Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Automating and Customizing Installations
Figure 2-1: Network share folder structure
Figure 2-2: Distribution folder structure
Chapter 3: Multilingual Solutions for Global Business
Figure 3-1: On-Screen Keyboard for French
Chapter 7: Supporting Mobile Users
Figure 7-1: 802.11 architecture
Figure 7-2: 802.11 Media access control frame format
Figure 7-3: 802.1x authentication
Chapter 8: Configuring Remote Desktop
Figure 8-1: How Remote Desktop works
Figure 8-2: Adding users to the Remote Desktop Users group
Figure 8-3: Downloading and using Remote Desktop Web Connection client
Figure 8-4: Remote Desktop Connection interface
Chapter 9: Managing Devices
Figure 9-1: System devices in Device Manager
Figure 9-2: USB tiered topology
Figure 9-3: Components of WIA architecture
Chapter 10: Managing Digital Media
Figure 10-1: Windows XP Professional software DVD decoding architecture
Figure 10-2: Windows XP Professional hardware DVD decoding architecture
Chapter 11: Enabling Printing and Faxing
Figure 11-1: Advanced tab in a printer properties dialog box
Figure 11-2: Printing process
Figure 11-3:
Internet printing process
Figure 11-4: Fax (Local) Properties dialog box
Figure 11-5: User Information in the Fax Properties dialog box
Chapter 12: Disk Management
Figure 12-1: How Disk Management displays GPT and MBR disks in an Itanium-based computer
Figure 12-2: How Disk Management identifies separate system, boot, and paging file volumes for an x86-based computer
Figure 12-3: Foreign Disk Volumes dialog box
Figure 12-4: Partition layout on basic and dynamic GPT disks
Figure 12-5: Configuring Run Once in Windows Setup Manager
Chapter 13: File Systems
Figure 13-1: Advanced Security Settings dialog box
Figure 13-2: Effective Permissions tab
Figure 13-3: Quota tab
Figure 13-4: Quota Entries window
Figure 13-5: The Disk Quota dialog box
Figure 13-6: Moving an uncompressed file to a compressed folder
Figure 13-7: Moving a compressed file to an uncompressed folder
Figure 13-8: Copying a compressed file to an uncompressed folder
Figure 13-9: Copying a file to a folder that contains a file of the same name
Figure 13-10: A mounted drive in My Documents
Figure 13-11: Sparse data storage
Figure 13-12: Properties of a sparse file
Figure 13-13: Unnamed and named streams for Streamexample.doc
Figure 13-14: Creating alternate data streams by using the Summary tab
Figure 13-15: Message that confirms loss of named data streams
Figure 13-16: MFT record for a small file or folder
Figure 13-17: Organization of a FAT16 volume
Figure 13-18: Files on a FAT volume
Figure 13-19: Long file name on a FAT volume
Chapter 14: Backup and Restore
Figure 14-1: Removable media with and without Removable Storage
Chapter 15: Logon and Authentication
Figure 15-1: Components involved in interactive logon
Figure 15-2: RunAs dialog box
Figure 15-3: NTLM logon process
Figure 15-4: Logon process using the Kerberos V5 authentication protocol
Figure 15-5: Group Policy snap-in
Figure 15-6: Typical security event message
Chapter 16: Authorization and Access Control
Figure 16-1: Validating a request for access
Figure 16-2: Security Properties page for a Windows folder
Figure 16-3: Advanced Security Settings for a Windows folder
Figure 16-4: Effective Permissions tab
Figure 16-5: ACE for the Windows folder
Figure 16-6: Owner tab
Figure 16-7: Local Security Settings snap-in
Figure 16-8: Security Templates snap-in with the default templates
Figure 16-9: Auditing tab
Figure 16-10: Opening a Security Configuration and Analysis database
Figure 16-11: Progress dialog for Security Configuration and Analysis
Chapter 17: Encrypting File System
Figure 17-1: EFS architecture
Figure 17-2: Structure of an encrypted data file
Figure 17-3: Encrypting a file with EFS
Figure 17-4: Decrypting a file for a user
Figure 17-5: Certificates snap-in and EFS certificate
Figure 17-6: Certificates snap-in
Figure 17-7: Sharing an encrypted file
Figure 17-8: Decrypting a file for a data recovery agent
Chapter 18: Implementing TCP/IP Security
Figure 18-1: Three-way TCP handshake
Figure 18-2: Services tab of ICF
Figure 18-3: AH modifications to an IP packet
Figure 18-4: ESP modifications to an IP packet
Figure 18-5: IPSec filter actions
Figure 18-6: Main mode and quick mode negotiation
Figure 18-7: Using IPSecmon in Windows 2000
Figure 18-8: Using IP Security Monitor MMC snap-in in Windows XP
Chapter 19: Securing Mobile Computers
Figure 19-1: Advanced wireless network connection properties
Figure 19-2: Configuring 802.1x authentication for wireless connections in Windows XP
Chapter 20: Connecting Clients to Windows Networks
Figure 20-1: Peer-to-peer network
Figure 20-2: Domain-based network
Figure 20-3: Windows 2000 domain hierarchy
Figure 20-4: Configure protocol binding order
Figure 20-5: User Configuration in Group Policy
Figure 20-6: Typical event log entry
Chapter 21: Configuring TCP/IP
Figure 21-1: IP packet routing
Figure 21-2: Host using RIP listening
Figure 21-3: Establishing an IPSec session
Figure 21-4: Multihomed Windows XP Professional based computer connected to two separate subnets
Chapter 22: Configuring IP Addressing and Name Resolution
Figure 22-1: The DHCP lease process
Figure 22-2: Advanced TCP/IP Settings dialog box
Figure 22-3: TCP/IP Gateway Address dialog box
Figure 22-4: Overview of name resolution
Figure 22-5: Computer Name tab
Figure 22-6: DNS name resolution, part 1
Figure 22-7: DNS name resolution, part 2
Figure 22-8: Advanced TCP/IP Settings DNS tab
Figure 22-9: Querying the DNS server, part 1
Figure 22-10: Querying the DNS server, part 2
Figure 22-11: Querying the DNS server, part 3
Figure 22-12: Name resolution for a multihomed client
Figure 22-13: Dynamic update for multihomed clients
Figure 22-14: NetBIOS name-resolution flowchart, part 1
Figure 22-15: NetBIOS name-resolution flowchart, part 2
Figure 22-16: WINS tab of the Advanced TCP/IP Settings dialog box
Chapter 23: Connecting Remote Offices
Figure 23-1: Connectivity with Ethernet PVC
Figure 23-2: L2TP tunneling
Figure 23-3: New Connection Wizard
Figure 23-4: Authentication tab on the Local Area Connection Properties sheet
Figure 23-5: Smart Card or other Certificate Properties dialog box
Figure 23-6: Initial configuration of a branch office
Figure 23-7: Internet Connection Sharing using an analog modem or ISDN connection
Figure 23-8: Internet Connection Sharing using a DSL or cable modem connection
Figure 23-9: Connect a remote office client to the corporate network using a PPTP-based VPN connection
Chapter 24: Configuring Telephony and Conferencing
Figure 24-1: H.323 gateway
Figure 24-2: Client/server telephony using PBX
Figure 24-3: TAPI architecture
Figure 24-4: Phone and Modem Options dialog box
Figure 24-5: Edit Location dialog box
Figure 24-6: Client/server TAPI architecture
Figure 24-7: Configure H.323 Service Provider dialog box
Chapter 25: Troubleshooting Concepts and Strategies
Figure 25-1: Troubleshooting Model
Figure 25-2: Motherboard firmware revision in System Information
Figure 25-3: Non-ACPI computer in Device Manager
Figure 25-4: ACPI-compliant computer in Device Manager
Chapter 26: Troubleshooting Disks and File Systems
Figure 26-1: Chkdsk message in the system log in Event Viewer
Figure 26-2: The Disk Defragmenter snap-in
Figure 26-3: Online status and Healthy status
Figure 26-4: Online (Errors) and Healthy (At Risk) error conditions
Figure 26-5: Interpreting data in the partition table
Figure 26-6: Detail of a basic disk with four partitions
Figure 26-7: Detail of an extended partition on a basic disk
Figure 26-8: Partition structures on a GPT disk
Chapter 27: Troubleshooting Startup
Figure 27-1: Startup options when your system cannot start
Figure 27-2: Task Manager
Figure 27-3: Services snap-in
Figure 27-4: Example of a startup menu for multiple-boot systems
Figure 27-5: Using Device Manager to determine ACPI functionality
Appendix C: Common Stop Messages for Troubleshooting
Figure C-1: Stop message
Figure C-2: Error reporting options
Appendix D: Tools for Troubleshooting
Figure D-1: Startup recovery menu
Figure D-2: System Configuration Utility
Previous page
Table of content
Next page
Microsoft Windows XP Professional Resource Kit 2003
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 338
BUY ON AMAZON
Managing Enterprise Systems with the Windows Script Host
Networking Resources
Input/Output Streams
Registry Operations
Internet Information Server
Security
Cisco IOS Cookbook (Cookbooks (OReilly))
Using the Small Servers
Using Policy-Based Routing to Route Based on Application Type
Using a Remote Log Server
Configuring a DHCP Database Client
IPv6 Route Filtering and Metric Manipulation in OSPF
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
An Introduction to the Lotus Domino Tool Suite
Managing Recurring Events Using Single Documents
Reference Library Applications
Links to developerWorks
Importing Data
Microsoft VBScript Professional Projects
Errors, Constants, and Variables
Conditional Logic and Iterative Structures
Maintaining a 30-Day Summary Log Archive
Developing a Setup Script
Building the Report Archive Page
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Advanced Features
Deployment Scenarios
Deployment Scenarios of Cisco IPSec VPN
Interface Management
Case Studies
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Codes, Standards, and Safety Practices
Trim-Out Installation
Designing and Installing Distributed Video Systems
Home Lighting Basics
Designing a Home Lighting Control System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies