Solved

Compare Two Reg Files

Posted on 2004-08-19
3
3,696 Views
Last Modified: 2012-08-13
I exported 2 regkey files and would like to find out what the differences are between the two. Is there any free programs and\or easy ways to do this? I am trying to figure out which keys are changing when Outlook 2003 is set from normal mode to Cached mode so I can add it to my Laptop Config file.
0
Comment
Question by:noodleNT
3 Comments
 
LVL 69

Expert Comment

by:Callandor
ID: 11846199
I think Windiff will work.
0
 
LVL 11

Accepted Solution

by:
jgiordano earned 50 total points
ID: 11846214
http://www.pchardware.ro/Download/index.php?offset=10&catid=11&ord=1

see on the page  Advanced Registry Tracer  or  Active Registry Monitor
0
 

Author Comment

by:noodleNT
ID: 11846485
thats doing the trick. Thanks!
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
XP won't boot 27 155
Outlook 2010 Password Issue After Microsoft Update 11 91
partition magic 8 extend into d drive 7 75
Run Access2013-32bit under WinXP? 4 24
If you build your web application in Visual Studio you'll get at least a few binaries, or .DLL, files in your bin folder. However, there is more compiling to be done. Normally this would happen when an ASP.NET resource within the web site is request…
Today, still in the boom of Apple, PC's and products, nearly 50% of the computer users use Windows as graphical operating systems. If you are among those users who love windows, but are grappling to keep the system's hard drive optimized, then you s…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question