[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

How to Recover Registry Info

Posted on 2000-03-26
1
Medium Priority
?
197 Views
Last Modified: 2010-04-04
My hard disk got trashed.  It's unbootable.  Was NT 4 Wkstn, SP5.

Have new hard disk.  NT 4 Server, SP 6.

I can "mount" the old disk and "see" the file structure with "Win NT Explorer" and can "open" most of the files.  Specifically, I can open:

E:\WinNT\System32\Config\Software

Clearly it's not a "text" file, but it is "readable".

Some programs (eg Gator) store their / my "data" in the Registry.

Question: is there any way to extract / export a set of keys from the old registry on E: and restore / import them into my new registry?

0
Comment
Question by:PHenningsen
1 Comment
 
LVL 2

Accepted Solution

by:
NetoMan earned 340 total points
ID: 2665927
If I well understand your question, of course you can obtain your old registry settings using REGEDIT.

You can access it from Start -> Run : "REGEDIT"

from REGEDIT you can import reg files or export them (a sort of keys or all)to reg files for later importing into other NT/Windows system.

look for those *.reg files in your non usable disk system

Hope this helps!

0

Featured Post

Vote for the Most Valuable Expert

It’s time to recognize experts that go above and beyond with helpful solutions and engagement on site. Choose from the top experts in the Hall of Fame or on the right rail of your favorite topic page. Look for the blue “Nominate” button on their profile to vote.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you how to use the Windows Speech API in Delphi. I will only cover basic functions such as text to speech and controlling the speed of the speech. SAPI Installation First you need to install the SAPI type library, th…
Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Loops Section Overview
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question