The registry is a hierarchiral database that contains virtually all information about your computer's configuration. Under previous version of Windows, those settings were contained in files like config.sys, autoexec.bat, win.ini, system.ini, control.ini, and so on. From this you can understand how important the registry is.
The registry editor is a utility by the filename regedit.exe that allows you to see, search, modify and save the registry database of Windows. The registry editor does not validate the values you are writing: it allows any operation. Therefore the registry editor does not show any error messages. To launch the registry editor just run regedit.exe.
The registry is divided into keys and subkeys. Each key contains a value entry, each one has a name, a type or a class and the value itself. The name is a string that identifies the value to the key.
As you see in the registry editor, the registry is divided into five principal keys: there is no way to add or delete keys at this level. Only two of these keys are actually saved on the hard disk: HKEY_LOCAL_MACHINE and HKEY_USERS. The other are just branches of the main keys or are dynamcally created by Windows.
HKEY_LOCAL_MACHINE
This key contains any hardware, applications and services information. Several hardware information is updated automatically while the computer is booting. The data stored in this key is shared with any user.
HKEY_CLASSES_ROOT
This key is an alias of the branch HKEY_LOCAL_MACHINE\Software\Classes and contains OLE, drag'n'drop, shortcut and file association information.
HKEY_CURRENT_CONFIG
This key is also an alias. It contains a copy of the branch HKEY_LOCAL_MACHINE\Config, with the current computer configuration.
HKEY_DYN_DATA
Some information stored in the registry changes frequently, so Windows maintains part of the registry in memory instead of on the hard disk. For example, it stores PnP information and computer performance.
HKEY_USERS
This inportant key contains the sub-key. Default and another key for each user that has access to the computer. If there is just one user only default key exists. Each sub-key maintains the preferences of each user, likethe desktop colours, the fonts used, and also the settings of many programs.
HKEY_CURRENT_USER
It is an alias to current user of HKEY_USERS. If your computer is not configured for multi-users' usage,' it points to the subkey. Default of HKEY_USERS.
Tuesday, 29 May 2007
Sunday, 20 May 2007
Request for Comment
The most exhaustive resource for all aspiring web geeks or hackers is something called RFC or Request For Comment. RFCs basically started out as discussion groups during the days of Arpanet.
RFCs are online textfiles which have been writen by some computer geeks. They contain the most comprehensive guides to how the networks or the internet works.
An ideal situation would be that you memorise all the RFCs and learn them by heart. For those of you who need to take time out of sleep and eat and who don't have tonnes of free time? Well, for them, there is a complete list of RFCs with their numbers and titles. The best foolproof way of seeking a RFC is to use your favourite search engine. Say, if you want RFc821, then simply type in 'RFC 821' into the search field.
In fact there is also a RFC on RFC! Yes, RFC 825 is meant to clarify the status and all your doubts about other RFCs.
For a complete list of RFCs visit antionline.com
There is also something called FYI, which stands for For Your Information. They provide an easier guide to what RFCs explain. to learn more about FYIs and to find out where to get them read the RFC on FYIs (RFC 1150).
RFCs are online textfiles which have been writen by some computer geeks. They contain the most comprehensive guides to how the networks or the internet works.
An ideal situation would be that you memorise all the RFCs and learn them by heart. For those of you who need to take time out of sleep and eat and who don't have tonnes of free time? Well, for them, there is a complete list of RFCs with their numbers and titles. The best foolproof way of seeking a RFC is to use your favourite search engine. Say, if you want RFc821, then simply type in 'RFC 821' into the search field.
In fact there is also a RFC on RFC! Yes, RFC 825 is meant to clarify the status and all your doubts about other RFCs.
For a complete list of RFCs visit antionline.com
There is also something called FYI, which stands for For Your Information. They provide an easier guide to what RFCs explain. to learn more about FYIs and to find out where to get them read the RFC on FYIs (RFC 1150).
Saturday, 19 May 2007
Whats ahead..
Before I begin, i would like to say that whatever little i know as been drived from the books I've read and from my friends especially Divye (Comp.Sc. IIT-R). Most of the information I'll be puting up would come from the book of my favourite author Ankit Fadia. I hope that whatever i can share through my blog with you proves helpful. I shall try to cover even the basic of most of the fundas which is often skipped by most books and remains in the dark.
As you'd see that next post is the first step that any learner takes... Finding Information on the Net.
As you'd see that next post is the first step that any learner takes... Finding Information on the Net.
Friday, 18 May 2007
Finding Information On the Net
The internet is th most exhaustive and comprehensive library of information and knowledge.It is really easy to get lost in this gigantic resource.
Let us first consider search engines. Knowing about the best search engines and knowing how to use them efficiently are two completely different things. Try typing 'hacking', 'cracking', 'hacker' or even 'learn to hack' into any of them. You would find zillions of websites and newsgroups posts to read from. You need to figure out how to use the search engines to get what you want and not what they have to offer to you. Using quotes (" ") you can narrow down the search parameters and and make the search more specific.
Using Boolean Logic, (yes, i know this may come as a surprise to most guys who still find it difficult to figure out the uses of boolean algebra) can also narrow down the search parameters, making the results more spedific and efficient. For example, searching for 'hacking - exploits' will give results with information on hacking but no information on exploits. Similarly + an NOT can be used to narrow down the search criteria.
Let us set aside search engines for a moment. Let us consider mailing lists. These lists are a great way of exchanging information with both experienced hackers and wannabe hackers from around the world. But again, like every dark alley of the internet, on each list there is at least one obnoxious overly smart egoistic pretentious boaster who tries to prove his mental superiority by either using foul or impolite rantings. Ask them a question, even a good one, and you are likely to be flamed (they would be perhaps sensible enough not to mailbomb you).
I feel that the best way to learn anything is by asking as many questions as possible. Sometimes even the dumbest questions elicit some some really interesting answers. So feel free to put up as many querries as you want.
Let us first consider search engines. Knowing about the best search engines and knowing how to use them efficiently are two completely different things. Try typing 'hacking', 'cracking', 'hacker' or even 'learn to hack' into any of them. You would find zillions of websites and newsgroups posts to read from. You need to figure out how to use the search engines to get what you want and not what they have to offer to you. Using quotes (" ") you can narrow down the search parameters and and make the search more specific.
Using Boolean Logic
Let us set aside search engines for a moment. Let us consider mailing lists. These lists are a great way of exchanging information with both experienced hackers and wannabe hackers from around the world. But again, like every dark alley of the internet, on each list there is at least one obnoxious overly smart egoistic pretentious boaster who tries to prove his mental superiority by either using foul or impolite rantings. Ask them a question, even a good one, and you are likely to be flamed (they would be perhaps sensible enough not to mailbomb you).
I feel that the best way to learn anything is by asking as many questions as possible. Sometimes even the dumbest questions elicit some some really interesting answers. So feel free to put up as many querries as you want.
gettin started..
hi,
my next couple of posts would include some useful information for the newbies(like myself) who want to be hackers or would like to get their hands wet in some serious programming.
so here it goes!!
my next couple of posts would include some useful information for the newbies(like myself) who want to be hackers or would like to get their hands wet in some serious programming.
so here it goes!!
Wednesday, 16 May 2007
Subscribe to:
Posts (Atom)