Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
BackCover
Windows XP Registry
Introduction
Aims of this Book
Chapter 1: Windows XP Registry Overview
Introduction
History of the Registry
Registry Structure
When Should You Edit the Registry
Summary
Chapter 2: Registry Backup and Recovery
Preparing for Registry Editing
Using System Restore
Using the Microsoft Backup Program
Using Recovery Console
Backing up and Restoring Windows NT2000XP Registries Manually
Registry Export and Import
Registry Backup Using Resource Kit Utilities
Summary
Chapter 3: Using Registry Editor
Using Regedit
Starting Regedit
Examining the Regedit User Interface
Managing Registry Security
Summary
Chapter 4: The Easiest Ways to Customize Windows
Preparing to Edit the Registry
Customizing the Boot Sequence
Customizing the Login Process
Configuring System Folders
Other Popular Customization Methods
Summary
Chapter 5: Plug and Play in Windows XP
Registry and Plug and Play Subsystem
Hardware Profiles
Power Management
Summary
Chapter 6: Registry and the System Boot Process
What Happens When You Start Your Computer
Files Required to Start up Windows NT2000XP
Summary
Chapter 7: Registry Key Reference
The HKEY LOCAL MACHINE Key
The HKEY LOCAL MACHINEHARDWARE Key
The HKEY LOCAL MACHINESAM Key
The HKEY LOCAL MACHINESECURITY Key
The HKEY LOCAL MACHINESOFTWARE Key
The HKEY LOCAL MACHINESystem Key
The HKEY CLASSES ROOT Key
The HKEY CURRENT CONFIG Key
The HKEY CURRENT USER Key
The HKEY USERS Key
Summary
Chapter 8: Network Settings in the Registry
Installing Network Components Using Control Panel Applets
Network Settings in Windows NT 4.0 Registry
Windows 2000 and Windows XP Network Parameters in the Registry
Customizing a Network Using the Registry
Summary
Chapter 9: Securing the Registry
The Easiest Methods of Restricting the Registry Access
Editing Access Rights to the Registry Keys
Protecting the Registry Against Unauthorized Remote Access
Protecting SAM and Security Hives
Restricting Anonymous Access to the Computer
System Scheduler as a Potential Security Risk
Summary
Chapter 10: Managing the User Working Environments
Basic Information on the User Profiles
Advantages of the User Profile
Roaming User Profiles in the Mixed Environments
Scripts
System Policy Overview
Summary
Chapter 11: Troubleshooting Common Problems
Troubleshooting Startup Problems
Troubleshooting Shutdown Problems
Configuring Windows NT2000XP to Clear the Paging File at Shutdown
How to Unlock a Windows XP Workstation
Other Problems
Summary
Chapter 12: Advanced Customization and Troubleshooting Tips
Interface Customizations
Troubleshooting Aids
Summary
Chapter 13: Third-Party Registry Utilities
Windows XP PowerToys
RegMaid UtilityCleaning Your Registry
RegmonRegistry Monitoring
NTFSDOS Professional
RegSafe Professional from Imaginelan
ERD Commander 2000
Summary
Chapter 14: Automating Registry Management with WSH
Basic Information on Microsoft Windows Script Host
Windows Script Host Object Model
Summary
Appendix 1: Internet Resources
Summary
Appendix 2: Bibliography
Glossary
A
B
C
D
E
G
H
K
L
N
O
P
R
S
U
V
W
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
List of Figures
List of Tables
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
ERP and Data Warehousing in Organizations: Issues and Challenges
Challenging the Unpredictable: Changeable Order Management Systems
The Second Wave ERP Market: An Australian Viewpoint
A Hybrid Clustering Technique to Improve Patient Data Quality
Relevance and Micro-Relevance for the Professional as Determinants of IT-Diffusion and IT-Use in Healthcare
Development of Interactive Web Sites to Enhance Police/Community Relations
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Identifying Project Schedule Risk
Identifying Project Resource Risk
Managing Project Constraints and Documenting Risks
Managing Project Risk
Conclusion
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Using Exported Templates
Comparing Floating-Point Numbers with Bounded Accuracy
Performing Date and Time Arithmetic
Sorting a Range
Lining Up Text Output
GO! with Microsoft Office 2003 Brief (2nd Edition)
Concepts Assessments
Concepts Assessments
Using Special Document Formats, Columns, and Mail Merge
Access 2003
Objective 6. Insert an Excel Chart into a PowerPoint Presentation
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 100 Definitions
Article 310 Conductors for General Wiring
Article 344 Rigid Metal Conduit Type RMC
Article 406: Receptacles, Cord Connectors, and Attachment Plugs (Caps)
Article 427: Fixed Electric Heating Equipment for Pipelines and Vessels
Special Edition Using Crystal Reports 10
Deploying Crystal Enterprise in a Complex Network Environment
Using the Crystal Management Console
Programming with the Report Engine Object Model
Troubleshooting
Understanding the Report Source
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies