Solved

Compare Two Reg Files

Posted on 2004-08-19
3
3,707 Views
Last Modified: 2012-08-13
I exported 2 regkey files and would like to find out what the differences are between the two. Is there any free programs and\or easy ways to do this? I am trying to figure out which keys are changing when Outlook 2003 is set from normal mode to Cached mode so I can add it to my Laptop Config file.
0
Comment
Question by:noodleNT
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 69

Expert Comment

by:Callandor
ID: 11846199
I think Windiff will work.
0
 
LVL 11

Accepted Solution

by:
jgiordano earned 50 total points
ID: 11846214
http://www.pchardware.ro/Download/index.php?offset=10&catid=11&ord=1

see on the page  Advanced Registry Tracer  or  Active Registry Monitor
0
 

Author Comment

by:noodleNT
ID: 11846485
thats doing the trick. Thanks!
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There are 2 things you must have in order to connect to the internet behind a router, The "Gateway IP" of the router, which is usually something like 192.168.xxx.1, I've seen routers with default values of: 192.168.0.1, 192.168.1.1, 192.168.11.1, …
If your system is showing symptoms of browser hijacks or 'google search redirects' check out my other article (http://rdsrc.us/u3GP7A) first and run the tool TDSSKiller (http://rdsrc.us/GDBBs4) to get rid of the infection. Once done, and if the …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question