labs
connectivity, 8–50, 8–56
Internet Explorer, 5–47, 5–55
locally attached devices, 12–15
multiboot computers, 11–20, 11–26
Office installations, 6–49, 6–56
Office troubleshooting, 7–54, 7–61
operating systems, 3–49 to 3–50
Outlook, 4–51
security, 9–41, 9–48, 10–31
LAN connections, re–creating, 8–18
LAN e–mail account settings, 4–7
Language Bar, 3–24
languages
automatic detections, 6–38
changing, 3–22 to 3–23
common problems, 3–24 to 3–25
input languages, 3–23 to 3–24
Internet Explorer options, 5–5 to 5–6
Outlook Express, 7–41
overview, 3–21 to 3–22
text proofing, 6–37 to 6–39
toggling, 3–23, 3–26
Word formats, 7–9
laptops, wireless access points, 12–5
large documents, archiving, 5–20
Large Icons option, 6–25
large network permissions, 9–14
leaving e–mail copy on servers, 4–8, 4–44 to 4–45, 4–47
left corner, Start menu pinning, 3–15
leftover messages, 3–11
legacy program compatibilities, 6–8 to 6–9
legacy systems name resolution, 8–42
lengths
passwords, 9–26
share files, 9–6
licenses, 6–5, 6–13
Limited accounts, 11–3
limiting website content, 5–12 to 5–13
lines, taskbar handles, 3–8
linking objects in files, 7–11 to 7–13
links, taskbar toolbars, 3–12
Links toolbars, 3–12, 5–32
List Folder Contents permissions, 9–10
List Font Names In Their Font option, 6–26
lists
All Programs, 3–14
e–mail messages, 4–34, 4–40
frequently used programs area, 3–14
local user profiles, 9–5
websites, previously viewed, 5–7
LMHOSTS, 8–43
Local Administrator accounts, 11–2
local group privileges, built–in, 9–14 to 9–16
Local Intranet zone, 5–38 to 5–40
local policies
audit options, 9–29
described, 9–24
domain Group Policy settings, 9–37
overriding, 9–24
overview, 9–29
program installations, 6–10
security options, 9–31, 9–33
user rights assignment options, 9–30, 9–32
local security settings
account policies, 9–25 to 9–29
local policies, 9–29 to 9–31
overview, 9–24
local user accounts, multiple, 11–2 to 11–7
localized help information, 2–10
localized templates, attaching, 6–40
locally attached devices
connection types, 12–2 to 12–9
handhelds, 12–10 to 12–19
labs, 12–15
overview, 12–1
locating
hardware, 8–4
ICF log files, 10–12
installed programs, 11–16
local user profiles, 9–5
lost e–mails, 7–42, 7–49 to 7–50
lost files, 7–14 to 7–15, 7–29, 7–35
Outlook appointments and meetings, 7–47
programs to open files, 3–36
unread e–mails, 4–33
websites, previously viewed, 5–7
locations
automatic file saves, 7–14
HOSTS files, 8–44
LMHOSTS files, 8–43
Office file options, 6–33
Office installation file folders, 6–16
Lock Computer option, 9–38
locked taskbars, 3–8, 3–10 to 3–11
locked toolbars, 5–33
lockout options, account policies, 9–27, 9–32
logging
files, viewing, 6–20
Internet Connection Firewall, 10–11 to 10–13
problem resolution, 2–18
logical groupings vs. physical layouts, 1–10
logical networks
corporate environments, 1–8 to 1–11
domains, 1–9 to 1–11
workgroups, 1–8
logical partitions, 11–9
logons
account policies, 9–24 to 9–29
domains, 8–22
e–mail name or address problems, 4–39
passwords, changing at, 9–28
logos, customizing Title bar, 5–10 to 5–12
loopback addresses, pinging, 8–32
low privacy settings, 5–26
low security zone settings, 5–39