Sei sulla pagina 1di 19

Lovely Professional University

TERM PAPER Of OPERATING SYSTEM TOPIC :--HOW REGISTRY IS HELPFUL FOR


MANAGING SECURITY

SUBMITTED BY:-

ACKNOWLEDGEMENT

We cannot ach e!e an"th n# $o%th$h &e n the f e&' of techn ca& e'(cat on (nt & o% (n&e)) the theo%et ca& e'(cat on ac*( %e' n the c&a))%oo+ ) effect !e&" $e''e' to t) ,%act ca& a,,%oach that ) ta- n# ,&ace n the +o'e%n n'()t% e) an' %e)ea%ch n)t t(te. A&tho(#h an en# nee% can on&" /e )(cce))f(& th%o(#h )hee% ha%' $o%-0 /(t the cont% /(t on of h ) teache%) an' a&& tho)e $ho ha!e /een he&,f(& cannot /e o!e% &oo-e'. I a&)o e1,%e)) than-) to +" ,a%ent) $ho ,(t the % #%eat !a&(a/&e t%()t an' he&,e' +e .La)t&"0 I offe% +" %e#a%') an' /&e)) n#) to a&& of tho)e ),ec a&&" $ho )(,,o%te' +e n %e),ect '(% n# the co+,&et on of the ,%o2ect. I e1,%e)) +" 'ee, )en)e of #%at t('e to LECT. PUSHPENDRA fo% ,%o! ' n# +e %e*( ) te fac & t e) an' co%' a& at+o),he%e '(% n# +" t%a n n# ,e% o'.

33333333

What is the registry?

The registry is a database in Windows that contains important information about system hardware, installed programs and settings, and profiles of each of the user accounts on your computer. Windows continually refers to the information in the registry. You shouldn't need to make manual changes to the registry because programs and applications typically make all the necessary changes automatically. An incorrect change to your computer's registry could render your computer inoperable. Howe er, if a corrupt file appears in the registry, you might be re!uired to make changes. We strongly recommend that you back up the registry before making any changes and that you only change alues in the registry that you understand or ha e been instructed to change by a source you trust.

What is "egistry #ditor?


"egistry #ditor is a tool intended for ad anced users. $t's used to iew and change settings in the system registry, which contains information about how your computer runs. Windows refers to this information and updates it when you make changes to your computer, such as installing a new program, creating a user profile, or adding new hardware. "egistry #ditor lets you iew registry folders, files, and the settings for each registry file. %rdinarily, you don't need to make changes to the registry. The registry contains comple& system information that's ital to your computer, and an incorrect change to your computer's registry could render your computer inoperable. Howe er, a corrupt registry file might re!uire changes. We strongly recommended that you back up the registry before making any changes and that you only change alues in the registry that you understand or ha e been instructed to change.

Ho$ to o,en Re# )t%" E' to% 4

To open the registry with ele ated pri ileges, click 'tart, click All (rograms, click Accessories, right)click *ommand (rompt and then point to "un as administrator. $n the command prompt that opens, type regedit.e&e. 'ystem configuration information is stored centrally in a hierarchical database called the registry. You can use "egistry #ditor to add and edit registry keys and alues, restore the registry from a backup or to default alues, and to import or e&port keys for reference or backup. You can also print the registry and control which accounts ha e permission to edit the registry.

MANAGING THE USER REGISTRY


+anage your user registry by running arious update and,or delete tasks after you ha e configured the user registry as part of the installation and deployment process. $nitial security configuration is part of the installation instructions. This is a change from pre ious ersions of the information center. The information in this section assumes you ha e already configured the user registry as part of the installation and deployment process. $f you are looking for instructions to initially setup your user registry, refer to the $nstalling Web'phere (ortal section of the information. *lustered en ironment note- $f you are running any of the following tasks after setting up your clustered production en ironment, you will need to run an additional task to update the security settings on the secondary nodes. see *onfiguring security after cluster creation for information.

Enabling application groups Application groups is a concept that allows you to define user groups within the

database user registry with members /users or groups0 contained in the federated 12A( user registry you configured. The benefit of application groups is that you can create 3roups that are only used in $4+ Web'phere (ortal.

Managing your user registry on AIX After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Managing your user registry on an H !"X After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Managing your user registry on i#$O%


After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a

property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Managing your user registry on Linu&


After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Managing your user registry on %olaris


After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Managing your user registry on Win'o(s


After installing and deploying $4+ Web'phere (ortal, which includes installing and configuring the user registry, you can manage the user registry by running arious update and,or delete tasks. These tasks include, but are not limited to, adding a property e&tension /lookaside0 database, updating or deleting the entity type, and deleting the registry.

Add a "egistry 5ey

To find or change any entry in the registry, use "egistry #ditor. %nce you ha e opened "egistry #ditor, you can proceed to add a registry key. *aution

$ncorrectly editing the registry may se erely damage your system. 4efore making changes to the registry, you should back up any alued data on your computer. 6ote $f you make a mistake that results in your computer not starting properly, you can restore the registry. 7or instructions, see "estore the "egistry. To add a registry key 8. $n "egistry #ditor, click the registry key under which you would like to add a new key.
5. *lick 6ew on the #dit menu and then click 5ey.

9. Type a name for the new key and then press #6T#".

To change a alue 8. $n "egistry #ditor, click the entry you want to change.
5. %n the #dit menu, click +odify. 6. $n :alue data, type the data for the alue and then click %5.

6ote To make changes to a registry key, you must ha e the appropriate permissions. 7or more information about permissions and security in this ersion of Windows, search Help and 'upport for ;'ecurity best practices.; To find a string, alue, or key
7. $n "egistry #ditor, click 7ind on the #dit menu. 5. $n 7ind what, type the string, alue, or key you want to find. 6. 'elect the 5eys, :alues, 2ata, or +atch whole string only check bo&es to match the

type of search you want, and then click 7ind 6e&t. 6ote To repeat the search, press 79.

#&porting registry files


To e&port all or part of the registry remotely, use "egistry #ditor. %nce you ha e opened "egistry #ditor, you can e&port the registry to a te&t file or to a hi e file. You can use a te&t editor like 6otepad to work with registry files you create by e&porting. You can sa e registry files in the Windows format, as registration files, as binary hi e files, or as te&t files. "egistry files are sa ed with .reg e&tensions, and te&t files are sa ed with .t&t e&tensions. #&port all or part of the registry 8. %pen "egistry #ditor. $f you want to sa e only a particular branch, select it.
5. %n the 7ile menu, click #&port<. 6. $n 7ile name, enter a name for the registry file. 8. $n 'a e as type, select the file type you wish to use for the sa ed file /registration file,

registry hi e file, te&t file, Windows =>,6T?.@ registration file0.


9. $n #&port "ange, use the radio buttons to select whether you want to e&port the entire

registry or only the selected branch.


:. *lick 'a e.

"egistry #ditor pro ides a number of commands that are designed primarily for maintaining your system. 7or e&ample, 1oad Hi e and Anload Hi e allow a part of your system to be temporarily downloaded onto another computer for maintenance. 4efore a hi e can be loaded or restored, it must be sa ed as a key, either to a floppy disk or to your hard disk.

$mporting registry files


The $mport< command in "egistry #ditor can import registry files of all types, including te&t files and hi e files.

$mport some or all of the registry 8. %pen "egistry #ditor.


5. %n the 7ile menu, click $mport<. 6. 7ind the file you want to import, click the file to select it, and then click %pen.

6ote $n Windows #&plorer, double)clicking a file with the .reg e&tension imports the file into the computer's registry. *aution A restored hi e o erwrites an e&isting registry key and becomes a permanent part of your configuration. 7or e&ample, to perform maintenance on part of your system, you can use #&port< to sa e a hi e to a disk. When you are ready, you can then use $mport< on the 7ile menu to restore the sa ed key to your system

To print all or part of the registry 8. %pen "egistry #ditor. B. *lick the computer or top)le el key of the registry area you want to print.
6. %n the 7ile menu, click (rint<.

?. 2o one of the followingo o

*lick All to print the entire registry. *lick 'elected 4ranch and type a particular branch in the te&t bo& to print only part of the registry.

9. *lick %5.

6ote The a erage registry can take hundreds of pages to print. *onsider printing only those branches you need.

"estore the "egistry

$f certain keys or alues in the registry key H51+C'ystemC*urrent*ontrol'et are deleted or gi en incorrect alues, the registry may need to be restored before you can continue using the computer. To restore the registry 8. (rint these instructions. /$f you are reading these instruction in Windows Help and 'upport, click the print icon.0 They will not be a ailable after you shut down your computer in step 9. B. %pen "egistry #ditor.
6. *lick 'tart, point to the right)pointing arrow icon, and then click 'hut 2own. 8. 'tart the computer. When you see the message (lease select the operating system to

start, press 7>.


9. Ase the arrow keys to highlight 1ast 5nown 3ood *onfiguration and then press

#6T#". 6A+ 1%*5 must be off before the arrow keys on the numeric keypad will function. D. Ase the arrow keys to highlight an operating system, and then press #6T#".

"egistry 5ey 'ecurity and Access "ights

;. The Windows security model enables you to control access to registry keys. 7or more

information about security, see Access)*ontrol +odel.


<. You can specify a security descriptor for a registry key when you call the

"eg*reate5ey#& or "eg'et5ey'ecurity function. $f you specify 6A11, the key gets a default security descriptor. The A*1s in a default security descriptor for a key are inherited from its direct parent key.

=. To get the security descriptor of a registry key, call the "eg3et5ey'ecurity,

3et6amed'ecurity$nfo, or 3et'ecurity$nfo function.


7>. The alid access rights for registry keys include the 2#1#T#, "#A2E*%6T"%1,

W"$T#E2A*, and W"$T#E%W6#" standard access rights. "egistry keys do not support the 'Y6*H"%6$F# standard access right. 88. The following table lists the specific access rights for registry key obGects. :alue +eaning *ombines the 'TA62A"2E"$3HT'E"#HA$"#2, 5#YEHA#"YE:A1A#, 5#YE'#TE:A1A#, 5#YEA11EA**#'' /@&7@@970 5#YE*"#AT#E'A4E5#Y, 5#YE#6A+#"AT#E'A4E5#Y', 5#YE6%T$7Y, 5#YE*"#AT#E1$65 /@&@@B@0 5#YE*"#AT#E'A4E5#Y /@&@@@?0 5#YE#6A+#"AT#E'A4E5#Y' /@&@@@>0 5#YE#I#*AT# /@&B@@8=0 5#YE6%T$7Y /@&@@8@0 5#YEHA#"YE:A1A# /@&@@@80 and 5#YE*"#AT#E1$65 access rights. "eser ed for system use. "e!uired to create a subkey of a registry key. "e!uired to enumerate the subkeys of a registry key. #!ui alent to 5#YE"#A2. "e!uired to re!uest change notifications for a registry key or for subkeys of a registry key. "e!uired to !uery the alues of a registry key. *ombines the 'TA62A"2E"$3HT'E"#A2, 5#YEHA#"YE:A1A#, 5#YE#6A+#"AT#E'A4E5#Y', and 5#YE6%T$7Y alues. "e!uired to create, delete, or set a registry alue. $ndicates that an application on D?)bit Windows should operate on the 9B)bit registry iew. 7or more information, see Accessing an Alternate "egistry :iew. 5#YEW%WD?E9B5#Y /@&@B@@0 This flag must be combined using the %" operator with the other flags in this table that either !uery or access registry alues. Windows B@@@- This flag is not supported. 5#YEW%WD?ED?5#Y /@&@8@@0 $ndicates that an application on D?)bit Windows should

5#YE"#A2 /@&B@@8=0

5#YE'#TE:A1A# /@&@@@B0

operate on the D?)bit registry iew. 7or more information, see Accessing an Alternate "egistry :iew. This flag must be combined using the %" operator with the other flags in this table that either !uery or access registry alues. Windows B@@@- This flag is not supported. *ombines the 'TA62A"2E"$3HT'EW"$T#, 5#YEW"$T# /@&B@@@D0 5#YE'#TE:A1A#, and 5#YE*"#AT#E'A4E5#Y access rights. 8B.
76. When you call the "eg%pen5ey#& function, the system checks the re!uested access

rights against the key's security descriptor. $f the user does not ha e the correct access to the registry key, the open operation fails. $f an administrator needs access to the key, the solution is to enable the '#ETA5#E%W6#"'H$(E6A+# pri ilege and open the registry key with W"$T#E%W6#" access. 7or more information, see #nabling and 2isabling (ri ileges.
78. You can re!uest the A**#''E'Y'T#+E'#*A"$TY access right to a registry key if

you want to read or write the key's system access control list /'A*10. 7or more information, see Access)*ontrol 1ists /A*1s0 and 'A*1 Access "ight.
79. To iew the current access rights for a key, including the predefined keys, use the

"egistry #ditor /"egedt9B.e&e0. After na igating to the desired key, go to the #dit menu and select (ermissions.

HOW Re# )t%" ) he&,f(& n )ec(% t"


$f youJre in ol ed in data security, youJre familiar with cryptography in some fashion and you know that ciphers ) algorithms for performing encryption and decryption ) are what do

the work. You probably also know that there are a few !uick)and)dirty algorithms for encrypting data. %ne such algorithm is known as the *aesar *ipher, or "%T)89, a simple algorithm that encrypts data by shifting each character 89 places in the alphabet while lea ing non)alpha characters untouched. $tJs so simple that you can decrypt it manually, but itJs enough to fool the casual obser er. Anyone coming across something like cnffG be!sb egurf rperg s yrf fcnf fGbe!, is naturally going to assume itJs encrypted. in fact, itJs "%T)89 for password for the secret files is password. $ broke it up into fi e)character groups to make it more con incing.

7or whate er reason, +icrosoft uses "%T)89 to encrypt data in some registry keys. %ne such key is- H5*AC'oftwareC+icrosoftCWindowsC*urrent:ersionC#&plorerCAserAssist. HereJs an e&ample- KH"F"E#HA*63A-(-CA7Y44IH*."5".L 2ecrypted, thatJs KA#+#E"A6(ATH-*-C6'1%%5A(.#I#.L /WeJll look at the AserAssist key in (art 9.0 A better way to hide data is to encode te&t)based information in binary format and store it in binary form as a string in registry alues of type "#3E'F. 3i en that binary data is common in the registry, the techni!ue would make it e&tremely difficult to retrie e the hidden information.

$n addition to using "%T)89 and binary encoding to obfuscate data, a suspect could take ad antage of a flaw in the registry editor to also make the data in isible to anyone but a forensics e&aminer who knows about the flaw. 7rom K7orensic Analysis of the Windows "egistry-L The Windows B@@@ and I( "egistry #ditor /regedit.e&e or regedt9B.e&e0 ha e an implementation flaw that allows hiding of registry information from iewing and editing, regardless of users access pri ilege /'ecunia, B@@M0. The flaw in ol es any registry alues with name from BMD to BM= /ma&imum alue name0 characters long. The o erly long registry alue /regardless of type0 not only hides its own presence, but also subse!uently created alues /regardless of type0 in the same key /7ranchuk, B@@M0. The editor stops displaying the remaining of the alues thinking the o erly long alue as the last alue in that key. 'uspect could e&ploit such "egistry #ditor flaw to hide information. The Windows console registry tool /reg.e&e0 can display these o erly long registry alues so the hidden data can be reco ered as e idence. howe er, gi en the sheer number of entries in the registry, this process is not tri ial. :ery few people are aware about e en the e&istence of the windows registry of the computer, let alone the utility of registry cleaning. This is the central database of the system that stores information about the computer. All the details about the hardware that make up the system and the software that runs on the system as well as the software that runs the hardware stored in this database called the registry. This system database records all the acti ity that takes place on the system. This can be regarding which user logged on to the system to the time when the user logged off. $t e en records what sites were isited and what was downloaded. This means that the operating system keeps on adding to the information in its database and so it must grow as the days go by. $n the bargain the system database will grow to such a siNe with redundant and useless information that the speed of scanning the registry for information that is called up by some program will be much more than the speed of the processor and so the system will become sluggish and slow. Here is where the knowledge of how to use a registry repair software will come handy to you. To enhance the security of the Windows +anagement $nstrumentation /W+$0 shared pro ider host process /wmipr se.e&e0, changes were made to Windows platforms that secure

the pro ider host process with a ser ice security identifier /'$20. These changes introduce the following running modes for the W+$ shared host- secure and compatible. The following sections are co ered in this topic

Sec(%e an' Co+,at /&e Mo'e) Re# )t%" ?e") an' @a&(e) Conf #(% n# a P%o! 'e% to R(n n Sec(%e o% Co+,at /&e Mo'e

Sec(%e an' Co+,at /&e Mo'e)

'tarting in Windows O, the following two running modes for the W+$ shared host process were addedSec(%e +o'e

W+$ pro ider host process resources are secured with a ser ice '$2. %nly the ser ice '$2 has permissions for these resources.
Co+,at /&e +o'e

The W+$ shared pro ider host process is not secured with a ser ice '$2. The pro ider host process allows access to the 6etwork'er ice or 1ocal'er ice accounts depending on the hosting model. 7or more information about hosting models, see (ro ider Hosting and 'ecurity.
W n'o$) AP $ th SP5 an' &ate%0 a&& !e%) on) of W n'o$) Se%!e% 5>>60 W n'o$) @ )ta0 an' W n'o$) Se%!e% 5>><: To acce)) the %e# )t%" -e") an' !a&(e) fo% cont%o&& n# )ec(%e an' co+,at /&e +o'e) fo% the ,%o! 'e% ho)t ,%oce))0 "o( +()t n)ta&& the )ec(% t" (,'ate n ?B =9=898. Fo% +o%e nfo%+at on0 )ee the M c%o)oft Sec(% t" B(&&et n MS>=->75.

What $s A "egistry *leaner?

$t is a software that scan the registry of the system and identify broken links, files, fonts, and any information that is not in any way needed or used by the system but is Gust lying there taking up disk space and slowing down the registry operations. 7ree +icrosoft registry cleaner, ensuing, (* and e&press are some names associated with the registry maintenance software. The program will identify and select such components and then prompt you to clean or repair the registry by clicking on the appropriate link. How 2oes A "egistry *leaner Work? %nce you ha e downloaded the registry cleaning program from the site onto your computer you will ha e to install it. The program must be compatible to the resident operating system. $nstallation of such programs is high on ease and takes a ery less time. $f you are using I( you will not ha e to reboot the system for the program to work. *licking on the e&e program will launch it. This is usually a link on the desktop. The program interface will prompt you to scan the registry by clicking on 'scan registry' link. The scanning process will take about three minutes to scan the registry and then display the redundant links on the page. Then it will ask you to 'repair the registry by clicking on the 'repair' link. This process takes a couple of seconds. When you reboot your system the computer will be running more smoothly and efficiently because the Gunk has been remo ed from the system by the windows registry cleaning software. Author is admin and technical e&pert associated with de elopment of computer security and performance enhancing software like "egistry *leaner, Anti 'pyware, Window *leaner, Anti 'pam 7ilter. 1earn how clean registry increase efficiency of computer. :isit our Home page or "esource *enter to read more about products and download free trial of a range of security and performance enhancing software like

Windows "egistry *leaner Anti 'pyware and Anti Adware Windows and $nternet *leaner Anti 'pam 7ilter for +' %utlook Anti 'pam 7ilter for %utlook #&press

You' e probably heard it somewhere before. Your registry is what keeps all of the information that your computer needs to be able to run all the programs you' e installed and e en the basic functions of your operating system. %ne can ne er emphasiNe enough the importance of keeping this registry in great shape. 6either can one downplay the importance of registry cleaners. As the brain of the computer is said to be the *(A, the registry shall be called the heart of your computing life. Without it or with a failing registry, you'll probably be failing as far as your documentation and storage re!uirements are concerned. That's because with a bungled registry, you ha e a bungling computer and e erything Gust tends to fall down like a domino. 6eedless to say, the registry has to be kept in perfect shape all the time lest you run the risk of putting your precious files in danger. 'o what can you do to make your registry as perfect as it could be? *lean it, of course, but this is not something you can can Gust take for granted. When choosing a registry cleaner, make sure it's something that will actually make your computer perform better and not ha e things ending up compromising the stability of your system. Anless you're a pro, you're definitely going to need a program that will clean your registry so you can keep at a good siNe, meaning, free of unwanted elements such remnant files from software you' e installed and uninstalled pre iously or dri ers you no longer need. This could also mean ridding your system of possible digital contaminants you may ha e unknowingly downloaded from the $nternet like iruses, worms or TroGans. $t's important to realiNe that as you use your computer o er time, your registry tends to accumulate files that it doesn't really need. This is part of the computing e&perience as far as that registry is concerned. Howe er, you can do your part by cleaning it regularly so it could be kept at a healthy siNe, a siNe that won't make your computer take fore er to perform a task, a siNe that will make you confident that you are going to finish before deadline because you' e got a registry that won't be gi ing you lagging problems. $f you care about time and the precious moments that you could be losing Gust by waiting for your snail)paced computer to start up, you're going to ha e to install a registry cleaner. Pust don't get anything that sounds or looks good, though. You ha e to make a research on which

brands ha e been satisfying clients and to what degree. And how else to capture a ery accurate of this than to check re iew sites.

W n'o$) Re# )t%" FAB


Fact) a/o(t the M c%o)oft W n'o$) Re# )t%"

$n spite of the fact that the "egistry is an essential part of the Windows operating system and is in constant use, most (* users ha e little knowledge of it. $n fact, an aura of mystery has grown up around the "egistry. $n order to help a erage (* users understand the "egistry better, here are some short answers to fre!uently asked !uestions. +ore details will be found on the other pages of this site.
What ) the W n'o$) Re# )t%"4

The Windows "egistry is a central hierarchical database containing all the aried assortment of information needed for the computer to run both the hardware and the software.
Wh" 'oe) W n'o$) nee' a Re# )t%"4 Othe% o,e%at n# )")te+) 'onCt ha!e one.

All operating systems need a way to store information about the system. There is more than one way to do this and Apple and 1inu& ha e chosen a different method. %riginally, Windows kept information in a large number of separate $6$ files scattered throughout the system. Then, beginning with Windows =M, +icrosoft decided to centraliNe the information.
What 'o I nee' to -no$ a/o(t the Re# )t%"4

# eryone should know how to back up and restore the "egistry. +ore e&perienced (* users can learn how to make their system run better by maintaining and tweaking the "egistry.
I) the Re# )t%" a f &e that I can &oo- at4

The "egistry is actually a number of binary files. They are not directly accessible. Howe er, rele ant parts are combined in a single hierarchical presentation that can be iewed with the Windows utility called the "egistry #ditor.
What 'o I )ee f ()e the Re# )t%" e' to%4

$nformation in the "egistry is arranged in a tree)like system akin to folders and files. $n the "egistry, the containers for information are called ;keys;. These are analogous to folders. 5eys can ha e subkeys Gust as folders can ha e subfolders. The name of data that is contained in a key is called a ; alue;. This is something analogous to a file name. The actual data can ha e se eral formats and may be a string, a number, or a series of numbers.
I)nCt t 'an#e%o() to to(ch the Re# )t%"4

As long as the "egistry is always backed up first, Gudicious editing of the "egistry can be undertaken. %b iously, wholesale or random editing would not be ad isable. 1earn how to safely edit or tweak the "egistry on this page.
I canCt f n' the Re# )t%" E' to% n the P%o#%a+) +en(. Whe%e ) t4

1ike a number of Windows system utilities, the "egistry #ditor is not listed in the (rograms menu. To open it, enter ;regedit; in the 'tart)"un line or the 'tart search line.
What ,%o/&e+) can the Re# )t%" ha!e4

4ecause the "egistry is in constant use and has entries from almost anything installed on Windows, it can gradually accumulate unnecessary, corrupted, or broken entries. This can cause decreased system performance. +alware infections also affect the "egistry.
Ho$ 'o I a!o ' Re# )t%" ,%o/&e+)4

3uard against spyware and adware. A oid installing too many unneeded programs. Ase thorough ways to uninstall discarded programs. Ase methods described on this page to keep the "egistry clean.
Ho$ 'o I f 1 o% %e,a % a Re# )t%" ,%o/&e+4

7irst, try using Windows 'ystem "estore to take the "egistry back to a pre ious ersion. $f you ha e an additional backup, try that.. As a last resort, use a "egistry cleaner to try to fi& the problem.

Potrebbero piacerti anche