Solved

What is the difference between GUID and UUID?

Posted on 2002-06-21
10
2,152 Views
Last Modified: 2007-12-19
What is the difference between GUID and UUID? Is it there is only one GUID per system or there are lots of GUID in a system?

How can I get the GUID in DOS mode? Is there any tools I can use to do it?
0
Comment
Question by:calven
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 5
  • 2
  • 2
10 Comments
 
LVL 32

Accepted Solution

by:
jhance earned 100 total points
ID: 7098720
A GUID and a UUID are essentially the same thing.  The only difference is the CONTEXT of how they are used.

GUIDs are normally associated with COM/ActiveX
UUIDs are more general.

To make a GUID/UUID from a COMMAND LINE use the UUIDGEN command in the Visual Studio COMMON tools:

UUIDGEN >mynewuuid.txt
0
 

Author Comment

by:calven
ID: 7099816
Thanks for your answer. But one more question. I don't want to generate a new ID but just want to retrieve from the existing one? Can any tools help?
0
 
LVL 32

Expert Comment

by:jhance
ID: 7100355
Retrieve WHAT existing GUID?

Your Windows 2000 system has thousands of GUIDs stored in it.
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 

Author Comment

by:calven
ID: 7123588
Ok, let's say I want the system's AD UUID or any UUID in the system. Where can I download the tools to retrieve the UUID?
0
 
LVL 32

Expert Comment

by:jhance
ID: 7124360
It's still not clear what you want here.

Please be more detailed and specific as your question seems to be "morphing" from one thing to another.  It's really hard to be helpful under such circumstances.
0
 
LVL 1

Expert Comment

by:netwiz562
ID: 8962275
---- CLEAN UP ----

calven,
No comment has been added lately (383 days), so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area for this question:

RECOMMENDATION: [ Delete/No Refund ]

Please leave any comments here within the next seven days.

¡PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

------------------------------
Rajiv Makhijani
EE Cleanup Volunteer
0
 
LVL 32

Expert Comment

by:jhance
ID: 8962433
I DISAGREE!  This question answered FULLY!  I suggest force accept to jhance.
0
 
LVL 1

Expert Comment

by:netwiz562
ID: 8962669
jhance,

My recommendation is not the final decision...I will leave it up to the moderators who choose in the end.

Thanks,
Rajiv Makhijani
EE Cleanup Volunteer
0
 
LVL 32

Expert Comment

by:jhance
ID: 8962888
I'm just stating my disagreement with your recommendation.
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
A big percent of today’s marketing activity is performed through the online environment. The marketing strategies that have existed a decade ago no longer relate to what’s happening today. We’re currently facing a revolutionary era, called the digit…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question