Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
BackCover
Windows XP Registry
Introduction
Aims of this Book
Chapter 1: Windows XP Registry Overview
Introduction
History of the Registry
Registry Structure
When Should You Edit the Registry
Summary
Chapter 2: Registry Backup and Recovery
Preparing for Registry Editing
Using System Restore
Using the Microsoft Backup Program
Using Recovery Console
Backing up and Restoring Windows NT2000XP Registries Manually
Registry Export and Import
Registry Backup Using Resource Kit Utilities
Summary
Chapter 3: Using Registry Editor
Using Regedit
Starting Regedit
Examining the Regedit User Interface
Managing Registry Security
Summary
Chapter 4: The Easiest Ways to Customize Windows
Preparing to Edit the Registry
Customizing the Boot Sequence
Customizing the Login Process
Configuring System Folders
Other Popular Customization Methods
Summary
Chapter 5: Plug and Play in Windows XP
Registry and Plug and Play Subsystem
Hardware Profiles
Power Management
Summary
Chapter 6: Registry and the System Boot Process
What Happens When You Start Your Computer
Files Required to Start up Windows NT2000XP
Summary
Chapter 7: Registry Key Reference
The HKEY LOCAL MACHINE Key
The HKEY LOCAL MACHINEHARDWARE Key
The HKEY LOCAL MACHINESAM Key
The HKEY LOCAL MACHINESECURITY Key
The HKEY LOCAL MACHINESOFTWARE Key
The HKEY LOCAL MACHINESystem Key
The HKEY CLASSES ROOT Key
The HKEY CURRENT CONFIG Key
The HKEY CURRENT USER Key
The HKEY USERS Key
Summary
Chapter 8: Network Settings in the Registry
Installing Network Components Using Control Panel Applets
Network Settings in Windows NT 4.0 Registry
Windows 2000 and Windows XP Network Parameters in the Registry
Customizing a Network Using the Registry
Summary
Chapter 9: Securing the Registry
The Easiest Methods of Restricting the Registry Access
Editing Access Rights to the Registry Keys
Protecting the Registry Against Unauthorized Remote Access
Protecting SAM and Security Hives
Restricting Anonymous Access to the Computer
System Scheduler as a Potential Security Risk
Summary
Chapter 10: Managing the User Working Environments
Basic Information on the User Profiles
Advantages of the User Profile
Roaming User Profiles in the Mixed Environments
Scripts
System Policy Overview
Summary
Chapter 11: Troubleshooting Common Problems
Troubleshooting Startup Problems
Troubleshooting Shutdown Problems
Configuring Windows NT2000XP to Clear the Paging File at Shutdown
How to Unlock a Windows XP Workstation
Other Problems
Summary
Chapter 12: Advanced Customization and Troubleshooting Tips
Interface Customizations
Troubleshooting Aids
Summary
Chapter 13: Third-Party Registry Utilities
Windows XP PowerToys
RegMaid UtilityCleaning Your Registry
RegmonRegistry Monitoring
NTFSDOS Professional
RegSafe Professional from Imaginelan
ERD Commander 2000
Summary
Chapter 14: Automating Registry Management with WSH
Basic Information on Microsoft Windows Script Host
Windows Script Host Object Model
Summary
Appendix 1: Internet Resources
Summary
Appendix 2: Bibliography
Glossary
A
B
C
D
E
G
H
K
L
N
O
P
R
S
U
V
W
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
List of Figures
List of Tables
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Retrieving and Manipulating Data Through Cursors
Working with Data BLOBs and Text
Repairing and Maintaining MS-SQL Server Database Files
Working with SQL Database Data Across the Internet
Developing Tablet PC Applications (Charles River Media Programming)
Basics of the .NET Framework
Math and Random Number Functions in VB .NET
Obtaining the Tablet PC SDK
Introduction to Ink-Enabled Applications
Custom Grammars for Speech Recognition
Microsoft WSH and VBScript Programming for the Absolute Beginner
Getting Started with the WSH and VBScript
Overview of the Windows Script Host
Handling Script Errors
Appendix B Built-In VBScript Functions
Appendix C Whats on the CD-ROM?
PMP Practice Questions Exam Cram 2
Project Initiation
Project PlanningFacilitating Processes
Exam Prep Questions
Exam Prep Questions
Answers and Explanations
File System Forensic Analysis
Computer Foundations
Indexes
Group Descriptor Tables
Symbolic Link
Journal Data Structures
.NET System Management Services
Querying WMI
Handling WMI Events
The WMI Schema
WMI Providers
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies