Updating a registry key command
According to Microsoft, this offers several advantages over . Since file parsing is done much more efficiently with a binary format, it may be read from or written to more quickly than an INI file.
As well, strongly typed data can be stored in the registry, as opposed to the text information stored in . This is a benefit when editing keys manually using , the built-in Windows Registry Editor.
Each registry value stored in a registry key has a unique name whose letter case is not significant.
The Windows API functions that query and manipulate registry values take value names separately from the key path and/or handle that identifies the parent key.
In this sense, the entire registry was like a single associative array where the registry keys (in both the registry sense and dictionary sense) formed a hierarchy, and the registry values were all strings.Because the registry is a database, it offers improved system integrity with features such as atomic updates.If two processes attempt to update the same registry value at the same time, one process's change will precede the other's and the overall consistency of the data will be maintained. INI files, such race conditions can result in inconsistent data that does not match either attempted update.There are seven predefined root keys, traditionally named according to their constant handles defined in the Win32 API, or by synonymous abbreviations (depending on applications): Like other files and services in Windows, all registry keys may be restricted by access control lists (ACLs), depending on user privileges, or on security tokens acquired by applications, or on system security policies enforced by the system (these restrictions may be predefined by the system itself, and configured by local system administrators or by domain administrators).Different users, programs, services or remote systems may only see some parts of the hierarchy or distinct hierarchies from the same root keys.
Using WMI, you cannot set access security on a registry key. Check Access method compares the security settings of the current user to the security descriptor on a registry key to determine if the user has a specific permission, such as KEY_SET_VALUE.