Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Windows XP Registry Overview
Table 1.1: Registry Root Keys
Table 1.2: Registry Data Types
Table 1.3: Windows NT/2000 Registry Hives
Table 1.4: Types of Files Associated to Windows NT 4.0/Windows 2000/Windows XP Registry Hives
Chapter 3: Using Registry Editor
Table 3.1: Keyboard Shortcuts Used in Regedit.exe
Table 3.2: Icons Used for Designating Registry Data Types in Regedit.exe
Table 3.3: Registry Key Permission Types
Table 3.4: The Special Access Options
Table 3.5: Auditing Option Types for Registry Keys
Chapter 4: The Easiest Ways to Customize Windows
Table 4.1:
[boot loader]
Section Parameters
Table 4.2: Boot.ini Switches
Chapter 5: Plug and Play in Windows XP
Table 5.1: Plug and Play Support Levels for Devices and Drivers
Table 5.2: Registry Keys Modified Using the Power Schemes Tab Controls
Table 5.3: Registry Keys Modified by Setting Parameters of the Advanced Tab
Chapter 6: Registry and the System Boot Process
Table 6.1: Files Required to Start Up Windows NT/2000/XP (
x
86 Platforms)
Table 6.2: Windows XP Startup Files for Itanium-Based Systems
Chapter 7: Registry Key Reference
Table 7.1: Subkeys Contained within the
HKEY_LOCAL_MACHINE
Root Key
Table 7.2: Typical subkeys of the
Control
Key for All Control Sets
Table 7.3: Standard Subkeys of the
HKEY_CURRENT_USER
Registry Key
Chapter 8: Network Settings in the Registry
Table 8.1: Local Area Connection Icons
Table 8.2: Types of Network Components
Table 8.3: Network Component Classes and Their Respective ClaseGuid Values
Chapter 9: Securing the Registry
Table 9.1: Default Windows 2000/XP Access Rights to File System Objects
Table 9.2: Windows 2000 Default Registry Key Permissions Assigned to Users and Power Users
Table 9.3: Levels of Permissions Provided by Windows XP
Table 9.4: Influence of the ForceGuest Registry Value on the Sharing UI and ACL Editor Behavior
Chapter 10: Managing the User Working Environments
Table 10.1: User Profile Settings
Table 10.2: User Profile Locations
Table 10.3: Folders that Roam with the Profile
Table 10.4: Windows 2000 Incremental Security Templates
Chapter 11: Troubleshooting Common Problems
Table 11.1: Brief Description of Windows XP Startup Process
Table 11.2: Startup Problem Symptoms
Table 11.3: The List of Default Settings Under the
FilesNotToBackup
Key
Table 11.4: Default Settings Stored under the
HKLM\SYSTEM\Current ControlSet\Control\BackupRestore\KeysNotToRestore
Registry Key
Chapter 14: Automating Registry Management with WSH
Table 14.1: WSH Versions Implemented by Microsoft Operating Systems
Table 14.2: Abbreviations for the Registry Root Key Names
Table 14.3: Acceptable Values of the strType Argument for the RegWrite Method
Previous page
Table of content
Next page
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
ORM Constraints
Configuring, Manipulating, and Reusing ORM Models
Generating a Physical Database Schema
Logical Database Model Reports
Change Propagation and Round Trip Engineering
Network Security Architectures
Business Priorities Must Come First
References
Role of Identity in Secure Networking
Defining the Teleworker Environment
Conclusions
SQL Hacks
Number Crunching
Hack 63. Generate Rows Without Tables
Hack 64. Determine Your Isolation Level
Hack 79. Identify Updates Uniquely
Hack 98. Find and Stop Long-Running Queries
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Mapping Hostnames to IP Addresses
ISDN Interfaces
Static Routes
Modern IOS QoS Tools
QoS Device Manager
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 322 Flat Cable Assemblies Type FC
Article 328 Medium-Voltage Cable Type MV
Article 374 Cellular Metal Floor Raceways
Article 392 Cable Trays
Article 422: Appliances
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Defeating Virtual Private Databases
Running Operating System Commands
Accessing the Network
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies