Flylib.com
Microsoft Windows Registry Guide, Second Edition
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Microsoft Windows Registry Guide, Second Edition
Copyright
Companion Content
Introduction
This Book Is DifferentReally
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
Part I: Registry Overview
Chapter 1: Learning the Basics
Heart and Soul of Windows
Registry Warnings and Myths
Must-Know Concepts
Registry Structure
Registry Organization
Registry Management Tools
Registry Hive Files
Chapter 2: Using Registry Editor
Running Regedit
Regedit
Searching for Data
Editing the Registry
Printing the Registry
Exporting Settings to Files
Working with Hive Files
Getting Beyond Basics
Chapter 3: Backing Up the Registry
Editing the Registry Safely
Using System Restore
Backing Up the Registry Regularly
Backing Up User Settings
Chapter 4: Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Reorganizing Control Panel
Customizing File Associations
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Logging On Automatically
Changing User Information
Looking for More Hacks
Chapter 5: Mapping Tweak UI
General
Mouse
Explorer
Common Dialog Boxes
Taskbar and Start Menu
Desktop
My Computer
Control Panel
Templates
Internet Explorer
Command Prompt
Logon
Chapter 6: Configuring Servers
Server Customizations
Authentication
Internet Information Services
Network Connections
Shutdown Event Tracker
Part II: Registry in Management
Chapter 7: Using Registry-Based Policy
Editing Local Policies
Extending Registry-Based Policy
Deploying Registry-Based Policy
Customizing Windows
Using the Group Policy Tools
Using DesktopStandard PolicyMaker
Finding More Resources
Chapter 8: Configuring Windows Security
Setting Permissions for Keys
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Configuring New Security Features
Internet Explorer Privacy Settings
Internet Explorer Security Zones
Chapter 9: Troubleshooting Problems
Fixing Corrupt Settings
Recovering from Disasters
Diagnosing Registry Corruption
Repairing a Corrupt Registry
Chapter 10: Finding Registry Settings
Comparing REG Files
Comparing with Reg.exe
Auditing the Registry
Monitoring the Registry
Chapter 11: Scripting Registry Changes
Choosing a Technique
Installing INF Files
Setting Values with REG Files
Editing from the Command Prompt
Scripting Using Windows Script Host
Creating Windows Installer Packages
Part III: Registry in Deployment
Chapter 12: Deploying User Profiles
Exploring User Profiles
Getting User Profiles
Using Roaming User Profiles
Deploying Default User Profiles
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Chapter 13: Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Removing Windows Installer Data
Inventorying Applications
Chapter 14: Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Adding Settings to Unattend.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
Chapter 15: Cloning Disks with Sysprep
Cloning Windows
Building a Disk Image
Reducing Image Count
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
Chapter 16: Configuring Windows PE
Exploring Windows PE
Using Windows PE as an Installation Platform
Customizing Windows PE
Starting Windows PE
Automating Installations
Chapter 17: Deploying Office 2003 Settings
Profile Wizard
Custom Installation Wizard
Custom Maintenance Wizard
Group and System Policy
Chapter 18: Fixing Common IT Problems
Controlling Just-in-Time Setup
Removing Components
Removing Policy Tattoos
Elevating Privileges of Processes
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
Part IV: Appendixes
Appendix A: File Associations
Merge Algorithm
File Extension Keys
Program Class Keys
Specialized Keys
COM Class Keys
Appendix B: Network Settings
HKCUNetwork
HKLMSYSTEMCurrentControlSetServices
Appendix C: Per-User Settings
AppEvents
Console
ControlPanel
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
SoftwareMicrosoftWindowsCurrentVersion
Appendix D: Per-Computer Settings
HARDWARE
SAM
SECURITY
SOFTWARE
SOFTWAREMicrosoftWindowsCurrentVersion
SYSTEM
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Study Strategies
Security Fundamentals
Web Application Hacking
Key Terms
Steganography
High-Speed Signal Propagation[c] Advanced Black Magic
Impedance of Linear, Time-Invariant, Lumped-Element Circuits
Dielectric Loss Region
Single-Ended Circuits
Pcb Applications
UTP Signal Propagation
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Strings, GDI+, and Error Handling in VB .NET
Console Application Input/Output
Creating an MP3 Player
Not Quite a Magic Ball
The Java Tutorial: A Short Course on the Basics, 4th Edition
How Will Java Technology Change My Life?
Code Samples
How to Throw Exceptions
Overview of Applets
Interoperability
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Application Menus
What Is a Formula?
What Are Commands?
Defining a Workflow Application
Endnotes
Sap Bw: a Step By Step Guide for Bw 2.0
Creating an InfoCube
Creating Update Rules for the InfoCube
Preparing to Load Data into the ODS Object, Then into an InfoCube
Loading Data from R/3 into BW
Section B.2. Dispatcher, Work Processes, and Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies