Flylib.com
Microsoft Windows Registry Guide, Second Edition
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Microsoft Windows Registry Guide, Second Edition
Copyright
Companion Content
Introduction
This Book Is DifferentReally
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
Part I: Registry Overview
Chapter 1: Learning the Basics
Heart and Soul of Windows
Registry Warnings and Myths
Must-Know Concepts
Registry Structure
Registry Organization
Registry Management Tools
Registry Hive Files
Chapter 2: Using Registry Editor
Running Regedit
Regedit
Searching for Data
Editing the Registry
Printing the Registry
Exporting Settings to Files
Working with Hive Files
Getting Beyond Basics
Chapter 3: Backing Up the Registry
Editing the Registry Safely
Using System Restore
Backing Up the Registry Regularly
Backing Up User Settings
Chapter 4: Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Reorganizing Control Panel
Customizing File Associations
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Logging On Automatically
Changing User Information
Looking for More Hacks
Chapter 5: Mapping Tweak UI
General
Mouse
Explorer
Common Dialog Boxes
Taskbar and Start Menu
Desktop
My Computer
Control Panel
Templates
Internet Explorer
Command Prompt
Logon
Chapter 6: Configuring Servers
Server Customizations
Authentication
Internet Information Services
Network Connections
Shutdown Event Tracker
Part II: Registry in Management
Chapter 7: Using Registry-Based Policy
Editing Local Policies
Extending Registry-Based Policy
Deploying Registry-Based Policy
Customizing Windows
Using the Group Policy Tools
Using DesktopStandard PolicyMaker
Finding More Resources
Chapter 8: Configuring Windows Security
Setting Permissions for Keys
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Configuring New Security Features
Internet Explorer Privacy Settings
Internet Explorer Security Zones
Chapter 9: Troubleshooting Problems
Fixing Corrupt Settings
Recovering from Disasters
Diagnosing Registry Corruption
Repairing a Corrupt Registry
Chapter 10: Finding Registry Settings
Comparing REG Files
Comparing with Reg.exe
Auditing the Registry
Monitoring the Registry
Chapter 11: Scripting Registry Changes
Choosing a Technique
Installing INF Files
Setting Values with REG Files
Editing from the Command Prompt
Scripting Using Windows Script Host
Creating Windows Installer Packages
Part III: Registry in Deployment
Chapter 12: Deploying User Profiles
Exploring User Profiles
Getting User Profiles
Using Roaming User Profiles
Deploying Default User Profiles
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Chapter 13: Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Removing Windows Installer Data
Inventorying Applications
Chapter 14: Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Adding Settings to Unattend.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
Chapter 15: Cloning Disks with Sysprep
Cloning Windows
Building a Disk Image
Reducing Image Count
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
Chapter 16: Configuring Windows PE
Exploring Windows PE
Using Windows PE as an Installation Platform
Customizing Windows PE
Starting Windows PE
Automating Installations
Chapter 17: Deploying Office 2003 Settings
Profile Wizard
Custom Installation Wizard
Custom Maintenance Wizard
Group and System Policy
Chapter 18: Fixing Common IT Problems
Controlling Just-in-Time Setup
Removing Components
Removing Policy Tattoos
Elevating Privileges of Processes
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
Part IV: Appendixes
Appendix A: File Associations
Merge Algorithm
File Extension Keys
Program Class Keys
Specialized Keys
COM Class Keys
Appendix B: Network Settings
HKCUNetwork
HKLMSYSTEMCurrentControlSetServices
Appendix C: Per-User Settings
AppEvents
Console
ControlPanel
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
SoftwareMicrosoftWindowsCurrentVersion
Appendix D: Per-Computer Settings
HARDWARE
SAM
SECURITY
SOFTWARE
SOFTWAREMicrosoftWindowsCurrentVersion
SYSTEM
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Certified Ethical Hacker Exam Prep
Summary
Key Terms
Denial of Service
Certified Ethical Hacker
Appendix B. Preparing Your System for Knoppix-std
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Jump Start with SWT/JFace
SWT Event Handling, Threading, and Displays
Scales, Sliders, and Progress Bars
JFace Windows and Dialogs
Sample Application
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Counting the Number of Characters, Words, and Lines in a Text File
Classes
Initializing Class Member Variables
Copying a File
Creating a Thread
Developing Tablet PC Applications (Charles River Media Programming)
Introduction to Visual Basic .NET
Working with VB .NET
Form Effects
Advanced Microsoft Agent
Power Management for the Tablet PC
Managing Enterprise Systems with the Windows Script Host
Logon Scripts and Scheduling
Input/Output Streams
Registry Operations
System Administration
Exchange Server
Quartz Job Scheduling Framework: Building Open Source Enterprise Applications
Why job Scheduling Is Important
Whos Using Quartz?
Scheduling a Quartz Job Declaratively
Using Start and End Dates with CronTrigger
Thread Use in Listeners
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies