Solved

what does this file do?

Posted on 2002-07-01
3
139 Views
Last Modified: 2010-04-13
I just go my pc crashed! Each time I boot up now, it tells me one of my files in the C:\WINNT\system32\config folder is missing or corrupted. If I'm not mistaken, the corruption is the system file. Anyone know how I can go round this problem w/o having to reinstall win2k once again? thanx ;o)

0
Comment
Question by:kacang
  • 2
3 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 200 total points
ID: 7121675
Note the following approcah will not replace any system files.

Can you boot to your Win2000 CD? If so then when it finally boots At the "Welcome to Setup" screen, press F10, or press R to repair, and then C to start the Recovery Console this will allow you to use the command line. From here do something like the following. Or if the file system is FAT32 you can use a Win98 bootdisk to do this. www.bootdisk.com

COPY /Y C:\WINNT\repair\RegBack\TheParticularHive C:\WINNT\system32\config\

This will replace the registry hive to the last time that hive was backuped. Hopefully you didn't backup the registry at the time the problems started to happen.

Following is a list of the files that are the registry hives. I would suggest starting with the SYSTEM hive and then reboot and if the problem still persists do the SOFTWARE hive next. Note these files don't have a file extension on them

DEFAULT
SAM
SECURITY
SOFTWARE
SYSTEM

I would suggest to first backup these hives from the C:\WINNT\system32\config\ to folder of your making or choice just don't back them up to the C:\WINNT\repair\RegBack\ folder.

The Crazy One
0
 

Author Comment

by:kacang
ID: 7123915
Thanx CrazyOne. Got my pc up already. Though, I 'm facing some minor problems but nothing important. Thanx once again :o)
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 7123987
You are welcome. :>)
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Windows 2000 Kerberos problem 5 304
auto copy 8 610
Application Deployment 2 247
Windows 7 7 255
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Find out what the Office 365 disclaimer function is, why you would use it and its limited ability to create Office 365 signatures.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now