Solved

Access Registry file on Non-Bootable Win2k HDD

Posted on 2004-03-23
7
276 Views
Last Modified: 2010-04-13
I have a Windows 2000 machine that has become unable to boot, even into safe mode.

I have taken that drive and made it a slave in another computer. I am able to navigate and retrieve data from the unbootable HDD.

Does anyone know of a free or inexpensive registry tool that can be used to export entries from a Registry file on the slave hard drive and not the actual registry for the second machine?

Basically, I need to get registry keys exported from a non-bootable machine.

Thanks.
0
Comment
Question by:beyenhoft
  • 4
  • 3
7 Comments
 
LVL 44

Expert Comment

by:CrazyOne
ID: 10659552
Start > Run regedt32
On the menu do this  Window > HKEY_LOCAL_MACHINE
Go to the menu File > Load Hive
Locate the hive file
Give it a name, maybe something like Fixing
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 10659583
These are the registry hives in the \system32\config\ folder
and the ntusers.dat file in the C:\Documents and Settings\Profile Name



DEFAULT
SAM
SECURITY
SOFTWARE
SYSTEM
0
 
LVL 7

Accepted Solution

by:
YarnoSG earned 250 total points
ID: 10660559
See CrazyOne's article above


Then Go here (I wrote this 6 years ago...)
http://www.winnetmag.com/Article/ArticleID/14738/14738.html

Use that technique of using BOTH REGEDT32 and Regedit and you can export keys that you can edit with notepad search & replace, and then Import onto a live server.
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 7

Expert Comment

by:YarnoSG
ID: 10660571
Okay, Maybe only 4 years , but that is more like 40 + years in Internet time :)
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 10679683
Hmmm I get them the half way there but get no points for that effort, bummer :(
0
 
LVL 7

Expert Comment

by:YarnoSG
ID: 10680314
Like you NEEDED them :)

 (I let my premium lapse, so I did....)
0
 
LVL 44

Expert Comment

by:CrazyOne
ID: 10680612
:)
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now