Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Introducing Windows Vista
Figure 1-1: The Welcome Center
Figure 1-2: The System console
Figure 1-3: Changing the product key
Figure 1-4: The User Account Control dialog box
Chapter 2: Working with Windows Vista
Figure 2-1: The taskbar in Windows Vista
Figure 2-2: Working with Windows Flip view
Figure 2-3: Working with Windows Flip 3D view
Figure 2-4: The system clock
Figure 2-5: The Start menu
Figure 2-6: Control Panel
Chapter 3: Managing Information
Figure 3-1: The desktop, with Windows Sidebar and gadgets
Figure 3-2: The Sidebar Properties dialog box
Figure 3-3: The Add Gadgets dialog box
Figure 3-4: Using Windows Explorer
Figure 3-5: The Address bar in Windows Explorer
Figure 3-6: The taskbar in Windows Explorer
Figure 3-7: The Searches folder
Figure 3-8: The Properties dialog box
Chapter 4: Using Internet Explorer 7
Figure 4-1: The new interface in Internet Explorer 7
Figure 4-2: The Classic Menu and the standard toolbar in Internet Explorer 7
Figure 4-3: The Address bar in Internet Explorer 7
Figure 4-4: The Manage Add-Ons dialog box
Figure 4-5: Configuring security levels and zone options in Internet Explorer
Figure 4-6: A Web privacy report
Figure 4-7: Viewing and setting the privacy level
Chapter 5: Collaborating, Connecting, and Sharing
Figure 5-1: Using Windows Mail for e-mail and newsgroups
Figure 5-2: The Internet Connection Wizard
Figure 5-3: The Newsgroup Subscriptions dialog box
Figure 5-4: The Contacts window
Figure 5-5: Using color-coding in Windows Calendar to differentiate between one person’s appointments and tasks and another’s
Figure 5-6: The Windows Calendar main toolbar
Figure 5-7: Working with appointments in Windows Calendar
Figure 5-8: Working with tasks in Windows Calendar
Figure 5-9: Entering the publishing information for the calendar
Figure 5-10: Subscribing to a published calendar
Figure 5-11: Using Windows Shared View
Chapter 6: Managing Programs and Multimedia
Figure 6-1: Viewing startup programs in Software Explorer
Figure 6-2: Viewing running programs in Software Explorer
Figure 6-3: Viewing network-connected programs in Software Explorer
Figure 6-4: Working with installed programs
Figure 6-5: Configuring default programs and related settings
Figure 6-6: Configuring default programs and related settings
Figure 6-7: Turning Windows features on or off
Figure 6-8: Configuring Windows Media Player for the first time
Figure 6-9: Using Windows Media Player 11
Figure 6-10: The Navigation toolbar in Windows Media Player 11
Figure 6-11: The Address toolbar in Windows Media Player 11
Figure 6-12: The Controls toolbar in Windows Media Player 11
Figure 6-13: Using Windows Movie Maker
Figure 6-14: Using Windows Photo Gallery
Figure 6-15: The Navigation toolbar in Windows Photo Gallery
Figure 6-16: The Controls toolbar in Windows Photo Gallery
Chapter 7: Working with Laptops and Tablet PCs
Figure 7-1: Selecting a power plan
Figure 7-2: Configuring power plan options
Figure 7-3: Setting Power Button and Password Protection On Wakeup options
Figure 7-4: Setting pen tap options
Figure 7-5: Setting visual feedback options
Figure 7-6: Setting pen flick options
Figure 7-7: Using Windows Mobility Center
Figure 7-8: Specifying how to connect to the projector
Figure 7-9: Specifying the project address and password
Figure 7-10: Using Input Panel in writing pad mode
Figure 7-11: Using Snipping Tool in New Snip mode
Figure 7-12: Using Snipping Tool in Edit mode
Figure 7-13: Using Sticky Notes
Figure 7-14: Using Windows Journal
Figure 7-15: Copying handwriting as text
Chapter 8: Improving Accessibility
Figure 8-1: The Ease Of Access Center in Control Panel
Figure 8-2: Configuring Magnifier
Figure 8-3: The On-Screen Keyboard
Figure 8-4: Using Microsoft Narrator
Figure 8-5: The Welcome To Speech Recognition page
Figure 8-6: The Select Microphone page
Figure 8-7: The Adjust The Microphone Volume page
Figure 8-8: The Improve Speech Recognition Accuracy page
Chapter 9: Protecting User Accounts and Using Parental Controls
Figure 9-1: The shield icon indicates tasks that require administrator privileges
Figure 9-2: Marking an application to always run elevated
Figure 9-3: Disabling Admin Approval Mode
Figure 9-4: Accessing parental controls
Figure 9-5: Viewing and setting the games rating system to use
Figure 9-6: Setting general notifications
Figure 9-7: Enabling and configuring parental controls
Figure 9-8: Setting Web restrictions
Figure 9-9: Setting time limits
Figure 9-10: Setting game controls
Figure 9-11: Setting application restrictions
Figure 9-12: Viewing activity reports
Chapter 10: Protecting Your Computer
Figure 10-1: Using the Startup And Recovery dialog box to configure basic startup options
Figure 10-2: Using the System Configuration utility to configure advanced startup options
Figure 10-3: Using the NAP Client Configuration console to manage NAP
Figure 10-4: Enforcing NAP when DHCP is used
Figure 10-5: Using the Local Security Settings console to manage Audit Policy
Figure 10-6: Using the Local Security Settings console to manage User Rights Assignment policies
Figure 10-7: Using the Local Security Settings console to manage Security Options
Chapter 11: Protecting Your Data
Figure 11-1: Managing the TPM by using the Trusted Platform Module Management console
Figure 11-2: The Turn On BitLocker Drive Encryption wizard
Figure 11-3: The Save The Recovery Key As A Password page
Figure 11-4: The Save The Recovery Key On A USB Device page
Figure 11-5: The Create A Startup Key For Added Security page
Figure 11-6: The Encrypt The Selected Disk Volume page
Chapter 12: Networking Your Computer
Figure 12-1: Network Center shows that you are connected to a network that in turn has connectivity to the Internet.
Figure 12-2: Network Center shows that you are not connected to a network or the Internet.
Figure 12-3: The Windows Networks Diagnostics Tool offers step-by-step advice.
Figure 12-4: Connecting to a new network
Figure 12-5: The Personalize Settings dialog box
Figure 12-6: Using Network List
Figure 12-7: Using Network Map
Figure 12-8: Using Network Connections
Chapter 13: Securing Your Network Connection
Figure 13-1: Using Windows Security Center
Figure 13-2: Getting firewall recommendations
Figure 13-3: Getting antivirus recommendations
Figure 13-4: Getting antispyware recommendations
Figure 13-5: The Windows Firewall dialog box
Figure 13-6: Configuring exceptions in the Windows Firewall dialog box
Figure 13-7: Enabling security logging
Figure 13-8: Configuring allowed types of control messages
Figure 13-9: Windows Firewall With Advanced Security
Figure 13-10: Setting the firewall state
Figure 13-11: Setting the firewall behavior
Figure 13-12: Setting the logging options
Figure 13-13: Setting IPSec options
Figure 13-14: Viewing the currently defined inbound rules
Figure 13-15: Configuring inbound rules
Figure 13-16: Viewing the currently defined outbound rules
Figure 13-17: The Rule Type page
Figure 13-18: Viewing status in Windows Defender
Figure 13-19: Configuring general settings in Windows Defender
Figure 13-20: Performing a scan using Windows Defender
Figure 13-21: Selecting the drives and folders to scan
Chapter 14: Supporting Windows Vista
Figure 14-1: The Group Policy Management Console
Figure 14-2: The Windows Memory Diagnostics Tool
Figure 14-3: The Problem Reports And Solutions dialog box
Figure 14-4: The Windows Help And Support console
Figure 14-5: The Remote Assistance Wizard
Figure 14-6: Configuring Remote Assistance
Figure 14-7: Configuring Windows Update
Figure 14-8: Checking for updates
Figure 14-9: Viewing the update history
Figure 14-10: All services have recovery policy.
Figure 14-11: The Event Viewer
Figure 14-12: Creating a cross-log view
Figure 14-13: Using Task Scheduler
Figure 14-14: Creating a new task
Figure 14-15: Using triggers with scheduled tasks
Figure 14-16: Associating actions with scheduled tasks
Figure 14-17: Viewing a computer’s performance details and rating
Figure 14-18: Using the Windows Performance Diagnostic console
Figure 14-19: Using Reliability Monitor
Figure 14-20: Working with System Protection
Figure 14-21: Using Windows Backup
Chapter 15: Deploying Windows Vista
Figure 15-1: Starting Windows Easy Transfer
Previous page
Table of content
Next page
Introducing Microsoft Windows Vista
ISBN: 0735622841
EAN: 2147483647
Year: 2006
Pages: 101
Authors:
William R. Stanek
BUY ON AMAZON
CISSP Exam Cram 2
SECURITY-MANAGEMENT PRACTICES
We Want to Hear from You!
The Risk of Poor Security Management
Exam Prep Questions
System Validation
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Overview of Java UI Toolkits and SWT/JFace
SWT/JFace Mechanisms
Tables
Dialogs
SWT Graphics and Image Handling
Building Web Applications with UML (2nd Edition)
Software Development for Web Applications
Activities
Summary
Design
Web Application Extension for UML
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Eleven Gaining Access to People with Power
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Appendix B Solution Selling: A Scalable Approach
The Java Tutorial: A Short Course on the Basics, 4th Edition
Questions and Exercises
Catching and Handling Exceptions
The Life Cycle of a Thread
Questions and Exercises
Why Is Thread.stop Deprecated?
Comparing, Designing, and Deploying VPNs
The Carriers Carrier Architecture
Designing and Implementing L2TP Compulsory/NAS-Initiated Tunnel Mode Remote Access VPNs
Review Questions
Enabling SSL VPNs (WebVPN) on Cisco IOS Devices
Designing and Building SSL Remote Access VPNs (WebVPN)
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies