Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Windows Server 2003 Registry Overview
Table 1.1: Registry Root Keys
Table 1.2: Registry Data Types
Table 1.3: Registry Hives Existing in Windows NT/2000, Windows XP, and Windows Server 2003
Table 1.4: Types of Files Associated to Registry Hives in Windows NT/2000, Windows XP, and Windows Server 2003
Chapter 3: Using Registry Editor
Table 3.1: Keyboard Shortcuts Used in Regedit.exe
Table 3.2: Icons Used for Designating Registry Data Types in Regedit.exe
Table 3.3: Registry-Key Permission Types
Table 3.4: The Special Access Options
Table 3.5: Auditing Option Types for Registry Keys
Chapter 4: Customizing the System with the Registry
Table 4.1: [boot loader] Section Parameters
Table 4.2: Boot.ini Switches
Table 4.3: RGB Patterns for the Most Common Colors
Table 4.4: Effects of the
NoDriveTypeAutoRun
Value
Chapter 5: How the Registry Stores Hardware Information
Table 5.1: Plug and Play Support Levels for Devices and Drivers
Table 5.2: Registry Keys Modified Using the Power Schemes Tab Controls
Table 5.3: Registry Keys Modified by Setting Parameters of the Advanced Tab
Chapter 6: Registry and the System Boot Process
Table 6.1: Files Required to Start Up Windows NT/2000/XP Server 2003 (
x
86 Platforms)
Chapter 7: Software Settings in the Registry
Table 7.1: Subkeys Contained within the
HKEY_LOCAL_MACHINE
Root Key
Table 7.2: Typical subkeys of the
Control
Key for All Control Sets
Table 7.3: Standard Subkeys of the
HKEY_CURRENT_USER
Registry Key
Chapter 8: Network Settings in the Registry
Table 8.1: Local Area Connection Icons
Table 8.2: Network Component Classes and Their Respective ClassGuid Values
Table 8.3: W32Time Service Registry Values
Chapter 9: Protecting the Registry
Table 9.1: The Switches for schtasks.exe
Table 9.2: Recommended Settings for the Password Policy
Table 9.3: Recommended Settings for the Account Lockout Policy
Chapter 10: Managing the User Environment
Table 10.1: User Profile Settings
Table 10.2: User Profile Locations
Table 10.3: Folders that Roam with the Profile
Table 10.4: Incremental Security Templates
Chapter 11: Active Directory Settings in the Registry
Table 11.1: Available Functionality Nodes in Group Policy Objects
Chapter 12: Troubleshooting Common Problems
Table 12.1: Windows Server 2003 Startup Process
Table 12.2: Startup Problem Symptoms
Table 12.3: Default System Processes
Table 12.4: Registry Values Disabling Run and RunOnce Keys
Table 12.5: The List of Default Settings Under the
FilesNotToBackup
Key
Table 12.6: Default Settings Stored Under the
HKLM\SYSTEM\Current ControlSet\Control\BackupRestore\KeysNotToRestore\Registry Key
Chapter 13: Advanced Troubleshooting Topics
Table 13.1: Parameters Used in the
[Register Registry Values]
Section of the Sceregvl.inf File
Chapter 15: Registry Programming
Table 15.1: WSH Versions implemented by Microsoft Operating Systems
Table 15.2: Abbreviations for the Registry Root Key Names
Table 15.3: Acceptable Values of the strType Argument for the RegWrite Method
Previous page
Table of content
Next page
Unicode Explained
ISBN: 1931769214
EAN: 2147483647
Year: 2005
Pages: 129
Authors:
Jukka K. Korpela
BUY ON AMAZON
Postfix: The Definitive Guide
Mail Delivery
chroot
How qmgr Works
Shared Domains with System Accounts
SMTP Client Authentication
Cisco Voice Gateways and Gatekeepers
H.323 Specifications
Design Considerations
Assigning COR Lists with Cisco CallManager Express
E.164 Number Resolution
Review Questions
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Computers as Persuasive Social Actors
Credibility and the World Wide Web
Captology Looking Forward
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
File System Forensic Analysis
Summary
Introduction
Apple Partitions
Introduction
File Name Category
DNS & BIND Cookbook
Building and Installing BIND
Setting Up a Slave Name Server for a Zone in Multiple Views
Adding or Removing Zones Without Restarting or Reloading the Name Server
Monitoring a Name Server
Introduction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies