Solved

Two Registry Editors in Windows

Posted on 2004-04-19
3
274 Views
Last Modified: 2010-04-13
Just a little question.

I understand that there are two registry editors in windows 2000, regedit and regedit32. Microsoft explain that regedit32 supports a security menu, read only mode, REG__MULTI_SZ and REG_EXPAND_SZ where as regedit does not. However they do not explain why ?

Firstly does anyone know why there are two registry editors and also what are REG__MULTI_SZ and REG_EXPAND_SZ.

Many thanks

GISVPN
0
Comment
Question by:gisvpn
  • 2
3 Comments
 
LVL 86

Assisted Solution

by:jkr
jkr earned 25 total points
Comment Utility
>>Firstly does anyone know why there are two registry editors

"Historical" reasons. Win9x came with no security in the registry.

>>what are REG__MULTI_SZ and REG_EXPAND_SZ

REG_MULTI_SZ: An array of null-terminated strings, terminated by two null characters., like

string1\0string2\0string3\0\0

REG_EXPAND_SZ: A null-terminated string that contains unexpanded references to environment variables (for example, "%PATH%").

0
 
LVL 57

Accepted Solution

by:
Pete Long earned 25 total points
Comment Utility
Regedit.exe
Regedit.exe is the registration editor for 16-bit Windows. It is used tomodify the Windows registration database. The database is located in theWindows directory as Reg.dat. The database contains information about 16-bit applications, and is used by File Manager for opening and printingfiles. It is also used by applications that support Object Linking andEmbedding (OLE). Reg.dat is used and maintained by Windows on Windows (WOW)and 16-bit Windows applications. The WOW layer resides on top of theVirtual DOS Machine (VDM).

Regedit.exe is a 16-bit application that is included in Windows NT forcompatibility with previous 16-bit applications. Regedit provides a methodfor examining Reg.dat under Windows NT. You can migrate the Reg.datdatabase file to the Windows NT registry during the first logon to aninitial installation of Windows NT.
Regedt32.exe
Regedt32.exe is the configuration editor for Windows NT. It is used tomodify the Windows NT configuration database, or the Windows NTregistry. This editor allows you to view or modify the Windows NT registry.The editor provides views of windows that represent sections of theregistry, named hives. Each window displays two sections. On the leftside, there are folders that represent registry keys. On the right side,there are the values associated with the selected registry key. Regedt32 isa powerful tool. You must use extreme caution when you use it to changeregistry values. Missing or incorrect values in the registry can make theWindows NT installation unusable.
http://support.microsoft.com/default.aspx?scid=kb;EN-US;141377

The bit you are referring to

"You cannot view, edit, or search the value data types REG_EXPAND_SZ and REG_MULTI_SZ. If you try to view a REG_EXPAND_SZ value, Regedit.exe displays it as a binary data type. If you try to edit either of these data types, Regedit.exe saves it as REG_SZ, and the data type no longer performs its intended function"

Then see
http://support.microsoft.com/default.aspx?scid=kb;EN-US;101230

REG_EXPAND_SZ
An expandable data string that is text containing a variable to be replaced when called by an application. For example, for the following value, the string "%SystemRoot%" will replaced by the actual location of the directory containing the Windows NT system files:    File : REG_EXPAND_SZ : %SystemRoot%\file.exe

REG_MULTI_SZ
This is a multiple string. Values that contain lists or multiple values in human readable text are usually this type. Entries are separated by NULL characters. For example, the following value entry specifies the binding rules for a network transport:    bindable : REG_MULTI_SZ : dlcDriver dlcDriver non non 50

0
 
LVL 57

Expert Comment

by:Pete Long
Comment Utility
ThanQ
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now