Flylib.com
Microsoft Windows Registry Guide, Second Edition
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Microsoft Windows Registry Guide, Second Edition
Copyright
Companion Content
Introduction
This Book Is DifferentReally
Power Users First, Then IT Professionals
Some Terminology
Why I Love Windows XP
Sample Files and Scripts
Resource Kit Support Policy
Final Note
System Requirements
Part I: Registry Overview
Chapter 1: Learning the Basics
Heart and Soul of Windows
Registry Warnings and Myths
Must-Know Concepts
Registry Structure
Registry Organization
Registry Management Tools
Registry Hive Files
Chapter 2: Using Registry Editor
Running Regedit
Regedit
Searching for Data
Editing the Registry
Printing the Registry
Exporting Settings to Files
Working with Hive Files
Getting Beyond Basics
Chapter 3: Backing Up the Registry
Editing the Registry Safely
Using System Restore
Backing Up the Registry Regularly
Backing Up User Settings
Chapter 4: Hacking the Registry
Redirecting Special Folders
Customizing Shell Folders
Reorganizing Control Panel
Customizing File Associations
Adding File Templates
Preventing Messenger from Running
Personalizing the Start Menu
Disabling Windows Tour
Creating Program Aliases
Customizing Internet Explorer
Clearing History Lists
Running Programs at Startup
Controlling Registry Editor
Logging On Automatically
Changing User Information
Looking for More Hacks
Chapter 5: Mapping Tweak UI
General
Mouse
Explorer
Common Dialog Boxes
Taskbar and Start Menu
Desktop
My Computer
Control Panel
Templates
Internet Explorer
Command Prompt
Logon
Chapter 6: Configuring Servers
Server Customizations
Authentication
Internet Information Services
Network Connections
Shutdown Event Tracker
Part II: Registry in Management
Chapter 7: Using Registry-Based Policy
Editing Local Policies
Extending Registry-Based Policy
Deploying Registry-Based Policy
Customizing Windows
Using the Group Policy Tools
Using DesktopStandard PolicyMaker
Finding More Resources
Chapter 8: Configuring Windows Security
Setting Permissions for Keys
Mapping Default Permissions
Taking Ownership of Keys
Auditing Registry Access
Preventing Local Registry Access
Restricting Remote Registry Access
Deploying Security Templates
Configuring New Security Features
Internet Explorer Privacy Settings
Internet Explorer Security Zones
Chapter 9: Troubleshooting Problems
Fixing Corrupt Settings
Recovering from Disasters
Diagnosing Registry Corruption
Repairing a Corrupt Registry
Chapter 10: Finding Registry Settings
Comparing REG Files
Comparing with Reg.exe
Auditing the Registry
Monitoring the Registry
Chapter 11: Scripting Registry Changes
Choosing a Technique
Installing INF Files
Setting Values with REG Files
Editing from the Command Prompt
Scripting Using Windows Script Host
Creating Windows Installer Packages
Part III: Registry in Deployment
Chapter 12: Deploying User Profiles
Exploring User Profiles
Getting User Profiles
Using Roaming User Profiles
Deploying Default User Profiles
Coexisting with Earlier Versions of Windows
Migrating User Settings to Windows
Chapter 13: Mapping Windows Installer
Repairing Registry Settings
Managing Windows Installer with Policies
Removing Windows Installer Data
Inventorying Applications
Chapter 14: Deploying with Answer Files
Creating Distribution Folders
Customizing Answer Files
Adding Settings to Unattend.txt
Adding Multiple Settings with One Script
Logging On Automatically After Installation
Chapter 15: Cloning Disks with Sysprep
Cloning Windows
Building a Disk Image
Reducing Image Count
Removing the Paging File
Mapping Sysprep Settings
Keeping Perspective
Chapter 16: Configuring Windows PE
Exploring Windows PE
Using Windows PE as an Installation Platform
Customizing Windows PE
Starting Windows PE
Automating Installations
Chapter 17: Deploying Office 2003 Settings
Profile Wizard
Custom Installation Wizard
Custom Maintenance Wizard
Group and System Policy
Chapter 18: Fixing Common IT Problems
Controlling Just-in-Time Setup
Removing Components
Removing Policy Tattoos
Elevating Privileges of Processes
Severing File Associations
Deploying Office Trusted Sources
Enabling Remote Desktop Remotely
Customizing the Windows Logon
Restoring Administrative Shares
Changing Source Location
Part IV: Appendixes
Appendix A: File Associations
Merge Algorithm
File Extension Keys
Program Class Keys
Specialized Keys
COM Class Keys
Appendix B: Network Settings
HKCUNetwork
HKLMSYSTEMCurrentControlSetServices
Appendix C: Per-User Settings
AppEvents
Console
ControlPanel
Environment
Keyboard Layout
Network
Printers
SessionInformation
Software
SoftwareMicrosoftWindowsCurrentVersion
Appendix D: Per-Computer Settings
HARDWARE
SAM
SECURITY
SOFTWARE
SOFTWAREMicrosoftWindowsCurrentVersion
SYSTEM
Microsoft Windows Registry Guide, Second Edition
ISBN: 0735622183
EAN: 2147483647
Year: 2003
Pages: 186
Authors:
Jerry Honeycutt
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
An Agile Process Framework
Phase: Close
Project Size
Practice: Participatory Decision Making
A Scaled Adaptive Framework
Absolute Beginner[ap]s Guide to Project Management
Important Questions Project Planning Should Answer
The Process of Building a WBS
The Impact of the Project Schedule
Common Budget Challenges
Power of Servant Leadership Approach
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Cause and Effect
Matte and Keying Plug-ins
Static Matte Painting in Photoshop
Scale and Speed
Atmosphere, Film, and Noise Effects
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Transactions
Unions
Following a Methodology
Generating the Entire Page
Section A.2. Commands You Can Issue Within SQL*Plus
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Value Stream Mapping and Process Flow Tools
Variation Analysis
Identifying and Verifying Causes
Reducing Lead Time and Non-Value-Add Cost
Selecting and Testing Solutions
Python Standard Library (Nutshell Handbooks) with
The anydbm Module
The _winreg Module
The grep Module
The soundex Module
The regsub Module
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies