Monday, September 27, 2010

Export and the introduction of the registry


Export and the introduction of the registry
Registry is stored in binary on the hard disk. When we modify the registry will inevitably cause problems, even fatal failure. Then back up the registry file and restore the very significance. In addition, you can be in the registry of a primary key or subkey is saved as a text file, and print it out, to study the structure of the registry.
Export Registry File
As a backup, we can Regedit Editor, click "Registry" menu under "Export Registry File" command, and select the Export range "All", will back up the registry file on your hard disk. As a general back-up, in Regedt32 be completed on, such as saving a root key, or a primary key (a key).

In the Registry Editor Regedt32 to save data within the registry, you can save root key, primary key or a subkey. First choice to save the primary key or subkey, and then click the "Registry / Save Key" command, as shown:


Then pop-up "Save Key" dialog box, where you want to save the registry file input file name, extension generally use the REG, shown in Figure:


As some of the primary key or subkey, and because different users use, or is the primary key or subkey is used by the system will be prompted to disable access to the warning, as shown:


If you are a system administrator, for some primary key or subkey can give permission for, such as editing the registry settings for a user permission to modify the printer. Operation, please click the "security" menu under "permissions" command, as shown:


A "registry key permissions" dialog box, select the name of a particular user, and then in the "Access Type" drop-down list, select the access type, as shown:


There are three access types, namely: "read", "Full Control", "selective access." Selected the options and then click Full Control "OK" button.
If you want to view to modify a primary key or a subkey of the owner's name, in the "Security" menu, select "owner" command, will pop up a dialog box as shown below, if you are using the system of permissions than the user higher authority, click the "take ownership" button to the primary key or subkey to modify, as shown:


Otherwise, the owner can only view, and then click "Close" button?.

We can also export the registry file as a text file, the operation of the method is to use the mouse to select "Registry / subdirectory tree will save as" command, and name it as TXT file extension, then click " Save "button. So that we can use WordPad or Notepad Windwos view.

The introduction of the registry file
There are two ways to introduce the registry file, one is available to restore a primary key is the use of previously backed up registry files or other sources through the registry file to overwrite the existing primary key.

Operation, please click the "Registry" menu under "restore" command, and "restore item" window, select to restore the registry files (note the selected file is now selected the contents of the same primary key), Finally, click "Open" button, as shown:


Will bring up a "warning" dialog box, shown in Figure:


The dialog box asking whether to overwrite the existing primary key of the operation, attention is to restore the currently selected item, the two elements must be consistent.
Another method is to load into the hive, please use the mouse to select a primary key, then select "Registry" menu under "Load Hive" command (and restore the difference is that it introduces the primary key may be registered table does not have, please note the difference between the two), as shown:


Then in the "Load Hive" dialog select the registry file to load, as shown:


Click "Open" button, a "Load Hive" dialog box, in the dialog box "item name" text entry box enter the name of the new primary key, as shown:


Then click "OK" button, so you find the primary key of the following in the current emergence of a new primary key (. NEWUSER), shown in Figure:


In order to unload the hive is very simple (note that before uninstalling the primary key for backup), select the primary key, click the "Registry / Unload Hive" command, as shown:


Editing program will prompt you to uninstall operation, as shown:


Click "Yes (Y)" button on the primary key will be deleted from the registry (but note that some important software, hardware, information can not be unloaded off of).








Recommended links:



Using PHOTOSHOP make Windows logo



Kids EDUCATION introduction



MKV to FLV



China Unicom next month to adjust the proportion of SP into



What is courseware?



Hong Kong PCCW PRIVATIZATION Commission will vote by sealed-depth inquiry



QT To WMV



To expose the fraud: WinRAR to compress 775MB 13.4MB



Compare Desktop



Computer Fraud, although he is alleged to have bought



message oriented MIDDLEWARE based data



Domain name will be the first time Chinese and other non-Latin alphabet and opening support 11 langu



VOB to FLV



Thursday, September 16, 2010

Is out of date, ADSL Anecdotes


ADSL (Asymmetric Digital Subscriber Line) stands for asymmetric digital subscriber line, is called a non-symmetric, is due to the realization rate is up less than 1Mbps, down less than 7Mbps. It is a home or small business can make use of the existing telephone network with high-frequency digital compression for network service providers ISP for broadband access technology. This access method so it is a non-symmetrical manner, from ISP-ended client (downlink) requires large bandwidth to support, but from the client to the ISP side (upstream) bandwidth of only a small amount can be.

ADSL principle introduced

ADSL modem and ISDN and traditional as well as the transmission medium using the telephone network. When the two ends of a pair of telephone lines were in place an ADSL device, the use of modern frequency modulation and coding, this phone line will be able to create three information channels: a high-speed downlink channel (1.5 1.8Mbps), one is the speed duplex channel, one is the ordinary telephone channel, and these three channels can work simultaneously. That is, it can get the most out of existing telephone line data transmission capacity, so users can access a telephone line not only fast-track "Surf", you can call to send a fax, call or reduced without affecting the effect of Internet . Specific work flow is: ADSL Modem encoded by the signal transmitted through the telephone line telephone office and then by a signal recognition / separator, if it is transmitted voice signal on the telephone switch, if the digital signal to access Internet.

See Figure 1, ADSL service is composed mainly of the following:



Figure 1 ADSL diagram

* ATM Backbone (ATM backbone): is the ISP to provide broadband services to the core backbone network, is the intersection of all data. Not only provides high bandwidth, and because ATM has its own advantages, making use of the channel and data exchange more efficient.

* DSLAM (DSL ATM multiplexer): This is the central office equipment to provide ADSL services. Central Office on a similar program-controlled switches.

* Telephone lines to provide services: the current ADSL services provided through the normal analog telephone line that carries voice and data services. People were asked whether the ISDN line will be converted into ADSL line, in fact, provide ISDN is a digital transmission, and ADSL must rely on analog circuit implementation.

* Voice, data separation / integrator: This is an important part of the output in the central office DSLAM ADSL central office line and voice line when the device is integrated through a transmission line. To the client and then separated by a similar device to form a data line, a voice line.

* ADSL CPE equipment (ADSL customer premises equipment): This is a user-purchase or lease of equipment to the central office. Usually ADSL Modem or ADSL Router.

Some of the problems on the ADSL

* ADSL in the end be able to provide much speed? See from Figure 2, ADSL lines using a frequency higher than the Mandarin audio line (4400kHz), up to 1MHz. Therefore, to provide 8Mbps maximum bandwidth.



Figure 2 ADSL lines over the frequency of use of 4400Hz

* ADSL there are no weaknesses? It is susceptible to interference, high requirements for the line, with the cable length increases the quality of subsequent deterioration of data transmission.

* ADSL is not an outdated technology?

In fact, the application of each technique has its surface, just as Bluetooth technology is the same as 10 meters for communication, and wireless local area network suitable for a wider range communication. I believe that, ADSL as an ordinary telephone line can transfer the technology itself has very good flexibility, that is, each ADSL phone users are directly applicable. Also for home users and small and medium enterprises do not need a guarantee by buying bandwidth of 10M FTTB access the Internet, as 10M itself is virtual, if it is the commitment rate, then ISP, ISP to guarantee the export of the Internet bandwidth, this cost is not generally Users can affordable.






Recommended links:



Secret benefits to customers Shi Xiaoen



youtube video formats



Using filter effects create fantastic images



Dell shipped the wrong price is not the Defendant of fraud: frozen funds



dvd to Mp4 converter



Firefox Download break 5 million mark will be issued a LIMITED edition of 50 sets of



Windows media player vob



Talent On: A New Maxima



PSP mp4 converter



Good Recreation



Do Not Heat To High Speed Fully Raiders Summer Thunder



Reflection: Dealers genuinely listened to recruitment



Dell second quarter profit by 28 PERCENT cited dissatisfaction with the price war has hurt revenue



Hot Clipboard Tools



Review Password Managers



Interview with B & Q (China) Vice President, HUMAN Resources Director Miss Hu Weiyan