Difference between revisions of "RegyKey"

From SpybotWiki
Jump to: navigation, search
Line 7: Line 7:
 
  RegyKey:"User settings",HKEY_CURRENT_USER,\SOFTWARE\,"Spyware"
 
  RegyKey:"User settings",HKEY_CURRENT_USER,\SOFTWARE\,"Spyware"
  
 +
===Description===
 +
Detects a registry key and flags it for removal.
  
===Description===
+
# First, a description. Using a [[Description templates|description template]] instead of plain text is recommended so that the user will receive a localized version.
 +
# The root key, where HKEY_CURRENT_USER stands for all users actually.
 +
# The path to the value, starting with a backslash. This may not include the actual subkey you want to remove.
 +
# The name of the key to detect. You may use a [[AlgoPrefix|Algo-Prefix]] here.
 +
# To refine detection, you can use [[Advanced registry parameters|advanced registry parameters]] to check the actual data of the value. You may use [[AlgoPrefix|Algo-Prefixes]] here.
  
 
==See also==
 
==See also==
* [[Advanced registry parameters]]
+
* [[AlgoPrefix]]
 +
* [[Description templates]]
 +
* [[Advanced registry parameters]]
  
 
===Similar commands===
 
===Similar commands===
Line 21: Line 29:
 
[[Category:SBI Commands]]
 
[[Category:SBI Commands]]
 
[[Category:SBI Commands (current)]]
 
[[Category:SBI Commands (current)]]
[[Category:ToDo]]
+
[[Category:SBI Commands supporting AlgoPrefix]]

Revision as of 10:21, 17 February 2008

Searches for the defined registry key and adds it to the results list, if found.

Usage

RegyKey:[description],[rootkey],[keypath],[key],<advanced regy parameters>

Examples

RegyKey:"User settings",HKEY_CURRENT_USER,\SOFTWARE\,"Spyware"

Description

Detects a registry key and flags it for removal.

  1. First, a description. Using a description template instead of plain text is recommended so that the user will receive a localized version.
  2. The root key, where HKEY_CURRENT_USER stands for all users actually.
  3. The path to the value, starting with a backslash. This may not include the actual subkey you want to remove.
  4. The name of the key to detect. You may use a Algo-Prefix here.
  5. To refine detection, you can use advanced registry parameters to check the actual data of the value. You may use Algo-Prefixes here.

See also

Similar commands