Solved

Registry key for write-behind caching

Posted on 1997-07-22
2
264 Views
Last Modified: 2013-12-23
What is the registry key to disable write behind caching, and what must it be set to to turn it on.

ie:  I want to disable write behind caching for all PCs on site, but I want to do it in the logon script, and if I know the key, I can write a script to do it.
0
Comment
Question by:Chrism
2 Comments
 
LVL 2

Accepted Solution

by:
dmethvin earned 50 total points
ID: 1547796
I think you're referring to to the check box "Disable Write Behind Caching for All Drives" that's in the Control Panel/System/Performance/FileSystem/Troubleshooting dialog.

To disable write-behind caching, you set the key
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\FileSystem\DriveWriteBehind to the binary value 0.

However, I'm pretty sure that the system only checks this value on boot-up, before you'll have a chance to change it in a batch file. Your change will only take effect after the next reboot.

Also, if you're looking for absolute safety in disk operations, you should know that virtually all EIDE drives write-cache in their on-disk buffers. If you lose power or have a system failure the bits you thought you wrote may not be there.  SCSI disks generally have configurable write cache, with the default being off.

Finally, if you're doing this because of some bad experiences from Windows 3.1 and Smartdrive, you should know that Win95 is a lot more conservative in the write caching. That is, unless you "Enable Synchronous Buffer Commits" (in same screen as the disable write-back above) which brings back the risky but faster behavior.
0
 
LVL 2

Author Comment

by:Chrism
ID: 1547797
Nah, I have to do it for a certain piece of software that we use on site.

Thanks for the info though.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Nslookup is a command line driven utility supplied as part of most Windows operating systems that can reveal information related to domain names and the Internet Protocol (IP) addresses associated with them. In simple terms, it is a tool that can …
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now