Flylib.com
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Table of Contents
BackCover
Windows XP Registry
Introduction
Aims of this Book
Chapter 1: Windows XP Registry Overview
Introduction
History of the Registry
Registry Structure
When Should You Edit the Registry
Summary
Chapter 2: Registry Backup and Recovery
Preparing for Registry Editing
Using System Restore
Using the Microsoft Backup Program
Using Recovery Console
Backing up and Restoring Windows NT2000XP Registries Manually
Registry Export and Import
Registry Backup Using Resource Kit Utilities
Summary
Chapter 3: Using Registry Editor
Using Regedit
Starting Regedit
Examining the Regedit User Interface
Managing Registry Security
Summary
Chapter 4: The Easiest Ways to Customize Windows
Preparing to Edit the Registry
Customizing the Boot Sequence
Customizing the Login Process
Configuring System Folders
Other Popular Customization Methods
Summary
Chapter 5: Plug and Play in Windows XP
Registry and Plug and Play Subsystem
Hardware Profiles
Power Management
Summary
Chapter 6: Registry and the System Boot Process
What Happens When You Start Your Computer
Files Required to Start up Windows NT2000XP
Summary
Chapter 7: Registry Key Reference
The HKEY LOCAL MACHINE Key
The HKEY LOCAL MACHINEHARDWARE Key
The HKEY LOCAL MACHINESAM Key
The HKEY LOCAL MACHINESECURITY Key
The HKEY LOCAL MACHINESOFTWARE Key
The HKEY LOCAL MACHINESystem Key
The HKEY CLASSES ROOT Key
The HKEY CURRENT CONFIG Key
The HKEY CURRENT USER Key
The HKEY USERS Key
Summary
Chapter 8: Network Settings in the Registry
Installing Network Components Using Control Panel Applets
Network Settings in Windows NT 4.0 Registry
Windows 2000 and Windows XP Network Parameters in the Registry
Customizing a Network Using the Registry
Summary
Chapter 9: Securing the Registry
The Easiest Methods of Restricting the Registry Access
Editing Access Rights to the Registry Keys
Protecting the Registry Against Unauthorized Remote Access
Protecting SAM and Security Hives
Restricting Anonymous Access to the Computer
System Scheduler as a Potential Security Risk
Summary
Chapter 10: Managing the User Working Environments
Basic Information on the User Profiles
Advantages of the User Profile
Roaming User Profiles in the Mixed Environments
Scripts
System Policy Overview
Summary
Chapter 11: Troubleshooting Common Problems
Troubleshooting Startup Problems
Troubleshooting Shutdown Problems
Configuring Windows NT2000XP to Clear the Paging File at Shutdown
How to Unlock a Windows XP Workstation
Other Problems
Summary
Chapter 12: Advanced Customization and Troubleshooting Tips
Interface Customizations
Troubleshooting Aids
Summary
Chapter 13: Third-Party Registry Utilities
Windows XP PowerToys
RegMaid UtilityCleaning Your Registry
RegmonRegistry Monitoring
NTFSDOS Professional
RegSafe Professional from Imaginelan
ERD Commander 2000
Summary
Chapter 14: Automating Registry Management with WSH
Basic Information on Microsoft Windows Script Host
Windows Script Host Object Model
Summary
Appendix 1: Internet Resources
Summary
Appendix 2: Bibliography
Glossary
A
B
C
D
E
G
H
K
L
N
O
P
R
S
U
V
W
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index J
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index W
Index Z
List of Figures
List of Tables
Linux Enterprise Cluster: Build a Highly Available Cluster with Commodity Hardware and Free Software
ISBN: N/A
EAN: 2147483647
Year: 2000
Pages: 144
Authors:
Karl Kopper
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
Getting Started
Object Types, Predicates, and Basic Constraints
Generating a Physical Database Schema
Change Propagation and Round Trip Engineering
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Size the Kanban
Appendix A MRP vs. Kanban
Appendix B Kanban Supermarkets
Appendix F Implementation in Large Plants
Appendix G Intra-Cell Kanban
A Practitioners Guide to Software Test Design
Section I - Black Box Testing Techniques
State-Transition Testing
Domain Analysis Testing
Exploratory Testing
Section IV - Supporting Technologies
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 2. Connect to SQL from a Program
Hack 12. Simplify Complicated Updates
Date Handling
Hack 49. Keep Track of Infrequently Changing Values
Extending and Embedding PHP
Summary
Summary
Exposing Information Through MINFO
Filters
Extending and Embedding at Once
GDI+ Programming with C#
Your First GDI+ Application
The Graphics Class
Transformation with Pens
The PrintDocument and Print Events
Cautions for Using GDI in Managed Code
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies