Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
BackCover
Windows XP Registry
Introduction
Aims of this Book
Chapter 1: Windows XP Registry Overview
Introduction
History of the Registry
Registry Structure
When Should You Edit the Registry
Summary
Chapter 2: Registry Backup and Recovery
Preparing for Registry Editing
Using System Restore
Using the Microsoft Backup Program
Using Recovery Console
Backing up and Restoring Windows NT2000XP Registries Manually
Registry Export and Import
Registry Backup Using Resource Kit Utilities
Summary
Chapter 3: Using Registry Editor
Using Regedit
Starting Regedit
Examining the Regedit User Interface
Managing Registry Security
Summary
Chapter 4: The Easiest Ways to Customize Windows
Preparing to Edit the Registry
Customizing the Boot Sequence
Customizing the Login Process
Configuring System Folders
Other Popular Customization Methods
Summary
Chapter 5: Plug and Play in Windows XP
Registry and Plug and Play Subsystem
Hardware Profiles
Power Management
Summary
Chapter 6: Registry and the System Boot Process
What Happens When You Start Your Computer
Files Required to Start up Windows NT2000XP
Summary
Chapter 7: Registry Key Reference
The HKEY LOCAL MACHINE Key
The HKEY LOCAL MACHINEHARDWARE Key
The HKEY LOCAL MACHINESAM Key
The HKEY LOCAL MACHINESECURITY Key
The HKEY LOCAL MACHINESOFTWARE Key
The HKEY LOCAL MACHINESystem Key
The HKEY CLASSES ROOT Key
The HKEY CURRENT CONFIG Key
The HKEY CURRENT USER Key
The HKEY USERS Key
Summary
Chapter 8: Network Settings in the Registry
Installing Network Components Using Control Panel Applets
Network Settings in Windows NT 4.0 Registry
Windows 2000 and Windows XP Network Parameters in the Registry
Customizing a Network Using the Registry
Summary
Chapter 9: Securing the Registry
The Easiest Methods of Restricting the Registry Access
Editing Access Rights to the Registry Keys
Protecting the Registry Against Unauthorized Remote Access
Protecting SAM and Security Hives
Restricting Anonymous Access to the Computer
System Scheduler as a Potential Security Risk
Summary
Chapter 10: Managing the User Working Environments
Basic Information on the User Profiles
Advantages of the User Profile
Roaming User Profiles in the Mixed Environments
Scripts
System Policy Overview
Summary
Chapter 11: Troubleshooting Common Problems
Troubleshooting Startup Problems
Troubleshooting Shutdown Problems
Configuring Windows NT2000XP to Clear the Paging File at Shutdown
How to Unlock a Windows XP Workstation
Other Problems
Summary
Chapter 12: Advanced Customization and Troubleshooting Tips
Interface Customizations
Troubleshooting Aids
Summary
Chapter 13: Third-Party Registry Utilities
Windows XP PowerToys
RegMaid UtilityCleaning Your Registry
RegmonRegistry Monitoring
NTFSDOS Professional
RegSafe Professional from Imaginelan
ERD Commander 2000
Summary
Chapter 14: Automating Registry Management with WSH
Basic Information on Microsoft Windows Script Host
Windows Script Host Object Model
Summary
Appendix 1: Internet Resources
Summary
Appendix 2: Bibliography
Glossary
A
B
C
D
E
G
H
K
L
N
O
P
R
S
U
V
W
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
List of Figures
List of Tables
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Getting Started
Object Types, Predicates, and Basic Constraints
Configuring, Manipulating, and Reusing ORM Models
Generating a Physical Database Schema
Other Features and Best Practices
Introducing Microsoft Office InfoPath 2003 (Bpg-Other)
Creating Forms
Working with Advanced Form Elements
Setting Form Template and Digital Signing Options
Navigating the InfoPath Object Model
Writing Advanced Event Handlers
High-Speed Signal Propagation[c] Advanced Black Magic
Slow-Wave Mode On-Chip
Embellishments
Limits to Attainable Distance
IBIS (I/O Buffer Information Specification)
Appendix B. Calculation of Loss Slope
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Review Questions
Authentication and Integrity
MySQL Clustering
Installation
SQL Nodes
Backup and Recovery
Security and Management
Running MySQL in a Chrooted Environment
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Credibility and the World Wide Web
Increasing Persuasion through Mobility and Connectivity
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies