Instead of My Computer. Provides Recovery Console That Work Similar to Using an ERD in WINNT

Total Page:16

File Type:pdf, Size:1020Kb

Instead of My Computer. Provides Recovery Console That Work Similar to Using an ERD in WINNT WIN2000 FAT16/32/ntfs-True 32 bit OS WIN2000 NTFS file system gives better sec be it has its own data encryption.Has ACPI w/c enables the computer to power down devices that are not in use. Power opt are in Control panel. Also dial up connections and schedules tasks are in the control panel instead of my computer. Provides recovery console that work similar to using an ERD in WINNT. Start 4 diskettes and wait for the window that allows you to repair your OS installation. All back up of the registry is stored on c:\winnt\repair\regback. Originals are stored on c:\winnt\system32.config. These files are called SAM, Security, software, system, default. WINNT (FAT16, NTFS, HPFS, CDFS) A computer running WINNT operates either a domain or a workgroup. DOMAIN all computers have access to a central dir database of user accts and sec info. Advantages: Centralized acct and security administration Single user logon provides network-wide resource access. Disadvantages: Requires at least 1 Windows NT server domain controller. Require additional planning prior to deployment WORKGROUP each computer has access only to its own dir database of user accts and sec info. Advantages: Does not require a WINNT Server domain controller Simple design and implementation Convenient for a limited number of computers in close proximity Disadvantages: Non centralized account management Inefficient for networks that have many computers Limited centralized administrative control. èERD To create a WIN95/98 startup disk/WIN98 ERD: place the WIN95/98 CD in the DC-ROM drive, boot the WIN destop, insert a blank FD in the A: drive, the start-settings-ctrl panel-add/remove programs- startupdisk-create disk (WIN98 FAT16 & FAT32, Combination of 16&32 bit OS To create a WIN95 ERD-boot to the windows desktop, place a win95cd, insert a FD –my computer- ctrl panel-add/remove programs-startup disk-created disk. WIN95 FAT16 & FAT32--- 1st version of Win95 doesn’t support FAT32 To make an ERD WINNT: Type RDISK at command prompt. Io.sys: the 1st OS file loaded during system startup Himem.sys: Loaded by Io.sys during system startup. Himem.sys provides access to the HMA and Extended memory. IFSHLP.sys: Loaded by IO.sys during system startup. This is the 32 bit installable file system. It is responsible for intercepting disk access request made by 16bit app and supporting network files access. Config.sys: provides a way of loading real mode device drivers and terminate and stay resident (TSR) programs that may be required for some systems or applications to operate properly. Autoexec.bat: provided for compatibility and as a way of configuring the command line environment. Win.ini: provides support for selected Win9x configuration settings. Most conf settings have been moved out of Win.ini and into the WIN9x registry. èWIN98/95-uses same CORE components: kernel, GDI, user // The kernel serves the same purpose as it did in WIN95-handles mem mgnt, file I/O and loading and executing programs. //User-controls mouse, keyboard ports, & desktop, also control pos of windows icon and dialog boxes. //GDI-draws screens and graphics. Krn386.exe: 16/32bit versions of the Kernel file // Gdi.exe // user.exe System.ini: provides support for windows95/98 config settings. // Win.com=to win3.x, verifies system conf and loads remaining OS system core files. // Vmm32.vxd--The VMM manager file that is responsible for loading initial device drivers, creating VM for application support 16bit & 32 bit progrng.: Windows contains both 16-32bit code for operations. The kernel uses only 32bit code to handle all its operations while the User mostly 16bit code. GDI uses a combination of both 16 and 32 bit code for all its functions. Windows is capable of using 16bit code however the OS was catered to run 32bit code bec of speed and 32 bit drivers are loaded in ext mem where it frees up convent mem, also 32-bit drivers can be loaded dynamically where it is only loaded when needed. // Win98 also implement virtual machine on its OS/--2 Types of VM that W95 supports- System virtual machine and MS-dos virtual machine.// Page faults occur when there is a call for mem and the data is in the hard drive instead of mem. Excessive page faults-(i.e. very high cpu use, slow system response, constant hard drive use) can cause disk thrashing bec of the overuse of the hard drive. Disk thrashing can cause appl. To lockup or fail or even hard drive failure. To cure the prob-to open fewer app. or install more RAM on computer. 'Win98 starts off in real mode where all control is handled by IO.sys and when in protected mode the control is handled off toe VMM32.VxD. Five phase of boot up Process Phase 1: comp goes through its POST, checks for RAM and hardware devices. Phase 2: Dos drivers and TSRs and environmental settings-Ctrl gets turned over to IO.sys w/c creates a real mode OS environment. Loads IFSHLP.sys and Himem.sys. Command.com is loaded and checks Autoexec.bat. Loads win.com where all other real mode components are loaded. Phase 3: Io.sys gives control to VMM32.vxd. Loads all critical static vxd files for boot. Locations for the vxd are either in a folder, embedded in the VMM32.vxd or inside the registry or an INI file. Phase 4: Switch over to protected mode-Loads configuration manager for PNP devices loads the remaining vxd drivers for devices. Phase5: core components are loaded for protected mode. How PNP works PNP provides two main services: resource management and run-time configuration. Resource management occurs at startup as system resources are allocated to devices. Run-time config. Is on going process that monitors any changes in system devices. Configuration manager examines &reexamines the reqd resources for the dev and sets up the best configuration for each device. It interacts with the resource arbitrator allowing the arbitrator to give resources to each device. It then passes info to the bus enumerator. Bus enumerator then assesses all the info and creates a hardware tree. Win98/95-Registry works/sub keys same way. Registry is contained in two files the System.dat and user.dat. WIN98 provides a too called the registry checker that scans your registry for errors and allows backup of the registry. Backup cab files and is located in c:\windows\sysbckup folder. They will look like zip files and are labeled rb001.cab. To restore from a backup registry start your computer in real mode DOS or from a bootable floppy. SCANREG /restore=restores the registry from a previously saved backup // /fix-repairs a corrupted registry /backup-creates a new backup, don’t use this if registry is corrupted // /opt-an option that scans the registry for data that is no longer needed and removes them. WIN95/98 uses win32api as an interface for users and programs. API are build in programs that the software programmers do not have to write. Many of DLL are part of this model. Most app will not have direct access to your devices they must go through the OS to gain access. èWINDOWS 95 NOTES (See also windows note) Complete, integrated 32 bit operating system that does not require MS-DOS Preemptive multitasking and multiple threads of execution for 32bit app Preemptive multitasking means application with the highest priority largest processor time Long file name support up to 255 characters // PNP architecture (3 factors: OS, Hardware & BIOS) Enhanced multimedia support // Build in support for networking // Document-centric approach where OS around the document instead of application 2 Types of VM that W95 supports- System virtual machine and MS-dos virtual machine-same as inW98 WIN386.swp=represents virtual memory in WIN95 // User.dat-contains all your configuration inW95 System.dat-they makeup registry WINNT page file: Pagefile.sys -FAT16-Max size partition 2GB and clusters at 64KB. Limited to 255 entries at root. FAT32 able to see partitions larger than 2GB. Clusters are sized at 4KB IRQ2,5,9-11: open IRQ0: IT/SC; 1KB, IR15Sec HD controller, 14-Primary HD, 13Math processor, 6Floppy,7LPT,8Realtime clock èWINDOWS NOTES Sysedit in the run str men-shows system.ini/win.ini/config.sys/autoexec.bat (INI files not larger than 64KB) Regedit: made up of 6 sub-keys-c:\windows-2 files-*user.dat-holds all win envir. Info/users; *system.dat- holds all hardware info. // *make up the registry— 6 sub-key of the REGISTRY // Two files user.da0 & system.dao used as backups if the registry gets corrupted. Hkey_classes: divides files into ext type and assoc. Hkey_current_users: holds spec. conf settings on a sys. Hkey_local_machine: contains all info on hardware Hkey_users: info abt various users Hkey_current_config: holds data of the curr hardware on the system Hkey_dyn_data: data changes as devices are changed on the fly. WIN95FilesystemVFAT-WIN95 to FAT in FDISK. Vfat initializes every time you start windows. The IFSHLP.SYS must be loaded in order to start up VFAT-allows windows to use the LFN Protected mode drivers: *.VxD or .386 // Real mode drivers: *.SYS or *.DRV Kernel-most low level function-related to hardware. Main role-control mem alloc, resources, and multitasking-open mult appl ¥The 4 tabs of system properties: Device manager:list of all devices connected to your system; Performance: Filesys, graphics, adj toVM; General: shows basic system info.; & Hardware Profile-allows multiple hardware config on one comp. Virtual Mem: Part of HD that acts as memory. In WIN95 VM is dynamic w/c means that it will adjust according to your system’s needs.
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • Why Os/2 Failed: Business Mistakes Compounded by Memory Prices
    Mountain Plains Journal of Business and Economics Volume 10 Issue 1 Article 4 Date Published: 10-1-2009 Why Os/2 Failed: Business Mistakes Compounded By Memory Prices Eric G. Swedin Weber State University Davis Follow this and additional works at: https://openspaces.unk.edu/mpjbt Part of the Business Commons Recommended Citation Swedin, E. G. (2009). Why Os/2 Failed: Business Mistakes Compounded By Memory Prices. Mountain Plains Journal of Business and Economics, 10(1). Retrieved from https://openspaces.unk.edu/mpjbt/ vol10/iss1/4 This Case Study is brought to you for free and open access by OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. It has been accepted for inclusion in Mountain Plains Journal of Business and Economics by an authorized editor of OpenSPACES@UNK: Scholarship, Preservation, and Creative Endeavors. For more information, please contact [email protected]. 36 WHY OS/2 FAILED: BUSINESS MISTAKES COMPOUNDED BY MEMORY PRICES ERIC G. SWEDIN WEBER STATE UNIVERSITY DAVIS ABSTRACT In 2006, IBM ended their support of OS/2, closing the book on an ambitious effort to create a modern operating system for the personal computer. IBM and Microsoft released the OS/2 operating system in December 1987 to replace the primitive DOS with a more sophisticated, preemptive multitasking operating system for personal computers. This article argues that OS/2 failed because of the U.S.-Japan Semiconductor Trade Agreement of 1986, subsequent accusations of DRAM chip dumping by the United States, and the resulting tariffs on Japanese memory chips, led to a memory chip shortage that drove up memory prices.
    [Show full text]
  • F.A.Q. Series ROM-DOS TM
    21520 30th Drive SE #110 Bothell, WA 98021 USA Tel: (425) 951-8086 Fax: (425) 951-8095 [email protected] [email protected] www.datalight.com TM ROM-DOS F.A.Q. Series Question: Assuming they don't want FAT32, Long Filename support, or Sockets, why should my customer upgrade to the newest ROM-DOS? Answer: Since our first FAT32 and LFN release 4.00.1091, there have been several improvements to the core ROM- DOS kernel. This core code is used primarily for our DOS 6.22 compatible compilations, and then extended in the case of a FAT32 or Long Filename build. The 4.00.1091 release is also a new code base and there will be no further upgrades to the previous DOS 6.22 code. In order to obtain new features, fixes, and support a customer must upgrade to release 4.00.1091 or greater. Along with the performance enhancements for both size and speed, several corrections have been made to the ROM-DOS kernel. These include stack and memory issues, disk access issues, and compatibility with the former market leader in DOS. Most of the ROM-DOS utilities have also been improved for size and speed, along with bug fixes. The major changes happened with the XCOPY, HIMEM, MSCDEX, CHKDSK, FDISK and FORMAT utilities. In the realm of international support, the Euro was added to the keyboard and display driver code. ROM- DOS and PC-DOS 2000 are the only non-GUI operating systems to support the Euro. Finally, new ROM-DOS utilities have been added.
    [Show full text]
  • Older Operating Systems (962-038)
    Instructions: This is an open book pretest. Answer all questions. There are three sections. There are a total of five question pages. The time limit is two hours. Section one: Select only one answer for each multiple-choice question. Each question is worth 2 marks. Q1. Determine which of the following is true concerning DOS filters a. A DOS filter is used to modify information as it passes from EBCDIC text files to the screen. False because it for ASCII not EBCDIC b. The sort command is replaced using the command (dir /w) False because to sort you must use Dir /O:order ex. Dir/O:n c. The command (find /C “supervisor” memo1.txt memo2.txt) is an invalid command. False because it’s a valid command d. The command (type readme.doc | more) produces the same output as (more < readme.doc) True Q2. Determine which of the following is true concerning the tree command a. To indicate branching of directories, the tree command only uses the line characters. False because there are lines b. The deltree command is an enhanced version of the tree command. False, deltree erases a directory, tree shows structure. c. We can use the tree command with redirection symbols. True d. The tree command is an internal DOS command. False, it’s external. Internal means it exists in command.com. Tree.exe is external. Q3. Determine which of the following statement is true concerning variables. a. DOS includes built-in variables and therefore do not allow user defined variables. False – you can define your own variable.
    [Show full text]
  • Active @ UNDELETE Users Guide | TOC | 2
    Active @ UNDELETE Users Guide | TOC | 2 Contents Legal Statement..................................................................................................4 Active@ UNDELETE Overview............................................................................. 5 Getting Started with Active@ UNDELETE........................................................... 6 Active@ UNDELETE Views And Windows......................................................................................6 Recovery Explorer View.................................................................................................... 7 Logical Drive Scan Result View.......................................................................................... 7 Physical Device Scan View................................................................................................ 8 Search Results View........................................................................................................10 Application Log...............................................................................................................11 Welcome View................................................................................................................11 Using Active@ UNDELETE Overview................................................................. 13 Recover deleted Files and Folders.............................................................................................. 14 Scan a Volume (Logical Drive) for deleted files..................................................................15
    [Show full text]
  • Installation and Performance
    Installation and Performance Welcome Thank you for purchasing Visual Reality software. Visual Reality is designed to offer an easy but extremely powerful, three dimensional environment in which full color still images and 3D animations can be created. Visual Reality 2.0 includes: Renderize Live. Load 2D and 3D models from a variety of drawing and modeling programs or drag and drop from Visual Model and Visual Font and compose unique scenes in an intuitive 3D environment using a wide variety of material, lighting and camera effects. Load bitmap images from a variety of common file formats for backgrounds in scenes and as color, bump or reflection maps in material definitions. Render your compositions as full-color photorealistic images at any resolution. Animate just about anything with just a few button clicks. Objects, camera views, color intensity and location of lights and the bump height of materials can all be set in motion or transformed. Rotoscoping allows you to create moving water and flickering fire. Bend, twist, stretch and morph objects over time. An advanced channel editor gives you precise time line control of every attribute, for every element or object. The 'Ease to' and 'Ease from' functions and hierarchical linking of objects give your animations a natural feel with smooth, fully controllable motion. Visual Font. Load Windows TrueType fonts and create 3D text objects by defining extrusion and bevel properties. Load extruded text into Renderize Live for inclusion in 3D scenes. Visual Image. Load and modify bitmap images from a wide variety of file formats. Work on individual images, or use the powerful layering tools to create digital collages.
    [Show full text]
  • Chapter 3. Booting Operating Systems
    Chapter 3. Booting Operating Systems Abstract: Chapter 3 provides a complete coverage on operating systems booting. It explains the booting principle and the booting sequence of various kinds of bootable devices. These include booting from floppy disk, hard disk, CDROM and USB drives. Instead of writing a customized booter to boot up only MTX, it shows how to develop booter programs to boot up real operating systems, such as Linux, from a variety of bootable devices. In particular, it shows how to boot up generic Linux bzImage kernels with initial ramdisk support. It is shown that the hard disk and CDROM booters developed in this book are comparable to GRUB and isolinux in performance. In addition, it demonstrates the booter programs by sample systems. 3.1. Booting Booting, which is short for bootstrap, refers to the process of loading an operating system image into computer memory and starting up the operating system. As such, it is the first step to run an operating system. Despite its importance and widespread interests among computer users, the subject of booting is rarely discussed in operating system books. Information on booting are usually scattered and, in most cases, incomplete. A systematic treatment of the booting process has been lacking. The purpose of this chapter is to try to fill this void. In this chapter, we shall discuss the booting principle and show how to write booter programs to boot up real operating systems. As one might expect, the booting process is highly machine dependent. To be more specific, we shall only consider the booting process of Intel x86 based PCs.
    [Show full text]
  • Accessing Windows Applications from Unix and Vice Versa
    50-20-42 DATA COMMUNICATIONS MANAGEMENT ACCESSING WINDOWS APPLICATIONS FROM UNIX AND VICE VERSA Raj Rajagopal INSIDE Accessing Windows Applications from an X-Station, Coexistence Options, Windows in an X-Station, Accessing Windows Applications, Accessing UNIX Applications from Windows Desktops, Emulators Migrating from one environment to another takes planning, resources and, most importantly, time (except in very trivial cases). This implies that even if eventually migrating to another environment, one still has to deal with coexistence among environments in the interim. In many com- panies it would make good business sense not to migrate legacy systems at all. Instead, it may be better to develop new systems in the desired en- vironment and phase out the legacy applications. The data created by the legacy applications is important and one must ensure that data can be ac- cessed from a new environment. Coexistence considerations are very im- portant in this case. Coexistence between Windows PAYOFF IDEA NT, UNIX, and NetWare deals with a Some users want applications they develop in number of related issues. One may one environment to execute in other environ- need to access Windows applications ments with very little change. With this approach, they can continue to develop applications with from a UNIX machine or need to ac- the confidence that they will execute in another cess UNIX applications from Win- environment even if the environments change in dows desktops. One may prefer to the future. In applications that can run in both have the same type of desktop (Òan Windows NT and UNIX, this can be accomplished enterprise desktopÓ) for all users and in several ways: be able to access different environ- •use APIs — there are three flavors of this ap- ments.
    [Show full text]
  • Onetouch 4.0 Scanned Documents
    · MUL TICS SYSTEM-PROGRAMMERS' MANUAL SECTION BY.2.03 PAGE 1 Publishe¢: 04/03/67 Identification Delete a subtree of the file system hierarchy. del tree E. Q. Bjorkman+· ,. Purpose I \. Deltree is the procedure used by the delete command (BX.8.07)· to delete an entry which points to a non-empty directory. In order to delete svch an entry delete calls deltree to delete the subtree beneath the entry. The method used in deltree can be easily adapted for other tasks which are repeated at all nodes of some tree structure in the file system. Usaoe call deltree (path, failsw); path is the path name of a directory. Fails\-J is.a 1-bit switch indicating on return that some entry of path could not be deleted. Oeltree starts deleting entries of the tree structure beneath ,path at the end nodes (i.e., directories_ that have no directories inferior to them). Deltree reaches these end nodes by constructing a path name of a directory · . immediately inferior to path and then calling itself recursively with that path name until the end'nbdes are r~ached~ Whendeltree has deleted all the entries in an end-node directory which it can delete~ it returns to its caller. )me lementat ion ca 11 .de ltree (path, fail sw); del path char(')'<), f,:lf lsw bit (1); De 1 tree first obtai i'IS the current. ca landar clock time using the PL/I built-in abnormal function ''c1ock_11 .' This time is used later to determine whether entries were added to the directory ~th after deltree started its I.Mork.
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Copyrighted Material
    2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio.
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]