Flylib.com
List of Listings
Previous page
Table of content
Next page
Chapter 2: Using the Registry Editor
Listing 2-1: Sample Printer Output
Listing 2-2: Sample Version 5 REG File
Listing 2-3: Sample Version 4 REG File
Chapter 4: Hacking the Registry
Listing 4-1: Redirect.inf
Listing 4-2: Tweakui.inf
Listing 4-3: Cmdhere.inf
Listing 4-4: Fromhere.inf
Listing 4-5: Resort.inf
Listing 4-6: Magnify.htm
Listing 4-7: Search.inf
Chapter 6: Using Registry-Based Policy
Listing 6-1: example.adm
Listing 6-2: example.adm
Listing 6-3: example.adm
Listing 6-4: example.adm
Listing 6-5: example.adm
Listing 6-6: example.adm
Listing 6-7: example.adm
Listing 6-8: example.adm
Listing 6-9: example.adm
Listing 6-10: example.adm
Listing 6-11: example.adm
Listing 6-12: example.adm
Listing 6-13: example.adm
Listing 6-14: example.adm
Listing 6-15: example.adm
Listing 6-16: example.adm
Listing 6-17: Tweakui.adm
Chapter 9: Scripting Registry Changes
Listing 9-1: Example.inf
Listing 9-2: Setup Information File.inf
Listing 9-3: Example.inf
Listing 9-4: Strings.inf
Listing 9-5: Example.reg
Listing 9-6: Login.bat
Listing 9-7: Example.js
Chapter 11: Mapping Windows Installer
Listing 11-1: Inventory.vbs
Listing 11-2: Software.vbs
Chapter 12: Deploying with Answer Files
Listing 12-1: Unattend.txt
Listing 12-2: Unattend.txt
Chapter 13: Cloning Disks with Sysprep
Listing 13-1: Sysprep.inf
Chapter 14: Microsoft Office XP User Settings
Listing 14-1: OPW10adm.ini
Chapter 15: Working Around IT Problems
Listing 15-1: Outlook.inf
Listing 15-2: Unattend.txt
Listing 15-3: Sysoc.inf
Listing 15-4: Tattoos.inf
Listing 15-5: Install.inf
Appendix B: Per-User Settings
Listing B-1: Magnify.htm
Previous page
Table of content
Next page
Microsoft Windows XP Registry Guide (Bpg-Other)
ISBN: 0735617880
EAN: 2147483647
Year: 2005
Pages: 185
Authors:
Jerry Honeycutt
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Total Quality Management
In-Process Metrics for Software Testing
Complexity Metrics and Models
Customer Satisfaction Surveys
Getting Started with a Software Metrics Program
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Managing Activity Risks
Monitoring and Controlling Risky Projects
Conclusion
C++ How to Program (5th Edition)
Wrap-Up
Iterators
Algorithms
F.1. Introduction
J.12. Basic XHTML Forms
Postfix: The Definitive Guide
Configuration Files
Queue Tools
Inbound Mail Gateway
The Nature of Spam
Content Filtering
Introduction to 80x86 Assembly Language and Computer Architecture
Procedures
Decimal Arithmetic
Input/Output
Appendix B Useful MS-DOS Commands
Appendix C MASM 6.11 Reserved Words
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Triggers
Attacking Oracle PL/SQL Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies