Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Windows XP Registry Overview
Table 1.1: Registry Root Keys
Table 1.2: Registry Data Types
Table 1.3: Windows NT/2000 Registry Hives
Table 1.4: Types of Files Associated to Windows NT 4.0/Windows 2000/Windows XP Registry Hives
Chapter 3: Using Registry Editor
Table 3.1: Keyboard Shortcuts Used in Regedit.exe
Table 3.2: Icons Used for Designating Registry Data Types in Regedit.exe
Table 3.3: Registry Key Permission Types
Table 3.4: The Special Access Options
Table 3.5: Auditing Option Types for Registry Keys
Chapter 4: The Easiest Ways to Customize Windows
Table 4.1:
[boot loader]
Section Parameters
Table 4.2: Boot.ini Switches
Chapter 5: Plug and Play in Windows XP
Table 5.1: Plug and Play Support Levels for Devices and Drivers
Table 5.2: Registry Keys Modified Using the Power Schemes Tab Controls
Table 5.3: Registry Keys Modified by Setting Parameters of the Advanced Tab
Chapter 6: Registry and the System Boot Process
Table 6.1: Files Required to Start Up Windows NT/2000/XP (
x
86 Platforms)
Table 6.2: Windows XP Startup Files for Itanium-Based Systems
Chapter 7: Registry Key Reference
Table 7.1: Subkeys Contained within the
HKEY_LOCAL_MACHINE
Root Key
Table 7.2: Typical subkeys of the
Control
Key for All Control Sets
Table 7.3: Standard Subkeys of the
HKEY_CURRENT_USER
Registry Key
Chapter 8: Network Settings in the Registry
Table 8.1: Local Area Connection Icons
Table 8.2: Types of Network Components
Table 8.3: Network Component Classes and Their Respective ClaseGuid Values
Chapter 9: Securing the Registry
Table 9.1: Default Windows 2000/XP Access Rights to File System Objects
Table 9.2: Windows 2000 Default Registry Key Permissions Assigned to Users and Power Users
Table 9.3: Levels of Permissions Provided by Windows XP
Table 9.4: Influence of the ForceGuest Registry Value on the Sharing UI and ACL Editor Behavior
Chapter 10: Managing the User Working Environments
Table 10.1: User Profile Settings
Table 10.2: User Profile Locations
Table 10.3: Folders that Roam with the Profile
Table 10.4: Windows 2000 Incremental Security Templates
Chapter 11: Troubleshooting Common Problems
Table 11.1: Brief Description of Windows XP Startup Process
Table 11.2: Startup Problem Symptoms
Table 11.3: The List of Default Settings Under the
FilesNotToBackup
Key
Table 11.4: Default Settings Stored under the
HKLM\SYSTEM\Current ControlSet\Control\BackupRestore\KeysNotToRestore
Registry Key
Chapter 14: Automating Registry Management with WSH
Table 14.1: WSH Versions Implemented by Microsoft Operating Systems
Table 14.2: Abbreviations for the Registry Root Key Names
Table 14.3: Acceptable Values of the strType Argument for the RegWrite Method
Previous page
Table of content
Next page
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
The Guiding Principles of Agile Project Management
Judgment Required
Phase: Envision
Individual Performance
Practice: Coaching and Team Development
Absolute Beginner[ap]s Guide to Project Management
The Process of Building a WBS
What Exactly Is a Project Change and Whats the Big Deal Anyway?
What Is "Project Quality"?
Proven Techniques
Seven Tips for Sellers
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Data Access
Working with Console Applications
GDI+
Coding Conventions
Junos Cookbook (Cookbooks (OReilly))
Scheduling the Activation of a Configuration
Allowing Access to the Router
Introduction
Reordering Firewall Terms
Limiting the Group Ranges an RP Services
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
Success Story #2 Bank One Bigger… Now Better
Success Story #3 Fort Wayne, Indiana From 0 to 60 in nothing flat
Phase 2 Engagement (Creating Pull)
Phase 4 Performance and Control
Service Process Challenges
.NET System Management Services
Using the System.Management Namespace
Querying WMI
Handling WMI Events
Instrumenting .NET Applications with WMI
The WMI Schema
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies