Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material CONTENTS AT A GLANCE Introduction . .xxxvii PART I WINDOWS 2000 PROFESSIONAL BASICS 1 1 Introducing Windows 2000 Professional 3 2 Installing Windows 2000 Professional (and Automating Installation) 39 3 Running Your Applications 89 4 Organizing Programs and Documents 117 5 Setting Object Properties 145 6 Customizing Your Desktop via Control Panel 157 7 Printers and Printing 195 8 Running Multimedia Applications 245 9 Sharing Data Between Applications 273 PART II COMMUNICATIONS AND THE INTERNET 299 10 Introduction to Communications 301 11 Using the Communications Programs 341 12 Web Browsing with Internet Explorer 375 13 Using Outlook Express for E-mail and News 411 PART III NETWORKING WINDOWS 2000 PROFESSIONAL 435 14 Understanding the Architecture 437 15 An In-DepthCOPYRIGHTED Introduction to Networks MATERIAL 467 16 Network Architectures 501 17 Connecting to Windows 2000 Peer-to-Peer Networks and NT4 Domains 529 18 Living with Windows 2000 Professional; Strict Security 557 19 Active Directory Essentials 583 20 Connecting to Novell NetWare Networks 603 21 Secure Telecommuting 619 CONTENTS AT A GLANCE xi PART IV ADVANCED TECHNIQUES AND TROUBLESHOOTING 637 22 HTML and VBScript 639 23 DHTML and VBScript 693 24 VBScript and Windows 2000 Professional 727 25 The Windows Scripting Host 773 26 Supporting New Hardware and Installing Drivers 799 27 Fixing Windows 2000 Professional When It Breaks 809 28 Administrative and Diagnostic Tools 845 29 Additional Customization Options 881 30 Advanced Troubleshooting Methodology 911 Index . 943 CONTENTS Introduction . .xxxvii PART I • WINDOWS 2000 PROFESSIONAL BASICS 1 1 Introducing Windows 2000 Professional 3 Windows 2000 Professional, Windows 2000 Server: Which Is Which? . 4 The Road to Windows 2000 Professional . 5 The Beginnings . 6 The Early Releases . 7 What’s New in Windows 2000 Professional? . 8 Plug-and-Play Support . 8 Partial Plug-and-Play Systems . 10 Hot Plug-and-Play Support . 11 Offline Files . 12 Windows Management Instrumentation . 12 Advanced Power Management Support . 12 Encrypting File System . 12 Support for Windows 2000 Server Deployment Tools . 12 Microsoft Management Console . 13 USB Support . 13 Digital Camera Support . 13 Multiple Monitor Support . 13 DirectX 7 . 13 Advanced VPN Security . 14 Recovery Console . 14 Hibernation . 14 Remote Desktop Sharing . 15 Internet Connection Sharing . 15 Fax Services . 15 Internet Explorer 5 . 15 Internet Information Services . 15 Accessibility Options . 16 Telnet Server . 16 Personalized Menus . 16 What’s Not in Windows 2000 Professional? . 16 MSN Support . 16 Support for MIPS or PowerPC Chips . 16 Why Choose Windows 2000 Professional over Windows 98? . 17 More Solid, Crashless . 18 CONTENTS xiii Complete Protected Mode over Protected Mode with Real-Mode Support . 19 Faster . 19 Home Directories . 20 Error Recording . 20 Multiprocessor Support over x86-Only Support . 21 Separate 16-Bit Memory Spaces over Shared 16-Bit Memory Spaces . 21 NT File System over FAT File System . 22 Security in Windows 2000 Professional . 23 Windows 2000 Professional Requires Users to Log On to a Workstation . 24 Windows 2000 Professional Defines User Rights That Control a User’s Actions . 24 Windows 2000 Professional Uses File and Printer Permissions to Control Access . 24 Windows 2000 Professional Will Optionally Log All Security Events . 25 How Is Windows 2000 Professional Different from Other Operating Systems? . 25 Windows 2000 Professional Compared with Windows 3.x . 25 Windows 2000 Professional Compared with OS/2 . 26 Windows 2000 Professional Compared with Unix . 26 Windows 2000 Professional Compared to Macintosh OS . 26 What Are the Features of Windows 2000 Professional Architecture? . 27 Kernel Mode . 27 The HAL and the Kernel . 27 Executive Services . 28 User Mode . 30 Windows 2000 Professional Weaknesses . 31 Problems Related to Scale . 31 Fewer Drivers Are Available . 32 Not All Windows 95/98 Apps Run . 32 Problems Caused by the Secure Nature of Windows 2000 Professional . 33 Some DOS and Windows 3.x Apps Run Slowly . 34 Some DOS and Windows Apps Will Not Run . 34 Problems Related to Legacy . 34 File Associations Rely on File Extensions . 35 Operating System Components Are Largely Static . 35 Shortcuts Don’t Link Two Ways . ..
Recommended publications
  • TK Backman, Jason Yang, SW Development at MS
    T.K. Backman Jason Yang [email protected] [email protected] Principal Development Lead Principal Development Lead Debugging and Tools Group Analysis Technologies Team Windows Engineering Desktop Windows Engineering Desktop Microsoft Corporation Microsoft Corporationnnn Code on a massive scale Developers on a massive scale Tight constraints on schedules University of Washington 3/2/2011 2 ◦ Company structure Why the world is not just about developers ☺ ◦ Innovation strategy How we actually improve software over time ◦ Dynamic tension When people are involved, everything changes ◦ Development cycles How we build software products in cycles ◦ Program analysis How we push quality upstream ◦ Windows engineering system How we build large-scale products University of Washington 3/2/2011 3 ◦ Total size: ~89,000 employees ◦ Windows & Office – “perfect org structure” PM – program managers Dev – software developers Test – software developers in test ◦ Around 1000 PM+Dev+Test feature teams on 100s of products University of Washington 3/2/2011 4 ◦ Team size: ~10,000 employees ◦ Sales & marketing ◦ Project managers / product managers ◦ 30 feature teams 1500 Devs 1500 Testers 1000 PMs ◦ Customer support engineers ◦ Build engineers University of Washington 3/2/2011 5 “I often say that when you can measure what you are speaking about, and express it in numbers, you know something about it; but when you cannot measure it, when you cannot express it in numbers, your knowledge is of a meager and unsatisfactory kind; it may be the beginning
    [Show full text]
  • Scheduling, Thread Context, and IRQL
    Scheduling, Thread Context, and IRQL December 31, 2020 Abstract This paper presents information about how thread scheduling, thread context, and a processor’s current interrupt request level (IRQL) affect the operation of kernel- mode drivers for the Microsoft® Windows® family of operating systems. It is intended to provide driver writers with a greater understanding of the environment in which their code runs. A companion paper, “Locks, Deadlocks, and Synchronization” at http://www.microsoft.com/whdc/hwdev/driver/LOCKS.mspx, builds on these fundamental concepts to address synchronization issues in drivers. Contents Introduction ....................................................................................................................... 3 Thread Scheduling ............................................................................................................ 3 Thread Context and Driver Routines .................................................................................. 4 Driver Threads .................................................................................................................. 5 Interrupt Request Levels .................................................................................................... 6 Processor-Specific and Thread-Specific IRQLs .............................................................. 8 IRQL PASSIVE_LEVEL ............................................................................................ 8 IRQL PASSIVE_LEVEL, in a critical region ..............................................................
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Windows NT® 4 for Dummies® File:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM
    Table of contents Windows NT® 4 For Dummies® file:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM Table of Contents Windows NT® 4 For Dummies® Introduction About This Book How to Use This Book And What about You? How This Book Is Organized Part I: Introducing Windows NT (Bare-Bones Stuff) Part II: Making Windows NT Do Something Part III: Using Windows NT Applications Part IV: Been There, Done That: Quick References for Moving to Windows NT Part V: Getting Help Part VI: The Part of Tens Icons Used in This Book Where to Go from Here Part I: Intro to Windows NT (Bare Bones Stuff) Chapter 1: What Is Windows NT? What Is This "Windows" Stuff, Anyway? What Does Windows NT 4 Do? Why Should I Bother Using Windows NT? Will I Like Windows NT 4 Better than Windows NT 3.51? What's the Difference between Windows NT Workstation and Windows NT Server? Bracing Yourself for Windows NT 4 Chapter 2: Boring Information, Bothersome Computer Parts The Computer Microprocessor Floppy Disks, Compact Discs (CDs), and Disk Drives Floppy disk flipping What disk drives does Windows NT like? What does "write-protected" mean? Driving with compact discs The Mouse and That Double-Click Stuff Cards and Monitors Keyboards Groups of keys More key principles Print Screen: the one fun, weird code key Modems Printers Networks Sound Cards (Disgusting Bioactive Noises) Parts Required by Windows NT Chapter 3: Windows NT Stuff Everybody Thinks You Already Know Backing Up Your Work Clicking 1 of 9 07/14/99 08:29:14 Table of contents Windows NT® 4 For Dummies® file:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM
    [Show full text]
  • Copyrighted Material
    2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio.
    [Show full text]
  • Unit OS6: Device Management
    Lab Manual - OS6 Device Management Unit OS6: Device Management 6.4. Lab Manual Windows Operating System Internals - by David A. Solomon and Mark E. Russinovich with Andreas Polze 1 Lab Manual - OS6 Device Management Copyright Notice © 2000-2005 David A. Solomon and Mark Russinovich These materials are part of the Windows Operating System Internals Curriculum Development Kit, developed by David A. Solomon and Mark E. Russinovich with Andreas Polze Microsoft has licensed these materials from David Solomon Expert Seminars, Inc. for distribution to academic organizations solely for use in academic environments (and not for commercial use) 2 2 Lab Manual - OS6 Device Management Roadmap for Section 6.4. Lab experiments investigating: Viewing Security Processes Looking at the SAM Viewing Access Tokens Looking at Security Identifiers (SIDs) Viewing a Security Descriptor structure Investigating ordering of Access Control Entries (ACEs) Investigating Privileges 3 This Lab Manual includes experiments investigating the the I/O system mechanisms and concepts implemented inside the Windows operating system. Students are expected to carry out Labs in addition to studying the learning materials in Unit OS6. A thorough understanding of the concepts presented in Unit OS6: Device Management is a prerequisite for these Labs. 3 Lab Manual - OS6 Device Management Lab: Viewing the Installed Driver List View the list of System Drivers in the Software Environment section of the Windows Information utility (Msinfo32.exe) Note: the distinction between File System Drivers and Kernel Drivers is from the Type value in the driver’s Registry key. This distinction is meaningless. 4 Lab objective: Viewing the Loaded Driver List You can see a list of registered drivers on a Windows 2000 system by going to the Drivers section of the Computer Management Microsoft Management Console (MMC) snapin or by right-clicking the My Computer icon on the desktop and selecting Manage from the context menu.
    [Show full text]
  • Windows Kernel Internals II Windows Driver Model University of Tokyo – July 2004*
    Windows Kernel Internals II Windows Driver Model University of Tokyo – July 2004* Dave Probert, Ph.D. Advanced Operating Systems Group Windows Core Operating Systems Division Microsoft Corporation © Microsoft Corporation 2004 1 Windows I/O Model Asychronous, Packet-based, Extensible Device discovery supports plug-and-play — volumes automatically detected and mounted — power management support (ACPI) Drivers attach to per device driver stacks — Drivers can filter actions of other drivers in each stack Integrated kernel support — memory Manager provides DMA support — HAL provides device access, PnP manages device resources — Cache manager provides file-level caching via MM file-mapping Multiple I/O completion mechanisms: —synchronous —update user-mode memory status —signal events —callbacks within initiating thread —reaped by threads waiting on an I/O Completion Port © Microsoft Corporation 2004 2 IO Request Packet (IRP) IO operations encapsulated in IRPs IO requests travel down a driver stack in an IRP Each driver gets an IRP stack location which contains parameters for that IO request IRP has major and minor codes to describe IO operations Major codes include create, read, write, PNP, devioctl, cleanup and close Irps are associated with the thread that made the IO request © Microsoft Corporation 2004 3 Object Relationships Driver Object Device Object Device Device Device Object Object Object Volume Device Object Driver Object File Object File Object © Microsoft Corporation 2004 4 Layering Drivers Device objects attach one on top of another
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • Technical Information, You Will Find Several Different Types of Symbols Are Used to Identify Different Sections of Text
    Technical FAST/TOOLS R10.01 Information System Hardening Windows 7/8, Windows Server 2008/2012 TI 50A01A10-02EN (Rev. 1.0) Yokogawa Electric Corporation TI 50A01A10-02EN 2-9-32, Nakacho, Musashino-shi, Tokyo, 180-8750 Japan ©Copyright June 2015 (YK) Tel.: 81-422-52-2006 Fax.: 81-422-52-2540 1st Edition June 30, 2015 (YK) Blank Page i Introduction n Purpose In order to protect systems from network related security vulnerabilities, it is important to harden the operating system on which the application is running. This document describes the hardening procedure to be followed for FAST/TOOLS R10.01 systems running Microsoft operating systems. n Validity This document is primarily intended for internal Yokogawa use when engineering projects that use FAST/TOOLS on Microsoft operating systems. n Definitions, Abbreviations and Acronyms AV : Antivirus software DMZ : DeMilitarized Zone GSC : Global SCADA Center SCADA : Supervisory Control And Data Acquisition n References [1] McAfee VirusScan Enterprise version 8.8, YHQ recommended antivirus software. [2] IT Security Guide for System Products (Common Information) TI30A15B30-01E. All Rights Reserved Copyright © 2015, Yokogawa Electric Corporation TI 50A01A10-02EN June 30, 2015-00 ii n Symbol Marks Throughout this Technical Information, you will find several different types of symbols are used to identify different sections of text. This section describes these icons. CAUTION Identifies instructionsthat must be observed in order to avoid physical injury and electric shock or death to the operator. IMPORTANT Identifies importantinformation required to understand operations or functions. TIP Identifies additionalinformation. SEE ALSO Identifies asource to be referred to. n Trademark • FAST/TOOLS is registered trademark of Yokogawa Electric Corporation.
    [Show full text]
  • Dan's Motorcycle Windows Commands
    1 Complete List of Run Commands in Windows XP, Vista, 7, 8 & 8.1 ¶ People can get stuck if they are attacked with viruses or in any way can’t access different Applications in Windows. Sometimes it gets difficult to find the commands to start the applications directly. Knowing the Run Command for a program in different Windows versions can be very useful. if you’d like to start a program from a script file or if you only have access to a command line interface this can be helpful. For example, If you have Microsoft Word installed (Any version of Microsoft Office®) rather then searching or clicking the start icon, locating the Microsoft Office folder and then clicking the Microsoft Word. You can use the Windows Run Box instead to access the application directly. Just Click Start and Click Run or press "Window Key + R" and type "Winword" and press enter, Microsoft Word will open immediately. Here is a, hopefully, Complete list of RUN Commands in Windows XP, Vista, 7, 8 and 8.1 for your quick and easy access. Description of Applications Run Command 32-bit ODBC driver under 64-bit platform = C:\windows\sysWOW64\ odbcad32.exe 64 bit ODBC driver under 64-bit platform = C:\windows\system32\ odbcad32.exe Accessibility Controls access.cpl Accessibility Options control access.cpl Accessibility Wizard accwiz Copyright © 1999-2016 dansmc.com. All rights reserved. Adapter Troubleshooter (Vista/Win7) AdapterTroubleshooter 2 Add Features to Windows 8 Win8 windowsanytimeupgradeui Add Hardware Wizard Win8 hdwwiz Add New Hardware Wizard hdwwiz.cpl Add/Remove
    [Show full text]
  • Testing Closed-Source Binary Device Drivers with DDT
    Testing Closed-Source Binary Device Drivers with DDT Volodymyr Kuznetsov, Vitaly Chipounov, and George Candea School of Computer and Communication Sciences École Polytechnique Fédérale de Lausanne (EPFL), Switzerland Abstract non-privileged users to elevate their privileges to Local DDT is a system for testing closed-source binary de- System, leading to complete system compromise [24]. vice drivers against undesired behaviors, like race con- Our goal is to empower users to thoroughly test ditions, memory errors, resource leaks, etc. One can drivers before installing and loading them. We wish that metaphorically think of it as a pesticide against device the Windows pop-up requesting confirmation to install driver bugs. DDT combines virtualization with a spe- an uncertified driver also offered a “Test Now” button. cialized form of symbolic execution to thoroughly ex- By clicking that button, the user would launch a thor- ercise tested drivers; a set of modular dynamic check- ough test of the driver’s binary; this could run locally or ers identify bug conditions and produce detailed, exe- be automatically shipped to a trusted Internet service to cutable traces for every path that leads to a failure. These perform the testing on behalf of the user. Such function- traces can be used to easily reproduce and understand ality would benefit not only end users, but also the IT the bugs, thus both proving their existence and helping staff charged with managing corporate networks, desk- debug them. We applied DDT to several closed-source tops, and servers using proprietary device drivers. Microsoft-certified Windows device drivers and discov- Our work applies to all drivers, including those for ered 14 serious new bugs.
    [Show full text]
  • Windriver™ USB User's Manual
    WinDriver™ USB User's Manual Version 11.2.0 Jungo Ltd. WinDriver™ USB User's Manual: Version 11.2.0 Copyright © Jungo Ltd. 2005–2013 All Rights Reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license agreement. The software may be used, copied or distributed only in accordance with that agreement. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or any means, electronically or mechanically, including photocopying and recording for any purpose without the written permission of Jungo Ltd. Brand and product names mentioned in this document are trademarks of their respective owners and are used here only for identification purposes. © Jungo Ltd. 2005–2013 ii Table of Contents 1. WinDriver Overview .................................................................................................................. 1 1.1. Introduction to WinDriver .............................................................................................. 1 1.2. Background ..................................................................................................................... 2 1.2.1. The Challenge ...................................................................................................... 2 1.2.2. The WinDriver Solution ...................................................................................... 2 1.3. Conclusion ......................................................................................................................
    [Show full text]