Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
BackCover
Windows XP Registry
Introduction
Aims of this Book
Chapter 1: Windows XP Registry Overview
Introduction
History of the Registry
Registry Structure
When Should You Edit the Registry
Summary
Chapter 2: Registry Backup and Recovery
Preparing for Registry Editing
Using System Restore
Using the Microsoft Backup Program
Using Recovery Console
Backing up and Restoring Windows NT2000XP Registries Manually
Registry Export and Import
Registry Backup Using Resource Kit Utilities
Summary
Chapter 3: Using Registry Editor
Using Regedit
Starting Regedit
Examining the Regedit User Interface
Managing Registry Security
Summary
Chapter 4: The Easiest Ways to Customize Windows
Preparing to Edit the Registry
Customizing the Boot Sequence
Customizing the Login Process
Configuring System Folders
Other Popular Customization Methods
Summary
Chapter 5: Plug and Play in Windows XP
Registry and Plug and Play Subsystem
Hardware Profiles
Power Management
Summary
Chapter 6: Registry and the System Boot Process
What Happens When You Start Your Computer
Files Required to Start up Windows NT2000XP
Summary
Chapter 7: Registry Key Reference
The HKEY LOCAL MACHINE Key
The HKEY LOCAL MACHINEHARDWARE Key
The HKEY LOCAL MACHINESAM Key
The HKEY LOCAL MACHINESECURITY Key
The HKEY LOCAL MACHINESOFTWARE Key
The HKEY LOCAL MACHINESystem Key
The HKEY CLASSES ROOT Key
The HKEY CURRENT CONFIG Key
The HKEY CURRENT USER Key
The HKEY USERS Key
Summary
Chapter 8: Network Settings in the Registry
Installing Network Components Using Control Panel Applets
Network Settings in Windows NT 4.0 Registry
Windows 2000 and Windows XP Network Parameters in the Registry
Customizing a Network Using the Registry
Summary
Chapter 9: Securing the Registry
The Easiest Methods of Restricting the Registry Access
Editing Access Rights to the Registry Keys
Protecting the Registry Against Unauthorized Remote Access
Protecting SAM and Security Hives
Restricting Anonymous Access to the Computer
System Scheduler as a Potential Security Risk
Summary
Chapter 10: Managing the User Working Environments
Basic Information on the User Profiles
Advantages of the User Profile
Roaming User Profiles in the Mixed Environments
Scripts
System Policy Overview
Summary
Chapter 11: Troubleshooting Common Problems
Troubleshooting Startup Problems
Troubleshooting Shutdown Problems
Configuring Windows NT2000XP to Clear the Paging File at Shutdown
How to Unlock a Windows XP Workstation
Other Problems
Summary
Chapter 12: Advanced Customization and Troubleshooting Tips
Interface Customizations
Troubleshooting Aids
Summary
Chapter 13: Third-Party Registry Utilities
Windows XP PowerToys
RegMaid UtilityCleaning Your Registry
RegmonRegistry Monitoring
NTFSDOS Professional
RegSafe Professional from Imaginelan
ERD Commander 2000
Summary
Chapter 14: Automating Registry Management with WSH
Basic Information on Microsoft Windows Script Host
Windows Script Host Object Model
Summary
Appendix 1: Internet Resources
Summary
Appendix 2: Bibliography
Glossary
A
B
C
D
E
G
H
K
L
N
O
P
R
S
U
V
W
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
List of Figures
List of Tables
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Optimizing: The Crystal Reports Side
Optimizing: The Oracle Side
Optimizing: Reducing Parses
Other Tips
Appendix B Functions
Interprocess Communications in Linux: The Nooks and Crannies
Introduction
Executing Remote Commands at a System Level
Using Broadcasting to Search for an RPC Service
Exiting a Thread
D.1. Introduction
CISSP Exam Cram 2
PHYSICAL SECURITY
Exam Prep Questions
Security Mechanisms
Auditing and Monitoring
Business Continuity Management
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Command-Line Completion
Basic Router Configuration
Reverse Telnet
EIGRP
Older Queuing Methods
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 17. Map Nearby Wi-Fi Hotspots
Hack 47. Get Maps on Your Mobile Phone
Hack 50. The Serial Port to USB Conundrum
Hack 61. Build a Map of Local GSM Cells
Hack 63. Build Your Own Car Navigation System with GpsDrive
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies