Introduction to Changing Registered Owner
The purpose of this registry hack is to change the Registered to: as seen in the system icon. The scenario is that the wrong person has been assigned the registered owner. Perhaps the company had been merged or taken over.
Our Task – to find and change the Registered Owner
When it comes to making changes to the registry, I favour Regedit over RegEdt32, because Regedit has a much better find, it also remembers the last place you visited. To me, RegEdt32 is clunky, and more difficult to use.
Method Use the Find (menu) in Regedit, but be prepared to use F3 if you do not get to the RegisteredOwner at first.
Note RegisteredOwner is all one word with no spaces.
Alternative Method: Drill down to: HKLM\Software\Microsoft\WindowsNT\CurrentVersion\RegisteredOwner
Note the path at the bottom of the diagram.
Second Objective change RegisteredOwner
Double Click RegisteredOwner then change the value to what you want. Re-open the System Icon and check your new value
Bonus Objective change RegisteredOrganization
Just above the RegisteredOwner, you will see a REG_SZ RegisteredOrganization, why not change this as well to reflect your preference.
SolarWinds’ Config Generator is a free tool, which puts you in charge of controlling changes to network routers and other SNMP devices. Boost your network performance by activating network device features you’ve already paid for.
Guy says that for newbies the biggest benefit of this free tool is that it will provide the impetus for you to learn more about configuring the SNMP service with its ‘Traps’ and ‘Communities’. Try Config Generator now – it’s free!
LEM will alert you to problems such as when a key application on a particular server is unavailable. It can also detect when services have stopped, or if there is a network latency problem. Perhaps this log and event management tool’s most interesting ability is to take corrective action, for example by restarting services, or isolating the source of a maleware attack.
Yet perhaps the killer reason why people use LEM is for its compliance capability, with a little help from you, it will ensure that your organization complies with industry standards such as CISP or FERPA. LEM is a really smart application that can make correlations between data in different logs, then use its built-in logic to take corrective action, to restart services, or thwart potential security breaches – give LEM a whirl.
If you like this page then please share it with your friends
Windows Vista Registry Tweaks: