Seeing that you're so confident, I would be interested to learn how you
dealt with the following three issues:
- How did you modify some 20,000 entries, many of which are
write-protected?
- How did you modify hex entries of the following form:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\
@=hex(2):43,3a,5c,57,49,4e,44,4f,57,53,5c,...
(Hint: There is a "C:\" hidden in there)
- How did you modify unicode hex entries of the following form:
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Softwar
"CDRecordPath"=hex(0):43,00,3a,00,5c,00,44,00,...
(Hint: There is a "C:\" hidden in there)
If you ignored the hex entries, how could you tell the OP with confidence
that your method would give him a robust Windows installation?
Are you sure there are that many binary values containing strings after a
new install? Because I have done this on more than one occasion and I have
never had an unstable system as a result. If I burned the system to the
ground afterwards it was probably a year or so later, and I doubt it was due
to "leftover corruption" because I didn't change a few drive letters. The
important stuff in is plain strings and I changed those by exporting the
entire registry and doing a search and replace with a good text editor. It's
possible, although I won't swear to it, that I might have tried to search
for hex replacements, although if I had I wouldn't have tried the Unicode
approach.
I guess it's just the excruciatingly exacting programmer in me that can't
stand it when people say "It's not possible" when what they really mean is
"It's extremely difficult and not recommended." I don't like it when people
state things as facts that are not, in fact(!), facts. So I, uncontrollably,
respond. The Windows boot drive CAN be changed after installation. I know
because I have done it. Period. As far as robustness is concerned, well, you
can doubt it all you want. I've done it on my work machine and installed
tons of software afterward and had no more problems than I've had on
machines where I didn't change the drive assignment.