How is regsvr32 /u used?

Posted on 2005-04-06
Last Modified: 2013-12-29
I have seen regsvr32 mentioned as a method of validating a file.
When is it used?
What is the procedure?
What are the switches?
Question by:gonzal13
    LVL 24

    Expert Comment

    by:Dufo G. Belski
    It is used to register and unregister dlls in the registry (which makes the system recognize or not recognize them).  Sometimes a dll gets unregistered for an unknown reason, and sometimes after installing new software you need to register a dll.  

    You might use regsvr32 /u if a newer version of a dll becomes available.  You need to unregister it before you can delete it and copy in the new one.

    Syntax:  regsvr32 filename.dll registers it
                 regsvr32 /u filename.dll unregisters it
                 regsvr32 /s filename.dll registers it without prompting you to confirm it

    Two other switches, /i and /n, I am not familiar with.
    LVL 13

    Author Comment

    When does one know when a file needs to be registered.

    LVL 24

    Accepted Solution

    In my experience, when something goes wrong with Windows or a program.  You'll research the fix and be told to run it.  I don't think it's something you would routinely do, unless your a programmer; you might include some regsvr32 commands in your installer.
    LVL 13

    Author Comment

    You are right. After being on experts-exchange for about 3 hours a day 0n win98, I have very rarely seen a comment instructing one to use it.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Top 6 Sources for Identifying Threat Actor TTPs

    Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

    Update 11/3/2014 - Although the below article will get you to relocate the WINSXS folder, Microsoft has finally released a utility to reduce the size of the WINSXS folder. For some reason, it's not that straightforward. It only works on Windows 2008…
    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
    The viewer will learn how to successfully create a multiboot device using the SARDU utility on Windows 7. Start the SARDU utility: Change the image directory to wherever you store your ISOs, this will prevent you from having 2 copies of an ISO wit…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    10 Experts available now in Live!

    Get 1:1 Help Now