- dotTech - http://dottech.org -
Tweak your computer with registry hacks, Part 1: Introduction
Posted By Samuel On March 28, 2012 @ 12:20 PM In Tips 'n Tricks | 29 Comments
In the past I have written a number of “How to” articles  on dotTech explaining how to do various tasks, such blocking Flash ads in Internet Explorer. I’ve decided to continue with my series of “How to” articles. (Ignore the fact that this isn’t titled “How to”.) However, now I am going to take it up a notch; instead of simple install this, change that type of topic, I’m going to tell you about some nifty Windows’ registry hacks, or Windows tweaks – whichever you prefer to call them.
Now whether you like the registry or not it (although I am sure many people are indifferent on their feelings towards the registry), is a very powerful tool and if used correctly it can be used to customize your computer so it was more the way you want it to be, or it can just simply make your computer run better. However, as with super heroes, “with great power comes great responsibility”. One wrong move in the registry can, at best, make something happen you didn’t mean to and, at worst, make your computer crash, burn, and die. To help avoid either situation, this first article on registry hacks will explain what the registry is, how it works, what it can do, and provide precautionary tips on what to do to avoid trouble in the future; subsequent articles will then expand on the nifty hacks/tweaks I have to share.
As a general rule of thumb, before starting to work with the registry, you want to:
In general, registry hacks can be divided in to two groups: hacks that help personalize the system and hacks that change how the system works. Personalization hacks change things like the Context Menu (that menu that pops up when you right click) or icons that files use. System hacks change things like what shell Windows’ will use. For the most part, I will focus on personalization hacks since they are less dangerous.
The registry is organized like your file system with “drives” called Hives, “folders” called Keys, and “files” called Values. There are five Hives in the registry, though we will only be dealing with three of them: Classes Root, Local Machine, and Current User:
Under each Hive are Keys that, like folders on your computer, can contain other Keys. In both HKLM and HKCU there is a Key called Software, and under it you would find a key for most companies that you have installed software from. In each company Key, you will find Keys for software from them, which should contain settings and information about the program.
In each Key, besides containing other Keys, there can also be Values, which store the actual information. A Value is made up of three parts: Name, Type, and Data. The Name is simply a name for the Value and can be anything, like how you can name a file. The Type tells the system what kind of data is being stored. The two we will be dealing with are REG_SZ which means a string of text and REG_DWORD which means some number from 0 to 4,294,967,295. Data will contain, well, the data associated with that Value. All the hacks/tweaks I will discuss will be accomplished by changing, mixing, matching, cloning, etc. the Keys, and Values.
Now, I think that’s enough for you to take in. As I said, reread this post 10 times so you know exactly what you are dealing with. Next time I’ll show you some real hacks!
Article printed from dotTech: http://dottech.org
URL to article: http://dottech.org/12428/tweak-your-computer-with-registry-hacks-part-1-introduction/
URLs in this post:
 written a number of “How to” articles: http://dottech.org/author/samuel-2
 GFI Backup: http://dottech.org/freewaresr/7372
 has: http://dottech.org/featured/11628
 mentioned: http://dottech.org/featured/6194
 many: http://dottech.org/freewaresr/7896
 before: http://dottech.org/freewaresr/11487
 CCleaner: http://dottech.org/tipsntricks/11866
© 2008-2012 dotTech.org | All content is the property of its rightful owner.