A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to 'regedit' to access the registry from the command line (Start > Run). I question the use of 'regedt32,' but he says to do it anyway. Whenever I use the registry editor, I recall this incident and never look up the tale of the two regs... until now.

Regedt32.exe is an alternative registry editor available with Windows NT/2000 with features of its own. Regedt32.exe does not support importing and exporting registration entries (.reg) files. Regedit has limitations of its own as quoted here:

You cannot set the security for registry keys. You cannot view, edit, or search the value data types REG_EXPAND_SZ and REG_MULTI_SZ. If you try to view a REG_EXPAND_SZ value, Regedit.exe displays it as a binary data type. If you try to edit either of these data types, Regedit.exe saves it as REG_SZ, and the data type no longer performs its intended function. You cannot save or restore keys as hive files.

Research indicates regedit has:

  • a better search tool
  • bookmarking of subkeys
  • opens to last edited subtree, export and import capabilities
  • all keys are visible from a window similar to Windows Explorer

Regedt32 (pre-WinXP) can:

  • run in read-only mode
  • allows you to edit values longer than 256 characters (who wants to do that???)
  • displays subtrees in their own windows
  • modify access permissions to subtrees, keys, and subkeys

In WinXP and Server 2003, the two have been replaced by a new version of regedit that has features from both. Try typing 'regedit' and 'regedt32' to see what happens. They're the same. To prove it, while in 'regedit,' select 'edit' and you'll see 'permissions.' This is a feature that was only available in the old 'regedt32' and not 'regedit.'

Technically, regedt32 is a small program that runs regedit. So when typing 'regedt32,' it takes you to 'regedit.' The destination is the same either way. So type whichever is easier for you to remember. Regedit is easier for me - I had to play with the spelling of the other version until I got it right.

Now I remember that tech support was checking to see if the permissions were properly set and that was why we used 'regedt32.' However, someone forgot to update the script or tell him that it didn't matter anymore when a user had WinXP. Tech support always asks what operating system at the beginning of the call, so he knew.

More registry editor resources: Microsoft has a knowledgebase article on the differences between the two. Windows IT Library has a feature comparison chart dated 2000, so it's way old, but it will satisfy curiosity. Here's a list of registry editor alternatives for those who wish to try something different. For tweaks, tricks, and hacks, check out WinGuides' Registry Guide for Windows.

meryl k. evans is the Content Maven behind meryl k. evans, meryl k. evans. She is also a PC Today columnist and a tour guide at InformIT. She is geared to tackle your editing, writing, content, and process needs. The native Texan resides in Plano, Texas, a heartbeat north of Dallas, and doesn't wear a 10-gallon hat or cowboy boots.

experienced cleaning professionals Northbrook ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

Why Using an Ad Blocker Can be a Bad Idea

Ad Blocking is getting to be a common sport on... Read More

Computer Performance Tips

Introduction In this article I will clearly spell out the... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

The Ipod Mini: Why Its Not that Hot

I got my eyes set on a iPod mini, as... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

The Newbies Guide to Personal Computer Maintenance

When you turn on your computer, does it act like... Read More

What?s the Difference Between Plasma TVs and LCD TVs?

Plasma and LCD TVs are the latest trend in home... Read More

Buying A PC Flat Screen Monitor

For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

Customize Your Portable Player with an MP3 Player Accessory

Everywhere you look today people are listening to personal audio... Read More

How Does a Palm Pilot Work?

Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

How Do MP3 Players Work? Digital Audio Technology Revolutionizes Music Enjoyment

Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More

How To Buy An MP3 Player

Are you looking for an MP3 player but am not... Read More

10 Easy Steps to Speed Up Your Computer - Without Upgrading

1. Empty the Temp directory regularly. To do this, make... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Build Your Own Computer

I'm eighty-one years old and I bought my first computer... Read More

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Web Standards

HTTP ProtocolThe web is run on port 80. You are... Read More

best value cleaning service Northbrook ..