Flylib.com
Microsoft Windows Registry Guide, Second Edition
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Microsoft Windows Registry Guide, Second Edition
Copyright
Companion Content
Introduction
This Book Is DifferentReally
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
Part I: Registry Overview
Chapter 1: Learning the Basics
Heart and Soul of Windows
Registry Warnings and Myths
Must-Know Concepts
Registry Structure
Registry Organization
Registry Management Tools
Registry Hive Files
Chapter 2: Using Registry Editor
Running Regedit
Regedit
Searching for Data
Editing the Registry
Printing the Registry
Exporting Settings to Files
Working with Hive Files
Getting Beyond Basics
Chapter 3: Backing Up the Registry
Editing the Registry Safely
Using System Restore
Backing Up the Registry Regularly
Backing Up User Settings
Chapter 4: Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Reorganizing Control Panel
Customizing File Associations
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Logging On Automatically
Changing User Information
Looking for More Hacks
Chapter 5: Mapping Tweak UI
General
Mouse
Explorer
Common Dialog Boxes
Taskbar and Start Menu
Desktop
My Computer
Control Panel
Templates
Internet Explorer
Command Prompt
Logon
Chapter 6: Configuring Servers
Server Customizations
Authentication
Internet Information Services
Network Connections
Shutdown Event Tracker
Part II: Registry in Management
Chapter 7: Using Registry-Based Policy
Editing Local Policies
Extending Registry-Based Policy
Deploying Registry-Based Policy
Customizing Windows
Using the Group Policy Tools
Using DesktopStandard PolicyMaker
Finding More Resources
Chapter 8: Configuring Windows Security
Setting Permissions for Keys
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Configuring New Security Features
Internet Explorer Privacy Settings
Internet Explorer Security Zones
Chapter 9: Troubleshooting Problems
Fixing Corrupt Settings
Recovering from Disasters
Diagnosing Registry Corruption
Repairing a Corrupt Registry
Chapter 10: Finding Registry Settings
Comparing REG Files
Comparing with Reg.exe
Auditing the Registry
Monitoring the Registry
Chapter 11: Scripting Registry Changes
Choosing a Technique
Installing INF Files
Setting Values with REG Files
Editing from the Command Prompt
Scripting Using Windows Script Host
Creating Windows Installer Packages
Part III: Registry in Deployment
Chapter 12: Deploying User Profiles
Exploring User Profiles
Getting User Profiles
Using Roaming User Profiles
Deploying Default User Profiles
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Chapter 13: Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Removing Windows Installer Data
Inventorying Applications
Chapter 14: Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Adding Settings to Unattend.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
Chapter 15: Cloning Disks with Sysprep
Cloning Windows
Building a Disk Image
Reducing Image Count
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
Chapter 16: Configuring Windows PE
Exploring Windows PE
Using Windows PE as an Installation Platform
Customizing Windows PE
Starting Windows PE
Automating Installations
Chapter 17: Deploying Office 2003 Settings
Profile Wizard
Custom Installation Wizard
Custom Maintenance Wizard
Group and System Policy
Chapter 18: Fixing Common IT Problems
Controlling Just-in-Time Setup
Removing Components
Removing Policy Tattoos
Elevating Privileges of Processes
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
Part IV: Appendixes
Appendix A: File Associations
Merge Algorithm
File Extension Keys
Program Class Keys
Specialized Keys
COM Class Keys
Appendix B: Network Settings
HKCUNetwork
HKLMSYSTEMCurrentControlSetServices
Appendix C: Per-User Settings
AppEvents
Console
ControlPanel
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
SoftwareMicrosoftWindowsCurrentVersion
Appendix D: Per-Computer Settings
HARDWARE
SAM
SECURITY
SOFTWARE
SOFTWAREMicrosoftWindowsCurrentVersion
SYSTEM
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
MySQL Stored Procedure Programming
Performing Dynamic SQL with Prepared Statements
Editing an Existing Stored Program
The Pros and Cons of Stored Programs in Modern Applications
Review of Perl DBD::mysql Basics
Tuning Table Access
Project Management JumpStart
Building the Foundation
Initiating the Project
Defining the Project Goals
Planning and Acquiring Resources
Appendix A Answers to Review Questions
Documenting Software Architectures: Views and Beyond
P.5. Viewtypes and Styles
Client-Server Style
Elements, Relations, and Properties of the Allocation Viewtype
Discussion Questions
Discussion Questions
Postfix: The Definitive Guide
Unix Topics
POP and IMAP
Mailing-List Managers
Content Filtering
Other Considerations
File System Forensic Analysis
Data Organization
Summary
Bibliography
Bibliography
Summary
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
Objects, Interfaces, and Patterns
XML
Printing and Drawing with GDI+
Remoting and Enterprise Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies