The third clause, the line marked in red, is where the backup problem or weakness is with the .reg file that appears. If any changes or modifications to the Registry are outside the scope of the backed up sections in the .reg file, everything is fine. But if you add a new key or value when editing, the problem will appear. The process of re-importing the backup file cannot replace or remove the part added to the Registry, because it is not in the backup file.
If you really guarantee that you will only be modifying or modifying existing values, not creating any new keys or values, you can use the .REG File type. But if you're not 100% sure, it's better to use the following Hive File Backups backup method.
Hive File Method
Except for the two limitations mentioned above, using .REG files for backup is still a good method. The second method mentioned here is to use the Hive File type, similar to .REG File but fix the drawbacks of .Reg File. It is usually better for you to use Hive File in the background. (See Figure 3 again).
Like .reg files, the actual backup procedure when creating hive files is also simple. In the Keys Pane box, right-click on each key you want to back up (here is Desktop), select [Export] , write the file name and select the backup file type. In Figure 10, the file name is for example Desktop, the file type is Registry Hive Files. When creating hive-type backup files, you need to add an extension for the created file. There are two most commonly used extension names: ".dat" and ".hiv". In the image below, we get the illustration with the .hiv extension, the full file name is Desktop.hiv.
Figure 10
Notice the " Selected Branch " button describing which key is actually recorded. A quick check of this information can help you avoid a lot of annoying, even fatal mistakes if the backup is wrong. After clicking the Save button, the key will be recorded with the file name "Desktop.hiv" at the location you choose. You need to pay attention to the following points:
• When backing up the parent key, its subkeys are backed up. For example, in this case, the HKEY_CURRENT_USERControl PanelDesktop key is selected to back up, its subkey: HKEY_CURRENT_USERControl PanelDesktopWindowMetrics will also be backed up.
• Normally, users move the registry backup level higher than necessary. In this example, when the key to backup is HKEY_CURRENT_USERControl Panel , the HKEY_CURRENT_USERControl PanelDesktop key will be backed up. But there are also many other unexpected keys that also become part of the backup file. You can limit the desired lock level as close as possible by moving the hierarchy farther than necessary. The table below illustrates just how fast the .hiv file increases if the selected endpoint is not reasonable. Obviously the last option marked in red is the case to use. Not only does it require less memory space, it can also be imported quickly.
Entrypoint Key Size My recorded .reg file My Computer cannot be backed up with this method HKEY_CURRENT_USER 2.67 MB HKEY_CURRENT_USERControl Panel 176.0 KB HKEY_CURRENT_USERControl PanelDesktop 12.0 KB
Restore backup Hive file
To restore the backup hive file, do the following:
Figure 11
There are many lines in the above paragraph marked in red for warning purposes. Take a look at Figure 11 above and notice The Key Will Be Restored On Top Of Key: Desktop (The key will be restored to the top of the keys: Desktop). Now looking at Figure 12 below, there is also an almost identical line. The Key Will Be Restored On Top Of Key: Control Panel (The key will be restored to the top of the keys: Control Panel). Please carefully confirm the information before clicking Yes or No. Because all current key and subkey values may be deleted when restoring the old key, follow the specified key name (Desktop or Control Panel).
Figure 12
Recovering the wrong location for Hive File Backup will probably wipe out all important parts of the Registry and the system will almost be paralyzed. It is impossible to say which solution is the best for this situation. There is only one method to suggest that you should create a file name that records both the location you want to recover, for example in our case it may be HKCUControlPanelDesktop.hiv . Recover each backup file in different folders. In each folder, next to the backup file, it is recommended to create a small Notepad text file that details when and why at this backup file. Also record the Registry path for files to import.
System State backup method
Backing up System State is a backup of system state components such as Registry, Registry database of COM + class (COM + Class Registration Database) and boot files. Windows XP is equipped with a backup utility, Backup Utility. You can open it by: go to Start > All Programs > Accessories > System Tools > Backup . In the Advanced Backup Wizard window there is a setting parameter to back up System State to one of the machine's logical drives or another device of your choice. If the Registry is down, the System State backup will be used to restore the system.
Not all Windows XP has a default backup utility available. For example, in the Home Edition version if you want to use the Backup Utility, you must install it yourself from the Windows disk. The Professional Edition is available from the time you install the operating system for the machine.
System Restore
The last thing to note in Registry backup is how to use the System Restore utility, another utility available in Windows XP. System Restore is likened to a video camera, recording the complete image of your system at a point in time and storing it in a place called a restore point. This recovery point may be recalled at some point in the future, effectively overwriting any changes made on the computer since it was created.
Which backup method is best
It can be said that all the backup methods listed in this article are good. They provide us with certain levels of risk protection, do not require a large amount of time to complete the process and the security is quite stable. You can use several methods at the same time to complement each other if there is time and conditions allowed before editing the Registry parameters.
Typically, the most commonly used method is Hive File Backup or System Restore. Changes in Registry editing can occur after a long time, often without immediate impact on the system for us to know. System Restore can protect the entire system, instead of just single keys as in many other methods. If you pay attention to both the time and date issues when making modifications, the system recovery job will get better.
Now you have your best way to recover the Registry for each situation. Hopefully you no longer have to frown, frown or "freak out on the cloud" when you accidentally misstep a step with these pretty fastidious Registry.