Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Learning the Basics
Table 1-1: Well-Known SIDs
Table 1-2: Hexadecimal Digits
Table 1-3: Root Keys
Table 1-4: Value Types
Table 1-5: Hive File Name Extensions
Table 1-6: Hive Files
Chapter 2: Using the Registry Editor
Table 2-1: Keyboard Shortcuts
Table 2-2: Binary and String Icons
Table 2-3: REG File Data Formats
Chapter 3: Backing up the Registry
Table 3-1: Merging REG Files
Table 3-2: Backing Up the Registry with Reg.exe
Table 3-3: Recovery Console Environment Settings
Chapter 4: Hacking the Registry
Table 4-1: Special Folders
Table 4-2: Special Object Classes
Table 4-3: NameSpace Subkeys
Table 4-4: Start Menu Settings
Table 4-5: Internet Explorer Menu Extensions
Table 4-6: Values in Search URLs
Table 4-7: History Lists
Table 4-8: Values in Winlogon
Chapter 5: Mapping Tweak UI
Table 5-1: Values in General
Table 5-2: Values in Focus
Table 5-3: Values in Mouse
Table 5-4: Values in Hover
Table 5-5: Values in Wheel
Table 5-6: Values in X-Mouse
Table 5-7: Values in Explorer
Table 5-8: Values in Shortcut
Table 5-9: Values in Colors
Table 5-10: Values in Thumbnails
Table 5-11: Subkeys for Command Keys
Table 5-12: Values in Common Dialog Boxes
Table 5-13: Folders for the Places Bar
Table 5-14: Values in Taskbar
Table 5-15: Values in Grouping
Table 5-16: Values in XP Start Menu
Table 5-17: Values in Desktop
Table 5-18: Values in First Icon
Table 5-19: Values in My Computer
Table 5-20: Values in Special Folders
Table 5-21: Values in Autoplay Drive Types
Table 5-22: Values in Autoplay Handlers
Table 5-23: Values in Control Panel
Table 5-24: Values in Templates
Table 5-25: Values in Internet Explorer
Table 5-26: Values in Search
Table 5-27: Values in Command Prompt
Table 5-27: Values in Autologon
Chapter 6: Using Registry-Based Policy
Table 6-1: Policies Compared to Preferences
Table 6-2: Group Policy Compared to System Policy
Chapter 7: Managing Registry Security
Table 7-1: Default Permissions in the Registry
Chapter 8: Finding Registry Settings
Table 8-1: Regmon Request Types and Data
Chapter 9: Scripting Registry Changes
Table 9-1: Comparison of Scripting Methods
Table 9-2: Value Formats in REG files
Table 9-3: Special Characters in REG Files
Table 9-4: Key and Value Formatting
Chapter 10: Deploying User Profiles
Table 10-1: Location of User Profiles
Table 10-2: User Profile Folders
Table 10-3: Roaming and Redirecting Folders
Table 10-4: History Lists to Remove
Chapter 11: Mapping Windows Installer
Table 11-1: Secure Windows Installer Settings
Chapter 12: Deploying with Answer Files
Table 12-1: Setup Manager Pages
Chapter 13: Cloning Disks with Sysprep
Table 13-1: Sysprep Registry Settings
Chapter 15: Working Around IT Problems
Table 15-1: Components in Installed Components
Table 15-2: Configuring Autologon
Appendix A: File Associations
Table A-1: Bits in
EditFlags
Table A-2: Special Classes in
HKCR\CLSID
Appendix B: Per-User Settings
Table B-1: Bits in UserPreferencesMask
Table B-2: Values for
DefaultColor
Table B-3: Internet Explorer Menu Extensions
Table B-4: Values in SearchURLs
Table B-5: History Lists in Search Assistant
Table B-6: Start Menu Settings
Table B-7: Special Folders
Appendix C: Per-Computer Settings
Table C-1: Values for DefaultColor
Table C-2: Values in AutoplayHandlers
Table C-3: Special Folders
Appendix D: Group Policies
Table 19-1: Policies in Conf.adm
Table 19-2: Policies in Inetcorp.adm
Table 19-3: Policies in Inetres.adm
Table 19-4: Policies in Inetset.adm
Table 19-5: Policies in System.adm
Table 19-6: Policies in Wmplayer.adm
Previous page
Table of content
Next page
Microsoft Windows XP Registry Guide (Bpg-Other)
ISBN: 0735617880
EAN: 2147483647
Year: 2005
Pages: 185
Authors:
Jerry Honeycutt
BUY ON AMAZON
Software Configuration Management
Configuration Control
Configuration Management and Software Engineering Standards Reference
Appendix D Problem Change Report
Appendix T Software Configuration Management Plan (SCMP)
Appendix V Functional Configuration Audit (FCA) Checklist
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Initial Startup and Common Pitfalls
Auditing the Kanban
Appendix A MRP vs. Kanban
Appendix B Kanban Supermarkets
Appendix E EOQ vs. Kanban
Cisco Voice Gateways and Gatekeepers
Gateways and Gatekeepers
When to Use H.323
Dial Peer Matching
Using Trunk Groups
Case Study: Providing Enterprise VoIP Trunking to VoIP Service of the Service Provider
Cisco CallManager Fundamentals (2nd Edition)
Circuit-Switched Systems
Meet-Me Conferencing
Understanding Field Data in CDRs
Understanding Field Data in CMRs
Telephony Service Solutions
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 6. Share Google Maps
Hacks 2941: Introduction
Hack 34. Publish Your Own Hiking Trail Maps
Hack 57. Do a Local Zoom with GxMagnifier
Hack 60. Make Things Happen When the Map Moves
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with the Worksheets, Charts, and Sheets Collections
Events in Visual Studio Tools for Office
Properties and Methods Common to Outlook Items
Creating Application-Level Smart Tags
Conclusion
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies