Microsoft windows 7 unleashed

816 42 0
Microsoft windows 7 unleashed

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Paul McFedries Microsoft Windows ® UNLEASHED 800 East 96th Street, Indianapolis, Indiana 46240 USA www.it-ebooks.info Microsoft Windows Unleashed Copyright © 2010 by Pearson Education, Inc All rights reserved No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher No patent liability is assumed with respect to the use of the information contained herein Although every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions Nor is any liability assumed for damages resulting from the use of the information contained herein ISBN-13: 978-0-6723-3069-8 ISBN-10: 0-672-33069-5 Library of Congress Cataloging-in-Publication Data: McFedries, Paul Microsoft Windows unleashed / Paul McFedries p cm ISBN 978-0-672-33069-8 Microsoft Windows (Computer file) Operating systems (Computers) I Title QA76.76.O63M398163 2010 005.4'46—dc22 2009024027 Printed in the United States of America Second Printing: November 2009 Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized Pearson Education, Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied The information provided is on an “as is” basis The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this book Associate Publisher Greg Wiegand Acquisitions Editor Rick Kughen Development Editor Rick Kughen Managing Editor Patrick Kanouse Project Editor Jennifer Gallant Copy Editor Keith Cline Indexer Tim Wright Proofreader Sheri Cain Technical Editor Mark Reddin Publishing Coordinator Cindy Teeters Interior Designer Gary Adair Cover Designer Gary Adair Compositor Bulk Sales Pearson offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales For more information, please contact: U.S Corporate and Government Sales 1-800-382-3419 corpsales@pearsontechgroup.com For sales outside of the U.S., please contact: International Sales +1-317-581-3793 international@pearsontechgroup.com www.it-ebooks.info Mark Shirar Contents at a Glance Introduction Part I Unleashing Windows Customization Customizing Windows Explorer Customizing Internet Explorer 27 Customizing the File System 45 Customizing Startup and Shutdown 63 Customizing the Start Menu and Taskbar 89 Part II Unleashing Windows Performance and Maintenance 111 Tuning Windows 7’s Performance Maintaining Your Windows System Part III 135 Unleashing Windows Power User Tools Controlling Windows with Control Panel 165 Policing Windows with Group Policies 181 10 Configuring the Microsoft Management Console 197 11 Controlling Services 209 12 Tweaking the Windows Registry 225 13 Controlling Windows from the Command Line 245 Part IV Unleashing Windows Security 14 Securing Windows 297 15 Configuring Internet Explorer Security 315 16 Implementing Email Security 17 Securing the File System 359 18 Setting Up User Security 373 19 Implementing Network Security 409 20 Tightening Wireless Network Security 423 Part V 341 Unleashing Windows Troubleshooting 21 Troubleshooting and Recovering from Problems 439 22 Troubleshooting Devices 461 23 Troubleshooting Startup 481 www.it-ebooks.info iv Microsoft Windows Unleashed Part VI Unleashing Windows Networking 24 Troubleshooting Networking 491 25 Setting Up a Small Network 511 26 Accessing and Using Your Network 553 27 Making Remote Network Connections 585 28 Turning Windows into a Web Server 611 29 Adding Macs to Your Windows Network 641 Part VII Unleashing Windows Scripting 30 Scripting Windows with WSH 657 31 Scripting Windows with PowerShell Part VIII 703 Appendixes 731 A Windows Keyboard Shortcuts B Understanding TCP/IP 741 Index 759 www.it-ebooks.info v Contents Table of Contents Introduction Who Should Read This Book How This Book Is Organized Part I: Unleashing Windows Customization Part II: Unleashing Windows Performance and Maintenance Part III: Unleashing Windows Power User Tools Part IV: Unleashing Windows Security Part V: Unleashing Windows Troubleshooting Part VI: Unleashing Windows Networking Part VII: Unleashing Windows Scripting Part VIII: Appendixes Conventions Used in This Book How to Contact Me Customizing Windows Explorer Returning the Menus to Their Rightful Place Changing the View Viewing More Properties Turning On File Extensions 11 Stopping Delete Confirmations 13 Running Explorer in Full-Screen Mode 15 Exploring the View Options 16 Moving User Folders 19 Taking Ownership of Your Files 20 Running Custom Searches 22 Using Advanced Query Syntax to Search Properties 22 Using Natural Language Queries 25 Customizing Internet Explorer 27 Displaying the Internet Options 28 Controlling the Web Page Cache 28 Configuring the Page History 29 Adding More Search Engines to Internet Explorer 30 Using Any Search Engine from the Address Bar 32 Make Tabs More Efficient 34 Loading Multiple Home Pages at Startup 35 Understanding Internet Explorer’s Advanced Options 37 www.it-ebooks.info vi Microsoft Windows Unleashed Customizing the File System 45 Understanding File Types 46 File Types and File Extensions 46 File Types and the Registry 47 Working with Existing File Types 49 Setting the Default Action 49 Creating a New File Type Action 50 Example: Opening the Command Prompt in the Current Folder 51 Hiding a File Type’s Extension 52 Associating an Extension with a Different Application 53 Associating an Application with Multiple File Types 55 Creating a New File Type 56 Associating Two or More Extensions with a Single File Type 57 Customizing the New Menu 57 Adding File Types to the New Menu 58 Deleting File Types from the New Menu 59 Customizing Windows 7’s Open With List 59 Opening a Document with an Unassociated Application 59 How the Open With Feature Works 60 Removing an Application from a File Type’s Open With Menu 61 Removing a Program from the Open With List 61 Adding a Program to the Open With List 62 Disabling the Open With Check Box 62 Customizing Startup and Shutdown 63 Customizing Startups Using the Boot Configuration Data 63 Using Startup and Recovery to Modify the BCD 65 Using the System Configuration Utility to Modify the BCD 66 Using BCDEDIT to Customize the Startup Options 69 Customizing Startups with the Advanced Options Menu 73 Useful Windows Logon Strategies 76 Logging On to a Domain 76 Enabling the Administrator Account 76 Setting Up an Automatic Logon 79 Disabling Automatic Logon Override 80 Setting Up One-Click Restarts and Shutdowns 81 Create a Restart Shortcut 83 Create a Shutdown Shortcut 84 Turning Off Your Windows Computer from Anywhere 84 Customizing the Start Menu’s Power Button 86 Customizing Your Notebook’s Power and Sleep Buttons 87 www.it-ebooks.info Contents Customizing the Start Menu and Taskbar vii 89 Customizing the Start Menu for Easier Program and Document Launching 90 Getting More Favorite Programs on the Start Menu 90 Pinning a Favorite Program Permanently to the Start Menu 92 Clearing the Recent Programs List 94 Setting Program Access and Defaults 94 Streamlining the Start Menu by Converting Links to Menus 96 Adding, Moving, and Removing Other Start Menu Icons 97 Customizing the Taskbar for Easier Program and Document Launching 98 Improving Productivity by Setting Taskbar Options 98 Pinning a Favorite Program to the Taskbar 100 Pinning a Destination to a Program’s Jump List 101 Using the Windows Key to Start Taskbar Programs 102 Taking Control of the Notification Area 103 Displaying Multiple Clocks for Different Time Zones 106 Displaying the Built-In Taskbar Toolbars 108 Setting Some Taskbar Toolbar Options 108 Creating New Taskbar Toolbars 109 Modifying the Start Menu and Taskbar with Group Policies 109 Tuning Windows 7’s Performance 111 Monitoring Performance 112 Viewing Your Computer’s Performance Rating 112 Monitoring Performance with Task Manager 114 Using the Resource Monitor 117 Using the Performance Monitor 119 Optimizing Startup 121 Reducing or Eliminating BIOS Checks 121 Reducing the OS Choices Menu Timeout 122 Turning Off the Startup Splash Screen 122 Upgrading Your Device Drivers 123 Using an Automatic Logon 123 Configuring the Prefetcher 123 Optimizing Applications 123 Adding More Memory 124 Installing to the Fastest Hard Drive 124 Optimizing Application Launching 124 Getting the Latest Device Drivers 124 Optimizing Windows for Programs 124 Setting the Program Priority in Task Manager 125 www.it-ebooks.info viii Microsoft Windows Unleashed Optimizing the Hard Disk 126 Examining Hard Drive Performance Specifications 126 Performing Hard Drive Maintenance 127 Disabling Compression and Encryption 128 Turning Off the Content Indexing 128 Enabling Write Caching 128 Converting FAT16 and FAT32 Partitions to NTFS 129 Turning Off 8.3 Filename Creation 130 Disabling Last Access Timestamp 130 Optimizing Virtual Memory 131 Storing the Page File Optimally 131 Splitting the Page File 131 Customizing the Page File Size 131 Watching the Page File Size 132 Changing the Paging File’s Location and Size 132 Maintaining Your Windows System 135 Checking Your Hard Disk for Errors 135 Understanding Clusters 137 Understanding Cycles 138 Running the Check Disk GUI 138 Checking Free Disk Space 140 Deleting Unnecessary Files 143 Defragmenting Your Hard Disk 145 Running the Disk Defragmenter Tool 146 Changing the Disk Defragmenter Schedule 147 Changing Which Disks Get Defragmented 148 Preparing for Trouble 149 Setting System Restore Points 149 Creating a System Repair Disc 152 Backing Up Your Files 153 Configuring Automatic File Backups 155 Creating a System Image Backup 157 Checking for Updates and Security Patches 158 Reviewing Event Viewer Logs 160 Setting Up a 9-Step Maintenance Schedule 162 Controlling Windows with Control Panel 165 Touring the Control Panel Window 166 Reviewing the Control Panel Icons 167 Understanding Control Panel Files 172 Easier Access to Control Panel 175 www.it-ebooks.info Contents ix Alternative Methods for Opening Control Panel Icons 175 Putting Control Panel on the Start Menu 176 Removing an Icon from Control Panel 177 Showing Only Specified Control Panel Icons 178 Policing Windows with Group Policies 181 Understanding Group Policies 181 Local Group Policy Editor and Windows Versions 182 Launching the Local Group Policy Editor 183 Working with Group Policies 184 Configuring a Policy 185 Filtering Policies 187 Group Policy Examples 189 Customizing the Windows Security Window 189 Customizing the Places Bar 191 Increasing the Size of the Recent Documents List 193 Enabling the Shutdown Event Tracker 194 10 Configuring the Microsoft Management Console 197 Reviewing the Windows Snap-Ins 197 Launching the MMC 200 Adding a Snap-In 200 Saving a Console 202 Creating a Custom Taskpad View 203 Controlling Snap-Ins with Group Policies 207 11 Controlling Services 209 Controlling Services with the Services Snap-In 209 Controlling Services at the Command Prompt 212 Controlling Services with a Script 213 Disable Services for Faster Performance 217 Make Windows Shut Down Services Faster 222 Reset a Broken Service 222 12 Tweaking the Windows Registry 225 Firing Up the Registry Editor 226 Getting to Know the Registry 227 Navigating the Keys Pane 227 Understanding Registry Settings 228 Getting to Know the Registry’s Root Keys 229 Understanding Hives and Registry Files 231 www.it-ebooks.info x Microsoft Windows Unleashed Keeping the Registry Safe 233 Preventing Other Folks from Messing with the Registry 233 Backing Up the Registry 234 Saving the Current Registry State with System Restore 234 Protecting Keys by Exporting Them to Disk 235 Working with Registry Entries 236 Changing the Value of a Registry Entry 237 Renaming a Key or Setting 243 Creating a New Key or Setting 243 Deleting a Key or Setting 243 Finding Registry Entries 244 13 Controlling Windows from the Command Line 245 Getting to the Command Line 246 Running Command Prompt as the Administrator 246 Running CMD 247 Working at the Command Line 251 Running Commands 251 Working with Long Filenames 252 Changing Folders Faster 253 Taking Advantage of DOSKEY 254 Redirecting Command Output and Input 256 Piping Commands 259 Understanding Batch File Basics 260 Creating Batch Files 260 REM: Adding Comments to a Batch File 261 ECHO: Displaying Messages from a Batch File 261 PAUSE: Temporarily Halting Batch File Execution 262 Using Batch File Parameters 263 FOR: Looping in a Batch File 264 GOTO: Jumping to a Line in a Batch File 265 IF: Handling Batch File Conditions 266 Working with the Command-Line Tools 269 Working with Disk Management Tools 269 Working with File and Folder Management Tools 276 Working with System Management Tools 288 14 Securing Windows 297 Thwarting Snoops and Crackers 297 First, Some Basic Precautions 298 Locking Your Computer 300 Requiring Ctrl+Alt+Delete at Startup 302 www.it-ebooks.info Registry 780 DWORD, editing, 239 releasing DHCP lease, 501 entries rem command, 261 changing, 237 finding, 244 group policies, 233-234 Group Policy Settings Reference, 182 hives, 231 supported files, 232-233 HKEY_CLASSES_ROOT key, 47-48 keys creating, 243 deleting, 243 exporting to disk, 235-236 renaming, 243 Keys pane, 227 Remote App and Desktop Connections icon (Control Panel), 171 remote computers, 578 scripting, 700-702 Remote Desktop, 586-609 stored desktop credentials, removing, 418-420 Remote Desktop Users group, 361 remote desktops, 649-652 remote folders, 562 remote shutdowns, configuring, 84-86 removable drives, 559 removing new action, setting for file types, 50-53 applications from Open With dialog box, 61-62 root keys, 227 icons from Control Panel, 177-178 HKEY_CLASSES_ROOT, 229-230 security zone sites, 329-330 HKEY_CURRENT_CONFIG, 231 shortcuts from Start menu, 97-98 HKEY_CURRENT_USER, 230 stored desktop credentials, 418-420 HKEY_LOCAL_MACHINE, 230 HKEY_USERS, 231 securing, 233-235 settings wireless connections, 551 ren command, 281-282 renaming, 629 boot applications, 72 deleting with scripts, 686 built-in accounts, 405-406 reading with scripts, 685 network connections, 531 storing with scripts, 686 wireless network connections, 548 ShellNew subkey, 58 renaming Registry keys, 243 string values, editing, 238 renewing DHCP lease, 501 system hive, loading services, 224 reordering wireless network connections, 548-549 Registry Editor launching, 226 replace command, 282-283 Settings pane, 228-229 Replicator group, 361 slow services, killing, 222 reports, 121 RegRead method, 685 resetting erratic services, 222-224 RegWrite method, 686 resolving IP address conflicts, 513 reinstalling drivers, 477 resource conflicts, troubleshooting, 479-480 www.it-ebooks.info scripting resource exhaustion detection, 450 781 setup pages Resource Monitor, monitoring performance, 117 accessing, 299 restarting, 629 displaying, 424-427 shortcut, creating, 83-84 routing restore points default gateway, 750 reverting to, 457-459 subnet masks, 748-750 setting, 149-152 RPC (Remote Procedure Call) protocol, 605 Restricted Sites, 329 Run method, 681 restricting running computer usage with parental controls, 395-400 commands, 251-252 login times for users, 420-422 PowerShell cmdlets, 709-713 Internet Explorer without add-ons, 336 results pane, 197 PowerShell scripts, 728-729 custom taskpad view, creating, 203-205 resuming paused services, 210 return codes for StartService method, 216-217 return codes for StopService method, 216-217 returning S Safe mode value of PowerShell object properties, 723 WMI class instances, 696-699 troubleshooting, 485 when to use, 483 returning object members (PowerShell), 714-715 reversible encryption, 383 Safe mode with Command Prompt, when to use, 483 Safe mode with Networking, when to use, 483 reviewing Event Viewer logs, 160-162 right pane (Group Policy Editor), 184 Safe Senders, specifying in Windows Live Mail, 348 rolling back drivers, 478 sample scripts, 693-694 root keys, 227 saving consoles, 202-203 HKEY_CLASSES_ROOT, 229-230 scanning email with Windows Defender, 345 HKEY_CURRENT_CONFIG, 231 scheduling Disk Defragmenter, 147-149 HKEY_CURRENT_USER, 230 script jobs, creating, 661 HKEY_LOCAL_MACHINE, 230 scripting HKEY_USERS, 231 rotational latency, 127 Administrator account, running scripts from, 664, 680 route command, 499 examples InternetExplorer object, 693-694 routers web pages, displaying, 691-692 administrative passwords, specifying, 428 web pages, navigating, 692 firmware, updating, 497-498 PowerShell How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info 782 scripting cmdlets, 705-713 group policies, 181 collections, 724-725 execution policy, configuring, 726 Group Policy Manager, device security policies, 472 ISE, 726-727 hidden shares, disabling, 417-418 methods, 724 Internet Explorer object instances, filtering, 719-720 advanced options, 337-339 object instances, sorting, 720-722 IDN spoofing, preventing, 334-335 objects, 714-717, 723-724 Phishing Filter, 332-334 objects, assigning to a variable, 722 pop-up windows, blocking, 327-328 output, formatting, 717-719 protected mode, 331 scripts, running, 728-729 running without add-ons, 336 services, controlling, 213-217 security zones, 328-331 Windows Script Host, 658-659 SmartScreen Filter, 333-334 CScript, 661-662 MAC address filtering, enabling, 436-438 WScript, 660-661 on wireless networks, preventing signal leakage, 428-430 WMI, 695 password-protected sharing, enabling, 410 class instances, returning, 696-699 passwords remote computers, scripting, 700-702 policies, 382-383 search engines, adding to Internet Explorer, 30-31 recovering, 383-384 search queries strengthening, 381 permissions AQS, 22-23 assigning, 363-364 Boolean operators, 24-25 configuring, 414-415 operators, 23 privilege escalation, preventing, 400-402 natural language queries, 25-26 sectors, 137 receiving secure email, 356-357 security, 560, 577, 637 Registry, 233-235 Administrator account, disabling, 307-308 reversible encryption, 383 BitLocker, enabling sending secure email, 356 on non-TPM systems, 369-371 shared folders, hiding, 415-417 on TPM systems, 369 shared permissions, configuring, 411-414 Sharing Wizard, disabling, 410-411 crackers, thwarting, 298-300 computers, locking, 300-302 snoops, thwarting, 298-300, 302 Ctrl+Alt+Delete, requiring at startup, 302 special permissions, assigning, 364-366 email, encrypting, 353-356 encrypting disks, 368 encrypting files, 366-367 SSID broadcasting, disabling on wireless networks, 432-433 default value, modifying, 435-436 file system, setting permissions, 360 www.it-ebooks.info shared folders TCI, 316 segments (TCP), 756-757 UAC, 374 configuring, 377, 379-380 selecting object members (PowerShell), 715-717 elevating, 375-376 sending least-privileged user account, 375 783 email messages via CDO, 343-344 secure email messages, 356 password options, 381-382 privileges, 375-376 sequencing TCP segments, 758 verifying operation, 307 Server Too Busy error messages, 612 servers, 612-615, 637-639 user accounts services built-in, renaming, 405-406 disabling, 402-403 automatic startup, configuring, 212 Guest account, 406-407 controlling at command prompt, 212-213 lockout policies, 391-392 controlling with scripts, 213-215, 217 managing, 384-386 deleting, 223 policies, configuring, 389-390 dependent, 211 restricting login times, 420-422 disabling, 212, 217-221 user names, hiding in logon screen, 403-405 essential, 211 user rights policies, configuring, 391 pausing, 210 WEP, 516 resetting, 222-224 Windows Defender starting, 210 killing, 222 accessing, 304 status of, changing, 210 settings, 306-307 stopping, 210 spyware scanning, 305 Services icon (Control Panel), 168 Windows Defender, verifying operation, 303-305 Services snap-in, loading, 209 Windows Firewall, verifying operation, 303 setting session layer, 743 Windows Service Hardening, 368 restore points, 149-152 wireless networks, WPA, 430-432 toolbar options, 109 WPA, 516 value of PowerShell object properties, 723-724 Security group (Internet Explorer, Advanced Tab), 43 settings for Windows Defender, 306-307 security groups, 360 Settings pane (Registry Editor), 228-229 assigning users to, 361-363 security zones, 328-329 shareable memory, 118 shared folders, 585, 644-648 security level, changing, 330-331 hiding, 415-417 sites, adding/removing, 329-330 security permissions, configuring, 414-415 seek time, 127 How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info 784 shared network resources shared network resources, 554-558, 563-570 organizing, 201 Services, loading, 209 shared permissions, configuring, 411-414 snoops, thwarting, 298-299 Sharing Wizard, disabling, 410-411 Shaw, Marco, 704 computers, locking, 300-302 ShellNew subkey, 58 Ctrl+Alt+Delete, requiring at startup, 302 sockets, 755-756 shortcuts, 52 adding/removing from Start menu, 97-98 solutions to problems, checking for, 452-455 creating in Windows Script Host, 682-685 sort command, 258, 283-284 extensions, hiding, 52 sorting PowerShell object instances, 720-722 restarts, creating, 83-84 Sound icon (Control Panel), 171 shutdown, creating, 84 source of problems, isolating, 440-447 spam Shut Down command, customizing, 86-87 blocking from specific countries, 349-350 SHUTDOWN command, 81 restart shortcut, creating, 83-84 junk email protection level, configuring Windows Live Mail, 347-348 shutdown shortcut, creating, 84 senders, blocking, 349 remote shutdowns, configuring, 85-86 thwarting, 345-346 shutting down slow services, 222 Special Edition Using JavaScript (Que, 2001), 659 signal leakage, 428, 430 Signature Verification tool, 478 special permissions, 360 signed drivers, upgrading, 478 assigning, 364-366 single-key encryption, 354 Size slider (Remote Desktop), 595 specifying Safe Senders in Windows Live Mail, 348 sleep button, customizing on notebooks, 87-88 splitting page file, 131 sleeping computers, waking up with network connection, 539-541 spoofing slow services, killing, 222 homograph spoofing, 333 IDN spoofing, 333-335 SMART (Self-Monitoring, Analysis, and Reporting Technology), 450 spyware, 304-305 smart modems, 513 SSIDs SmartScreen Filter (Internet Explorer), 333-334, 350-351 default value, modifying, 435-436 SMB (Server Message Blocks), 642 Standby mode See Sleep mode (Start menu), 539 smooth scrolling, 42 SMTP (Simple Message Transfer Protocol), 742 snap-ins, 197-199 adding, 200-202 controlling with group policies, 207 broadcasting, preventing on wireless networks, 432-433 Start menu Control Panel, adding, 176-177 customizing, 90 default programs, configuring, 94-95 Local Users and Groups, 388-389 www.it-ebooks.info system management tools favorite programs 785 Safe mode with Networking, 483 increasing displayed number of, 91-92 splash screen, turning off, 122 pinning to, 92-93 links, converting to menus, 96-97 System Configuration utility options, 488-490 modifying with Group Policies, 109-110 troubleshooting, 481-482 power button, customizing, 86-87 static IP addressing, configuring, 534-537 recent programs, clearing, 94 status of services, changing, 210 shortcuts, adding/removing, 97-98 stop errors, 442 stopping services, 210 starting Check Disk GUI, 138-139 StopService method, return codes, 216-217 Command Prompt sessions, 246 stored desktop credentials, removing, 418-420 Group Policy Editor, 183 storing page file optimally, 131 MMC, 200 strengthening passwords, 381 PowerShell sessions, 704-705 string values, editing in Registry, 238 services, 210 strings, comparing in batch files, 267 Windows with last known good configuration, 456 strong passwords, creating, 381 subkeys StartService method, return codes, 216-217 HKEY_CLASSES_ROOT key, 48 startup ShellNew, 58 BIOS checks, reducing, 121 subnet masks, 748-750 customizing, 63-66 subst command, 253 with Advanced Boot Options menu, 73-76 suppressing web bugs, 352-353 with BCDEDIT, 69-73 Sync Center icon (Control Panel), 171 Sync Center, 578 Debugging Mode, when to use, 484 synchronizing, 579-582 Directory Services Restore Mode, when to use, 484 System Configuration icon (Control Panel), 168 Disable Automatic Restart on System Failure option, when to use, 484 System Configuration utility, 487 startup options, 488-490 Disable Driver Signature Enforcement option, when to use, 485 system hive, copying services into, 224 Enable Boot Logging option, when to use, 483 system image backup, creating, 157 System icon (Control Panel), 171 Enable VGA Mode option, when to use, 484 System Information utility, troubleshooting error messages, 442 Last Known Good Configuration, when to use, 484 system management tools OS Choices menu timeout, reducing, 122 Safe mode, 483 reg, 289-291 systeminfo, 292-293 typeperf, 293-295 Safe mode with Command Prompt, 483 whoami, 295-296 How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info system recovery disc 786 System Recovery Options, 485-487 Taskbar and Start Menu icon (Control Panel), 171 System Restore, 457-459 taskpad view, customizing, 203-205 system recovery disc, creating, 153 Registry, backing up, 234 Tasks pane (Network Center), 518 restore points, setting, 149-152, 458 TCI (Trustworthy Computing Initiative), 316 TCP (Transmission Control Protocol), 742, 755 system tray See notification area features, 758 systeminfo command, 256-257, 292-293 segments, 756-757 sockets, 755-756 TCP/IP, 742-743, 755 T IP datagrams, 743-745 tabbed browsing, 34-35 opening multiple home pages at startup, 35-37 DNS, 752-754 dynamic IP addressing, 751 IP addresses, 745-748 Tablet PC Input Panel toolbar, 108 Tablet PC Settings icon (Control Panel), 171 IP routing, 748-750 TCP Task Manager Performance tab, 115 features, 758 performance, monitoring, 114-117 segments, 756-757 sockets, 755-756 Processes tab, 114 temporary access, granting with Guest account, 406-407 program priority, configuring, 125-126 Task Scheduler icon (Control Panel), 168 temporary Internet files, 316 taskbar customizing, 98-100 text files, exporting device driver list to, 469-471 favorite programs, pinning to, 100-101 threads, 116 jump list, pinning destinations to, 101-102 thwarting modifying with Group Policies, 109-110 notification area, 103 customizing, 104 disabling, 105-106 pinned icons, launching from keyboard, 102-103 toolbars creating, 109 displaying, 108 options, setting, 109 crackers, 298-300 computers, locking, 300-302 Ctrl+Alt+Delete, requiring at startup, 302 snoops, 298-300 computers, locking, 300-302 Ctrl+Alt+Delete, requiring at startup, 302 spam, 345-346 Tiles view, Windows Explorer icons, time, 579-581 TLD (top-level domain), 349 TLS (Transport Layer Security), 338 www.it-ebooks.info UAC (User Account Control) toolbars 787 Directory Services Restore Mode, when to use, 484 creating, 109 Disable Automatic Restart on System Failure option, when to use, 484 displaying, 108 options, setting, 109 Disable Driver Signature Enforcement option, when to use, 485 top-level domains, 753-754 TPM, enabling BitLocker, 369 Enable Boot Logging option, when to use, 483 TPM chip, verifying installation, 368 Enable VGA Mode option, when to use, 484 tracert command, 499, 504-505, 751 tracing packets with tracert, 504-505 Last Known Good Configuration, when to use, 484 transport layer, 743 tree panes, 197 Safe mode with Command P rompt, when to use, 483 troubleshooters, 448 Device Manager, 473-474 Safe mode with Networking, when to use, 483 nonworking devices, displaying, 474-477 disk diagnostics, 449 Safe mode, when to use, 483 Memory Diagnostics tool, 451-452 with System Configuration utility, 487-490 Problem Reporting, 452-455 tips, 447-448 RADAR, 450 wireless networks, 508-509 troubleshooting, 582 Troubleshooting icon (Control Panel), 171 BSOD, 444 Trusted Sites, 328 cables, 506-507 TTL (Time-to-Live) value, 751 device drivers, 477-478 default value, changing, 505 error messages, 441 turning off in Event Viewer, 441 delete confirmations, 13-15 in System Information utility, 442 from command-line, 499 startup splash screen, 122 turning on network discovery, 495-497 ipconfig, 500-502 typeperf command, 293-295 ping, 502-504 tracert, 504-505 last known good configuration, 456 U NIC, 507 online resources, 455-456 UAC (User Account Control), 374 resource conflicts, 479-480 configuring, 377-379 Safe Mode, 485 source of problem, isolating, 440-447 least-privieleged user account, 375 limited users, 374 startup, 481-482 Debugging Mode, when to use, 484 passwords, options, 381-382 How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info UAC (User Account Control) 788 policies, configuring, 379-380 managing, 384-386 privileges, elevating, 375-376 net user command, 393-394 verifying operation, 307 parental controls, 395-400 unassociated applications, opening documents with, 59-60 privilege escalation, preventing, 400-402 UNC (Universal Naming Convention), 558 user names, hiding in logon screen, 403-405 undo restore points, 458 security policies, configuring, 389-390 user rights policies, configuring, 391 uninstall restore points, 458 uninstalling devices, 471 User Accounts dialog box, 386-387 unknown restore points, 458 User Accounts icon (Control Panel), 171 unmounting, 648 user folders, moving, 19 unnecessary files, deleting, 143-145 user rights policies, configuring, 391 unnecessary services, disabling, 217-221 unreliable protocols, 755 user-specific wireless connections, creating, 549-550 unsigned drivers usernames, 560 users disabling, 478 assigning to security groups, 361, 363 ignoring, 466-469 permissions, assigning, 363-364 updates special permissions, assigning, 364-366 checking for, 158-160 utilities, 499 for drivers, checking for, 465-466 attrib, 278-279 updating device drivers, 124, 466 AUTOCHK, 139-140 router firmware, 497-498 chkdsk, 270-271 chkntfs, 271-274 upgrading device drivers, 123 defrag, 274-276 signed drivers, 478 Disk Defragmenter, 146 UpNP routers, accessing setup pages, 426-427 disks, selecting, 148-149 schedule, changing, 147 user accounts, 567-570, 586 find, 279-281 Administrator, 390 elevated Command Prompt sessions, 246-247 ipconfig, 500-502 scripts, running, 664, 680 System Configuration utility, 487 built-in, renaming, 405-406 disabling, 402-403 ping, 502-504 BCD, modifying, 66-68 startup options, 488-490 Guest account, 406-407 System Recovery Options, 485-487 lockout policies, configuring, 391-392 System Restore, setting restore points, 149-152 logged in users, discovering, 407 www.it-ebooks.info Windows Defender icon (Control Panel) tracert, 504-505 789 splitting, 131 Windows Backup, configuring automatic file backups, 155-156 storing optimally, 131 viruses, protecting against, 341-345 VPN (Virtual Private Networks), 529, 605-609 V W variables assigning PowerShell objects to, 722 waking up sleeping computers, 539-541 objects, assigning to, 668 War Games (1983), 423 VBA for the 2007 Microsoft Office System (Que, 2007), 659 warchalking, 424 wardialing, 423 VBScript, 659 FileSystemObject object, 675-677 wardriving, 423 web bugs, suppressing, 352-353 verifying connectivity with ping command, 502-504 web pages cache, controlling in Internet Explorer, 28-29 UAC operation, 307 web servers, 612-615, 637-639 Windows Defender operation, 303-305 websites, 614—639 settings, 306-307 channels, 353 spyware scanning, 305 WEP (Wired Equivalent Privacy), 516, 430 Windows Firewall operation, 303 whoami command, 295-296, 407 view options, customizing in Windows Explorer, 16-19 wildcards, AQS, 23 Win32 Service, 213 viewing, 554-556 device properties, 463 Windows and Vista Guide to Scripting, Automation, and Command Line Tools (Que, 2009), 659 hidden shares, 417 Windows Backup, 154 computers on network, 523-524 network status, 525-527 nonpresent devices in Device Manager, 464 automatic file backups, configuring, 155-156 viewing contents of ARP cache, 502 Windows CardSpace icon (Control Panel, 171 views, Device Manager, 463 Windows Defender virtual directories (IIS), adding folders as, 626-627 accessing, 304 virtual memory, 116 settings, 306-307 configuring to scan email, 345 commit limit, 451 spyware scanning, 305 page file verifying operation, 303-305 size of, monitoring, 132 Windows Defender icon (Control Panel), 172 size, customizing, 131-134 How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info Windows Explorer 790 Windows Memory Diagnostic icon (Control Panel), 168 Windows Explorer file extensions, displaying, 11-13 folders, moving, 19 Windows Mobility Center icon (Control Panel), 172 Full Control permissions, assigning to folders, 20, 22 Windows networks, 641-655 full-screen mode, enabling, 15 Windows Script Host, 658-659 CScript, 661-663 icons object customizing, assigning to a variable, 668 Details view, 9-10 menu, displaying full-time, methods, 667-668 view options, customizing, 16-19 properties, 666-667 objects, collections, 669 Windows Firewall, 588, 601, 614-615 WScript, 660 exception, creating, 309-310 managing, 308-309 parameters, 660-661 ports, adding as new exception, 311-313 programming, 671-675 programs, adding as new exception, 310-311 script properties, 663 verifying operation, 303 WshNetwork object, 689-691 shortcuts, creating, 682 WshShell object, 677-681, 685-686 Windows Firewall icon (Control Panel), 172 WshShortcut object, 683-685 Windows Firewall with Advanced Security icon (Control Panel), 168 Windows Security screen, bypassing, 114 Windows Live Mail Windows Service Hardening, 368 countries, blocking, 349-350 Windows shared folder, 644-648 digital ID, obtaining, 354-355 Windows Update, 455 email, encrypting, 353-356 Windows Update icon (Control Panel), 172 junk email protection level, configuring, 347-348 Windows Update website, checking for updates, 158-160 Junk Filter, 345-346 Windows XP, 590-591 public key, obtaining, 355-356 WINS (Windows Internet Name Service), 755 read receipts, blocking, 352 Safe Senders, specifying, 348 WinSAT (Windows System Assessment Tool), 112-114 secure messages, receiving, 356-357 wireless network connections, 542, 643-644 senders, blocking, 349 wireless networks viruses, protecting against, 343-345 access points, signal leakage, 428-430 web bugs, suppressing, 352-353 ad hoc, configuring, 543-545 Windows Logo Key, keyboard shortcuts, 739 connecting to, 514-515 Windows Media Player default SSID value, changing, 435-436 keyboard shortcuts, 737 hidden, connecting to, 434 privacy options, 320 www.it-ebooks.info zones hot spots, 515 791 GetObject method, 674-675 MAC address filtering, enabling, 436-438 Quit method, 671 properties, configuring, 545-548 parameters, 660-661 removing, 551 script properties, 663 renaming, 548 WshNetwork object reordering, 548-549 network drives, mapping, 690-691 routers network printers, mapping, 689 administrative passwords, specifying, 428 setup pages, displaying, 424-427 SSID broadcasting, disabling, 432-433 properties, 689 referencing, 689 WshShell object Popup method, 677 troubleshooting, 508-509 intType parameter options, 678-680 user-specific, creating, 549-550 return values, 680-681 WPA, 430-432 RegDelete method, 686 WishNetwork object RegRead method, 685 network drives, mapping, 690-691 RegWrite method, 686 network printers, mapping, 689 Run method, 681 properties, 689 WshShortcut object, 683-685 referencing, 689 wwwroot folder (IIS default website), 618, 623 WMI (Windows Management Instrumentation), 695 class instances, returning, 696-699 remote computers, scripting, 700-702 X-Y-Z services, controlling, 213-217 work networks, 528 xcopy command, 284-288 workgroup name, configuring on peer-to-peer networks, 513 XOR (Boolean Exclusive Or), 750 WPA (Wireless Protected Access), 430-431, 516 zones See security zones security properties, modifying on wireless networks, 431-432 write caching, enabling on hard drive, 128-129 Write permission, 360 WScript, 660 environment variables, 687-689 WScript objects CreateObject method, 672-674 Echo method, 671 How can we make this index more useful? Email us at indexes@samspublishing.com www.it-ebooks.info www.it-ebooks.info Try Safari Books Online FREE Get online access to 5,000+ Books and Videos FREE TRIAL—GET STARTED TODAY! www.informit.com/safaritrial Find trusted answers, fast Only Safari lets you search across thousands of best-selling books from the top technology publishers, including Addison-Wesley Professional, Cisco Press, O’Reilly, Prentice Hall, Que, and Sams Master the latest tools and techniques In addition to gaining access to an incredible inventory of technical books, Safari’s extensive collection of video tutorials lets you learn from the leading video training experts WAIT, THERE’S MORE! Keep your competitive edge With Rough Cuts, get access to the developing manuscript and be among the first to learn the newest technologies Stay current with emerging technologies Short Cuts and Quick Reference Sheets are short, concise, focused content created to get you up-to-speed quickly on new and cutting-edge technologies www.it-ebooks.info informit.com/register Register your copy of Windows Unleashed to receive a free updated online copy of this book Once the final Windows product is released by Microsoft, we will automatically update this book to include any changes made to the product You must register to get this update! To begin the registration process, simply go to informit.com/register to sign in or create an account You will then be prompted to enter the 10- or 13-digit ISBN that appears on the back cover of your product About InformIT Registering your products can unlock the following benefits: • Free Online Edition! When Microsoft releases the final product, you can get an updated edition of this book absolutely free! • All examples and source code presented in this book Registration benefits vary by product Benefits will be listed on your Account page under Registered Products — THE TRUSTED TECHNOLOGY LEARNING SOURCE INFORMIT IS HOME TO THE LEADING TECHNOLOGY PUBLISHING IMPRINTS Addison-Wesley Professional, Cisco Press, Exam Cram, IBM Press, Prentice Hall Professional, Que, and Sams Here you will gain access to quality and trusted content and resources from the authors, creators, innovators, and leaders of technology Whether you’re looking for a book on a new technology, a helpful article, timely newsletters, or access to the Safari Books Online digital library, InformIT has a solution for you informIT.com THE TRUSTED TECHNOLOGY LEARNING SOURCE Addison-Wesley | Cisco Press | Exam Cram IBM Press | Que | Prentice Hall | Sams SAFARI BOOKS ONLINE www.it-ebooks.info ... ISBN-13: 978 -0- 672 3-3069-8 ISBN-10: 0- 672 -33069-5 Library of Congress Cataloging-in-Publication Data: McFedries, Paul Microsoft Windows unleashed / Paul McFedries p cm ISBN 978 -0- 672 -33069-8 Microsoft. .. 72 6 Running PowerShell Scripts 72 8 www.it-ebooks.info xx Microsoft Windows Unleashed A Windows Keyboard Shortcuts 73 1 B Understanding... 575 Encrypting Offline Files 577 Working with Network Files While You're Offline 577 Synchronizing

Ngày đăng: 27/03/2019, 16:41

Từ khóa liên quan

Mục lục

  • Title

  • Introduction

  • Chapter 01

  • Chapter 02

  • Chapter 03

  • Chapter 04

  • Chapter 05

  • Chapter 06

  • Chapter 07

  • Chapter 08

  • Chapter 09

  • Chapter 10

  • Chapter 11

  • Chapter 12

  • Chapter 13

  • Chapter 14

  • Chapter 15

  • Chapter 16

  • Chapter 17

  • Chapter 18

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan