Introduction to .Reg Files
- New Page for Windows 8 .reg file examples.
- Page of .reg files, particularly suitable for Windows 7.
- Page of .reg files, particularly suitable for Vista.
This page contains examples of .reg files which will alter your Windows registry Begin by extracting the .reg file from its .zip equivalent. Once you double click the .reg and it will automatically make alterations to your registry. Where needed, you can edit the .reg file with notepad, for example, if you need to change a path or string value.
50,000+ people have read this page. Unfortunately, 2 users destroyed their machine by using the .reg files inappropriately. Rather than withdrawing this page I urge you: BEFORE using these .reg files, please read my5 Stages of Registry Hacking and in particular – check my Best Practice Summary.
Contents and Examples of .Reg Files
- Display ComputerName
- Show Security Tab (Exchange 2000)
- NoLowDiskSpaceChecks (Latest .Reg)
- How to create your own .reg files
- Windows 8 Registry Hacks
- Get Winzip
To understand what the Display ComputerName .reg file will achievecheck my example here.
This .reg file will alter the ‘My Computer’ to display the hostname and the name of the logged on user.
Note this only works if you have Exchange 2003 /2000 installed on your machine. However, it is probably one of the most useful .reg files.
What this .reg file does is to add ShowSecurityPage to the registry. The scenario is that you wish to configure the Security Tab in the properties of your Exchange Organization.
SolarWinds’ Config Generator is a free tool, which puts you in charge of controlling changes to network routers and other SNMP devices. Boost your network performance by activating network device features you’ve already paid for.
Guy says that for newbies the biggest benefit of this free tool is that it will provide the impetus for you to learn more about configuring the SNMP service with its ‘Traps’ and ‘Communities’. Try Config Generator now – it’s free!
This .reg file is useful if you wish a machine to restart without the need to logon. Naturally this is a completely insecure setting. The main business case is for AutoAdminLogon is in Libraries, or when installing machines via scripts.
Please note, that unlike the other .reg files there is no way this will work unless you edit the file because the DefaultPassword in the file is "z1!8line1".
In fact, you may better off making your own AutoAdminLogon .reg file, see the next item below.
P.S. See more about AutoAdminLogon here.
P.P.S. See more for Auto Logon in Windows 7
Are you fed up with Low Disk Space warning messages?
Note it may be better to empty the recycle bin and delete temporary internet files – first.
P.S. See more aboutNoLowDiskSpaceChecks here
What this .reg file does is add a message displaying the Build Number to the bottom right of you desktop.
Copy the instructions below into a text file, save the file with .reg extension, for example Build.reg. Then refer to How to transfer the .reg settings into the registry.
Windows Registry Editor Version 5.00
Note: this registry setting is a dword (and not a REG_SZ), consequently, observe the colon and the lack of speech marks around the 000000001.
Applying .reg files is useful, but best of all, you could create your own .reg files. Here is how you can do it:
- Launch Regedit (Start, Run, Regedit)
- Navigate to the area of the registry you are interested in.
- Select File (menu), Export and save as .reg file.
- Note: Export Range at the bottom of the diagram and choose: Selected branch.
Once you have mastered the technique to create .reg files, keep a look out for repetitive tasks where you need the same settings on multiple servers. Enabling the Security Tab on Exchange Servers is a classic use for this .reg file technique.
The main reason to monitor your network is to check that your all your servers are available. If there is a network problem you want an interface to show the scope of the problem at a glance.
Even when all servers and routers are available, sooner or later you will be curious to know who, or what, is hogging your precious network’s bandwidth. A GUI showing the top 10 users makes interesting reading.
Another reason to monitor network traffic is to learn more about your server’s response times and the use of resources. To take the pain out of capturing frames and analysing the raw data, Guy recommends that you download a copy of the SolarWindsfree Real-time NetFlow Analyzer.
Troubleshooting AutoPlay Using Regedit
Since the Local Group Policy Editor is not supplied with Windows Home editions, you will need to employ regedit to achieve the same result.
Open regedit and locate the following key:
Change: NoDriveTypeAutoRun to 0x91
If necessary create this key as a DWORD.
Increase the Number of Simultaneous Downloads
The keyword is ‘Simultaneous’, in early versions of Windows Explorer you could only download 2 files at a time. While Windows Explorer 8 increases this number to 6. Here is how edit the registry and so achieve 10.
Internet Explorer 8 Settings.
Note: dword:0000000a is ten in decimal.
Note: Observer that Internet … Explorer wraps to the next line.
Internet Explorer 7 and Lower Settings
These use FEATURE_MAXCONNECTIONSPER1_0SERVER instead of FEATURE_MAXCONNECTIONSPERSERVER
Guy Recommends: The Free IP Address Tracker (IPAT)
Calculating IP Address ranges is a black art, which many network managers solve by creating custom Excel spreadsheets. IPAT cracks this problem of allocating IP addresses in networks in two ways:
For Mr Organized there is a nifty subnet calculator, you enter the network address and the subnet mask, then IPAT works out the usable addresses and their ranges. For Mr Lazy IPAT discovers and then displays the IP addresses of existing computers.
If you need a copy of Winzip you can download an evaluation copy here.
If you like this page then please share it with your friends