restore the system to some pre-patch condition.
The Elder Geek sites contain many articles and ideas for modifying the Windows computer. Ive tried these tweaks and suggestions about many systems. Sometimes they work, sometimes not. The point is, ensure you might have a current, tested backup of system and information and realize how to restore it in case something goes very wrong. You can still yell at me, but I assume no responsibility for the actions and use with the information and disclaim any culpability for any consequences of those actions.
Copyright 2002/2003/2004/2005/2006/2007/2008/2009/2010/2011/2012/2013, Jim Foley/The Elder Geek, All Rights Reserved Worldwide
Reproduction, in all forms, of data on this page is prohibited without express written permission.
Microsoft is certainly affiliated with, nor offers endorsement of, this great site.