Chapter 7. Registry administration
- Discovering the registry’s size
- Manipulating registry keys and values
- Discovering security settings on registry keys
- Monitoring changes on keys and values
The registry is used to contain configuration information about your Windows systems. It’s entirely separate from the information maintained by the WMI providers we discussed in chapter 3, though some of the information may overlap.
This is the point where I issue the traditional warning about being careful with the registry. If you damage the registry, you may have to rebuild your system. I’m assuming that if you’re reading this, you aren’t going to deliberately wreck your system, but do be careful. Creating a system ...