Solved

Supporting Multiple Forests With Xendesktop

Posted on 2010-11-30
2
1,038 Views
Last Modified: 2012-05-10
How many Characters does the registry Key
HKLM\Software\citrix\desktopserver\
ADForestScope   REG_SZ?
Another words is the limit 256 characters on a WIN2K3  32 bit server?
0
Comment
Question by:sjasmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 4

Accepted Solution

by:
realParker earned 250 total points
ID: 34244331
The following table lists the data types that are currently defined and that are used by Windows. The maximum size of a value name is as follows:

    * Windows Server 2003, Windows XP, and Windows Vista: 16,383 characters
    * Windows 2000: 260 ANSI characters or 16,383 Unicode characters
    * Windows Millennium Edition/Windows 98/Windows 95: 255 characters

Long values (more than 2,048 bytes) must be stored as files with the file names stored in the registry. This helps the registry perform efficiently. The maximum size of a value is as follows:

    * Windows NT 4.0/Windows 2000/Windows XP/Windows Server 2003/Windows Vista: Available memory
    * Windows Millennium Edition/Windows 98/Windows 95: 16,300 bytes

Note There is a 64K limit for the total size of all values of a key.

This is from http://support.microsoft.com/kb/256986
0
 

Author Closing Comment

by:sjasmin
ID: 34249120
Thx that is what I was looking for
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

#CITRIX #XENDESKTOP #POC #Citrix Studio
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question