?
Solved

Setting a Registry Key

Posted on 2000-05-16
7
Medium Priority
?
227 Views
Last Modified: 2013-11-20
Hi,
   My App uses some API's that require a certain registry key to be set.
So as part of the initilisation of my app, I need to check if such a key exists and if not to create it.

So how do I go abt doing that?
i.e

Reading the key and then possible setting the appropriate key

Is there any MFC, Win32 command to do so ?

Thanks and Regards

ManX


0
Comment
Question by:manx
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 5

Expert Comment

by:proskig
ID: 2813894
If it is a part of API, not of your program, it is better to use Win 32 functions, e.g. RegQueryValueEx. There are some wrappers for this functions on www.codeguru.com 
0
 
LVL 6

Expert Comment

by:MichaelS
ID: 2814151
Duplicated question
0
 
LVL 10

Expert Comment

by:RONSLOW
ID: 2815355
Or you can use the CRegKey ATL classes which already provide wrappers.
0
Get MySQL database support online, now!

At Percona’s web store you can order your MySQL database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card.

 
LVL 2

Expert Comment

by:iDeb
ID: 2817926
Heres a list of registry apis you can use:-

RegCreateKeyEx Creates the specified registry key.
RegDeleteKey Deletes a subkey.
RegDeleteValue Removes a named value from the specified registry key.
RegEnumKeyEx Enumerates subkeys of the specified open registry key.
RegEnumValue Enumerates the values for the specified open registry key.
RegLoadKey Creates a subkey under HKEY_USERS or HKEY_LOCAL_MACHINE and stores registration information from a specified file into that subkey.
RegOpenCurrentUser Retrieves a handle to the HKEY_CURRENT_USER key for the user the current thread is impersonating.
RegOpenKeyEx Opens the specified registry key.
RegOpenUserClassesRoot Retrieves a handle to the HKEY_CLASSES_ROOT key for the specified user.
RegQueryInfoKey Retrieves information about the specified registry key.
RegQueryMultipleValues Retrieves the type and data for a list of value names associated with an open registry key.
RegQueryValueEx Retrieves the type and data for a specified value name associated with an open registry key.
RegReplaceKey Replaces the file backing a registry key and all its subkeys with another file.
RegSetValueEx Sets the data and type of a specified value under a registry key.
RegUnLoadKey Unloads the specified registry key and its subkeys from the registry.
0
 
LVL 2

Expert Comment

by:iDeb
ID: 2818363
iDeb changed the proposed answer to a comment
0
 
LVL 10

Accepted Solution

by:
RONSLOW earned 150 total points
ID: 2819414
Here is my answer (as requested in the duplicate question).
0
 

Author Comment

by:manx
ID: 2821597
Thanks ROSNLOW
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you use Adobe Reader X it is possible you can't open OLE PDF documents in the standard. The reason is the 'save box mode' in adobe reader X. Many people think the protected Mode of adobe reader x is only to stop the write access. But this fe…
In this post we will learn different types of Android Layout and some basics of an Android App.
This video will show you how to get GIT to work in Eclipse.   It will walk you through how to install the EGit plugin in eclipse and how to checkout an existing repository.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month7 days, 19 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question