Solved

How to Recover Registry Info

Posted on 2000-03-26
1
184 Views
Last Modified: 2010-04-04
My hard disk got trashed.  It's unbootable.  Was NT 4 Wkstn, SP5.

Have new hard disk.  NT 4 Server, SP 6.

I can "mount" the old disk and "see" the file structure with "Win NT Explorer" and can "open" most of the files.  Specifically, I can open:

E:\WinNT\System32\Config\Software

Clearly it's not a "text" file, but it is "readable".

Some programs (eg Gator) store their / my "data" in the Registry.

Question: is there any way to extract / export a set of keys from the old registry on E: and restore / import them into my new registry?

0
Comment
Question by:PHenningsen
1 Comment
 
LVL 2

Accepted Solution

by:
NetoMan earned 85 total points
ID: 2665927
If I well understand your question, of course you can obtain your old registry settings using REGEDIT.

You can access it from Start -> Run : "REGEDIT"

from REGEDIT you can import reg files or export them (a sort of keys or all)to reg files for later importing into other NT/Windows system.

look for those *.reg files in your non usable disk system

Hope this helps!

0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Creating an auto free TStringList The TStringList is a basic and frequently used object in Delphi. On many occasions, you may want to create a temporary list, process some items in the list and be done with the list. In such cases, you have to…
Introduction Raise your hands if you were as upset with FireMonkey as I was when I discovered that there was no TListview.  I use TListView in almost all of my applications I've written, and I was not going to compromise by resorting to TStringGrid…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now