A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to 'regedit' to access the registry from the command line (Start > Run). I question the use of 'regedt32,' but he says to do it anyway. Whenever I use the registry editor, I recall this incident and never look up the tale of the two regs... until now.

Regedt32.exe is an alternative registry editor available with Windows NT/2000 with features of its own. Regedt32.exe does not support importing and exporting registration entries (.reg) files. Regedit has limitations of its own as quoted here:

You cannot set the security for registry keys. You cannot view, edit, or search the value data types REG_EXPAND_SZ and REG_MULTI_SZ. If you try to view a REG_EXPAND_SZ value, Regedit.exe displays it as a binary data type. If you try to edit either of these data types, Regedit.exe saves it as REG_SZ, and the data type no longer performs its intended function. You cannot save or restore keys as hive files.

Research indicates regedit has:

  • a better search tool
  • bookmarking of subkeys
  • opens to last edited subtree, export and import capabilities
  • all keys are visible from a window similar to Windows Explorer

Regedt32 (pre-WinXP) can:

  • run in read-only mode
  • allows you to edit values longer than 256 characters (who wants to do that???)
  • displays subtrees in their own windows
  • modify access permissions to subtrees, keys, and subkeys

In WinXP and Server 2003, the two have been replaced by a new version of regedit that has features from both. Try typing 'regedit' and 'regedt32' to see what happens. They're the same. To prove it, while in 'regedit,' select 'edit' and you'll see 'permissions.' This is a feature that was only available in the old 'regedt32' and not 'regedit.'

Technically, regedt32 is a small program that runs regedit. So when typing 'regedt32,' it takes you to 'regedit.' The destination is the same either way. So type whichever is easier for you to remember. Regedit is easier for me - I had to play with the spelling of the other version until I got it right.

Now I remember that tech support was checking to see if the permissions were properly set and that was why we used 'regedt32.' However, someone forgot to update the script or tell him that it didn't matter anymore when a user had WinXP. Tech support always asks what operating system at the beginning of the call, so he knew.

More registry editor resources: Microsoft has a knowledgebase article on the differences between the two. Windows IT Library has a feature comparison chart dated 2000, so it's way old, but it will satisfy curiosity. Here's a list of registry editor alternatives for those who wish to try something different. For tweaks, tricks, and hacks, check out WinGuides' Registry Guide for Windows.

meryl k. evans is the Content Maven behind meryl k. evans, meryl k. evans. She is also a PC Today columnist and a tour guide at InformIT. She is geared to tackle your editing, writing, content, and process needs. The native Texan resides in Plano, Texas, a heartbeat north of Dallas, and doesn't wear a 10-gallon hat or cowboy boots.

custom home cleaning Lincolnshire ..
In The News:

Amazon Prime Day shoppers face threats from 120,000-plus scam websites as cybercriminals prepare phishing traps and malware ahead of the July sales event.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
The AEON humanoid robot tackles labor challenges with Nvidia AI, Microsoft Azure cloud and advanced spatial awareness, working alongside industry leaders Schaeffler and Pilatus.
Google's Ask Photos feature brings AI-powered searches to your photo library, letting you find memories with natural language queries while maintaining privacy controls.
The return of blue book exams emerges as universities fight widespread AI academic dishonesty and educators debate whether to ban AI tools or teach responsible usage.
Signs your phone might be hacked include strange behavior, unauthorized texts, battery drain and pop-ups, while protection involves updating software and avoiding public Wi-Fi.
Tokyo startup H2L has launched Capsule Interface technology enabling full-body robot control with muscle sensors, offering immersive remote operation.
The A.I. industry seems set for growing pains as Big Tech companies scramble for solutions to the medium's unprecedented strain on the power grid.
Fourth of July fireworks cause a 60% spike in lost pets, but GPS trackers and AI photo-matching services like Love Lost can help reunite missing dogs with their families.
Protect yourself from jugging, the rising crime by which thieves monitor ATM users and follow them to steal cash, with six practical safety tips to stay alert and secure.
U.S. airlines like Delta, American and United are selling your domestic flight records to government agencies through the little-known Travel Intelligence Program.
Autonomous robots from Uber Eats are rolling out across U.S. cities, featuring LIDAR sensors, secure compartments and all-weather operation for food and grocery delivery.
Costco has expanded into EV infrastructure with new ultra-fast charging stations that can charge most electric vehicles to 80% in 20-60 minutes while shoppers browse the warehouse.
The new Gemini Robotics On-Device AI allows robots to perform complex tasks without internet, offering enhanced privacy, reliability and adaptability for real-world use.
Protect yourself from Amazon phishing scams by spotting red flags like suspicious sender addresses and spelling errors while using Amazon's Message Center to verify communications.
GAC Group's new Govy AirCab flying car combines lightweight design with advanced safety systems and smart cabin technology to revolutionize city travel with an 18.6-mile range.
The Berkeley Humanoid Light (BHL) is a lightweight, open source humanoid robot that anyone can build using 3D-printed parts and off-the-shelf components.
Meta’s new AI chatbot is getting personal, and it might be sharing more than you realize.
A new threat targets both Android and iPhone users: SparkKitty, a powerful mobile malware strain that scans private photos to steal cryptocurrency recovery phrases and other sensitive data.
Thanks to a team at the University of California, Davis, there's a new brain-computer interface (BCI) system that's opening up real-time, natural conversation for people who can't speak.
Privacy risks are hiding in plain sight, as your personal data is likely being collected, tracked, and sold without your knowledge.
VenHub, a fully autonomous, AI-powered smart store just opened at the LAX/Metro Transit Center in Los Angeles.
A woman's Facebook account takeover reveals dangerous social engineering tactics and provides lessons on recovery, avoiding scams and enacting stronger security measures.
Shanghai engineers are using 432 walking robots to relocate a complex, preserving Shikumen architecture while creating space for a modern underground hub and cultural center.
Major healthcare data analytics firm Episource had a cybersecurity incident exposing 5 million patients' medical records and personal information in recent breach.

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Advantages and Guidelines of Automated Testing

"Automated Testing" is automating the manual testing process currently in... Read More

2 PC Annoyances and How To Solve Them!

I have a love-hate relationship with my computer.In fact, often... Read More

Be Your Own IT Department

If you use a computer, you need to know more... Read More

Digital Cameras + Photo Printers = Quality Instant Photographs

In the 1950's and 1960's Polaroid's instant cameras were all... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Learn the Lost Art of Touch Typing

Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

Cisco Certification: Taking Your First Certification Exam

You???ve studied hard; you???ve practiced your configurations; you???ve used your... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

How Do MP3 Players Work? Digital Audio Technology Revolutionizes Music Enjoyment

Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More

5 Steps to Removing PC Clutter

It's hard enough as it is these days to get... Read More

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

I am going to assume that you are running windows... Read More

Learning To Navigate Ciscos Online Documentation

When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More

Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

MP3 players are Hot! Playing music has come a long... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Is Your Web Browser Putting You At Risk?

It's free, it comes with Windows and it's used by... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

move in cleaning service Glencoe ..