Flylib.com
Microsoft Windows Registry Guide, Second Edition
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Microsoft Windows Registry Guide, Second Edition
Copyright
Companion Content
Introduction
This Book Is DifferentReally
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
Part I: Registry Overview
Chapter 1: Learning the Basics
Heart and Soul of Windows
Registry Warnings and Myths
Must-Know Concepts
Registry Structure
Registry Organization
Registry Management Tools
Registry Hive Files
Chapter 2: Using Registry Editor
Running Regedit
Regedit
Searching for Data
Editing the Registry
Printing the Registry
Exporting Settings to Files
Working with Hive Files
Getting Beyond Basics
Chapter 3: Backing Up the Registry
Editing the Registry Safely
Using System Restore
Backing Up the Registry Regularly
Backing Up User Settings
Chapter 4: Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Reorganizing Control Panel
Customizing File Associations
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Logging On Automatically
Changing User Information
Looking for More Hacks
Chapter 5: Mapping Tweak UI
General
Mouse
Explorer
Common Dialog Boxes
Taskbar and Start Menu
Desktop
My Computer
Control Panel
Templates
Internet Explorer
Command Prompt
Logon
Chapter 6: Configuring Servers
Server Customizations
Authentication
Internet Information Services
Network Connections
Shutdown Event Tracker
Part II: Registry in Management
Chapter 7: Using Registry-Based Policy
Editing Local Policies
Extending Registry-Based Policy
Deploying Registry-Based Policy
Customizing Windows
Using the Group Policy Tools
Using DesktopStandard PolicyMaker
Finding More Resources
Chapter 8: Configuring Windows Security
Setting Permissions for Keys
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Configuring New Security Features
Internet Explorer Privacy Settings
Internet Explorer Security Zones
Chapter 9: Troubleshooting Problems
Fixing Corrupt Settings
Recovering from Disasters
Diagnosing Registry Corruption
Repairing a Corrupt Registry
Chapter 10: Finding Registry Settings
Comparing REG Files
Comparing with Reg.exe
Auditing the Registry
Monitoring the Registry
Chapter 11: Scripting Registry Changes
Choosing a Technique
Installing INF Files
Setting Values with REG Files
Editing from the Command Prompt
Scripting Using Windows Script Host
Creating Windows Installer Packages
Part III: Registry in Deployment
Chapter 12: Deploying User Profiles
Exploring User Profiles
Getting User Profiles
Using Roaming User Profiles
Deploying Default User Profiles
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Chapter 13: Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Removing Windows Installer Data
Inventorying Applications
Chapter 14: Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Adding Settings to Unattend.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
Chapter 15: Cloning Disks with Sysprep
Cloning Windows
Building a Disk Image
Reducing Image Count
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
Chapter 16: Configuring Windows PE
Exploring Windows PE
Using Windows PE as an Installation Platform
Customizing Windows PE
Starting Windows PE
Automating Installations
Chapter 17: Deploying Office 2003 Settings
Profile Wizard
Custom Installation Wizard
Custom Maintenance Wizard
Group and System Policy
Chapter 18: Fixing Common IT Problems
Controlling Just-in-Time Setup
Removing Components
Removing Policy Tattoos
Elevating Privileges of Processes
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
Part IV: Appendixes
Appendix A: File Associations
Merge Algorithm
File Extension Keys
Program Class Keys
Specialized Keys
COM Class Keys
Appendix B: Network Settings
HKCUNetwork
HKLMSYSTEMCurrentControlSetServices
Appendix C: Per-User Settings
AppEvents
Console
ControlPanel
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
SoftwareMicrosoftWindowsCurrentVersion
Appendix D: Per-Computer Settings
HARDWARE
SAM
SECURITY
SOFTWARE
SOFTWAREMicrosoftWindowsCurrentVersion
SYSTEM
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Basic Security Principles
Best Practices for Quantitative and Qualitative Risk Assessment
Understanding the Attacker
Information Request Form
SIRT Incident Report
SQL Tips & Techniques (Miscellaneous)
Working with Queries, Expressions, and Aggregate Functions
Creating Indexes for Fast Data Retrieval
Working with Functions, Parameters, and Data Types
Understanding SQL Subqueries
Retrieving and Manipulating Data Through Cursors
The CISSP and CAP Prep Guide: Platinum Edition
Information Security and Risk Management
Access Control
Business Continuity Planning and Disaster Recovery Planning
Physical (Environmental) Security
The Accreditation Phase
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Arrays And Vectors
An Object Orientation
Exceptions
More Java
AutoCAD 2005 and AutoCAD LT 2005. No Experience Required
Using Layers to Organize Your Drawing
Generating Elevations
Controlling Text in a Drawing
Dimensioning a Drawing
Appendix A Look at Drawing in 3D
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Data Manipulation Statements
Generating Reports with SQL*Plus
Master/Detail Reports in HTML
Scripting Issues with iSQL*Plus
Section B.1. Formatting Numbers
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies