Windows ro'yxatga olish kitobi - Windows Registry

Ro'yxatdan o'tish
Ro'yxatdan o'tish kitoblari muharriri icon.png
Ro'yxatdan o'tish kitoblari muharriri, ro'yxatga olish kitobi uchun foydalanuvchi interfeysi, Windows 10 da
Ro'yxatdan o'tish kitoblari muharriri, ro'yxatga olish kitobi uchun foydalanuvchi interfeysi, Windows 10 da
Tuzuvchi (lar)Microsoft
Operatsion tizimMicrosoft Windows
Veb-saythujjatlar.microsoft.com/ uz-biz/ Windows/ ish stoli/ SysInfo/ reestr Buni Vikidatada tahrirlash

The Windows ro'yxatga olish kitobi ierarxikdir ma'lumotlar bazasi do'konlari past darajali uchun sozlamalar Microsoft Windows operatsion tizim va ro'yxatga olish kitobidan foydalanishni afzal ko'rgan dasturlar uchun. The yadro, qurilma drayverlari, xizmatlar, Xavfsizlik hisoblari menejeri va foydalanuvchi interfeysi barchasi ro'yxatga olish kitobidan foydalanishi mumkin. Ro'yxatdan o'tish kitobi kirish huquqini ham beradi hisoblagichlar tizim ish faoliyatini profillashtirish uchun.

Boshqacha qilib aytganda, ro'yxatga olish kitobi yoki Windows ro'yxatga olish kitobida Microsoft Windows operatsion tizimlarining barcha versiyalarida o'rnatilgan dasturlar va apparat vositalari uchun ma'lumotlar, sozlamalar, variantlar va boshqa qiymatlar mavjud. Masalan, dastur o'rnatilgandan so'ng, dasturning joylashuvi, uning versiyasi va dasturni ishga tushirish kabi sozlamalarni o'z ichiga olgan yangi pastki kalit Windows ro'yxatga olish kitobiga qo'shiladi.

Bilan tanishtirilganda Windows 3.1, Windows Ro'yxatdan o'tish kitoblari uchun asosan konfiguratsiya ma'lumotlari saqlanadi MAQOMOTI - asosli komponentlar. Windows 95 va Windows NT ma'lumotlarini ratsionalizatsiya qilish va markazlashtirish uchun foydalanishni kengaytirdi INI fayllari, individual dasturlar uchun konfiguratsiyani ushlab turadigan va turli joylarda saqlangan.[1][2] Windows dasturlari uchun Windows Ro'yxatdan o'tish kitobini ishlatish shart emas. Masalan, .NET Framework dasturlardan foydalanish XML konfiguratsiya uchun fayllar, esa ko'chma dasturlar odatda ularning konfiguratsiya fayllarini ular bilan saqlang bajariladigan fayllar.

Mantiqiy asos

Windows ro'yxatga olish kitobidan oldin,.INI fayllari har bir dasturning sozlamalarini matn yoki ikkilik fayl sifatida saqlagan, ko'pincha umumiy foydalanuvchi joylashgan stsenariyda foydalanuvchiga xos sozlamalarni ta'minlamagan joyda joylashgan. Aksincha, Windows Ro'yxatdan o'tish kitobi barcha dastur sozlamalarini bitta mantiqiy omborda (lekin bir qator diskret fayllar) va standartlashtirilgan shaklda saqlaydi. Microsoft-ning fikriga ko'ra, bu .INI fayllariga nisbatan bir qancha afzalliklarga ega.[2][3] Faylni tahlil qilish ikkilik format bilan ancha samarali amalga oshirilganligi sababli, matnli INI faylidan ko'ra tezroq o'qilishi yoki yozilishi mumkin. Bundan tashqari, qattiq yozilgan ma'lumotlar .INI fayllarida saqlangan matnli ma'lumotlardan farqli o'laroq, ro'yxatga olish kitobida saqlanishi mumkin. Bu tugmachalarni qo'lda tahrirlashda foyda keltiradi regedit.exe, o'rnatilgan Windows Ro'yxatdan o'tish kitoblari muharriri. Foydalanuvchilarga asoslangan ro'yxatga olish kitobi sozlamalari faqat o'qish mumkin bo'lgan tizim joyidan emas, balki foydalanuvchi uchun maxsus yo'ldan yuklanganligi sababli, ro'yxatga olish bir nechta foydalanuvchiga bir xil mashinani ulashishga imkon beradi va shuningdek, dasturlar kamroq imtiyozli foydalanuvchilar uchun ishlashga imkon beradi. Zaxiralash va tiklash ham soddalashtirilgan, chunki ro'yxatga olish kitobiga masofaviy boshqarish / qo'llab-quvvatlash uchun tarmoq ulanishi, shu jumladan skriptlardan standart to'plam yordamida kirish mumkin. API-lar, masofaviy reestrda ekan xizmat ishlaydi va xavfsizlik devori qoidalari bunga imkon beradi.

Ro'yxatdan o'tish ma'lumotlar bazasi bo'lganligi sababli, bu kabi xususiyatlar bilan yaxshilangan tizim yaxlitligini taklif etadi atom yangilanishlari. Agar ikkita jarayon bir vaqtning o'zida bir xil ro'yxatga olish kitobi qiymatini yangilashga harakat qilsa, bir jarayon o'zgarishi boshqasining oldiga keladi va ma'lumotlarning umumiy muvofiqligi saqlanib qoladi. .INI fayllariga o'zgartirishlar kiritiladigan joylarda, masalan poyga shartlari har ikkala yangilashga mos kelmaydigan ma'lumotlarning kelishmovchiligiga olib kelishi mumkin. Windows Vista va undan keyingi operatsion tizimlar ro'yxatga olish kitobi orqali tranzaktsion yangilanishlarni taqdim etadi Kernel Transaction Manager, an'anaviy majburiyatlarni bekor qilish semantikasi bilan bir nechta kalit va / yoki qiymat o'zgarishi bo'yicha atomlik kafolatlarini kengaytirish. (Ammo shunga e'tibor bering NTFS fayl tizimi uchun ham bunday yordamni taqdim etadi, shuning uchun nazariy jihatdan an'anaviy konfiguratsiya fayllari bilan bir xil kafolatlar olinishi mumkin.)

Tuzilishi

Kalitlar va qadriyatlar

Ro'yxatdan o'tish ikkita asosiy elementni o'z ichiga oladi: kalitlar va qiymatlar. Ro'yxatdan o'tish kalitlar papkalarga o'xshash konteyner moslamalari. Ro'yxatdan o'tish qiymatlar fayllarga o'xshash konteyner bo'lmagan narsalar. Kalitlarda qiymatlar va pastki kalitlar bo'lishi mumkin. Tugmalar Windows-ning yo'l nomlariga o'xshash sintaksis bilan, teskari chiziqlar yordamida ierarxiya darajasini bildiradi. Kalitlarda a bo'lishi kerak ish sezgir emas orqa chiziqsiz ism.

Ro'yxatdan o'tish kalitlari ierarxiyasiga faqat ma'lum "root" tugmachasidan (noma'lum, ammo samarali qiymati doimiy raqamli tutqichdan) kirish mumkin, u saqlangan "uyadan" yadro tomonidan oldindan yuklangan ro'yxatga olish kitobi kaliti tarkibiga, yoki boshqa bir asosiy kalit tarkibidagi pastki kalitning tarkibiga yoki ro'yxatdan o'tgan xizmatga yoki DLL-ga o'z ichiga olingan pastki kalitlarga va qiymatlarga kirishni ta'minlaydigan xaritada.

Masalan, HKEY_LOCAL_MACHINE Software Microsoft Windows HKEY_LOCAL_MACHINE ildiz tugmachasining "Dasturiy ta'minot" pastki qismidagi "Microsoft" pastki tugmachasining "Windows" pastki kalitiga ishora qiladi.

An'anaviy ravishda Win32 API-da yoki sinonim qisqartirishlar (dasturlarga qarab) tomonidan belgilangan doimiy tutqichlariga ko'ra nomlangan ettita oldindan belgilangan ildiz tugmachalari mavjud:

  • HKEY_LOCAL_MACHINE yoki HKLM
  • HKEY_CURRENT_CONFIG yoki HKCC
  • HKEY_CLASSES_ROOT yoki HKCR
  • HKEY_CURRENT_USER yoki HKCU
  • HKEY_USERS yoki HKU
  • HKEY_PERFORMANCE_DATA (faqat Windows NT-da, lekin Windows Ro'yxatdan o'tish kitoblari muharririda ko'rinmaydi)
  • HKEY_DYN_DATA (faqat Windows 9x-da va Windows Ro'yxatdan o'tish kitoblari muharririda ko'rinadi)

Windows-dagi boshqa fayllar va xizmatlar singari, barcha ro'yxatga olish kitobi kalitlari tomonidan cheklangan bo'lishi mumkin kirishni boshqarish ro'yxatlari (ACL), foydalanuvchi imtiyozlariga yoki ilovalar tomonidan sotib olingan xavfsizlik belgilariga yoki tizim tomonidan amalga oshiriladigan tizim xavfsizligi siyosatiga bog'liq (ushbu cheklovlar tizim tomonidan o'zi tomonidan belgilanishi va mahalliy tizim ma'murlari yoki domen administratorlari tomonidan tuzilishi mumkin). Turli xil foydalanuvchilar, dasturlar, xizmatlar yoki masofaviy tizimlar bir xil ildiz tugmalaridan faqat ierarxiyaning ayrim qismlarini yoki alohida ierarxiyalarni ko'rishlari mumkin.

Ro'yxatdan o'tish qiymatlar bu kalitlarda saqlangan ism / ma'lumotlar juftlari. Ro'yxatga olish kitobi qiymatlari ro'yxatga olish kitobi kalitlaridan alohida ko'rsatiladi. Ro'yxatdan o'tish kitobi kalitida saqlangan har bir ro'yxatga olish kitobi qiymati alohida ahamiyatga ega bo'lgan noyob nomga ega. The Windows API ro'yxatga olish kitobi qiymatlarini so'rab ishlaydigan va boshqaradigan funktsiyalar qiymat nomlarini kalit yo'lidan va / yoki asosiy kalitni aniqlaydigan tutqichdan alohida ajratib turadi. Ro'yxatdan o'tish registri o'z nomlarida teskari chiziqlarni o'z ichiga olishi mumkin, ammo bu ba'zi eski Windows Registry API funktsiyalaridan foydalanishda (ularning ishlatilishi Win32 da eskirgan), ularni asosiy yo'llaridan ajratib olishni qiyinlashtiradi.

Terminologiya biroz chalg'itadi, chunki har bir ro'yxatga olish kitobi kaliti o'xshash assotsiativ qator, bu erda standart terminologiya har bir ro'yxatga olish qiymatining nom qismini "kalit" deb ataydi. Shartlar Windows 3-dagi 16-bitli ro'yxatga olish kitobi bo'lib, unda ro'yxatga olish kitobi kalitlari o'zboshimchalik bilan nom / ma'lumotlar juftlarini o'z ichiga olmaydi, aksincha faqat bitta noma'lum qiymatni o'z ichiga oladi (bu satr bo'lishi kerak). Shu ma'noda, Windows 3 ro'yxatga olish kitobi bitta assotsiativ qatorga o'xshardi, unda kalitlar (ikkala "ro'yxatga olish kitobi kaliti" va "assotsiativ qator kaliti" ma'nosida) ierarxiyani tashkil etdi va ro'yxatga olish kitobi qiymatlari hammasi qatorlar edi. 32-bitli ro'yxatga olish kitobi yaratilganda, bitta kalit uchun bir nechta nomlangan qiymatlarni yaratishning qo'shimcha imkoniyati yaratildi va ismlarning ma'nolari biroz buzilgan edi.[4] Oldingi xatti-harakatlarga mos kelish uchun har bir ro'yxatga olish kitobi kaliti "standart" qiymatga ega bo'lishi mumkin, uning nomi bo'sh satr.

Har bir qiymat o'zgaruvchan uzunlik va kodlash bilan o'zboshimchalik bilan ma'lumotlarni saqlashi mumkin, ammo bu ma'lumotni qanday tahlil qilishni belgilaydigan ramziy tip (raqamli sobit sifatida aniqlanadi) bilan bog'liq. Standart turlari:

Standart ro'yxatga olish qiymati turlarining ro'yxati
ID identifikatorini kiritingRamziy tip nomiRo'yxatdan o'tish qiymatida saqlangan ma'lumotlarning ma'nosi va kodlanishi
0REG_NONEHech qanday turi (saqlangan qiymat, agar mavjud bo'lsa)
1REG_SZA mag'lubiyat odatda saqlanadigan va ta'sirlanadigan qiymat UTF-16 LE (Win32 API funktsiyalarining Unicode versiyasidan foydalanganda), odatda NUL belgisi bilan tugaydi
2REG_EXPAND_SZO'z ichiga olishi mumkin bo'lgan "kengaytiriladigan" mag'lubiyat qiymati muhit o'zgaruvchilari, odatda UTF-16LE-da saqlanadi va ta'sir qiladi, odatda NUL belgisi bilan tugaydi
3REG_BINARYIkkilik ma'lumotlar (har qanday o'zboshimchalik bilan ma'lumotlar)
4REG_DWORD / REG_DWORD_LITTLE_ENDIANA DWORD qiymati, 32-bit imzosiz tamsayı (0 dan 4.294.967.295 gacha bo'lgan raqamlar [232 - 1]) (kichik -endian )
5REG_DWORD_BIG_ENDIANA DWORD qiymati, 32-bit imzosiz tamsayı (0 dan 4.294.967.295 gacha bo'lgan raqamlar [232 - 1]) (katta-endian )
6REG_LINKIldiz kalitini va maqsad kalitiga yo'lni ko'rsatib, boshqa ro'yxatga olish kitobi kalitiga ramziy havola (UNICODE)
7REG_MULTI_SZBo'sh bo'lmaganlarning tartiblangan ro'yxati bo'lgan ko'p satrli qiymat torlar, odatda UTF-16LE-da saqlanadi va ta'sir qiladi, ularning har biri NUL belgisi bilan tugaydi, ro'yxat odatda ikkinchi NUL belgisi bilan tugaydi.
8REG_RESOURCE_LISTResurslar ro'yxati (tomonidan ishlatilgan Plug-n-Play apparat ro'yxati va konfiguratsiyasi)
9REG_FULL_RESOURCE_DESCRIPTORResurs tavsiflovchi (. Tomonidan ishlatiladigan Plug-n-Play apparat ro'yxati va konfiguratsiyasi)
10REG_RESOURCE_REQUIREMENTS_LISTResurslarga bo'lgan talablar ro'yxati (tomonidan ishlatilgan Plug-n-Play apparat ro'yxati va konfiguratsiyasi)
11REG_QWORD / REG_QWORD_LITTLE_ENDIANA QWORD qiymati, 64-bitli tamsayı (katta yoki kichik-endian yoki aniqlanmagan) (kiritilgan Windows XP )

Ildiz tugmachalari

Ierarxik ma'lumotlar bazasining ildiz darajasidagi kalitlarga odatda ularning nomi berilgan Windows API ta'riflar, barchasi "HKEY" dan boshlanadi.[2] Ular tez-tez "HK" dan boshlangan uch yoki to'rt harfli qisqa ismga qisqartiriladi (masalan, HKCU va HKLM). Texnik jihatdan, ular xotirada saqlanadigan yoki mahalliy fayl tizimida saqlanadigan va yuklash vaqtida tizimning yadrosi tomonidan yuklangan va keyin birgalikda (turli xil kirish huquqlari bilan) saqlanadigan maxsus tugmachalarning oldindan ma'lum tutqichlari (ma'lum doimiy qiymatlari bilan). mahalliy tizimda ishlaydigan barcha jarayonlar o'rtasida yoki foydalanuvchi tizimga kirganda foydalanuvchi sessiyasida boshlangan barcha jarayonlarda yuklangan va xaritalangan.

HKEY_LOCAL_MACHINE (mahalliy mashinaga xos konfiguratsiya ma'lumotlari) va HKEY_CURRENT_USER (foydalanuvchiga xos konfiguratsiya ma'lumotlari) tugunlari bir-biriga o'xshash tuzilishga ega; foydalanuvchi dasturlari odatda o'z parametrlarini "HKEY_CURRENT_USER Software Vendor's name Application's Version Setting name" da tekshirib ko'rishadi va agar sozlama topilmasa, uning o'rnini HKEY_LOCAL_MACHINE tugmachasi ostida qidiring[iqtibos kerak ]. Biroq, aksincha, ma'mur tomonidan qo'llaniladigan shaxsga murojaat qilish mumkin siyosat HKLM HKCU-dan ustun bo'lishi mumkin bo'lgan sozlamalar. The Windows logotipi dasturi foydalanuvchi ma'lumotlarining har xil turlarini qaerda saqlashi mumkinligi va kontseptsiyasi uchun aniq talablarga ega eng kam imtiyoz dasturni ishlatish uchun administrator darajasida kirish talab qilinmasligi uchun amal qiling.[a][5]

HKEY_LOCAL_MACHINE (HKLM)

Qisqartirilgan HKLM, HKEY_LOCAL_MACHINE mahalliy kompyuterga xos bo'lgan sozlamalarni saqlaydi.[6]

HKLM joylashgan kalit aslida diskda saqlanmaydi, ammo boshqa barcha pastki kalitlarni xaritada ko'rsatish uchun tizim yadrosi tomonidan xotirada saqlanadi. Ilovalar qo'shimcha pastki kalitlarni yarata olmaydi. Windows NT-da ushbu kalit "SystemRoot% System32 config" papkasida joylashgan o'z fayllari yuklash vaqtida yuklangan "SAM", "SECURITY", "SYSTEM" va "SOFTWARE" to'rtta kichik kalitni o'z ichiga oladi. Beshinchi "HARDWARE" pastki tugmasi o'zgaruvchan va dinamik ravishda yaratilgan va shuning uchun faylda saqlanmaydi (u hozirda aniqlangan barcha Plug-and-Play qurilmalarining ko'rinishini ochib beradi). Windows Vista va undan yuqori versiyalarida "COMPONENTS" va "BCD" oltinchi va ettinchi pastki kalitlari talab asosida yadro orqali xotirada xaritada joylashtiriladi va% SystemRoot% system32 config COMPONENTS yoki yuklash konfiguratsiyasi ma'lumotlari, boot BCD tizim bo'limida.

  • "HKLM SAM" tugmachasi aksariyat foydalanuvchilar uchun odatda bo'sh bo'lib ko'rinadi (agar ularga mahalliy tizim ma'murlari yoki mahalliy tizimni boshqaruvchi domenlar ma'murlari kirish huquqini berishmasa). Hammasiga havola qilish uchun foydalaniladi "Xavfsizlik hisoblari menejeri "(SAM) mahalliy tizim ma'muriy vakolat berilgan yoki tuzilgan barcha domenlar uchun ma'lumotlar bazalari (shu jumladan SAM ma'lumotlar bazasi" SAM "deb nomlangan pastki kalitda saqlanadigan ishlaydigan tizimning mahalliy domeni ham mavjud: kerak bo'lganda boshqa subkeyslar yaratiladi Har bir SAM ma'lumotlar bazasida tegishli domenda yaratilgan va tuzilgan barcha o'rnatilgan qayd yozuvlari (asosan guruh taxalluslari) va tuzilgan akkauntlar (foydalanuvchilar, guruhlar va ularning taxalluslari, shu jumladan mehmon hisoblari va administrator hisoblari) mavjud. ushbu domen, xususan ushbu domenga kirish uchun ishlatilishi mumkin bo'lgan foydalanuvchi nomini, domendagi ichki noyob foydalanuvchi identifikatorini, kriptografik xash har bir foydalanuvchi uchun har bir foydalanuvchi paroli autentifikatsiya protokoli, ularning foydalanuvchi ro'yxatga olish kitobi uyasini saqlash joyi, har xil holat bayroqlari (masalan, hisob qaydnomasi kiritilishi mumkin va kirish so'rovi ekranida ko'rinishi mumkin) va hisob sozlangan domenlarning ro'yxati (mahalliy domenni ham o'z ichiga oladi). .
  • "HKLM SECURITY" kaliti odatda ko'pchilik foydalanuvchilar uchun bo'sh ko'rinadi (agar ularga ma'muriy imtiyozlarga ega foydalanuvchilar tomonidan ruxsat berilmagan bo'lsa) va joriy foydalanuvchi tizimga kiradigan domenning Xavfsizlik ma'lumotlar bazasiga bog'langan (agar foydalanuvchi tizimga kirgan bo'lsa) mahalliy tizim domeni, ushbu kalit mahalliy mashina tomonidan saqlanadigan va mahalliy tizim ma'murlari yoki o'rnatilgan "Tizim" qayd yozuvi va Windows o'rnatuvchilari tomonidan boshqariladigan ro'yxatga olish kitobi uyasiga bog'lanadi). Yadro unga joriy foydalanuvchiga tegishli xavfsizlik siyosatini va ushbu foydalanuvchi tomonidan amalga oshirilgan barcha dasturlarni yoki operatsiyalarni o'qish va bajarish uchun kirish huquqini beradi. Shuningdek, u tarkibida joriy foydalanuvchi tizimga kirgan domenning SAM ma'lumotlar bazasi bilan dinamik ravishda bog'langan "SAM" pastki tugmasi mavjud.
  • "HKLM SYSTEM" kaliti odatda faqat mahalliy tizimda ma'muriy imtiyozlarga ega foydalanuvchilar tomonidan yoziladi. Unda Windows tizimi sozlamalari, xavfsiz tasodifiy raqamlar ishlab chiqaruvchisi (RNG) uchun ma'lumotlar, fayl tizimini o'z ichiga olgan hozirda o'rnatilgan qurilmalar ro'yxati, bir nechta raqamli "HKLM SYSTEM Control Sets" tizim apparat drayverlari va xizmatlari uchun muqobil konfiguratsiyalar mavjud. mahalliy tizimda (hozirda ishlatilgan va zaxira nusxasini o'z ichiga olgan holda), ushbu boshqaruv to'plamlarining holatini o'z ichiga olgan "HKLM SYSTEM Select" pastki tugmasi va yuklash vaqtida dinamik ravishda bog'langan "HKLM SYSTEM CurrentControlSet". Hozirda mahalliy tizimda ishlatiladigan boshqaruv to'plami. Har bir tuzilgan boshqaruv to'plami quyidagilarni o'z ichiga oladi:
    • barcha "Plug-and-Play" qurilmalarini sanab chiqadigan va ularni o'rnatilgan tizim drayverlari bilan bog'laydigan "Enum" pastki tugmasi (va ushbu drayverlarning qurilmaga xos konfiguratsiyasini saqlash),
    • barcha o'rnatilgan tizim drayverlarini (qurilmaga xos bo'lmagan konfiguratsiyani va ular tuzilgan qurilmalarni sanab o'tishni hisobga olgan holda) va xizmat sifatida ishlaydigan barcha dasturlarni (qanday qilib va ​​qachon avtomatik ravishda ishga tushirish mumkinligini) ko'rsatadigan "xizmatlar" pastki kalitini,
    • xizmat sifatida ishlaydigan turli xil apparat drayverlari va dasturlarini tashkil qiluvchi "Boshqarish" pastki tugmasi va boshqa barcha tizim konfiguratsiyasi,
    • Sozlangan turli xil profillarni sanab o'tadigan "uskuna profillari" pastki tugmasi (har biri standart tizimni o'zgartirish uchun ishlatiladigan "tizim" yoki "dasturiy ta'minot" sozlamalari bilan tizim drayverlari va xizmatlarida yoki dasturlarda), shuningdek "apparat Ushbu profillardan biriga dinamik ravishda bog'langan Profillar Current "pastki tugmasi.
  • "HKLM SOFTWARE" pastki tugmachasida dasturiy ta'minot va Windows sozlamalari mavjud (standart apparat profilida). U asosan dastur va tizim o'rnatuvchilari tomonidan o'zgartiriladi. U dasturiy ta'minot ishlab chiqaruvchisi tomonidan tashkil etilgan (har biri uchun pastki kalit bilan), shuningdek, Windows foydalanuvchi interfeysining ba'zi sozlamalari uchun "Windows" pastki tugmachasi, fayl kengaytmalari, MIME turlari, ob'ekt sinflari identifikatorlaridan ro'yxatdan o'tgan barcha assotsiatsiyalarni o'z ichiga olgan "Classes" pastki tugmasi mavjud. va interfeys identifikatorlari (OLE, COM / DCOM va ActiveX uchun) o'rnatilgan dasturlarga yoki mahalliy kompyuterda ushbu turlarni ishlatishi mumkin bo'lgan DLL-larga (ammo bu birlashmalar har bir foydalanuvchi uchun sozlanishi mumkin, quyida ko'rib chiqing) va "Siyosatlar" pastki tugmasi (sotuvchi tomonidan ham tashkil qilingan) ilovalar va tizim xizmatlaridan umumiy foydalanish siyosatini amalga oshirish uchun (shu jumladan, mahalliy tarmoq domeni tashqarisida ishlaydigan masofaviy tizimlar yoki xizmatlarni autentifikatsiya qilish, avtorizatsiya qilish yoki taqiqlash uchun ishlatiladigan markaziy sertifikatlar do'koni).
  • "HKLM SOFTWARE Wow6432Node" tugmachasi 64-bitli Windows operatsion tizimidagi 32-bitli dasturlarda qo'llaniladi va "HKLM SOFTWARE" ga teng, ammo alohida. Kalit yo'l shaffof ravishda 32-bitli dasturlarga taqdim etiladi WoW64 HKLM SOFTWARE sifatida[7] (shunga o'xshash tarzda 32-bitli dasturlar% SystemRoot% Syswow64-ni% SystemRoot% System32 deb ko'radi)

HKEY_CURRENT_CONFIG (HKCC)

Qisqartirilgan HKCC, HKEY_CURRENT_CONFIG ish vaqtida yig'ilgan ma'lumotlarni o'z ichiga oladi; ushbu kalitda saqlangan ma'lumotlar diskda doimiy saqlanmaydi, aksincha yuklash vaqtida qayta tiklanadi. Bu "HKEY_LOCAL_MACHINE System CurrentControlSet Hardware Profiles Current" tugmachasining dastagi, u dastlab bo'sh, lekin yuklash vaqtida "HKEY_LOCAL_MACHINE System CurrentControlSet Hardware Profiles" da saqlangan boshqa yuklash tugmalaridan birini yuklash orqali to'ldiriladi.

HKEY_CLASSES_ROOT (HKCR)

Qisqartirilgan HKCR, HKEY_CLASSES_ROOT kabi ro'yxatdan o'tgan dasturlar haqida ma'lumot mavjud fayl birlashmalari va OLE Ob'ekt sinfi identifikatorlari, ularni ushbu elementlarni boshqarish uchun ishlatiladigan dasturlarga bog'lash. Yoqilgan Windows 2000 va undan yuqori, HKCR - bu foydalanuvchiga asoslangan HKCU Software Classes va mashinaga asoslangan HKLM Software Classes to'plamidir. Agar berilgan qiymat yuqoridagi ikkala pastki tugmachada mavjud bo'lsa, HKCU Software Classes-da birinchi o'ringa ega.[8] Dizayn mashinada yoki foydalanuvchiga xos ro'yxatdan o'tishga imkon beradi MAQOMOTI ob'ektlar.

HKEY_USERS (HKU)

Qisqartirilgan HKU, HKEY_USERS har bir foydalanuvchi profiliga mos ravishda yuklangan har bir foydalanuvchi profili uchun HKEY_CURRENT_USER tugmalariga mos keladigan pastki kalitlarni o'z ichiga oladi, lekin foydalanuvchi uyalari odatda hozirda tizimga kirgan foydalanuvchilar uchun yuklanadi.

HKEY_CURRENT_USER (HKCU)

Qisqartirilgan HKCU, HKEY_CURRENT_USER hozirda tizimga kirgan foydalanuvchiga xos bo'lgan sozlamalarni saqlaydi.[9] HKEY_CURRENT_USER kaliti - foydalanuvchiga mos keladigan HKEY_USERS subkeysiga havola; ikkala joyda ham bir xil ma'lumotga ega bo'lish mumkin. Belgilangan pastki kalit "(HKU) (SID) ..." dir, bu erda (SID) mos keladi Windows SID; agar "(HKCU)" tugmachasida quyidagi "(HKCU) Software Classes ..." qo'shimchasi bo'lsa, u "(HKU) (SID) _CLASSES ..." ga mos keladi, ya'ni qo'shimchada "" _CLASSES "(SID) ga qo'shildi.
Windows NT tizimlarida har bir foydalanuvchi sozlamalari o'zlarining NTUSER.DAT va USRCLASS.DAT deb nomlangan fayllarida o'zlarining Hujjatlar va Sozlamalar pastki papkasida (yoki Windows Vista va undan yuqori qismidagi o'z foydalanuvchilarining pastki papkasida) saqlanadi. Ushbu uyadagi sozlamalar foydalanuvchilarni a bilan kuzatib boradi rouming-profil mashinadan mashinaga.

HKEY_PERFORMANCE_DATA

Ushbu kalit ish vaqti ma'lumotlarini NT yadrosining o'zi tomonidan taqdim etilgan ishlash ma'lumotlariga yoki ishlaydigan ma'lumotlarni ta'minlaydigan ishlaydigan tizim drayverlariga, dasturlariga va xizmatlariga taqdim etadi. Ushbu kalit hech qanday uyada saqlanmaydi va Ro'yxatdan o'tish kitoblari tahrirlovchisida ko'rsatilmaydi, lekin u Windows API-dagi ro'yxatga olish funktsiyalari orqali yoki Vazifa menejerining Ishlash yorlig'i orqali soddalashtirilgan ko'rinishda ko'rinadi (faqat bir nechta ishlash ma'lumotlari uchun mahalliy tizim) yoki yanada takomillashtirilgan boshqaruv panellari orqali (masalan, masofaviy tizimlardan ma'lumotlarni yig'ish va qayd qilish imkonini beradigan Performances Monitor yoki Performances Analyzer kabi).

HKEY_DYN_DATA

Ushbu kalit faqat Windows 95-da ishlatiladi, Windows 98 va Windows ME.[10] Unda qo'shimcha qurilmalar, shu jumladan Plug and Play va tarmoq ishlashi statistikasi haqida ma'lumotlar mavjud. Ushbu uyadagi ma'lumotlar ham qattiq diskda saqlanmaydi. Plug and Play ma'lumotlari ishga tushirilganda yig'iladi va tuziladi va xotirada saqlanadi.[11]

Kovanlar

Ro'yxatdan o'tish kitobi o'zini birlashtirilgan ierarxik ma'lumotlar bazasi sifatida ko'rsatsa ham, ro'yxatga olish kitobi filiallari aslida bir qator disk fayllarida saqlanadi uyalar.[12] (Kovani so'zi an hazilda.)[13]

Ba'zi uyalar o'zgaruvchan va umuman diskda saqlanmaydi. Bunga HKLM HARDWARE dan boshlangan filialning uyasi misol bo'la oladi. Ushbu uyada tizim apparatlari haqidagi ma'lumotlar yoziladi va tizim har safar yuklanganda va apparatni aniqlashni amalga oshirganda yaratiladi.

Tizimdagi foydalanuvchilar uchun individual sozlamalar har bir foydalanuvchi uchun uyada (disk fayli) saqlanadi. Foydalanuvchiga kirish paytida tizim foydalanuvchi uyasini HKEY_USERS tugmachasi ostida yuklaydi va HKCU (HKEY_CURRENT_USER) ramziy havolasini joriy foydalanuvchiga yo'naltirish uchun o'rnatadi. Bu dasturlarga HKCU kaliti ostida yashirin ravishda foydalanuvchi uchun sozlamalarni saqlash / olish imkonini beradi.

Bir vaqtning o'zida barcha uyalar yuklanmaydi. Yuklash vaqtida faqat minimal uyalar to'plami yuklanadi va shundan so'ng operatsion tizim ishga tushirilganda va foydalanuvchilar tizimga kirganda yoki uya dastur tomonidan aniq yuklanganida uyalar yuklanadi.

Fayl joylari

Ro'yxatdan o'tish bir nechta fayllarda jismonan saqlanadi, odatda ro'yxatga olish kitobi ichidagi ma'lumotlarni boshqarish uchun foydalaniladigan API-lardan foydalaniladi. Windows versiyasiga qarab, bu fayllar uchun turli xil fayllar va turli xil joylar bo'ladi, ammo ularning barchasi mahalliy kompyuterda. Windows NT-da tizim ro'yxatga olish fayllari uchun joy % SystemRoot% System32 Config; foydalanuvchi uchun maxsus HKEY_CURRENT_USER ro'yxatga olish uyasi saqlanadi Ntuser.dat foydalanuvchi profilining ichida. Har bir foydalanuvchi uchun ulardan bittasi bor; agar foydalanuvchi a rouming-profil, keyin ushbu fayl a ga ko'chiriladi server mos ravishda tizimdan chiqish va tizimga kirishda. UsrClass.dat nomli ikkinchi foydalanuvchiga tegishli ro'yxatga olish fayli MAQOMOTI ro'yxatga olish yozuvlarini o'z ichiga oladi va sukut bo'yicha yurmaydi.

Windows NT

Windows NT tizimlari ro'yxatga olish kitobini ushbu operatsion tizimlarda Ro'yxatdan o'tish kitoblari muharriri tomonidan eksport qilinishi, yuklanishi va tushirilishi mumkin bo'lgan ikkilik fayl formatida saqlaydi. Quyidagi tizim ro'yxatga olish fayllari saqlanadi % SystemRoot% System32 Config :

  • Sem - HKEY_LOCAL_MACHINE SAM
  • Xavfsizlik - HKEY_LOCAL_MACHINE XAVFSIZLIK
  • Dasturiy ta'minot - HKEY_LOCAL_MACHINE SOFTWARE
  • Tizim - HKEY_LOCAL_MACHINE SYSTEM
  • Odatiy - HKEY_USERS .DEFAULT
  • Userdiff - Kovan bilan bog'liq emas. Faqat operatsion tizimlarni yangilashda foydalaniladi.[14]

Har bir foydalanuvchining profil papkasida quyidagi fayl saqlanadi:

  • % USERPROFILE% Ntuser.dat - HKEY_USERS <Foydalanuvchi SID > (HKEY_CURRENT_USER tomonidan bog'langan)

Windows 2000, Server 2003 va Windows XP uchun fayllar assotsiatsiyasi va MAQOMOTI ma'lumotlari uchun quyidagi qo'shimcha foydalanuvchiga xos fayl ishlatiladi:

  • % USERPROFILE% Local Settings Application Data Microsoft Windows Usrclass.dat (yo'l mahalliylashtirilgan) - HKEY_USERS _Classes (HKEY_CURRENT_USER Software Classes)

Windows Vista va undan keyingi versiyalar uchun yo'l quyidagicha o'zgartirildi:

  • % USERPROFILE% AppData Local Microsoft Windows Usrclass.dat (yo'l lokalizatsiya qilinmagan) taxallus % LocalAppData% Microsoft Windows Usrclass.dat - HKEY_USERS _Classes (HKEY_CURRENT_USER Software Classes)

Windows 2000 ro'yxatdan o'tish uyalarining (.ALT) muqobil nusxasini saqlaydi va buzilish aniqlanganda unga o'tishga harakat qiladi.[15] Windows XP va Windows Server 2003 da a System.alt uya, chunki NTLDR Windows-ning ushbu versiyalarida System.log o'chirish yoki ishdan chiqish paytida mos kelmaydigan tizim uyasini yangilash uchun fayl. Bundan tashqari, % SystemRoot% Repair papkada tizim o'rnatilgandan so'ng yaratilgan Windows ro'yxatga olish kitobi uyalarining nusxasi va birinchi muvaffaqiyatli Windows ishga tushirilishi mavjud.

Har bir ro'yxatga olish ma'lumotlari faylida ".log" kengaytmasi bilan bog'liq fayl mavjud operatsiyalar jurnali har qanday to'xtatilgan yangilanishlarni keyingi ishga tushirish bilan yakunlashini ta'minlash uchun ishlatiladi.[16] Ichki ro'yxatga olish fayllari 4 ga bo'lingankB "hujayralar" to'plamlarini o'z ichiga olgan "axlat qutilari".[16]

Windows 9x

Ro'yxatdan o'tish fayllari % WINDIR% ismlar ostida katalog USER.DAT va SYSTEM.DAT qo'shilishi bilan Sinflar.DAT Windows ME-da. Shuningdek, har bir foydalanuvchi profilining (agar profillar yoqilgan bo'lsa) o'ziga xos xususiyatlari mavjud USER.DAT ichida foydalanuvchi profil katalogida joylashgan fayl % WINDIR% Profillar .

Windows 3.11

Yagona ro'yxatga olish fayli chaqiriladi REG.DAT va u ichida saqlanadi % WINDIR% katalog.

Windows 10 Mobile

Eslatma: Ro'yxatdan o'tish fayllariga kirish uchun telefonni quyidagilarni ishlatib maxsus rejimda sozlash kerak:

Agar yuqorida ko'rsatilgan usullardan birortasi ishlagan bo'lsa - Qurilma registridagi fayllarni quyidagi joyda topish mumkin:

 {Phone}  EFIESP  Windows  System32  config

Eslatma: InterOp Tools shuningdek, ro'yxatga olish kitobi muharririni ham o'z ichiga oladi.

Tahrirlash

Ro'yxatga olish muharrirlari

Ro'yxatdan o'tish kitobi operatsion tizim uchun muhim konfiguratsiya ma'lumotlarini, o'rnatilgan dasturlar uchun, shuningdek har bir foydalanuvchi va dastur uchun alohida sozlamalarni o'z ichiga oladi. Ro'yxatdan o'tish kitobidagi operatsion tizim konfiguratsiyasiga beparvolik bilan o'zgartirish qaytarib bo'lmaydigan zarar etkazishi mumkin, shuning uchun odatda o'rnatish / sozlash va olib tashlash paytida faqat ro'yxatga olish ma'lumotlar bazasida o'zgarishlarni amalga oshiradigan dasturlar o'rnatiladi. Agar foydalanuvchi ro'yxatga olish kitobini qo'lda tahrir qilmoqchi bo'lsa, Microsoft ro'yxatga olish kitobining zaxira nusxasini o'zgartirishdan oldin bajarishni tavsiya qiladi.[17] Dastur boshqaruv panelidan o'chirilganda, u to'liq o'chirilmaydi va foydalanuvchi dastur fayllari kabi kataloglarni qo'lda tekshirishi kerak. Shundan so'ng, foydalanuvchi ro'yxatga olish kitobidagi o'chirilgan dasturga havolani qo'lda olib tashlashi kerak. Bu odatda RegEdit.exe yordamida amalga oshiriladi.[18] Ro'yxatga olish kitobini tahrirlash ba'zan Windows-ga tegishli muammolarni hal qilishda kerak bo'ladi, masalan. domenga kirishda muammolarni ro'yxatga olish kitobini tahrirlash orqali hal qilish mumkin.[19]

Windows Registry-ni RegEdit.exe kabi dasturlar yordamida qo'lda tahrirlash mumkin, ammo bu vositalar ro'yxatga olish tizimining ba'zi bir oxirgi metadata kabi ma'lumotlarni o'zgartirmaydi.

3.1 / 95 seriyali operatsion tizimlar uchun registr muharriri RegEdit.exe, Windows NT uchun esa RegEdt32.exe; funktsional imkoniyatlar Windows XP-da birlashtirilgan. Ixtiyoriy va / yoki RegEdit.exe-ga o'xshash uchinchi tomon vositalari ko'plab Windows CE versiyalari uchun mavjud.

Ro'yxatdan o'tish kitoblari muharriri foydalanuvchilarga quyidagi funktsiyalarni bajarishga imkon beradi:

  • Yaratish, manipulyatsiya, nomini o'zgartirish[20] va ro'yxatga olish kitobi kalitlarini, pastki kalitlarni, qiymatlarni va qiymat ma'lumotlarini o'chirish
  • Import va eksport.REG fayllarni, ikkilik uyali formatda ma'lumotlarni eksport qilish
  • Ro'yxatdan o'tish kitobi formatidagi fayllarni yuklash, boshqarish va tushirish (faqat Windows NT tizimlarida)
  • Ruxsatnomalarni asosida sozlash ACL (Faqat Windows NT tizimlari)
  • Foydalanuvchi tomonidan tanlangan ro'yxatga olish kitobi kalitlarini Sevimlilar sifatida belgilash
  • Kalit nomlari, qiymat nomlari va qiymat ma'lumotlarida ma'lum qatorlarni topish
  • Boshqa tarmoqdagi kompyuterda ro'yxatga olish kitobini masofadan tahrirlash

.REG fayllar

.REG fayllar (Ro'yxatdan o'tish yozuvlari deb ham ataladi) - bu ro'yxatga olish qismlarini eksport qilish va import qilish uchun inson tomonidan o'qiladigan matnga asoslangan fayllar. Windows 2000 va undan keyingi versiyalarida ular qatorni o'z ichiga oladi Windows Registry Editor 5.00 versiyasi boshida va mavjud Unicode asoslangan. Yoqilgan Windows 9x va NT 4.0 tizimlari, ular qatorni o'z ichiga oladi REGEDIT4 va ANSI asoslangan.[21] Windows 9x formati.REG fayllar Windows 2000 va undan keyingi versiyalariga mos keladi. Ushbu tizimlardagi Windows-dagi Ro'yxatdan o'tish kitoblari muharriri ham eksport qilishni qo'llab-quvvatlaydi.REG Windows 9x / NT formatidagi fayllar. Ma'lumotlar saqlanadi.REG quyidagi sintaksisdan foydalangan holda fayllar:[21]

[ nomi>   nomi>   ism>]"Qiymat nomi"=<Value type>:<Value data>

Kalitning standart qiymati "Value Name" o'rniga "@" yordamida tahrir qilinishi mumkin:

[ nomi>   nomi>   ism>]@=<Value type>:<Value data>

String qiymatlari uchun kerak emas (misolga qarang), lekin orqa chiziqlar ('') ikkita teskari ('') va tirnoqlarni ('"') teskari tirnoq ('"') shaklida yozish kerak.

Masalan, "A qiymati", "qiymati B", "qiymati C", "qiymati D", "qiymati E", "qiymati F", "qiymati G", "qiymati H", "qiymati I" "," J qiymati "," qiymati K "," qiymati L "va" qiymati M "HKLM SOFTWARE Foobar tugmachasiga:

Windows Registry Editor 5.00 versiyasi[HKEY_LOCAL_MACHINE SOFTWARE  Foobar]"A qiymati"="""B qiymati"=hex: "S qiymati"=dword: "D qiymati"=hex (0): "E qiymati"=hex (1): "F qiymati"=hex (2): "G qiymati"=hex (3): ; "B qiymati" ga teng"H qiymati"=hex (4): "I qiymati"=hex (5): "J qiymati"=hex (7): "K qiymati"=hex (8): "L qiymati"=hex (a): "M qiymati"=hex (b): 

Ma'lumotlar.REG fayllarni ushbu faylni ikki marta bosish yoki buyruq satridagi / s tugmachasi yordamida ro'yxatga olish kitobi bilan qo'shish / birlashtirish mumkin. REG fayllar ro'yxatga olish ma'lumotlarini olib tashlash uchun ham ishlatilishi mumkin.

Kalitni (va barcha pastki kalitlarni, qiymatlarni va ma'lumotlarni) olib tashlash uchun kalit nomi oldida minus belgisi ("-") bo'lishi kerak.[21]

Masalan, HKLM SOFTWARE Foobar tugmachasini (va barcha pastki kalitlarni, qiymatlarni va ma'lumotlarni) olib tashlash uchun,

[-HKEY_LOCAL_MACHINE SOFTWARE  Foobar]

Qiymatni (va uning ma'lumotlarini) olib tashlash uchun olib tashlanadigan qiymatlar teng belgidan ("=") keyin minus ("-") belgiga ega bo'lishi kerak.[21]

Masalan, HKLM SOFTWARE Foobar tugmachasidan faqat "A qiymati" va "qiymati B" qiymatlarini (va ularning ma'lumotlarini) olib tashlash uchun:

[HKEY_LOCAL_MACHINE SOFTWARE  Foobar]"A qiymati"=-"B qiymati"=-

Faqat HKLM SOFTWARE Foobar tugmachasining (va uning ma'lumotlarining) standart qiymatini olib tashlash uchun:

[HKEY_LOCAL_MACHINE SOFTWARE  Foobar]@=-

Vertikal bilan boshlangan satrlar sharhlar hisoblanadi:

; Bu sharh. Bu .reg faylining istalgan qismiga joylashtirilishi mumkin[HKEY_LOCAL_MACHINE SOFTWARE  Foobar]"Qiymat"="Namuna qatori"

Guruh qoidalari

Windows guruh siyosati qoidalar asosida bir qator mashinalar yoki alohida foydalanuvchilar uchun ro'yxatga olish kitobi kalitlarini o'zgartirishi mumkin. Dastur mashinada yoki mashinaning individual foydalanuvchisi uchun birinchi marta kuchga kirganda, siyosatning bir qismi sifatida ko'rsatilgan ro'yxatga olish kitobi sozlamalari mashina yoki foydalanuvchi sozlamalarida qo'llaniladi.

Windows shuningdek yangilangan qoidalarni qidiradi va ularni vaqti-vaqti bilan, odatda har 90 daqiqada qo'llaydi.[22]

U orqali qamrov doirasi siyosat qaysi mashinalarga va / yoki foydalanuvchilarga qo'llanilishini belgilaydi. Mashina yoki foydalanuvchi siyosat doirasiga kiradimi yoki yo'qmi, tashkiliy katalogdagi mashina yoki foydalanuvchi hisobining joylashishini filtrlashi mumkin bo'lgan qoidalar to'plami, aniq foydalanuvchilar yoki mashinalar qayd yozuvlari yoki xavfsizlik guruhlari tomonidan belgilanadi. Batafsil rivojlangan qoidalar yordamida o'rnatilishi mumkin Windows boshqaruv asboblari iboralar. Bunday qoidalar kompyuter sotuvchisi nomi, protsessor arxitekturasi, o'rnatilgan dasturiy ta'minot yoki ulangan tarmoqlar kabi xususiyatlarni filtrlashi mumkin.

Masalan, ma'mur buxgalteriya bo'limidagi mashinalar uchun bitta registr sozlamalari to'plami va tashrif buyuruvchilar zonasidagi kiosk terminallari uchun boshqa (qulflangan) ro'yxatga olish to'plami bilan siyosat tuzishi mumkin. Mashina bir doiradan ikkinchisiga ko'chirilganda (masalan, uning nomini o'zgartirish yoki boshqa tashkiliy birlikka ko'chirish), to'g'ri siyosat avtomatik ravishda qo'llaniladi. Agar siyosat o'zgartirilsa, u avtomatik ravishda amaldagi barcha mashinalarga qayta qo'llaniladi.

Siyosat bir qator ma'muriy andozalar orqali tahrirlanadi, bu sozlamalarni tanlash va o'zgartirish uchun foydalanuvchi interfeysini ta'minlaydi. Ma'muriy shablonlar to'plami kengaytirilishi mumkin va uzoqdan boshqarishni qo'llab-quvvatlaydigan dasturiy ta'minot to'plamlari o'zlarining shablonlarini ro'yxatdan o'tkazishlari mumkin.

Buyruqlar satrini tahrirlash

reg
Tuzuvchi (lar)Microsoft
Operatsion tizimMicrosoft Windows
TuriBuyruq
LitsenziyaMulkiy tijorat dasturlari
Veb-saythujjatlar.microsoft.com/ uz-biz/ Windows-server/ ma'muriyat/ windows-buyruqlar/ reg
regini
Tuzuvchi (lar)Microsoft
Operatsion tizimMicrosoft Windows
TuriBuyruq
LitsenziyaMulkiy tijorat dasturlari
Veb-saythujjatlar.microsoft.com/ uz-biz/ Windows-server/ ma'muriyat/ windows-buyruqlar/ regini

Ro'yxatdan o'tish kitobini bir necha usullar bilan boshqarish mumkin buyruq satri. The Reg.exe va RegIni.exe yordamchi vositalar Windows XP va undan keyingi Windows versiyalariga kiritilgan. Windows-ning eski versiyalari uchun alternativ joylarga Resource Kit CD-lari yoki Windows-ning asl O'rnatish CD-lari kiradi.

Shuningdek, a .REG faylni quyidagi buyruq bilan buyruq satridan import qilish mumkin:

RegEdit.exe / s fayl

/ S fayl bo'ladi degan ma'noni anglatadi jim birlashtirildi ro'yxatga olish kitobiga. Agar / s parameter is omitted the user will be asked to confirm the operation. In Windows 98, Windows 95 and at least some configurations of Windows XP the / s switch also causes RegEdit.exe to ignore the setting in the registry that allows administrators to disable it. Dan foydalanganda / s almashtirish RegEdit.exe does not return an appropriate return code if the operation fails, unlike Reg.exe nima qiladi.

RegEdit.exe /e fayl

exports the whole registry in V5 format to a UNICODE .REG file, while any of

RegEdit.exe /e fayl HKEY_CLASSES_ROOT[]RegEdit.exe /e fayl HKEY_CURRENT_CONFIG[]RegEdit.exe /e fayl HKEY_CURRENT_USER[]RegEdit.exe /e fayl HKEY_LOCAL_MACHINE[]RegEdit.exe /e fayl HKEY_USERS[]

export the specified (sub)key (which has to be enclosed in quotes if it contains spaces) only.

RegEdit.exe /a fayl

exports the whole registry in V4 format to an ANSI .REG fayl.

RegEdit.exe /a fayl <key>

exports the specified (sub)key (which has to be enclosed in quotes if it contains spaces) only.

Bundan tashqari, foydalanish mumkin Reg.exe. Here is a sample to display the value of the registry value Version:

Reg.exe QUERY HKLMSoftwareMicrosoftResKit / v Versiya

Other command line options include a VBScript yoki JScript bilan birga CScript, WMI yoki WMIC.exe va Windows PowerShell.

Registry permissions can be manipulated through the command line using RegIni.exe va SubInACL.exe vosita. For example, the permissions on the HKEY_LOCAL_MACHINESOFTWARE key can be displayed using:

SubInACL.exe /keyreg HKEY_LOCAL_MACHINESOFTWARE / displey

PowerShell commands and scripts

Using PowerShell to navigate the registry

Windows PowerShell comes with a registry provider which presents the registry as a location type similar to the file system. The same commands used to manipulate files/directories in the file system can be used to manipulate keys/values of the registry.

Also like the file system, PowerShell uses the concept of a current location which defines the context on which commands by default operate. The Get-ChildItem (also available through the alias ls yoki dir) retrieves the child keys of the current location. By using the Set-Location (or the alias CD) command the user can change the current location to another key of the registry. Commands which rename items, remove items, create new items or set content of items or properties can be used to rename keys, remove keys or entire sub-trees or change values.

Through PowerShell scripts files a user/administrator can prepare scripts which, when executed, make changes to the registry. Such scripts can be distributed to users/administrators who can execute them on individual machines.

The PowerShell Registry provider supports transactions, i.e. multiple changes to the registry can be bundled into a single atomic transaction. An atomic transaction ensures that either all of the changes are committed to the database, or if the script fails, none of the changes are committed to the database.

Programs or scripts

The registry can be edited through the APIs of the Advanced Windows 32 Base API Library (advapi32.dll).[23]

List of registry API functions
RegCloseKeyRegOpenKeyRegConnectRegistryRegOpenKeyEx
RegCreateKeyRegQueryInfoKeyRegCreateKeyExRegQueryMultipleValues
RegDeleteKeyRegQueryValueRegDeleteValueRegQueryValueEx
RegEnumKeyRegReplaceKeyRegEnumKeyExRegRestoreKey
RegEnumValueRegSaveKeyRegFlushKeyRegSetKeySecurity
RegGetKeySecurityRegSetValueRegLoadKeyRegSetValueEx
RegNotifyChangeKeyValueRegUnLoadKey

Ko'pchilik dasturlash tillari offer built-in ish vaqti kutubxonasi functions or sinflar that wrap the underlying Windows APIs and thereby enable programs to store settings in the registry (e.g. Microsoft.Win32.Registry yilda VB.NET va C #, yoki TRegistry yilda Delphi va Bepul Paskal ). MAQOMOTI -enabled applications like Visual Basic 6 dan foydalanishi mumkin WSH WScript.Shell ob'ekt. Another way is to use the Windows Resource Kit Tool, Reg.exe by executing it from code,[24] although this is considered poor programming practice.

Xuddi shunday, stsenariy tillari kabi Perl (bilan Win32::TieRegistry), Python (with winreg), TCL (which comes bundled with the registry package),[25] Windows Powershell va Windows skriptlar xosti also enable registry editing from scripts.

Oflayn tahrirlash

The offreg.dll[26] mavjud Windows Driver Kit offers a set of APIs for the creation and manipulation of currently not loaded registry hives similar to those provided by advapi32.dll.

It is also possible to edit the registry (hives) of an offline system from Windows PE yoki Linux (in the latter case using ochiq manba vositalar).

COM self-registration

Prior to the introduction of registration-free MAQOMOTI, developers were encouraged to add initialization code to in-process and out-of-process binaries to perform the registry configuration required for that object to work. For in-process binaries such as .DLL and .OCX files, the modules typically exported a function called DllInstall()[27] that could be called by installation programs or invoked manually with utilities like Regsvr32.exe;[28] out-of-process binaries typically support the commandline arguments /Regserver and /Unregserver that created or deleted the required registry settings.[29] COM applications that break because of DLL Hell issues can commonly be repaired with RegSvr32.exe or the /RegServer switch without having to re-invoke installation programs.[30]

Advanced functionality

Windows exposes APIs that allows user-mode applications to register to receive a notification event if a particular registry key is changed.[31] APIs are also available to allow kernel-mode applications to filter and modify registry calls made by other applications.[32]

Windows also supports remote access to the registry of another computer via the RegConnectRegistry funktsiya[33] if the Remote Registry service is running, correctly configured and its network traffic is not firewalled.[34]

Xavfsizlik

Each key in the registry of Windows NT versions can have an associated security descriptor. The security descriptor contains an kirishni boshqarish ro'yxati (ACL) that describes which user groups or individual users are granted or denied access permissions. The set of registry permissions include 10 rights/permissions which can be explicitly allowed or denied to a user or a group of users.

Registry permissions
RuxsatTavsif
Query ValueThe right to read the registry key value.
Set ValueThe right to write a new value
Create SubkeyThe right to create subkeys.
Enumerate SubkeysAllow the enumeration of subkeys.
NotifyThe right to request change notifications for registry keys or subkeys.
Create LinkReserved by the operating system.
DeleteThe right to delete a key.
Write DACLThe right to modify permissions of the container's DACL.
Write OwnerThe right to modify the container's owner.
Read ControlThe right to read the DACL.

As with other securable objects in the operating system, individual access control entries (ACE) on the security descriptor can be explicit or inherited from a parent object.[35]

Windows Resource Protection ning xususiyati Windows Vista and later versions of Windows that uses security to deny Administrators and the system WRITE access to some sensitive keys to protect the integrity of the system from malware and accidental modification.[36]

Special ACEs on the security descriptor can also implement mandatory integrity control for the registry key and subkeys. A process running at a lower integrity level cannot write, change or delete a registry key/value, even if the account of the process has otherwise been granted access through the ACL. For instance, Internet Explorer running in Protected Mode can o'qing medium and low integrity registry keys/values of the currently logged on user, but it can only modify low integrity keys.[37]

Outside security, registry keys cannot be deleted or edited due to other causes. Registry keys containing NUL characters cannot be deleted with standard registry editors and require a special utility for deletion, such as RegDelNull.[38][39]

Backups and recovery

Different editions of Windows have supported a number of different methods to back up and restore the registry over the years, some of which are now deprecated:

  • Tizimni tiklash can back up the registry and restore it as long as Windows is bootable, or from the Windows tiklash muhiti (starting with Windows Vista).
  • NT zaxira nusxasi can back up the registry as part of the System State and restore it. Avtomatik tizimni tiklash in Windows XP can also restore the registry.
  • On Windows NT, the Last Known Good Configuration option in startup menu relinks the HKLMSYSTEMCurrentControlSet key, which stores hardware and device driver information.
  • Windows 98 and Windows ME include command line (Scanreg.exe) and GUI (Scanregw.exe) registry checker tools to check and fix the integrity of the registry, create up to five automatic regular backups by default and restore them manually or whenever corruption is detected.[40] The registry checker tool backs up the registry, by default, to %Windir%Sysbckup Scanreg.exe can also run from MS-DOS.[41]
  • The Windows 95 CD-ROM included an Emergency Recovery Utility (ERU.exe) and a Configuration Backup Tool (Cfgback.exe) to back up and restore the registry. Additionally Windows 95 backs up the registry to the files system.da0 and user.da0 on every successful boot.
  • Windows NT 4.0 kiritilgan RDISK.EXE, a utility to back up and restore the entire registry.[42]
  • Windows 2000 Resource Kit contained an unsupported pair of utilities called Regback.exe and RegRest.exe for backup and recovery of the registry.[43]
  • Periodic automatic backups of the registry are now disabled by default on Windows 10 May 2019 Update (version 1903). Microsoft recommends System Restore be used instead.[44]

Siyosat

Guruh siyosati

Windows 2000 and later versions of Windows use Guruh siyosati to enforce registry settings through a registry-specific client extension in the Group Policy processing engine.[45] Policy may be applied locally to a single computer using gpedit.msc, or to multiple users and/or computers in a domen foydalanish gpmc.msc.

Eski tizimlar

With Windows 95, Windows 98, Windows ME and Windows NT 4.0, administrators can use a special file to be merged into the registry, called a policy file (POLICY.POL). The policy file allows administrators to prevent non-administrator users from changing registry settings like, for instance, the security level of Internet Explorer and the desktop background wallpaper. The policy file is primarily used in a business with a large number of computers where the business needs to be protected from rogue or careless users.

The default extension for the policy file is .POL.The policy file filters the settings it enforces by user and by group (a "group" is a defined set of users). To do that the policy file merges into the registry, preventing users from circumventing it by simply changing back the settings.The policy file is usually distributed through a LAN, but can be placed on the local computer.

The policy file is created by a free tool by Microsoft that goes by the filename poledit.exe for Windows 95/Windows 98 and with a computer management module for Windows NT. The editor requires administrative permissions to be run on systems that uses permissions.The editor can also directly change the current registry settings of the local computer and if the remote registry service is installed and started on another computer it can also change the registry on that computer.The policy editor loads the settings it can change from .ADM files, of which one is included, that contains the settings the Windows shell provides. The .ADM file is plain text and supports easy localisation by allowing all the strings to be stored in one place.

Virtuallashtirish

INI file virtualization

Windows NT kernels support redirection of INI file-related API-lar into a virtual file in a registry location such as HKEY_CURRENT_USER using a feature called "InifileMapping".[46] This functionality was introduced to allow legacy applications written for 16-bit versions of Windows to be able to run under Windows NT platforms on which the System folder is no longer considered an appropriate location for user-specific data or configuration. Non-compliant 32-bit applications can also be redirected in this manner, even though the feature was originally intended for 16-bit applications.

Registry virtualization

Windows Vista introduced limited registry virtualization, whereby poorly written applications that do not respect the eng kam imtiyoz printsipi and instead try to write user data to a read-only system location (such as the HKEY_LOCAL_MACHINE hive), are silently redirected to a more appropriate location, without changing the application itself.

Xuddi shunday, dasturni virtualizatsiya qilish redirects all of an application's invalid registry operations to a location such as a file. Used together with file virtualization, this allows applications to run on a machine without being installed on it.

Low integrity processes may also use registry virtualization. For example, Internet Explorer 7 or 8 running in "Protected Mode" on Windows Vista and above will automatically redirect registry writes by ActiveX controls to a sandboxed location in order to frustrate some classes of xavfsizlik ekspluatatsiyasi.

The Application Compatibility Toolkit[47] beradi shimlar that can transparently redirect HKEY_LOCAL_MACHINE or HKEY_CLASSES_ROOT Registry operations to HKEY_CURRENT_USER to address "LUA " bugs that cause applications not to work for users with insufficient rights.

Kamchiliklari

Critics labeled the registry in Windows 95 a muvaffaqiyatsizlikning yagona nuqtasi, because re-installation of the operating system was required if the registry became corrupt.[iqtibos kerak ] However, Windows NT uses transaction logs to protect against corruption during updates. Current versions of Windows use two levels of log files to ensure integrity even in the case of power failure or similar catastrophic events during database updates.[48] Even in the case of a non-recoverable error, Windows can repair or re-initialize damaged registry entries during system boot.[48]

Equivalents and alternatives

In Windows, use of the registry for storing program data is a matter of developer's discretion. Microsoft provides programming interfaces for storing data in XML files (via MSXML ) or database files (via SQL Server Compact ) which developers can use instead. Developers are also free to use non-Microsoft alternatives or develop their own proprietary data stores.

In contrast to Windows Registry's binary-based database model, some other operating systems use separate Oddiy matn uchun fayllar xizmatchi and application configuration, but group these configurations together for ease of management.

  • Yilda Unixga o'xshash operatsion tizimlar (shu jumladan Linux ) that follow the Filesystem Hierarchy Standard, system-wide configuration files (information similar to what would appear in HKEY_LOCAL_MACHINE on Windows) are traditionally stored in files in /etc/ and its subdirectories, or sometimes in /usr/local/etc. Per-user information (information that would be roughly equivalent to that in HKEY_CURRENT_USER) is stored in hidden directories and files (that start with a period/full stop) within the user's home directory. Ammo XDG -compliant applications should refer to the environment variables defined in the Base Directory specification.[49]
  • Yilda macOS, system-wide configuration files are typically stored in the /Library/ folder, whereas per-user configuration files are stored in the corresponding ~/Library/ folder in the user's home directory, and configuration files set by the system are in /System/Library/. Within these respective directories, an application typically stores a property list file in the Preferences/ sub-directory.
  • RISC OS (bilan aralashmaslik kerak MIPS RISC / os ) uses directories for configuration data, which allows applications to be copied into application directories, as opposed to the separate installation process that typifies Windows applications; this approach is also used on the ROX ish stoli Linux uchun.[50] This directory-based configuration also makes it possible to use different versions of the same application, since the configuration is done "on the fly".[51] If one wishes to remove the application, it is possible to simply delete the folder belonging to the application.[52][53] This will often not remove configuration settings which are stored independently from the application, usually within the computer's !Boot structure, in !Boot.Choices or potentially anywhere on a network fileserver. It is possible to copy installed programs between computers running RISC OS by copying the application directories belonging to the programs, however some programs may require re-installing, e.g. when shared files are placed outside an application directory.[51]
  • IBM AIX (a Unix variant) uses a registry component called Ob'ekt ma'lumotlari menejeri (ODM). The ODM is used to store information about system and device configuration. An extensive set of tools and utilities provides users with means of extending, checking, correcting the ODM database. The ODM stores its information in several files, default location is /etc/objrepos.
  • The GNOME desktop environment uses a registry-like interface called dconf for storing configuration settings for the desktop and applications.
  • The Elektra Initiative provides alternative back-ends for various different text configuration files.
  • While not an operating system, the Vino compatibility layer, which allows Windows software to run on a Unix-like system, also employs a Windows-like registry as text files in the WINEPREFIX folder: system.reg (HKEY_LOCAL_MACHINE), user.reg (HKEY_CURRENT_USER) and userdef.reg.[54]

Shuningdek qarang

Izohlar

  1. ^ When applications fail to execute because they request more privileges than they require (and are denied those privileges), this is known as a limited user application (LUA) bug.

Izohlar

  1. ^ Esposito, Dino (November 2000). "Windows 2000 Registry: Latest Features and APIs Provide the Power to Customize and Extend Your Apps". MSDN jurnali. Microsoft. Arxivlandi asl nusxasi 2003-04-15. Olingan 2007-07-19.
  2. ^ a b v "The System Registry".
  3. ^ "Windows 95 Arxitektura komponentlari". www.microsoft.com. Arxivlandi asl nusxasi 2008-02-07 da. Olingan 2008-04-29. The following table shows other difficulties or limitations caused by using .INI files that are overcome by using the Registry.
  4. ^ Raymond Chen, "Why do registry keys have a default value?"
  5. ^ "Designed for Windows XP Application Specification". Microsoft. 2002-08-20. Olingan 2009-04-08.
  6. ^ "HKEY_LOCAL_MACHINE". Gautam. 2009 yil. Olingan 2009-04-08.
  7. ^ "Registry Keys Affected by WOW64 (Windows)". Msdn.microsoft.com. Olingan 2014-04-10.
  8. ^ "Description of the Microsoft Windows registry". Olingan 2008-09-25.
  9. ^ "HKEY_CURRENT_USER". Microsoft. 2009. Olingan 2009-04-08.
  10. ^ "Description of the HKEY_DYN_DATA Registry Key in Windows 95, Windows 98, and Windows 98 SE". support.microsoft.com.
  11. ^ "A Closer Look at HKEY_DYN_DATA". rinet.ru. Arxivlandi asl nusxasi on 2008-05-09.
  12. ^ "Registry hives". Olingan 2007-07-19.
  13. ^ Chen, Raymond (2011-08-08). "Why is a registry file called a "hive"?". The Old New Thing. Olingan 2011-07-29.
  14. ^ "Overview of the Windows NT Registry". Olingan 2011-12-02.
  15. ^ "Inside the Registry". Olingan 2007-12-28.
  16. ^ a b Norris, Peter (February 2009). "The Internal Structure of the Windows Registry" (PDF). Krenfild universiteti. Arxivlandi asl nusxasi (PDF) 2009 yil 29 mayda. Iqtibos jurnali talab qiladi | jurnal = (Yordam bering)
  17. ^ "Incorrect Icons Displayed for .ico Files". 2009 yil 15-noyabr. Olingan 31 mart 2012.
  18. ^ "How to Completely Uninstall / Remove a Software Program in Windows without using 3rd Party Software? - AskVG". www.askvg.com.
  19. ^ "You may receive a "STOP 0x00000035 NO_MORE_IRP_STACK_LOCATIONS" error message when you try to log on to a domain". 2011 yil 9 oktyabr. Olingan 31 mart 2012. This page tells the user to edit the registry when resolving the issue.
  20. ^ key renaming is implemented as removal and add while retaining subkeys/values, as the underlying APIs do not support the rename function directly
  21. ^ a b v d "How to add, modify, or delete registry subkeys and values by using a .reg file". support.microsoft.com.
  22. ^ "Applying Group Policy". Microsoft.
  23. ^ "Reading and Writing Registry Values with Visual Basic". Olingan 2007-07-19.
  24. ^ "REG command in Windows XP". Olingan 2007-07-19.
  25. ^ "registry manual page – Tcl Bundled Packages". www.tcl.tk. Olingan 2017-12-14.
  26. ^ "Offline Registry Library". Olingan 2014-06-04.
  27. ^ "DllInstall Function". Microsoft. 2012-03-07. Olingan 2012-03-22.
  28. ^ "Regsvr32". Microsoft. Olingan 2012-03-22.
  29. ^ "How to: Register Automation Servers". Microsoft. Olingan 2012-03-22.
  30. ^ "How to re-register PowerPoint 2000, PowerPoint 2003, PowerPoint 2007 and PowerPoint 2010". Microsoft. 2012 yil yanvar. Olingan 2012-03-22.
  31. ^ "RegNotifyChangeKeyValue function". Microsoft.
  32. ^ "Registering for Notifications". Microsoft.
  33. ^ "RegConnectRegistry function". Microsoft.
  34. ^ "How to Manage Remote Access to the Registry". Microsoft.
  35. ^ Gibson, Darril. "Chapter 4: Securing Access with Permissions". Microsoft Windows security : essentials. Indianapolis, Ind.: Vili. ISBN  978-1-118-01684-8.
  36. ^ "Application Compatibility: Windows Resource Protection (WRP)". Microsoft. Olingan 8 avgust 2012.
  37. ^ Marc Silbey, Peter Brundrett. "Understanding and Working in Protected Mode Internet Explorer". Olingan 8 avgust 2012.
  38. ^ "RegDelNull v1.1". 2006 yil 1-noyabr. Olingan 8 avgust 2012.
  39. ^ "Unable to delete certain registry keys – Error while deleting key". 2010 yil 23 mart. Olingan 8 avgust 2012. Microsoft Support page.
  40. ^ https://support.microsoft.com/en-us/help/183887/description-of-the-windows-registry-checker-tool-scanreg-exe
  41. ^ https://support.microsoft.com/EN-US/help/184023
  42. ^ "How To Backup, Edit, and Restore the Registry in Windows NT 4.0". support.microsoft.com.
  43. ^ "Technical Reference to the Registry: Related Resources". Microsoft. Olingan 2011-09-09.
  44. ^ "Microsoft Kills Automatic Registry Backups in Windows 10". ExtremeTech. Olingan 2019-07-01.
  45. ^ "How Core Group Policy Works". Microsoft. 2009 yil 2 sentyabr. Olingan 13 avgust 2012.
  46. ^ "Chapter 26 – Initialization Files and the Registry". Microsoft. Olingan 2008-03-03.
  47. ^ "Microsoft Application Compatibility Toolkit 5.0". Microsoft. Olingan 2008-07-26.
  48. ^ a b Ionescu, Mark Russinovich, David A. Solomon, Alex. "Registry Internals". Windows internals (6-nashr). Redmond, Wash.: Microsoft Press. ISBN  978-0-7356-4873-9.
  49. ^ "XDG asosiy katalogining spetsifikatsiyasi". standards.freedesktop.org.
  50. ^ "Application directories". Arxivlandi asl nusxasi 2012 yil 27 mayda. Olingan 17 may 2012.
  51. ^ a b "Case Studies Of The Top 132 Annoyances With Operating Systems Other Than RISC OS". Olingan 3 aprel 2012. Page from the riscos.com website. Mentioned in points 82 and 104.
  52. ^ "RISC OS tour". Olingan 2007-07-19.
  53. ^ "The RISC OS Products Directory". 2 Nov 2006. Archived from asl nusxasi on 19 February 2007. Olingan 1 aprel 2012.
  54. ^ 3.2. Using the Registry and Regedit (Wine User Guide)

Adabiyotlar

Tashqi havolalar