Browse Definitions :
Definition

registry key

In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry, an internal database the computer uses to store configuration information. The registry in Windows stores data in binary format, keeping the configuration data for the machine and its users in separate files. This allows the system and its applications to load global and individual configurations upon startup and login. 

When an administrator runs the command regedit, pre-defined keys called root keys, high-level keys or HKEYS display in the left pane of the Registry Editor window. To a lay person, a registry key looks just like any other Windows folder. A pre-defined key and its nested subkeys are collectively called a hive.

An application must open a key before it can add data to the registry, so having pre-defined keys that are always open helps an application navigate the registry. Although pre-defined keys cannot be changed, subkeys can be modified or deleted as long as the user has permission to do so and the subkey is not located directly under a high-level key.

Before making any changes to registry keys, however, Microsoft strongly recommends the registry be backed up and that the end user only change values in the registry that they understand or have been told to change by a trusted advisor. Keys and subkeys are referred to with a syntax that's similar to Windows' path names, using backslashes to indicate levels in the hierarchy. Edits to the registry that cause syntax errors can make the computer inoperable.

This was last updated in September 2012

Continue Reading About registry key

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Thanks, this really helped me :)
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close