Troubleshooting Windows® 7 Inside Out

Mike Halsey

Copyright © 2010 Mike Halsey.

Complying with all applicable copyright laws is the responsibility of the user. All rights reserved. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without express written permission of Press, Inc.

Printed and bound in the United States of America.

ISBN: 978-0-735-64520-2

3 4 5 6 7 8 9 10 11 LSI 8 7 6 5 4 3

Microsoft Press titles may be purchased for educational, business or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or send comments to [email protected].

Microsoft, Microsoft Press, ActiveX, Excel, FrontPage, , PowerPoint, SharePoint, Webdings, Windows, and are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.

Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, , places, and events depicted herein are fictitious, and no association with any real company, organization, prod- uct, domain name, email address, logo, person, place, or event is intended or should be inferred.

This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the author Microsoft Corporation, nor their respective resellers or distributors, will be held liable for any damages caused or alleged to be caused either directly or indirectly by such information.

Acquisitions and Development Editor: Kenyon Brown Production Editor: Adam Zaremba Editorial Production: Octal Publishing, Inc. and Custom Editorial Productions, Inc. Technical Reviewer: Todd Meister Indexing: Ginny Munroe Cover: Karen Montgomery Illustrator: Robert Romano

[2013-07-12] Contents at a Glance

Part 1: Prevention Chapter 15 Advanced Repair Methods...... 231 Chapter 1 Prevention Is Better Than Cure...... 3 Chapter 16 Windows Problems Demystified...... 257 Chapter 2 The Basic Windows 7 Utilities ...... 17 Chapter 17 Remote Help...... 273 Chapter 3 Basic Windows 7 Security...... 35 Chapter 18 Where to Find More Help and Support. . . . . 289 Chapter 4 ...... 53 Chapter 19 Diagnosing Hardware Problems...... 295 Chapter 5 Maintaining Windows 7...... 69 Part 4: Disaster Recovery Chapter 6 Users...... 79 Chapter 20 Windows and Tools...... 313 Chapter 7 Hardware...... 93 Chapter 21 Restoring from Another PC...... 319 Chapter 8 Virtualization ...... 103 Chapter 22 Linux: An on a Disc...... 325 Part 2: Quick Fixes Chapter 23 Third-Party Rescue Tools and Services...... 337 Chapter 9 Annoyances...... 121 Chapter 24 When You Can’t Recover Data...... 347 Chapter 10 Viruses, Malware, and Other Threats...... 137 Part 5: Power Utilities Chapter 11 Easy Ways to Fix Windows 7 ...... 163 Chapter 25 Advanced Windows Diagnostic Tools Part 3: Technical Fixes in Depth...... 369 Chapter 26 Chapter 12 in Depth ...... 401 What Is Windows 7 Anyway?...... 199 Chapter 27 Chapter 13 Advanced Registry Work ...... 413 Identifying the Source of a Problem ...... 205 Chapter 14 Advanced Diagnostic Tools in Windows 7. . . . 217

iii iv Contents at a Glance

Part 6: Appendices Appendix A Windows 7 Editions...... 423 Appendix B Windows 7 Features by Edition...... 425 Appendix C Windows 7 Shortcut Keys...... 431 Appendix D BIOS Beep Codes...... 439

Glossary...... 447 Index...... 455 Table of Contents

Part 1: Prevention ...... 1 Chapter 1: Prevention Is Better Than Cure ...... 3 Upgrade or Clean Install? ...... 4 How to Install Windows 7 to Prevent Problems ...... 4 Keeping Your Installation of Windows XP or ...... 6 How Big Should Partitions Be? ...... 7 What To Do When Windows 7 Is Installed ...... 7 Useful Windows 7 to Change ...... 8 MSConfig ...... 11 Moving Your Files Away from Windows ...... 12 Backing Up Windows 7 ...... 14 Summary ...... 16 Chapter 2: The Basic Windows 7 Utilities ...... 17 ...... 17 Action Center Settings ...... 19 What Can You Do with Action Center? ...... 19 ...... 20 Controlling Windows Update Through ...... 22 Windows Firewall ...... 23 Diagnose/Repair ...... 26 Windows Defender ...... 26 Windows 7 and Anti-Virus Software ...... 27 Legacy Program Compatibility ...... 28 The Program Compatibility Assistant ...... 29 Windows XP Mode ...... 31 Summary ...... 33

What do you think of this book? We want to hear from you! Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you . To participate in a brief online survey, please visit: microsoft com/learning/booksurvey.

v vi Table of Contents

Chapter 3: Basic Windows 7 Security ...... 35 The Reality of Virtualization ...... 36 Windows vNext ...... 37 Anti-Virus Software for Windows 7 ...... 38 Microsoft Security Essentials ...... 38 Norton Internet Security/Norton 360 ...... 39 Malwarebytes Anti-Malware ...... 39 Windows Defender ...... 39 Malicious Software Removal Tool ...... 39 ...... 40 BitLocker and BitLocker To Go ...... 43 Method 1: Encrypting a Hard Disk or Partition with Hardware Support ...... 43 Method 2: Encrypting a Hard Disk or Partition Without Hardware Support . . . . . 43 Method 3: Encrypting a USB Flash Drive or External Hard Disk ...... 43 Using BitLocker with Non-Windows 7 Computers ...... 45 Why Use BitLocker? ...... 47 Beware the Weak Link at the Keyboard ...... 47 Keep Your Anti-Virus Software Up to Date ...... 47 Make Sure You Have a Good, Up-to-Date Firewall ...... 47 Get Anti-Spyware Software ...... 48 Keep Windows Up to Date ...... 48 Keep Your Software Up to Date ...... 48 Always Check Email Attachments Before Opening Them ...... 48 Use a Secure Internet Browser ...... 48 Get Spam and Phishing Filtering for Your Email Software ...... 48 Never Click Anything You Don’t Explicitly Mean To ...... 49 Look for the Padlock or the Green Bar ...... 49 Never Give Private Details Online Unless You Have To ...... 49 Keep Backups ...... 49 Keep the Driver CDs and Manuals for Your PC ...... 50 Keep Windows Maintained ...... 50 Be Careful When You Throw Away Your PC ...... 50 Guest Mode ...... 50 Gibson Research ...... 51 Summary ...... 51 Chapter 4: Backup and Restore ...... 53 Moving Your Files Away from Windows 7 ...... 53 The Wizard ...... 53 Shrinking, Extending, and Creating Partitions ...... 55 Moving the Shell User Folders ...... 57 Using Backup and Restore ...... 57 Backing Up Files and Data ...... 57 Restoring Files and Data from a Backup ...... 61 Third-Party Backup Solutions ...... 62 Backing Up to the Cloud ...... 62 Version Control ...... 63 Table of Contents vii

Backing Up the Operating System ...... 63 Restoring Windows from a Windows System Image ...... 63 Restoring Windows 7 from a System Repair or Install Disc ...... 64 Corporate Image Backups ...... 65 Determining How Many Backups You Need and Where to Store Them ...... 66 Summary ...... 67 Chapter 5: Maintaining Windows 7 ...... 69 Defragmenting Your Hard Disks ...... 69 Which Hard Disks and Partitions Do You Defragment? ...... 71 Maintaining Windows ...... 71 Disk Cleanup ...... 71 Internet and Other Temporary Files ...... 72 Third-Party Tools and Utilities ...... 73 Don’t Install Too Much Software ...... 75 Keeping Windows 7 Updated ...... 76 Keeping Auto-Running Software to a Minimum ...... 76 The One Year Reinstall Rule ...... 77 Summary ...... 78 Chapter 6: Users ...... 79 How Windows 7 Controls Users ...... 79 Managing User Accounts ...... 80 Setting an Administrator Password ...... 81 What Is the Guest Account? ...... 83 Parental Controls ...... 84 What’s Missing from Parental Controls? ...... 87 Group Policies ...... 87 Local Security Policies ...... 88 Computer Management ...... 89 Blocking CDs, DVDs, Flash Drives, and External Hard Disks ...... 90 Summary ...... 91 Chapter 7: Hardware ...... 93 What’s in a PC? ...... 93 Motherboard ...... 94 Processor ...... 96 Memory ...... 97 Expansion Cards and Riser Cards ...... 97 Optical Drives and Hard Disks ...... 97 Power Supply ...... 98 The PC Case ...... 98 How Can You Clean the Inside of Your PC? ...... 98 Hardware Health ...... 99 Desktops ...... 99 Laptops ...... 99 All-in-Ones ...... 99 viii Table of Contents

SMART Monitoring of Hard Disks ...... 100 Peripherals ...... 100 Keyboards and Mice ...... 100 Monitors ...... 101 Other Devices ...... 101 Surge Protectors, UPS, and Power Supply ...... 102 Summary ...... 102 Chapter 8: Virtualization ...... 103 Virtualization vs . Dual ...... 104 Are There Any Benefits to Virtualization? ...... 105 Virtual Hard Disks and Windows 7 ...... 105 Creating a VHD in Windows 7 ...... 105 Reattaching the VHD ...... 110 Booting From a Virtual Copy of Windows 7 ...... 110 Windows Virtual PC and Windows XP Mode ...... 115 Installing Another Operating System in Windows Virtual PC ...... 116 Summary ...... 118 Part 2: Quick Fixes ...... 119 Chapter 9: Annoyances ...... 121 Common Windows 7 Problems ...... 121 You Don’t Have Permission to Write Files to a Disk ...... 121 You Can’t See Your New Wi-Fi Network ...... 125 Incorrect File Associations ...... 125 Problematic Graphics, Sound, Keyboard, or Mouse Drivers ...... 126 This Copy of Windows 7 Is Not Genuine ...... 128 Windows Update Won’t Install Anything ...... 129 Search Isn’t Finding Your Files ...... 129 Service Pack or Update Install Was Interrupted ...... 130 Windows Starts Up Very Slowly ...... 131 Windows Shuts Down Very Slowly ...... 132 Problems with Sleep ...... 133 Hardware Annoyances ...... 134 Windows Gets Stuck at Its Loading Screen ...... 135 No Operating System Found ...... 135 A New Monitor Results in No Picture ...... 135 Your USB3 Device Doesn’t Work ...... 135 You’ve Installed a Fresh Copy of Windows 7 and Can’t Get Online ...... 135 Your Headphones or Microphone Won’t Work ...... 136 Summary ...... 136 Table of Contents ix

Chapter 10: Viruses, Malware, and Other Threats ...... 137 Repelling an Attack ...... 137 Action Center ...... 137 Anti-Virus Software ...... 138 Anti-Malware Software ...... 140 Identifying an Attack ...... 144 Look for the Padlock ...... 144 Do You Really Need Another Toolbar? ...... 147 Do You Need that Extra Browser Plug-in or Download? ...... 148 Malicious Websites ...... 149 Malicious and Fake Anti-Malware Software ...... 150 What Goes on the Internet, Might Stay There Forever ...... 152 Repairing the Damage ...... 153 Use Your Existing Anti-Malware Software ...... 153 Try a Free Online Virus Scanner ...... 153 McAfee Stinger ...... 154 Safe Mode ...... 155 Manually Removing a Virus Infection ...... 157 Virus Removal Using Another PC ...... 158 Restoring Windows 7 from a Backup ...... 159 Viruses Corrupting the BIOS ...... 159 Where Can Viruses Hide? ...... 161 Summary ...... 162 Chapter 11: Easy Ways to Fix Windows 7 ...... 163 Restore Previous Versions of Files ...... 163 ...... 166 Configuring System Restore ...... 167 Restoring Windows 7 Using System Restore ...... 168 Can I Undo System Restore Changes? ...... 169 Troubleshooting Software Compatibility ...... 170 Manually Setting Program Compatibility ...... 170 The Automatic Program Compatibility Troubleshooter ...... 172 Program Compatibility Notifications in Action Center ...... 173 Windows XP Mode ...... 175 Windows Won’t Start ...... 175 Last Known Good Configuration ...... 176 Safe Mode ...... 176 Windows Startup Repair ...... 177 Startup Repair from an Install DVD or a System Repair Disc ...... 178 You Did Back It Up, Didn’t You? ...... 179 Working with Device Drivers ...... 180 Common Problems with Device Drivers ...... 180 Graphics Driver Problems ...... 181 ...... 182 Installing Device Drivers ...... 187 Removing and Reinstalling Device Drivers ...... 190 x Table of Contents

Updating Device Drivers ...... 192 Rolling Back Device Drivers ...... 193 Action Center Troubleshooter ...... 194 Microsoft Fix It Center ...... 195 Summary ...... 195 Part 3: Technical Fixes ...... 197 Chapter 12: What Is Windows 7 Anyway? ...... 199 The Windows 7 File and Folder Structure ...... 199 How Does Windows Compare to Other Operating Systems? ...... 202 Summary ...... 203 Chapter 13: Identifying the Source of a Problem ...... 205 Taking a Step-by-Step Approach ...... 205 Minimum Windows Configuration ...... 206 Safe Mode ...... 208 Unplug Your Hardware ...... 209 Why Problems Occur with Windows ...... 211 Keep Things Simple ...... 211 What Are the Causes of Common Problems? ...... 213 The Domino Effect ...... 213 Have You Tried Turning It Off and On Again? ...... 214 The Blue Screen of Death ...... 214 The Perpetual Restart ...... 215 Summary ...... 216 Chapter 14: Advanced Diagnostic Tools in Windows 7 ...... 217 Performance Information and Tools ...... 217 Event Log ...... 219 How to Read the Event Log ...... 221 ...... 222 Resource Monitor ...... 223 Windows ...... 224 System Information ...... 224 System Health Report ...... 226 Computer Management ...... 227 Using the Windows 7 Performance Tools ...... 229 Take Time to Step Back ...... 230 Summary ...... 230 Table of Contents xi

Chapter 15: Advanced Repair Methods ...... 231 Repairing Microsoft Internet Explorer ...... 231 Disable Your Add-Ons ...... 231 How to Factory Reset Internet Explorer ...... 235 Can You Reinstall Internet Explorer? ...... 237 Updating Internet Explorer via Windows Update ...... 238 Alternatives to Internet Explorer ...... 238 ...... 239 Using MSConfig for Diagnostic Startups ...... 241 Managing Windows Services ...... 244 Working with the ...... 246 Removing the Registry Settings for an Uninstalled Program ...... 248 Using the System Repair Disc for Advanced Restore ...... 249 BootRec .exe ...... 251 Windows Memory Diagnostic ...... 253 Using Safe Mode ...... 254 Summary ...... 255 Chapter 16: Windows Problems Demystified ...... 257 Windows 7 Core Operating System Files ...... 257 Windows 7 Security and Policy Folders ...... 260 The Windows 7 Registry ...... 260 Personalization Folders ...... 261 Windows 7 Logs ...... 261 Temporary Files Stores ...... 262 Advanced File Restore ...... 262 System File Checker ...... 263 Creating a Slipstreamed Install DVD ...... 263 What You Will Need ...... 264 Step 1: Creating a Windows Pre-Installation Environment Startup Disc ...... 264 Step 2: Installing a Fresh Copy of Windows 7 ...... 267 Step 3: Creating a New Windows Image File ...... 270 Step 4: Creating a New Windows 7 Installation DVD ...... 270 Third-Party Slipstreaming Software ...... 272 Summary ...... 272 Chapter 17: Remote Help ...... 273 Using the Internet to Find Solutions to Problems ...... 273 Where Else to ...... 274 Windows Remote Desktop ...... 278 Windows Remote Assistance ...... 281 Problem Steps Recorder ...... 285 Summary ...... 288 xii Table of Contents

Chapter 18: Where to Find More Help and Support ...... 289 Windows Help ...... 289 Third-Party Software ...... 289 Sisoftware Sandra Utilities ...... 289 Windows Sysinternals ...... 290 Zinstall zPOD ...... 290 GoToAssist ...... 290 SpinRite ...... 291 Windows Memory Diagnostic ...... 291 Norton Ghost ...... 291 Acronis True Image ...... 291 Paragon Partition Manager ...... 291 Acronis Disk Director Suite ...... 292 Third-Party Websites ...... 292 Tom’s Hardware ...... 292 Tech PC Forums ...... 292 Computing .net ...... 292 How-To Geek ...... 292 Annoyances org...... 293 Gibson Research ...... 293 ATI Support ...... 293 nVidia Support ...... 293 MSDN Diagnostics ...... 293 Within Windows ...... 293 The Long Climb ...... 294 Summary ...... 294 Chapter 19: Diagnosing Hardware Problems ...... 295 PC Hardware Guide ...... 295 Desktop PC Case ...... 295 Power Supply ...... 295 Motherboard ...... 296 Processor ...... 297 Memory ...... 298 Hard Disk ...... 298 Optical Drive ...... 300 Graphics Card ...... 300 Expansion Card(s) ...... 301 Fans ...... 301 Keyboards and Mice ...... 301 Laptops, Netbooks, and All-in-One PCs ...... 301 Safe Working ...... 304 Is Everything Plugged In? ...... 305 Minimal Hardware Boot ...... 306 Resetting the BIOS ...... 307 Jump-Starting Your PC ...... 309 Summary ...... 310 Table of Contents xiii

Part 4: Disaster Recovery ...... 311 Chapter 20: Windows and Data Recovery Tools ...... 313 You Did Back It Up, Didn’t You?! ...... 313 Restoring Windows and Data from a Backup ...... 313 Data Restore Through Over-the-Top Reinstall ...... 315 RAID Drives ...... 318 Summary ...... 318 Chapter 21: Restoring from Another PC ...... 319 Restoring a Windows Image on Another PC ...... 319 zPOD ...... 320 Restoring Windows File by File ...... 320 Restoring Your Data by Using Another PC ...... 321 Summary ...... 324 Chapter 22: Linux: An Operating System on a Disc ...... 325 System or Data Restore Using Another Operating System ...... 325 Useful Software in Linux ...... 330 Remote Desktop ...... 330 System Monitor ...... 331 System Testing ...... 332 CD and DVD Burning in Linux ...... 333 Compatible Linux Operating Systems to Run from a Disc ...... 334 Ubuntu ...... 334 Other Variants of Linux ...... 335 Creating a Linux Installation Disc or Pen Drive ...... 335 Summary ...... 336 Chapter 23: Third-Party Rescue Tools and Services ...... 337 Zinstall and zPOD ...... 337 GRC SpinRite ...... 341 Other Third-Party Tools ...... 344 O&O Disk Recovery ...... 344 Ashampoo WinOptimizer ...... 344 Other Third-Party Services ...... 344 Summary ...... 345 Chapter 24: When You Can’t Recover Data ...... 347 Encrypted ...... 347 Setting Up EFS ...... 348 Restoring an EFS Key ...... 352 Turning EFS Off ...... 354 EFS Certificates ...... 354 Smart Cards and EFS Certificates ...... 356 File Encryption Certificate Manager ...... 359 xiv Table of Contents

Recovering EFS-Encrypted Files ...... 359 Cipher .exe ...... 360 BitLocker and BitLocker To Go ...... 361 Creating a Copy of Encrypted Data ...... 364 Summary ...... 365 Part 5: Power Utilities ...... 367. Chapter 25: Advanced Windows Diagnostic Tools in Depth ...... 369 Computer Management ...... 369 System Tools ...... 370 Storage ...... 378 Services and Applications ...... 378 Performance Information and Tools ...... 380 Visual Effects ...... 380 Indexing Options ...... 383 Power Settings ...... 383 Disk Cleanup ...... 385 Advanced Tools ...... 385 Troubleshooters ...... 398 Summary ...... 400 Chapter 26: Windows Firewall in Depth ...... 401 Windows Firewall ...... 401 Windows Firewall with Advanced Security ...... 403 Managing Firewall Rules ...... 405 Adding New Inbound or Outbound Firewall Rules ...... 406 Setting a Connection Security Rule ...... 410 Monitoring ...... 410 Port Control for Routers ...... 411 Summary ...... 412 Chapter 27: Advanced Registry Work ...... 413 Registry Sections ...... 414 HKEY_CLASSES_ROOT ...... 414 HKEY_CURRENT_USER ...... 414 HKEY_LOCAL_MACHINE ...... 414 HKEY_USERS ...... 414 HKEY_CURRENT_CONFIG ...... 414 Registry Keys and Settings ...... 415 Backing Up and Restoring the Registry ...... 416 Working with the Registry ...... 416 Editing, Deleting, or Adding Registry Keys ...... 417 Backing Up Specific Registry Keys ...... 418 Finding Information in the Windows Registry ...... 419 Summary ...... 419 Table of Contents xv

Part 6: Appendices ...... 421 Appendix A: Windows 7 Editions ...... 423

Appendix B: Windows 7 Features by Edition ...... 425

Appendix C: Windows 7 Shortcut Keys ...... 431

Appendix D: BIOS Beep Codes ...... 439

Glossary ...... 447

Index ...... 455

Acknowledgments

I would like to thank the following people without whom this book would have not been possible, or at least very difficult, or perhaps a little bit of a problem, or that who helped in some intangible way that might be better explained later .

Everton Blair Martin Brinkmann Kenyon Brown Duncan Buchanan Mary Cholerton Fran Gilbane Richard Gilbane Vipin Goyal Larry Hall Phil ‘Fileas’ Smith Megan Smith-Creed Darren Webber Jake Webster Rory Webster Michael Weir Adam Zaremba

And, most of all, my dog Jed .

xvii

Conventions and Features Used in This Book

This book uses special text and design conventions to make it easer for you to find the information you need .

Text Conventions

Convention Feature Abbreviated menu For your convenience, this book uses abbreviated menu commands . For commands example, “Choose Tools, Forms, Design A Form” means that you should click the Tools menu, point to Forms, and select the Design A Form command . Boldface type Boldface type is used to indicate text that you enter or type . Initial Capital Letters The first letters of the names of menus, dialog boxes, dialog box elements, and commands are capitalized . Example: The Save As dialog box . Italicized type Italicized type is used to indicate new terms . Plus sign (+) in text Keyboard shortcuts are indicated by a plus sign (+) separating two key names . For example, Shift+F9 means that you press the Shift and F9 keys at the same time .

Design Conventions

Note Notes offer additional information related to the task being discussed .

Cross-references point you to other locations in the book that offer additional information on the topic being discussed .

CAUTION! Cautions identify potential problems that you should look out for when you’re com- pleting a task, or problems that you must address before you can complete a task .

xix xx Conventions and Features Used in This Book

This statement illustrates an example of an “Inside Out” INSIDE OUT problem statement These are the book’s signature tips . In these tips, you’ll get the straight scoop on what’s going on with the software—inside information on why a feature works the way it does . You’ll also find handy workarounds to different software problems .

TROUBLESHOOTING This statement illustrates an example of a “Troubleshooting” problem statement Look for these sidebars to find solutions to common problems you might encounter . Troubleshooting sidebars appear next to related information in the chapters . You can also use the Troubleshooting Topics index at the back of the book to look up problems by topic .

Sidebar The sidebars sprinkled throughout these chapters provide ancillary information on the topic being discussed . Go to sidebars to learn more about the technology or a feature . Errata & Book Support

We’ve made every effort to ensure the accuracy of this book and its companion content . If you do find an error, please report it on our Microsoft Press site:

1 . Go to www.microsoftpressstore.com.

2 . In the Search box, enter the book’s ISBN or title .

3 . Select your book from the search results .

4 . On your book’s catalog page, find the Errata & Updates tab

5 . Click View/Submit Errata .

You’ll find additional information and services for your book on its catalog page . If you need additional support, please e- Microsoft Press Book Support at mspinput@micro- soft.com .

Please note that product support for Microsoft software is not offered through the addresses above .

Your Companion eBook The eBook edition of this book allows you to: • Search the full text • Print • Copy and paste To download your eBook, please see the instruction page at the back of this book .

xxi xxii Errata & Book Support

We Want to Hear from You At Microsoft Press, your satisfaction is our top priority, and your feedback our most valuable asset . Please tell us what you think of this book at: http://www.microsoft.com/learning/booksurvey

The survey is short, and we read every one of your comments and ideas . Thanks in advance for your input!

Stay in Touch Let’s keep the conversation going! We’re on Twitter: http://twitter.com/MicrosoftPress CHAPTER 1 Prevention Is Better Than Cure

Upgrade or Clean Install?...... 4. What To Do When Windows 7 Is Installed...... 7. Keeping Your Installation of Windows XP or Moving Your Files Away from Windows...... 12 Windows Vista ...... 6. Backing Up Windows 7...... 14 How Big Should Partitions Be?...... 7. Summary...... 16

t’s always a good idea to prevent problems before they occur, but knowing where to start can be a problem . When you first installWindows 7, you encounter a blank desktop with I just a few items visible on the new and in the . You may be tempted to get working straight away, and you can do this if you like . However, Windows 7 comes with a great many tools that you can use to help prevent problems from occurring and to make sure that when problems do occur, you can be back up and running quickly . I recom- mend spending the time to configure your system and software after you first install Win- dows . Then back up this initial configuration to quickly restore later should you need to .

INSIDE OUT Why spend time configuring and backing up Windows? Windows 7 constantly makes small changes and adjustments to its files and settings as you work . The more you do, the more changes Windows makes . After a period of time, these changes can cause software or Windows components to misbehave or malfunc- tion, and they can become extremely difficult to undo . If you back up your copy of Windows 7 after the changes are entrenched, you preserve potential problems .

The benefit of taking time to back up a clean, unused Windows 7 installation is that when something goes wrong, your backup will be an exact copy of a fully working Windows 7 setup, including all of your software and settings . There will be no need to reinstall everything one piece at a time . Plus, you only need to make the initial backup once .

3

- -

Win- . digital e, along ent operating . No matter how No matter . oyed in a fir What’s more, there’s no there’s more, What’s . Most IT professionals

. . and reinstall Windows 7 on a clean and reinstall Almost all businesses keep a backup of Almost all businesses keep a backup of . The sensible option is to give your backup The sensible option is to give your backup

. If your files, photos, and music are stored on stored If your files, photos, and music are . from a backup or reinstall it completely a backup or reinstall from For instance, if you leave a DVD copy of your For instance, if you leave a DVD copy of . . . where you can store Windows, programs, files, data, and Windows, programs, you can store where Hard disks and partitions disks Hard

(The Windows 7 install DVD doesn’t support 7 install DVD doesn’t (The Windows from in-place upgrading . Although it may be convenient to install Windows 7 over your curr convenient to install Windows 7 over your Although it may be . But it’s not a good idea to keep all of your data in the same place without mak your data in the same place without not a good idea to keep all of But it’s ) . partition don’t have you really software installation media or , unless you’ve lost is easy to replace, but it’s impossible to replace last year’s holiday photos, to replace impossible but it’s is easy to replace, Hardware

. to a friend or family member to keep it safe to a friend or family member to keep it Think of a hard disk as one big plate for all the food at a party disk as one big plate buffet a hard Think of together; in laying out the food, it will always end up mixed are you and if careful everything it’ll go over somebody spills the garlic mayonnaise, revention Is Better Than Cure music and photo libraries next to your PC, it could be stolen or destr music and photo libraries next to your PC, DVD Although you can fix many Windows 7 problems with no loss of data, some problems of data, some problems with no loss problems Although you can fix many Windows 7 the operating system restore you to require disk you to wipe the hard usually require Restoring and reinstalling occur way to know if and when a disaster will disk or partitionthe same hard lose them forever as Windows 7, you could their data somewhere separate from the originals, because data is the critical partcritical the is originals, because data the com a from separate of somewhere their data puter music and video you’ve bought How to Install Windows 7 to Prevent Problems Prevent Windows 7 to Install How to disk is one big area hard Your backups ing a backup and storing it elsewhere stored the original files are with your PC where system, keeping all of your programs and settings intact, any problems that exist on the any problems and settings intact, your programs system, keeping all of previous Windows installation can carry forward to the new one recommend disk your hard you always format that drive or a clean install the time to spend on described in the previous section are a good reason to install reason a good section are in the previous settings changes described The minor Vista Windows PC in place from than upgrading your Windows 7 rather a clean version of 7 to Windows it’s difficult to re-enter all of your customer data, and it’s annoying to re-download all the annoying to of your customer data, and it’s re-enter all to difficult it’s dows XP P

INSIDE OUT INSIDE Chapter 1

Upgrade or Clean Install? or Clean Upgrade 4

Chapter 1 which youwanttoinstallWindows7andpress Next(seeFigure 1-1) andcreate newpartitions drive partition hard diskusingthe toolsavailableintheWindows7installertodeletecurrent single- When you install Windows 7, you can choose the purchase aseparate USB the optionof splittingyourdataacross different physicaldrives Laptops andmostPCsystemsincludeonlyonephysicaldisk, however identical copiesof yourfilesanddata,againjustincaseaphysicaldiskfails you don’tloseyourbackupcopyof Windows,too a real catastrophe, suchasthephysical diskcontainingyourWindowsinstallationfailing, split yourWindowsinstallation,files,andbackupsacross them If youhaveadesktopPCandaccesstotwoormore hard disks, it’s evenbetterifyoucan apart forsafety apart a backup of your Windows7installation one forWindows7,asecondyour filesanddata,athird for including backups, It’s withcomputer hard disks asimilarstory off thechocolate profiteroles willhelpkeepsafe intheknowledgethatthesecompartments thegarlicmayonnaise plate that’s you splitinto canputadifferent several compartments, foodineachspace, What you really needare different plates to separate thefood Windows 7 A partitioned hard disk, split hard disk, A partitioned into three “logical”drives . A normal hard disk Files andData external hard drive . . Once you have done this, select the partition onto Onceyouhavedonethis,selectthepartition . Splitting them between partitions keeps Splittingthembetween partitions them . . You cansplityour hard diskinto partitions, Backup Custom Install option and repartition your . You can alsousetwohard diskstokeep . Thismeansthatifyouhave . . You may insteadwantto Ifyou useonelong U . pgrade or Clean Install? Clean or pgrade , soyouwon’thave .

5

Chapter 1 - . This software will turn your pre will turn This software . . Windows XP or Windows Vista installation, you have two . keep your Certain can help such as Zinstall, software, . must Creating and choosing a hard disk and partition hard and choosing a Creating setup for Windows 7 during

You need a large hard disk or partition hard need a large for this since you will essentially have two You First, if you have a spare partition enough to accommodate First, if you have a spare disk large or hard . . Note can get Zinstall at www.zinstall.com You Vista revention Is Better Than Cure vious operating system into a virtual 7 machine that will run in a window on your Windows However, many people find this setup clunky and want to be able to use both systems many people However, simultaneously desktop operating systems installed If you really options a dual-boot and create you could install Windows 7 there Windows 7 on your computer, you can choose at startupsystem where system you want to run which operating Figure 1-1 Figure P

Chapter 1

Keeping Your Installation of Windows XP or Installation of Your Keeping Windows 6

Chapter 1 How BigShouldPartitions Be? What To DoWhenWindows7IsInstalled tem toyourpreferences Windows7is After forenteringintoWindowsareNote: Suggestednumbers approximate sizesandnotexactlythesame Gaming Developer Power User General Home General Business PC Usage Table 1-1 design), youmightfindwillneedmore spaceforyourprograms these figures are aguideonly Use Table shouldbe 1-1asaguidetohowlarge yourWindows7partition be biggerifyoualsowanttokeepfilesandsoftware there installers ifyouonlywanttokeepabackupcopyof Windows7onit Windows 7partition big youshouldmakeyourpartitions The sizeof yourhard diskandhowyouintendtouseyourcomputerwilldetermine how partition sizeinGB. partition • • • cause problems onaPC control procedures ascommercial packages dowritesome excellentsoftware,authors itrarely goes through thesame quality Try toavoidinstalling been upgradedanyway use onlyrarely ormight notuseatall;whenyouare ready touseit,youmayfindit’s Install onlysoftware youwilldefinitelyuse regularly Trojan configuring yourcomputer, anysoftware youinstallcouldbeinfected withavirusor Install anti-virusandmalware

Recommended partition sizes for Windows 7 in different uses different 7in Windows for sizes partition Recommended . installed, youshouldinstallyourothersoftware andconfigure thesys- . Isuggestfollowingtheguide 100 GB, Enter 100000 in the partition sizebox 100 GB,Enter100000inthepartition sizebox 100 GB,Enter100000inthepartition sizebox 50 GB,Enter50000inthepartition sizebox 30 GB,Enter30000inthepartition sizebox 30 GB,Enter30000inthepartition size Windows 7partition shareware software ortrialversion . . Ifyouusedevelopmentsoftware (web,programming, or . . Your should bethesamesizeasyour backuppartition protection first .

Shareware andsimilarsoftware can . Eventhoughyou’re justloadingand W hat To Do When Windows 7 Is Installed 7Is Windows Tohat When Do . Skiploadingsoftware youwill . Whileamateursoftware . . . . Pleasenote . Itshould

7

Chapter 1 . e- Read . . . The option to activate The option to activate . . This is especially important This is especially for . . You can access these settings You . To activate Windows 7 from activate Windows 7 from To . . files are oftenused to hide viruses files are If you don’t activate Windows 7, it might become If you don’t activate . . You can access Windows Update from the Start Update from can access Windows menu You . Avoiding regular work helps make sure nothing can go sure helps make work regular Avoiding . activated backup , click System And Security, then click System , click System And Security, installed software to get any upgrades installed software . ! Do this several times, restarting Do this several times, the PC after your each update to make sure . system image . Modify Windows 7 settings to your preferences (regional settings, for example) (regional Modify preferences Windows 7 settings to your to do this the following section for details about how product keys to keep the software from from keep the software keys to product and enter required software Activate your a backup from it to restore crippled if you need becoming operating you have the latest updates to the to make sure Run Windows Update system to date computer is fully up Windows 7 is Make sure a backup from restore inoperable if you eventually Panel Control the window bottom of Windows 7 is at the Update all the Update all because PDF Reader Adobe Acrobat

CAUTION to while getting Windows 7 ready important work much regular don’t do too you It’s a create during this importantwrong period • • • • • revention Is Better Than Cure by pressing Start on the taskbar or on your keyboard and selecting Control Panel from the from Start Panel by pressing selecting Control and or on your keyboard on the taskbar Start menu of options appears as and a list click the first option, System And Security, Panel, In Control 1-2 shown in Figure Useful Windows 7 Settings to Change Useful Windows 7 Settings to customized than pr By default, Windows 7 is efficient to set up and needs fewer options operating system make for a happier experience using the vious versions of Windows, although there are a small few options that, if changed, will a small few options that, if changed, are although there Windows, vious versions of For a new installation of Windows 7, I recommend a series of steps of a series 7, I recommend Windows of For a new installation P

Chapter 1

8

Chapter 1

To changethe data onthehard disk physicalmemory the computer’s Windows 7usesaspaceonyourhard diskcalled Figure 1-2 can grow andshrinkcauseproblems thatultimatelyslowdownaccesstothefilesand file(alsoknownasthepagingfile),butthismeansit memory ages thesizeof thevirtual 4 3 2 1 . . . .

In thePerformance section,clickSettingsasshowninFigure 1-3 dialogbox, clicktheAdvanced tab In theSystemProperties sideofClick AdvancedSystemSettingsinthebluepanelonleft thewindow options appears In theControl Panel, clickSystemAndSecurity, andthenclickSystem

The SystemandSecuritypanelintheWindows7Control Panel virtual memory sizefollowthesesteps memory virtual . . andtoloadprograms quickly tohelpbettermanage memory virtual . W hat To Do When Windows 7 Is Installed 7Is Windows Tohat When Do . Bydefault,Windowsman . . . Anewlistof .

- 9

Chapter 1 - This . Enter the recommended pag Enter the recommended . . System Properties dialog box in Control Panel System Properties in Control dialog box . in the example in Figure 1-4) in the example in Figure The Advanced tab in the The Advanced tab in

Setting the virtual memory paging .

Figure 1-3 Figure revention Is Better Than Cure The recommended amount of disk space is displayed toward the bottom of the Virtual the bottom of disk space is displayed toward of amount The recommended Memory (1534 MB dialog box Set, and then click OK to close the dialog box click box, Figure 1-4 Figure File Size For All Drives option and selecting the Clearing the Automatically Manage Paging this paging file the same size all the time Custom Size option tells Windows to keep can help keep access to your files fast You can change the virtual memory Virtual settings in the You Memoryshown in as dialog box 1-4 Figure ing file size for your computer in both the Initial Size (MB) box and Maximum Size (MB) ing file size for your computer in both the Initial Size (MB) box P

Chapter 1

10

Chapter 1 the longer it will take to start up the longeritwilltaketostart that themore software yourcomputer isrunningatonetime,thesloweritwillbecomeand The advantageof minimizing thenumberof is programs thatrunautomaticallyatstartup include theiTunes UpdaterortheAdobeAcrobat Loader timeyouuseyourPC can clearalltheprograms youdon’twanttorunevery up will seealistof automaticallywhen Windows7starts alltheprograms thatstart keyboard on Windows, isMSConfig of version One of themostusefulhidden features inWindows7,andindeedevery MSConfig Figure 1-5 Figure 1-5) forallofto DeviceManagercheckthatthedrivers yourhardware are installed(see In Control Panel, youcanalsochangeregional andlanguagesettingsgetaccess

your keyboard . When the MSConfig window appears, click the Startup tab clicktheStartup WhentheMSConfigwindowappears,

. Settings toadjustinControl Panel, includingregional settings . Key (seeFigure 1-6) in the Start menusearch box, andpressmsconfig intheStart Enteronyour . . To access MSConfig, click Start onthetaskbaror MSConfig, clickStart W hat To Do When Windows 7 Is Installed 7Is Windows Tohat When Do . . Onthistab,you . Thesecould . You 1 1

Chapter 1 . . . My Documents folder(s) on the same hard My Documents folder(s) on the same hard Windows developers recognize, however, that however, Windows developers recognize, . Stopping third-party programs from running at startupStopping third-party from programs using MSConfig

On the Start name in the top right menu, click your . Note parts of the columns in the MSConfig window (and in many other can resize You Windows) by dragging the vertical the columns line between 1 revention Is Better Than Cure made this easy to do in Windows 7 with four simple steps made this easy to do in Windows 7 with By default, every your Windows stores version of disk or partition as the Windows installation and important useful separate, and they have finally to keep Windows and your files it’s Figure 1-6 Figure P

Chapter 1

Moving Your Files Away from Windows from Files Away Moving Your 12

Chapter 1

INSIDE OUT All of yourfilesanddocuments are movedtothenewlocation 3 2 4 That’s to separate whyitisimportant your dataandWindows onyour PC stored where onthesamedrive you puttheoperatingsystem orpartition originally reinstall Windowsatsome point,you couldloseallof yourif theyare filesanddata electronic device stableoperatingsystem, your PC isstillnotaconsumer Although Windows7isavery will simplyduplicate them Be sure to selectCutandnotCopyinstep 3,becauseCopywillnotmove thefiles;it CAUTION . . . E:\Files), right-click inanemptyspacethatwindow, andselectPaste Navigate tothedriveorfolderwhere youwanttorelocate thefiles(forexample, Right-click inthewindowandselectCut should notbemovedsincedoingsocancauseproblems withtheoperatingsystem) (exceptDesktop,which In theexplorer selectallthefolders windowthatappears,

! . Windows could become corrupt withlittleornonotice Windowscouldbecomecorrupt Why moveyourfilesawayfrom Windows7? . . M oving Your Files Away from Windows from Away Your Files oving . . . Ifyou must . .

3 1 .

Chapter 1 Do not . . . When you create a backup, you create When you . . Backup . Image from the blue panel on the left the window Image from side of In the Control Panel Backup and Restore window that appears, select Create A System System A appears,that window Create select Restore and Backup Panel Control the In In the Start type box, menu search that appear results search the list of from Select Backup And Restore

. . . 3 1 2 revention Is Better Than Cure errors in the backup file errors Windows 7, you are ready to create a backup and a backup and to create ready you are configuring Windows 7, finish loading and When you system the operating an image of by creating lock it down on your computer files and settings all the Windows a snapshot of create essentially unreported back up Windows 7 since this could create to while preparing run programs P

Chapter 1

Backing Up Windows 7 Up Windows Backing 14

Chapter 1

4 5 . . Click Next to start thebackup Click Nexttostart computer, youwillneedquiteafewDVDs),orto network selection of DVDs(notethatifyouhavealotof software orgamesinstalledonyour onyourcomputer,choose tosavethebackupanotherhard diskorpartition ona In the Create ASystemImagedialogbox, selectalocationforthebackup location B acking Up Windows 7 Windows Up acking . . You can 5 1

Chapter 1 . . ” . Following the steps described in the chapter can Following the steps described in the chapter . You’ll learn more about restoring Windows 7 in about restoring more learn You’ll . If Windows 7 becomes unresponsive, you can restore this restore you can unresponsive, If Windows 7 becomes . You never know when and under what circumstances Windows 7 never know when and under what circumstances You . Network backup precautions Network backup

Only do a network backup if you connect via a physical network cable connect via a physical network if you backup Only do a network . is now backed up Don’t back up your operating system to a network location if your PC connects to the connects to PC location if your a network to operating system up your Don’t back need to if you see the backup will be unable to only via Wi-Fi, because you network it restore revention Is Better Than Cure ensure that you’re never far from being up and running when you need to be being up and running when never far from that you’re ensure It’s very 7 backed up Windows important that you have a working copy of It’s to make sure accessible somewhere might become unusable or malfunction Windows 7 again quickly backup and get working 7 to Fix Windows Chapter 11, “Easy Ways P

INSIDE OUT INSIDE Chapter 1

Summary 16

Chapter 1 CHAPTER 14 Advanced Diagnostic Tools in Windows 7

Performance Information and Tools...... 217 System Information...... 224 Event Log...... 219 System Health Report...... 226 Performance Monitor ...... 222 Computer Management...... 227 Resource Monitor...... 223 Using the Windows 7 Performance Tools...... 229 Windows Task Manager...... 224 Summary...... 230

n Chapter 2, “The Basic Windows 7 Utilities,” you learned about the basic diagnostic and help utilities included with Windows 7 . In this chapter, I cover some of the advanced I tools that come with Windows 7, describing the features and capabilities of each one and explaining how you can use them to help you troubleshoot your Windows 7 system .

Performance Information and Tools Performance Information and Tools is a central location for many types of information about your PC and how Windows 7 performs on it . The easiest way to access Performance Information and Tools is by typing performance in the Start menu search box, as shown in Figure 14-1 . You can access its components separately in Control Panel by selecting System and Security\Administrative Tools .

Figure 14-1 Accessing Performance Information and Tools

217 - Perfor . Once you’re in the in the Once you’re . 7

Advanced tools in Performance and Information Tools and Information Advanced tools in Performance Performance Information and Tools window and Tools Information Performance

dvanced Diagnostic Tools in Windows A mance Information and Tools window, which is shown in Figure 14-2, click Advanced Tools click Advanced Tools 14-2, is shown in Figure which window, and Tools mance Information Figure 14-3 Figure Figure 14-2 Figure The basic function of Performance Information and Tools is to provide a front end to fea- a front to provide is Tools and Information Performance function of The basic the visual effects, options for adjusting Index and Windows Experience such as the tures Windows your copy of of and indexing options power settings, 14-3 in the left shown in Figure which are the advanced tools, pane to access

Chapter 14

218

Chapter 14

Event Log Figure 14-4 with red icons,asshowninFigure 14-4 clicking System on yourcomputerbyclickingEventViewer(Local),thenWindowsLogs,and In theEventViewer, youcanfindalltheeventsanderrors thatWindows7has recorded are theoneswhere youwillseemost Windows 7errors recorded how muchinformation isstored inthe neverevenknowaboutisloggedandrecordedthat theusers thathappensinWindows7from userlog-instoprogram componentfailuresEverything and theComputerManagementconsole Monitor, Resource Monitor,Task Manager, SystemInformation, chapter, butIdocoverwhatconsiderthevitalonesindividually:EventLog,Performance dows 7andyoursoftware andhardware drivers These advancedtoolsare problems extremely withWin - usefulindiagnosingperformance

Event Viewershowingsystemactivity anderrors . Warnings are highlightedwithyellowtriangles,anderrors are indicated . Event Log . . I don’t provide details for every toolinthis Idon’tprovide detailsforevery . The two most important views,however, Thetwomostimportant . You would beamazedby . , System HealthReport E vent Log vent 19 2

Chapter 14 - You You . . By default, the . . These errors include events These errors . You can also expand this panel You . . 7

You can cut and paste it into an email or select an option from the can cut and paste it into an email or select an option from You . . Administrative errors in the Event Log in Administrative errors

Below the list is a description of this PrintServiceof list is a description Below the enough informa that includes error . dvanced Diagnostic Tools in Windows A right pane such as Save Selected Events to email General tab is selected, and here you find general information about errors and events about errors you find general information General tab is selected, and here Details tab by clicking the information can get much more more to read upward to a third- can be useful if you need to send specific data about an error This information party support person Figure 14-5 Figure (Local)\ listed in the Event Log is under Another useful place to see errors 14-6 shown in Figure Custom Views\Administrative Events, as to performfor which you or Windows didn’t have permission the specified action and Details two tabs, General Viewer are the Event In the bottom pane of Administrative Events of the Administrative in the first highlighted line the error 14-5, notice In Figure pane and fix it problem the of source you track down the tion to help

Chapter 14

220

Chapter 14

INSIDE OUT helping youdiagnoseproblems muchmore quicklythanyoucould bytrialanderror the event list encountered an error, you can check for it by date and time By default,theeventsin How to Read theEvent Log Figure 14-6 tion itprovides isfargreater than otherWindowsutilities toolset inPerformance andTools Information becausetheamountof- informa useful to troubleshooting problems The Event Logisprobably feature thesinglemostuseful inWindows7whenitcomes

Formatted error information, whichyoucansendtothird parties . TheEventLogprovides essentialinformation about thesource of errors,

The EventLogisyourfriend Event Logare ordered bydate . It is certainly the most useful feature themostuseful intheadvanced Itiscertainly . . . Ifyourcomputerhasrecently

It’s probably near the top of E vent Log vent . 21 2

Chapter 14 - . . You can also use it to check can also You . In Chapter 25, “Advanced Windows In Chapter 25, “Advanced . . ReadyBoost cache isn’t working properly— 7

If you need specific information about how a certain If you need specific information component . Performance Monitor in Windows 7 Performance dvanced Diagnostic Tools in Windows A Diagnostic Tools in Depth,” I will talk about these tools in much greater depth much greater I will talk about these tools in in Depth,” Diagnostic Tools complex Monitor is extremely Performance by For most users, provided the information and difficult to interpret for example, you suspect the is working—say, Monitor time via Performance in real you can monitor this feature Figure 14-7 Figure Monitor to add information tools in Performance monitoring can use the real-time You disk or the power dis read/write data for your hard about specific things, for instance, the 14-8 in Figure tribution to individual components, seen provides real-time information about a wide about a wide information real-time provides 14-7, shown in Figure Monitor, Performance events components and and hardware Windows range of Windows reportingwhether the activated tools are

Chapter 14

Performance Monitor Performance 222

Chapter 14

Resource Monitor on yournetwork running(ornot running) onyourCPUtothecurrenttus of activity processes andservices exactly what’s of goingonatagivenmomentindifferent yoursystem,from part thesta amounts of memory, youwouldfindinformation aboutithere on the cessor, memory, hard disks, andnetworking components, Resource Monitorgives youextensivereal-time information aboutyourpro Whereas and Performance Monitorhelpsyoudiagnoseproblems with Windowsservices Figure 14-8 Memory tabof Resource Monitor Memory

Adding custom counters toPerformanceAdding customcounters Monitor . . Ifoneof yourapplicationsisconsumingvast . Figure 14-9shows theinformation youfind . Eachtabletsyouknow R esource Monitor esource 23 2 - -

Chapter 14 . - One . Windows Task Manager Windows Task . . . 7

Resource Monitor in Windows 7 Resource dvanced Diagnostic Tools in Windows A in Figure 14-10, is the place to find it 14-10, is the place in Figure including what services are currently running and what users are logged in to the computer the to in logged serviceswhat usersincluding what and are running currently are party a third If you need to provide your PC, including data on about with information tool, shown the System Information and your installed software, Windows, your hardware, If you’ve used Windows before, you’re probably familiar with probably you’re If you’ve used Windows before, task the Windows Manager is by right-clicking ways to access Windows Task the fastest of Manager bar and selecting Start Task Task Manager is less detailed than what you see in you find in Windows The information Monitor, is not shown in Performance that information Manager but can provide Resource Resource Monitor provides information similar to what Windows Task Manager gives you similar to what Windows Task information Monitor provides Resource diagnosing advanced details, which can be useful when you’re but supplies many more in Windows or in your applications problems Figure 14-9 Figure

Chapter 14

System Information System Windows Task Manager Windows Task 224

Chapter 14 any computer, namethetextfile,andsaveit gotoFile\Export, To asatextfilethatcanbe anyorallofread on thedatafrom export theSystemSummary The systeminformation isdividedintothree sections Figure 14-10 • • •

ware and drivers to startup programs andrecentware Windowserror tostartup anddrivers reporting Software Environment problematic a separatesection,Problem Devices,fordevicesthatWindows7hasidentifiedas Components allocations,andsoon rupt requests), memory Hardware Resources

System Information tool .

Includes infor

Contains infor Includes infor mation aboutthehardware attachedtoyourPC,with mation abouthardware conflicts,IRQs(inter mation about everything from installedsoft mation abouteverything . . . S ystem Information ystem . 25 - 2 -

Chapter 14 - - This . Here you’ll see Here . . configured on your configured This tool produces thorough thorough This tool produces . . System Health Report in the Advanced Tools Tools Advanced the in Report Health System Figure 14-11 shows the Resource and Perfor the Resource 14-11 shows Figure . . 7

Diagnostic Results panel, as shown in Figure 14-12 Diagnostic Results panel, as shown in Figure Tool for generating system health reports for generating system in Windows 7 Tool dvanced Diagnostic Tools in Windows A tion that appears in the method will vary on your email provider depending the system health report, the informa you should read you dive into the details of Before links to helpful articles as well as problems detected on currently information these about website on the Microsoft problems Figure 14-11 Figure the reportThe File menu includes options to send to an email client you would any other attachment you send file manually to an email in the same way PC, save it as a file, or send it through a web mail application when you can attach the a web mail application when PC, save it as a file, or send it through and detailed reports of the current status of your PC, checking every your PC, checking status of the current and detailed reports part of Windows, your of problems and highlighting any and your installed software hardware, One of the most useful automatic diagnostic features in Windows 7 is the system health 7 is the system health in Windows features automatic diagnostic the most useful One of A Generate click you when find you tool report and Tools Information Performance section of that appearsmance Monitor window when you click the link

Chapter 14

System Health Report Health System 226

Chapter 14

Computer Management Figure 14-13 ing Manage,asshowninFigure 14-13 easiest waytogetitisbyright-clicking menuandselect theComputerlinkinStart and Security, clickAdministrativeTools, andthenclickComputerManagement),butthe You can accesstheComputerManagementconsolethrough Control Panel (clickSystem Figure 14-12

Accessing theComputer Managementconsole Sample systemhealthreport . C omputer Management omputer 27 2 -

Chapter 14 - - . For example, you . Here you can view all Here . Reformatting or reinitializing the disk or reinitializing Reformatting . If the disk has been working fine until now, the prob fine until now, If the disk has been working . . 7

. Be careful when working with suspected faulty disks Be careful Disk Management, the pane in Figure 14-15 appears Disk Management, the pane in Figure

The Computer Management console

might not fix the problem Just because Windows is reporting or “not initialized” doesn’t a disk as “unformatted” faulty mean that the disk is really or a corrupt BIOS with a driver likely lem is more dvanced Diagnostic Tools in Windows A Figure 14-14 Figure When you click problems with them removable drives in your PC and find the fixed and or is being reportedmight see that a disk isn’t being recognized as unformatted From the Computer Management window, shown in Figure 14-14, you can view and con you can view and 14-14, shown in Figure Management window, the Computer From tool storage the Disk Management trol System Tools such as Task Scheduler, Event Viewer, Performance, Device Manager, and Device Manager, Performance, Event Viewer, Scheduler, Task such as System Tools trol

INSIDE OUT INSIDE Chapter 14

228

Chapter 14

Using theWindows7Performance Tools be required might additional helporguidance ifyou’re helpingsomeone else,asystemhealthreport of yourtroubleshooting needs,theEventLogwillsuffice and thedifferent levels of detailtheygoesintodependingonyourrequirements They are especially usefulbecauseof thedifferent waysthey can present thisinformation data aboutyourPC,copyof Windows,andyourhardware the mostusefulfunctionsof thesetoolsistheirabilitytoquicklydisplayahugeamount of that are of usetoanyoneworkingwithdiagnosingandrepairing problems onaPC be primarilyusedbyITprofessionals, eitherremotely orwhen accessingthePCdirectly, but toolsinWindows7offerThe performance someextremely advancedinformation thatmay operating systemandyourhardware finding thetoolsthatcomewithWindowscanbeusedfor repairing problems withthe As Ihavesaid,theComputerManagementConsoleisagoodandcentralizedplacefor Figure 14-15 .

Disk Managementconsole . U . sing the Windows 7 Performance Tools 7Performance Windows the sing If you’re going to a third party for Ifyou’re goingtoathird party . . Formost . Oneof 29 2

Chapter 14 - This can give . The reportsthat the . If you’re stuck on a stuck on If you’re . . 7

These tools are versatile and useful in many contexts as well as These tools are . Take a break, maybe even a day, and come back to the problem with a the problem and come back to a day, maybe even a break, Take What I hope to have shown in this chapter is that even a novice user What I hope to have shown in this chapter . . . If you (or your company) can’t justify try If you (or your company) the such a respite, of some reading . I’ve found that if I keep staring at a PC screen trying staring at a PC screen I’ve found that if I keep a chal out or fix to figure . dvanced Diagnostic Tools in Windows A lenging problem, my mind can become muddled and I can tend to miss things that I would and I can tend to miss things that I my mind can become muddled lenging problem, tools in Windows 7 I will talk about the advanced tools included in Performance Information and Tools in much and Tools Information in Performance I will talk about the advanced tools included depth in Chapter 25 more highly customizable maintenance and troubleshooting the advanced from can gain useful data and information normally catch normally offline and Tools Information reports with Performance you generated - read make for excellent utilities can provide and Tools Information Advanced Performance PC and can’t be tempted to try your away from ing when you’re quick fixes the logs thoroughly and read problem you time to digest a Take Time to Step Back Step Time to Take the system tool isn’t built into the best troubleshooting Sometimes you to step away out, I would advise figure that you just can’t problem troubleshooting your computer from clear mind

Chapter 14

Summary 230

Chapter 14 Index

Symbols and Numbers administrator passwords, 81–83 32-bit registry keys, 415 guest accounts, 83 64-bit registry keys, 415 parental controls, 84–87 256-bit encryption Acronis Disk Director, 292 zPOD, 339 Acronis True Image, 291, 313 - (minus) sign Action Center, 17–20 Internet searches, 273, 274 Check For Solutions option, 18 + (plus) sign logs, 18 Internet searches, 273, 274 Maintenance section, 18 Network Access Protection, 19 A notifications, 19 accessing panel, 18, 19 BitLocker, 362 program compatibility notifications Computer Management console, 227, 227–229, 369 notifications, 173–175 Device Manager, 182 Reliability History Disk Defragmenter, 70 viewing, 19 Indexing Options, 129 repelling attacks, 137–138 MSConfig, 11, 76, 241 Security section, 402 Performance Information and Tools, 217, 217–218 settings, 19 Previous Versions, 163 System and Security section, 21 Problem Steps Recorder, 285 troubleshooters, 194–195 Registry Editor, 246, 413 User Account Control, 19 Services panel, 244 Actions tab (Task Scheduler), 371 System File Checker, 239 activating System Recovery Options, 250 Windows 7, 8 Windows drive in Ubuntu, 327 ActiveX Windows Remote Assistance, 282–286 files, 258–259 Windows Remote Desktop, 278 add-ons Windows Task Manager, 224 Internet Explorer accounts disabling, 231–232 confirmation links, 146 managing in Control Panel, 234–235 guest, 83 running without, 233–234 user, 80–86

455 456 address bars

address bars Advanced Tools (Performance Information and Tools), 385–398 online security, 49 Disk Defragmenter, 396–397 Adjust Visual Effects link, 380–382 Event Log, 386 Administrative Events pane (Event Log), 220 Performance Monitor, 386–393 administrator mode Resource Monitor, 393–395 Program Compatibility Assistant, 30 System Information panel, 396 administrator passwords Task Manager, 396 user accounts, 81–83 AES (Advanced Encryption Standard) Advanced Attributes dialog box, 348 BitLocker, 43–47 advanced diagnostic tools AES (Advanced Encryption Standard) key, 361 Computer Management console, 227–229 alerts Event Log, 219–221 User Account Control (UAC), 40–41 Performance Monitor, 222–223 all-in-one PCs, 301–303 Resource Monitor, 223–224 cleaning, 99 System Health Report, 226–228 Amazon S3, 62 System Information tool, 224–225 AMI Windows Task Manager, 224 beep codes, 439 Advanced EFS Data Recovery, 360 and, using in Internet searches, 274 Advanced Encryption Standard (AES) annotating screenshots (Problem Steps Recorder), 286 BitLocker, 43–47 anti-malware Advanced Encryption Standard (AES) key, 361 Microsoft Security Essentials, 38 advanced options Windows Defender, 26–27 system repair disc, 250 anti-malware software, 38–40, 140–144 Advanced Options dialog box, 383 malicious, 150–151 Advanced security settings Malwarebytes, 39, 143 Windows Firewall, 403–411 Microsoft Windows Malicious Software Removal Inbound rules, 406–409 Tool, 142–143 managing firewall rules, 405–406 repairing attack damage, 153 Outbound rules, 406–409 SpyBot Search & Destroy, 39 setting Connection Security Rules, 410 Spyware Blaster, 144 advanced settings Spyware Terminator, 39, 76, 143 Windows Firewall, 24–25 Windows Defender, 39, 141–142 Advanced Settings panel, 384 anti-spyware Advanced System Settings link, 279 Windows Defender, 26–27 Advanced tab (System Properties dialog box), 10 anti-spyware software, 48 Advanced tab (Windows Firewall With Advanced Security Antivirus 2010, 150 management panel), 406 backups 457

anti-virus software, 27–28, 38–40 . See also viruses phishing, 146–147 AVG Anti-Virus/AVG Security Suite, 140 spam, 146–147 installing after Windows 7 installation, 7 toolbars, 147–148 Malwarebytes, 39 repairing damage, 153–162 Microsoft Security Essentials, 28, 38, 139 anti-malware software, 153 Microsoft Windows Malicious Software Removal Tool, 39 BIOS viruses, 159–161 Norton Internet Security/Norton 360, 28, 39, 140 McAfee Stinger, 154–155 repelling attacks, 138–140 online virus scanners, 153 updates, 47 removing viruses, 157–158 Windows Virtual PC, 117 restoring Windows 7 from backups, 159 Windows XP Mode, 117 Safe Mode, 155–156 AppData folder, 259, 260 viruses hiding, 161–162 Application Control Policies (Local Policy Editor), 89 repelling, 137–144 applications, 259 Action Center, 137–138 compared to processes and services, 208 anti-malware software, 140–144 Computer Management console, 378–379 anti-virus software, 138–140 definition, 208 Attrib command, 253 dupliware, 211 audio devices exiting setting, 136 system tray, 206–207 Audit Mode, 269 extensions, 259 authentication shutting down BitLocker, 361 End Process Tree option, 207 Automatically Manage Paging File Size For All Drives option, 10 Safe Mode, 208–209 automatic restarts Windows Task Manager, 207–208 disabling, 215 Ashampoo WinOptimizer, 74, 344 auto-running software, 76 associations (files) AVG Anti-Virus/AVG Security Suite, 140 troubleshooting, 125–126 Award BIOS beep codes, 440 ATI support website, 293 attaching B virtual hard disks (VHD), 110 Backup and Restore, 57–60 attachments (email) Backup And Restore window, 61–62 viruses, 48 backups, 4, 49, 57–63, 313 attacks Backup and Restore, 57–60 identifying, 144–152 BitLocker, 45 browser plug-ins, 148–149 cloud storage, 62 malicious anti-malware software, 150–151 copies, 315–317 malicious websites, 149–150 corporate image, 65 padlock icon, 144–145 determining number of, 66–67 458 backups (continued)

backups (continued) BitLocker, 43–47, 361–364 image, 314 accessing, 362 Windows System Image Backup, 314–316 authentication, 361 incremental, 66 backups, 45 Linux ISOs, 333 encrypting drives, 363 Nero, 62 encrypting hard disks, 364 networks, 16, 59 non-Windows computers, 45–46 NTI Shadow, 62 reading encrypted hard disks, 362 partitions reasons to use, 47 size, 7 BitLocker Drive Encryption window, 362 Previous Versions, 165, 166 BitLocker To Go, 361–364 RAID (Redundant Array of Independent Disks), 318 Windows XP, 362 registry, 249, 416–417 BitLocker To Go Reader, 45–46, 362 registry keys, 418 blocking reinstalling Windows 7, 77 CDs, 90–91 removable optical discs, 66 DVDs, 90–91 restoring files/data from, 61–62 external hard disks, 90–91 restoring Windows Flash drives, 90–91 custom installs, 315–317 blocks restoring Windows 7 from, 159 routers restoring Windows from, 313–315 troubleshooting, 412 splitting data across desktops, 5 Blue Screen of Death (BSOD), 214–215, 320 starting Windows 7, 179 bookmarks storage locations, 66–67 resetting Internet Explorer, 236 storing, 314 Boot Camp, 104 version control, 63 boot configuration data (BCD) file viruses, 161 creating, 266 Windows 7, 14–16, 63–66 boot discs Basic Input Output System (BIOS), 94–96 Linux, 326 resetting, 307–309 Boot folder, 258, 259, 262 BCD (boot configuration data) file booting creating, 266 dual booting BCDEdit, 252 compared to virtualization, 104 beep codes (BIOS), 94, 439–445 from virtual hard disks (VHD), 110–115 BIOS (Basic Input Output System), 94–96 minimal hardware boots, 306–307 corruption, 213 boot log, 241–243 resetting, 307–309 finding, 242 viruses, 159–161 warning beep codes, 94, 439–445 Command Prompt window 459

Boot menu certification BCDEdit, 252 hardware, 75 repairing with bootrec .exe, 251–252 Change Action Center Settings option, 174 Boot Order setting, 64 Change Advanced Power Settings, 134 Bootrec .exe, 251 Check For Solutions option (Action Center), 18 repairing Boot menu, 251–252 chkdsk /? command, 251 Browser Ballot Screen Cipher .exe, 360 Internet Explorer alternatives, 238–239 cleaning browsers all-in-one PCs, 99 clearing temporary files, 72–73 desktops, 99 Google Chrome, 239 keyboards, 100–101, 301 Internet Explorer . See Internet Explorer laptops, 99 Mozilla Firefox, 239 mice, 100–101, 301 plug-ins PCs, 98 identifying attacks, 148–149 clean installs, 4–6 security, 48 Clean Up System Files option, 72 BSOD (Blue Screen of Death), 214–215, 320 Clear CMOS jumper, 308 burning clearing ISO files (Linux), 335–336 temporary files, 72–73 burning CDs/DVDs cloud storage Linux, 333–334 backups, 62 SkyDrive, 46 C cmd (Command Prompt) cases, 98 accessing System File Checker, 239 desktops, 295–296 code CCleaner, 73 legacy, 35 Cd command, 253 security, 35 CDs legacy code blocking, 90–91 updates, 21 burning command-line switches Linux, 333–334 /FixBoot, 252 burning ISO files to /FixMbr, 252 Linux, 335–336 /ScanOS, 252 manuals, 50 Command Prompt (cmd) Certificate Export Wizard, 349 accessing System File Cheker, 239 certificates Command Prompt window EFS (Encrypted File System), 354–356, 356–359 cutting/pasting in, 114 File Encryption Certificate Manager, 359 460 commands

commands Computer Management console, 89–90, 227–229, 369–379 Attrib, 253 accessing, 227, 369 Cd, 253 applications, 378–379 chkdsk /?, 251 Device Manager, 377 Copy, 253 Local Users and Groups option, 376 Del, 253 reattaching virtual hard disks (VHDs), 110 Devices By Connection, 377 services, 378–379 Devices By Type, 377 Shared Folders option, 376 Dir, 253 system tools, 370–377 Diskpart, 253 Event Viewer, 373–376 /F, 250 Task Scheduler, 370–372 Mkdir, 253 Task Scheduler, 90–91 More, 253 Windows Management Instrumentation (WMI), 379 Move, 253 Computer Management Console /R, 250 Event Viewer, 90 Rd, 253 Shared Folders, 90 Ren, 253 computers Resources By Connection, 377 policies Resources By Type, 377 restoring folders, 263 Show Hidden Devices, 377 restarting Type, 253 after software crashes, 214 /X, 250 disabling automatic restarts, 215 Xcopy, 253 restoring data, 321–324 compatibility, 28–33 Computers tab (Windows Firewall With Advanced Security management panel), 406 hardware Computing .net, 292 Microsoft list, 171 Conditions tab (Task Scheduler), 371 Program Compatibility Assistant, 29–30 configurations Program Compatibility troubleshooter, 172–173 system preferences, 7–12 software System Restore, 167–168 Microsoft list, 171 Windows notifications, 173–175 minimum configuration, 206–208 troubleshooting, 170–171 Windows Remote Desktop, 279 manually setting, 170–172 confirmation links, 146 Windows XP Mode, 31–33, 175 connections Complete PC Backup, 313–315 Internet Components (System Information tool), 225 Linux, 330–331 Computer Configuration section (Group Policy Editor), 87 Windows Remote Assistance, 282–286 Windows Remote Desktop, 279 Data Execution Prevention (DEP) 461

Connection Security Rules Create A System Rescue Disc option, 63–64 setting, 410 Create Basic Task option, 372 connectors cryptography jump-starting PCs, 309 BitLocker, 43–47 power supplies, 305 Custom (Advanced) option, 316–318 control Custom Install option, 5 users custom installs UAC (User Account Control), 79–80 restoring data, 315–317 controllers, 183 restoring Windows, 315–317 Control Panel cutting Indexing Options, 129 in Command Prompt window, 114 logs, 261 D System and Security panel, 9 data troubleshooters, 398–400 copying encrypted data, 364 Control Panel Item . See cpl files recovering controls Advanced EFS Data Recovery, 360 Parental Controls, 84–87 Cipher .exe, 360 Copy command, 253 registry settings, 415 copying rescuing encrypted data, 364 Ashampoo WinOptimizer, 344 registry files, 321 O&O Disk Recovery, 344 Copype .cmd script, 265 restoring cores custom installs, 315–317 running multiple operating systems, 37 from backups, 313–315 corporate environments recovery specialists, 344 Windows Remote Assistance, 281–285 with Linux distributions, 325–330 Windows Remote Desktop, 278–280 with other PCs, 321–324 corporate image backups, 65 restoring from backups, 61–62 corruption splitting across desktops for backups, 5 BIOS, 213 splitting across partitions for backups, 5 counters data backups, 49 adding to Performance Monitor, 387 Data Collector Sets cpl files, 259 adding event logs, 390 craplets, 211 Performance Monitor, 388–393 crashes scheduling, 393 software viewing, 392 rebooting, 214 Data Execution Prevention (DEP), 382 Create a System Image dialog box, 15 Create a System Repair Disc option, 63–64 462 data loss

data loss rolling back device drivers, 193–194 reinstalling/restoring, 4 updating device drivers, 192–194 DDOS (distributed denial of service) attacks, 140 warning triangles, 184 Debian, 335 devices debug folder, 261 common problems, 180–181 decryption controllers, 183 Cipher .exe, 360 Device Manager, 377 Default setting (UAC), 42 diagnosing problems, 205 defragmenting hard disks, 69–71 displaying, 377 Del command, 253 hidden devices Delete Browsing History dialog box, 72, 73 Device Manager, 185–187 deleting human interface, 183 files IRQ (interrupt requests) conflicts, 209–210 Disk Cleanup, 71–72 troubleshooting, 101 fragmentation, 69–74 USB3 temporary files, 262 troubleshooting, 135 registry keys, 417–418 Devices By Connection command, 377 registry settings, 248–249 Devices By Type command, 377 DEP (Data Execution Prevention), 382 Diagnose/Repair feature (Windows Firewall), 26–27 desktops diagnosing cases, 295–296 common problems, 213 cleaning, 99 domino effect, 213 folder, 259 hardware problems device drivers, 180–194 System Monitor for Linux, 331–332 common problems, 180–181 reasons problems occur, 211–213 common Windows problems, 213 step-by-step approach, 205–210 Device Manager, 182–187 minimum Windows configuration, 206–208 installing, 187–190 unplugging hardware, 209–210 reinstalling, 190–191 Diagnostic Results panel (System Health Report), 226–227 removing, 190–191 diagnostics folder, 261 rolling back, 193–194 diagnostic startups updating, 192–194 MSConfig, 241–243 Device Manager, 182–187, 377 diagnostic tools accessing, 182 Computer Management console, 227–229 hidden devices, 185–187 Event Log, 219–221 installing device drivers, 187–190 Performance Monitor, 222–223 reinstalling device drivers, 190–191 Resource Monitor, 223–224 removing device drivers, 190–191 System Health Report, 226–228 DVDs 463

System Information tool, 224–225 distributed denial of service (DDOS) attacks, 140 Windows Task Manager, 224 distributions dialog boxes Linux, 325, 334–335 Advanced Attributes, 348 DLLs Advanced Options, 383 (Dynamic Link Library), 259 Create a System Image, 15 domino effect, 213 Delete Browsing History, 72, 73 Doyle, Sir Arthur Conan, 205 Indexing Options, 383 drivers Internet options, 237 CDs Power Options, 384, 385 manuals, 50 Properties, 170–171, 245, 379 diagnosing with boot log, 241–243 Resources tab, 209 Drivers folder, 259 Remote Desktop Connection, 279 DriverStore folder, 259 System Configuration, 243 drives . See also hard drives System Properties accessing Windows drive in Ubuntu, 327 Advanced tab, 10 encryption with BitLocker, 363 User Account Control, 80 IDE (Integrated Drive Electronics) drives, 298 Windows 7 Disk Defragmenter, 70 managing in Ubuntu, 328 Dir command, 253 optical, 300 DirectX Diagnostic Tool RAID (Redundant Array of Independent Disks) identifying problems, 126–128 backups, 318 disabling . See turning off drv files, 259 automatic restarts, 215 dual booting EFS (Encrypted File System), 354 compared to virtualization, 104 Internet Explorer add-ons, 231–232 dual-boot systems discarding PCs, 50 Windows Vista, 6 Disk Cleanup, 71–72, 385 Windows XP, 6 Disk Cleanup Wizard, 53–54 dupliware, 211 Disk Defragmenter, 70–71, 396–397 DVDs disk images blocking, 90–91 Linux, 333 burning Disk Management console, 228–229 Linux, 333–334 Diskpart command, 253 burning ISO files to disks . See hard disks Linux, 335–336 custom installs, 317, 317–318 install monitoring, 395 Startup Repair, 178–179 displaying installation hidden devices, 377 restoring Windows 7 from, 314 tasks (Task Scheduler), 372 464 DVDs (continued)

DVDs (continued) encryption installation DVD 256-bit System File Checker, 239–240 zPOD, 339 slipstreamed installation DVDs BitLocker, 43–47, 361–364 creating, 263–272 encrypting drives, 363 Dynamic Link Library files . See DLLs encrypting hard disks, 364 non-Windows computers, 45–46 E reasons to use, 47 Easy Connect, 283 BitLocker To Go, 361–364 ECC (Elliptic-Curve Cryptographic) algorithm cipher, 360 Cipher .exe, 360 editing copying encrypted data, 364 registry keys, 417–418 EFS (Encrypted File System), 347–360 editions certificates, 354–356, 356–359 Windows 7, 423 EnCase Forensic, 360 features, 425–429 reading Windows files in Linux, 328 EFS (Encrypted File System), 347–360 recovering files, 359 certificates, 354–356, 356–359 restoring EFS keys, 352–354 EnCase Forensic, 360 setup, 348–351 keys smart cards, 356–359 restoring, 352–354 turning off, 354 reading Windows files in Linux, 328 File Encryption Certificate Manager, 359 recovering EFS files, 359 files, 350–351 setup, 348–351 folders, 350–351 smart cards, 356–359 PGP (Pretty Good Privacy), 347 turning off, 354 TrueCrypt, 46 electricity End Process Tree option, 207 laptops, 304 engines static electricity, 93 scanning memory cards, 97 Norton Internet Security/Norton 360, 39 safety, 304 erasing PCs, 50 Elliptic-Curve Cryptographic (ECC) algorithm cipher, 360 errors email administrative, 220 attachments partitions viruses, 48 SpinRite, 343 phishing, 48, 146–147 Event Log, 219–221, 386 spam, 48, 146–147 reading, 221 EnCase Forensic, 360 event logs Encrypt Contents To Secure Data check box, 348 adding to Data Collector Sets, 390 Encrypted File System . See EFS filtering, 374–375 files 465

events files attaching to tasks to, 374–375 ActiveX, 258–259 Event Viewer, 219, 373–376 associations attaching tasks to events, 374–375 troubleshooting, 125–126 creating custom views, 375–376 Backup and Restore, 57–60 event log filtering, 374–375 BCD (boot configuration data) Event Viewer (Computer Management Console), 90 creating, 266 exiting cpl, 259 programs deleting system tray, 206–207 Disk Cleanup, 71–72 expandable VHD files, 112 fragmentation, 69–74 expansion cards, 97, 301 temporary files, 262 Explore Additional Options, 399 DLLs exporting (Dynamic Link Library), 259 tasks (Task Scheduler), 372 drv, 259 extending encrypting, 350–351 partitions, 55–57 encryption extensions File Encryption Certificate Manager, 359 applications, 259 hidden, 201 extensions (file) viewing, 257 viewing, 257 inf, 258 external hard disks moving away from Windows 7, 12–13, 53–57 blocking, 90–91 Disk Cleanup Wizard, 53–54 encrypting with BitLocker, 43 Shell user folders, 57–58 shrinking/extending/creating partitions, 55–57 F ntuser .dat, 321 factory resetting ocx, 259 Internet Explorer, 235–237 operating system, 257–260 failures operatng system common problems, 213 System Restore, 166–170 fans, 301 program files, 200 faults reading Windows files in Linux minimal hardware boots, 306–307 EFS (Encrypted File System), 328 favorites recovering resetting Internet Explorer, 236 EFS (Encrypted File System), 359 /F command, 250 registry Fedora, 335 copying, 321 File Encryption Certificate Manager, 359 466 files (continued)

files(continued) /FixBoot switch, 252 restoring, 262 fixed VHD files, 112 previous versions, 163–166 /FixMbr switch, 252 System File Checker, 239–240 Flash drives restoring from backups, 61–62 blocking, 90–91 restoring Windows, 320–321 encrypting with BitLocker, 43 Search folders troubleshooting, 129–130 AppData, 259, 260 structure, 199–202 Backup and Restore, 57–60 System File Checker, 239–240 Boot, 258, 259, 262 temporary, 262 debug, 261 clearing, 72–73 Device Driver, 259 vbs, 259 diagnostics, 261 viruses (hidden), 161 Drivers, 259 writing to disks DriverStore, 259 troubleshooting permission issues, 121–125 encrypting, 350–351 filter Globalization, 202, 261 event logs, 374 Help, 258 filters hidden, 201 phishing, 48 INF, 262 spam, 48 LiveKernelReports, 262 finding logs, 261 boot log, 242 Logs, 262 files Media, 261 troubleshooting Search, 129–130 ModemLogs, 262 hard disks in My Computer, 322 NTUSER .DAT, 260–261 registry information, 419 operating system, 257–260 firewalls, 47 personalization, 261 ShieldsUp! test, 402 Public, 200 troubleshooting WI-FI networks, 125 Resources, 202, 261 updates, 47 Root, 200 Windows Firewall, 23–26, 401–403 Security, 260 Advanced security settings, 403–411 ServiceProfiles, 260 port control for routers, 411–412 Shared Folders (Computer Management Console), 90 resetting, 404 Shell user troubleshooters, 404 moving, 57–58 Windows Remote Desktop, 280 structure, 199–202 Windows Remote Desktop, 278, 280 System32, 202, 262 firmware, 95 Users, 200, 324 hard disks 467

Web, 261 Google Chrome, 239 Windows, 200, 201 GoToAssist, 290 Windows .old, 317, 317–318 gpedit .msc, 87–88 winsxs, 259 graphics WinSxS, 262 troubleshooting, 126–128 X:\Users\AppData, 259 graphics cards, 97, 300 X:\Windows\Boot, 258 resolution, 306 X:\Windows\debug, 261 screen resolution, 306 X:\Windows\diagnostics, 261 graphics drivers X:\Windows\Downloaded Program Files, 262 common problems, 181–182 X:\Windows\Globalization, 261 GRC SpinRite, 341–343 X:\Windows\Help, 258 green bar X:\Windows\inf, 258 shopping online, 49 X:\Windows\LiveKernelReports, 262 grounding PCs, 93 X:\Windows\Logs, 262 group policies, 87–91 X:\Windows\Media, 261 Group Policies X:\Windows\ModemLogs, 262 registry, 416 X:\Windows\Prefetch, 262 Group Policy X:\Windows\Resources, 261 Windows Update, 22–23 X:\Windows\Security, 260 Group Policy Editor, 87–91 X:\Windows\ServiceProfiles, 260 blocking access to removable storage, 90–91 X:\Windows\SoftwareDistribution, 262 guest accounts, 83 X:\Windows\System32, 258 Guest Mode, 50 X:\Windows\Temp, 262 H X:\Windows\Web, 261 hard disk drives X:\Windows\winsxs, 259 SMART (Self-Monitoring, Analysis, and Reporting fragmentation, 69–74 Technology) . See SMART Disk Defragmenter, 396–397 hard disks, 298–299 freeware, 75 backups, 4 G BitLocker, 362 defragmenting, 69–71 game controllers, 183 encrypting with BitLocker, 43–45, 364 General tab (Task Scheduler), 371 external disks, 43 General tab (Windows Firewall With Advanced Security management panel), 405–406 external Gibson Research, 293 blocking, 90–91 Gibson Research Corporation, 51 finding in My Computer, 322 Gibson, Steve, 51, 291, 293 fragmentation Glary Utilities, 73 Disk Defragmenter, 396–397 Globalization folder, 202, 261 GRC SpinRite, 341–343 468 hard disks (continued)

hard disks (continued) laptops, 301–303 moving files away from Windows, 12–13 electricity, 304 restoring, 4 memory, 97, 298 Ashampoo WinOptimizer, 344 mice, 301 O&O Disk Recovery, 344 minimal hardware boots, 306–307 restoring data plugging into other PCs, 321–324 monitors, 101 size, 7 troubleshooting, 135 SpinRite motherboards, 94–95, 296–297 Surface Analysis Monitor, 342 Basic Input Output System (BIOS), 94–96 SSDs (Solid State Disks) Clear CMOS jumper, 308 SpinRite, 343 Northbridge and Southbridge chipset, 96 writing files to sockets, 94 troubleshooting permission issues, 121–125 netbooks, 301–303 hard drives, 97 optical drives, 300 IDE (Integrated Drive Electronics) drives, 298 partitions hardware restoring data, 321–324 all-in-one PCs, 301–303 peripherals, 100–101 BIOS power supplies, 98, 102, 295–296 viruses, 159–161 connectors, 305 BIOS (Basic Input Output System), 94–96 jump-starting PCs, 309 resetting, 307–309 laptops, 304 cases, 98 processors, 96, 297–298 compatibility Performance Monitor, 387 Microsoft list, 171 riser cards, 97 desktop PC cases, 295 searching for in Device Manager, 185–187 devices sockets, 94 diagnosing problems, 205 static electricity displaying, 377 safety, 304 encrypting with BitLocker, 43–45 surge protectors, 102 expansion cards, 97, 301 System Monitor fans, 301 Ubuntu Linux, 331–332 graphics cards, 300 unplugging, 209–210 screen resolution, 306 utilities, 211 hard disks, 298–299 Windows 7 certification, 75 hard drives Hardware Resources (System Information tool), 225 restoring data, 321–324 headphones IRQs (interrupt requests) conflicts, 209 troubleshooting, 136 keyboards, 301 help Internet solutions, 273–277 identifying 469

Microsoft Answers, 276–277 hidden extensions (file) Microsoft Support website, 274–276 viewing, 257 Microsoft TechNet, 276–277 hidden files, 201 Microsoft Windows 7 Solution Center, 274–275 viewing, 257 Problem Steps Recorder, 285–287 hidden folders, 201 Remote Desktop hidden viruses, 161–162 Ubuntu Linux, 330–331 History tab (Task Scheduler), 371 third-party software HKEY_CLASSES_ROOT, 414 Acronis Disk Director, 292 HKEY_CLASSES_ROOT (registry), 247 Acronis True Image, 291, 313 HKEY_CURRENT_CONFIG, 414 GoToAssist, 290 HKEY_CURRENT_CONFIG (registry), 247 Norton Ghost, 291, 313 HKEY_CURRENT_USER, 414 Paragon Partition Manager, 291 HKEY_CURRENT_USER (registry), 247 Sisoftware Sandra, 289–290 HKEY_LOCAL_MACHINE, 414 SpinRite, 291 HKEY_LOCAL_MACHINE (registry), 247 Windows Memory Diagnostic, 291 HKEY_USERS, 414 Windows Sysinternals, 290 HKEY_USERS (registry), 247 Zinstall zPOD, 290 Holmes, Sherlock (Sign of Four), 205 third-party websites home users Annoyances, 293 Windows Remote Assistance, 281–285 ATI support, 293 How-To Geek, 292 Computing .net, 292 human interface devices, 183 Gibson Research, 293 I How-To Geek, 292 IBM Long Climb, The, 294 error codes, 439 MSDN, 293 icons NVidia, 293 padlock Tech PC Forums, 292 identifying attacks, 144–145 Tom’s Hardware, 292 IDE (Integrated Drive Electronics) drives, 298 Within Windows, 293 identifying Windows Help, 289 attacks, 144–152 Windows Remote Assistance, 281–285 browser plug-ins, 148–149 Windows Remote Desktop, 278–280 malicious anti-malware software, 150–151 Help folder, 258 malicious websites, 149–150 hibernate mode, 133–134 padlock icon, 144–145 hidden devices phishing, 146–147 Device Manager, 185–187 spam, 146–147 displaying, 377 toolbars, 147–148 470 identity theft

identity theft, 49, 50 operating systems in Windows Virtual PC, 116–117 image backups, 314 software Windows System Image Backup, 314–316 media player software, 212 image files software categories, 211 creating for slipstreamed installation DVD creation, 270 stability, 75 images Windows functionalities, 212 Windows Windows restoring on other PCs, 319–321 custom installs, 315–317 inbound rules Windows 7 Windows Firewall, 25 annual reinstallation, 77 Inbound rules clean installs, 4–6 adding, 406–409 for slipstreamed installation DVD creation, 267–270 Inbound Rules section (Windows Firewall With Advanced on VHDs (virtual hard disks), 111–112 Security management panel), 406–407 preventing problems, 4 incremental backups, 66 system preferences, 7–12 indexing options Integrated Drive Electronics (IDE) drives, 298 Performance Information and Tools, 383 integrity of files Indexing Options System File Checker, 239–240 accessing, 129 Interner browsers Indexing Options dialog box, 383 security, 48 inf files, 258 Internet INF folder, 258, 262 connections installation disc Linux, 330–331 Linux, creating, 335–336 privacy, 152–153 installation DVD searches restoring Windows 7 from, 314 processes, 208 slipstreamed . See slipstreamed installation DVDs searching for help, 273–277 System File Checker, 239–240 security, 49 Windows 7 Internet browsers creating slipstreamed installation DVDs, 270–272 clearing temporary files, 72–73 install disc Google Chrome, 239 restoring Windows 7 from, 64–65 Internet Explorer . See Internet Explorer Startup Repair, 178–179 Mozilla Firefox, 239 installing plug-ins compared to upgrading, 4–6 identifying attacks, 148–149 device drivers, 187–190 Internet Explorer reinstalling, 190–191 add-ons Internet Explorer disabling, 231–232 reinstalling, 237–238 managing in Control Panel, 234–235 Linux 471

running without, 233–234 deleting, 417–418 Browser Ballot Screen alternatives, 238–239 editing, 417–418 factory resetting, 235–237 names, 419 installing Knoppix, 335 reinstalling, 237–238 L security, 35 laptops, 301–303 starting cleaning, 99 resetting when IE doesn’t start, 237 electricity, 304 turning off, 237 Last Known Good Configuration, 176–177 updates, 238 legacy code, 35 Internet options dialog box, 237 security, 35 interrupt requests . See IRQs (interrupt requests) updates, 21 invitations legacy programs Windows Remote Assistance, 283 compatibility, 28–33 IRQs (interrupt requests) Program Compatibility Assistant, 29–30 conflicts, 209–210 legacy support ISO files processors, 37 burning updates, 36 Linux, 335–336 Windows 8, 203 J Windows vNext, 37–38 Jscript Windows XP Mode, 36–37 registry, 417 Let Me Choose option, 58 jumpers Let Windows Choose option, 58 Clear CMOS, 308 licensing jump-starting PCs, 309 booting Windows 7 from VHDs, 111 Linux K backup ISOs, 333 Karp, David A ., 293 boot discs, 326 keyboards, 100–101, 301 burning CDs/DVDs, 333–334 cleaning, 301 creating installation disc, 335–336 troubleshooting, 126–128 creating pen drives, 335–336 keyboard shortcuts, 431–437 Debian, 335 keys distributions, 325, 334–335 AES (Advanced Encryption Standard), 361 Fedora, 335 EFS (Encrypted File System) Internet connectivity, 330–331 restoring, 352–354 Knoppix, 335 registry, 415 printing douments, 329 adding, 417–418 restoring systems/data, 325–330 backups, 418 472 Linux (continued)

Linux (continued) PC Tune-Up, 74 software, 330–332 Windows Update, 76 SuSe, 335 Maintenance section System Monitor, 331–332 Action Center, 18 system testers, 332–333 malicious anti-malware software, 150–151 Ubuntu . See Ubuntu Linux malicious toollbars, 148 Linux disc ISO, 326 malicious websites LiveKernelReports folder, 262 attacks, 149–150 loading screen, 182 malware . See anti-malware software troubleshooting, 135 anti-malware Local Group Policy Editor window, 22 Windows Defender, 26–27 local policies, 89–90 Malwarebytes, 39, 143 Local Security Policy Editor, 89–90 malware software Local Security Policy window, 88, 355 installing after Windows 7 installation, 7 Local Users and Groups option, 376 Manage Add-ons window, 232 locations management, computer PCs, 98 Computer Management console, 369–379 logs, 261 accessing, 369 Action Center, 18 applications, 378–379 event logs Device Manager, 377 filtering, 374–375 Local Users and Groups option, 376 SpinRite, 341 services, 378–379 Logs folder, 262 Shared Folders option, 376 Long Climb website, 294 system tools, 370–377 Windows Management Instrumentation (WMI), 379 M managing Magic Card, 51 Internet Explorer add-ons in Control Panel, 234–235 maintenance . See also performance services, 244–246 PCs, 50 user accounts, 80–86 Windows 7 administrator passwords, 81–83 annual reinstallation, 77 guest accounts, 83 Ashampoo Winoptimizer, 74 Parental Controls, 84–87 auto-running software, 76 manually setting compatibility, 170–172 CCleaner, 73 manuals clearing temporary files, 72–73 CDs, 50 defragmenting hard disks, 69–71 McAfee Stinger, 154–155 Disk Cleanup, 71–72 Media folder, 261 Glary Utilities, 73 media player software, 212 installing software, 75 MSDN website 473

memory, 97, 298 minus (-) sign static electricity Internet searches, 273, 274 safety, 304 Mkdir command, 253 virtual MMC (Microsoft Management Console) settings, 381 programs, 259 virtual memory registry, 416 changing size, 9–10 ModemLogs folder, 262 Windows 7 editions, 423 Monitoring Windows Memory Diagnostic option, 253–254 Windows Firewall With Advanced Security management panel, 410–411 Memory tab (Resource Monitor), 223–224, 394, 395 monitors, 101 menus troubleshooting, 135 Boot More command, 253 BCDEdit, 252 motherboards, 94–95, 296–297 repairing with bootrec .exe, 251–252 Basic Input Output System (BIOS), 94–96 messages blue screen of death (BSOD), 320 Windows Clear CMOS jumper, 308 Action Center, 18 graphics cards, 300 mice, 100–101 Northbridge and Southbridge chipset, 96 cleaning, 301 sockets, 94 microphones static electricity troubleshooting, 136 safety, 304 Microsoft Answers, 276–277 mouse drivers Microsoft Fix it Center, 195 troubleshooting, 126–128 Microsoft Internet Explorer . See Internet Explorer Move command, 253 Microsoft Knowledge Base moving website, 206 files away from Windows 7, 12–13, 53–57 Microsoft Live Essentials Suite, 212 Disk Cleanup Wizard, 53–54 Microsoft Management Console (MMC) Shell user folders, 57–58 logs, 261 shrinking/extending/creating partitions, 55–57 registry, 416 Shell user folders, 57–58 Microsoft Security Essentials, 28, 38, 139 Mozilla Firefox, 239 Microsoft SkyDrive, 62 Mozy, 62 Microsoft Support website, 274–276 MSConfig, 11–12, 76 Microsoft TechNet, 276–277 accessing, 76, 241 Microsoft Windows 7 Solution Center, 274–275 diagnostic startups, 241–243 Microsoft Windows Malicious Software Removal Tool, 39, 142–143 troubleshooting Windows startup, 131–132 minimal hardware boots, 306–307 MSDN website, 293 474 My Computer

My Computer NT (New Technology) finding hard disks, 322 versions, 199 ntuser .dat, 246–249, 321 N NTUSER .DAT folder, 260–261 names nVidia, 293 registry keys, 419 virtual hard disks (VHD), 109 O NAS (network attached storage), 66 ocx files, 259 Nero, 62 online netbooks, 301–303 devices, 135 Network Access Protection, 19 online accounts network attached storage (NAS), 66 confirmation links, 146 networks online shopping backups, 16, 59 security, 49 monitoring, 395 online virus scanners WI-FI repairing damage from attacks, 153–154 troubleshooting, 125 O&O Disk Recovery, 344 Never Notify setting (UAC), 42 opening New Connection Security Rule Wizard, 410 ports New Technology File System (NTFS), 109 Windows Firewall, 25–26 New Technology (NT) versions, 199 OpenOffice, 327 No Operating System Found, 135 operating system files, 257–260 Northbridge and Southbridge chipset, 96 operating systems . See also Windows; Windows 7 Norton Ghost, 291, 313 compared to Windows 7, 202–203 Norton Internet Security/Norton 360, 28, 39, 140 installing in Windows Virtual PC, 116–117 notebooks Linux cleaning, 99 burning CDs/DVDs, 333–334 notification area creating installation disc, 335–336 Action Center, 17 distributions, 334–335 notifications software, 330–332 Action Center, 19 system/data restores, 325–330 program compatibility, 173–175 managing services, 244–246 User Account Control (UAC), 40 No Operating System Found, 135 not, using in Internet searches, 274 running multiple OSes on different cores, 37 ntblog .txt, 241–243 UNIX, 203 NTFS (New Technology File System), 109 virtualization, 103 removable drives, 347 compared to dual booting, 104 NTI Shadow, 62, 76 Windows 7 . See Windows 7 optical drives, 300 PCs 475

optical hard drives, 97 Passware Kit Forensic, 364 optimizers, 74 passwords, 147–148 or, using in Internet searches, 274 administrator outbound rules user accounts, 81–83 Windows Firewall, 25 cracking with EnCase Forensic, 360 Outbound rules pasting adding, 406–409 in Command Prompt window, 114 Outbound Rules section (Windows Firewall With Advanced PCs Security management panel), 406–407 all-in-one, 301–303 P BIOS (Basic Input Output System), 94–96 padlock icon resetting, 307–309 identifying attacks, 144–145 cases, 98, 295–296 shopping online, 49 cleaning, 98 panels discarding, 50 Action Center, 18, 19 erasing, 50 Services, 244–246 expansion cards, 97, 301 System and Security, 9 fans, 301 Windows Firewall With Advanced Security graphics cards, 300 management, 403–410 screen resolution, 306 Paragon Partition Manager, 291 grounding, 93 Parental Controls, 84–87 hard disks, 298–299 partitions jump-starting, 309 backups, 4 laptops, 301–303 size, 7 electricity, 304 creating, 55–57 locations, 98 custom installs, 317–318 maintenance, 50 defragmenting, 71 manuals, 50 encrypting with BitLocker, 43–45 memory, 97, 298 errors minimal hardware boots, 306–307 SpinRite, 343 motherboards, 94–95, 296–297 extending, 55–57 Basic Input Output System (BIOS), 94–96 managing in Ubuntu, 329 Northbridge and Southbridge chipset, 96 moving files away from Windows, 12–13 sockets, 94 restoring data, 321–324 netbooks, 301–303 shriking, 55–57 optical drives, 300 size, 7 performance tools, 229–230 splitting data across for backups, 5 power supplies, 98, 102, 295–296 virtual hard disks (VHD), 108 processors, 96, 297–298 removing viruses using, 158–159 476 PCs (continued)

PCs (continued) Performance Information and Tools window, 218 repairing Performance Monitor, 222–223, 386–393 system repair disc, 250–254 adding counters to, 387 restoring data, 321–324 Data Collector Sets, 388–393 restoring Windows images, 319–321 performance tools, 229–230 riser cards, 97 peripherals, 100–101 security, 51 permissions sleeping options, 133–134 Windows Firewall, 24–25 sockets, 94 writing files to disk static electricity, 93 troubleshooting, 121–125 safety, 304 personal information, 144 surge protectors, 102 personalization folders, 261 PC Tune-Up, 74 PGP (Pretty Good Privacy) encryption, 347 PEBCAK (Problem Exists Between Chair And Keyboard), 79 phishing, 146–147 pen drives email, 48 Linux, creating, 335–336 filters, 48 performance . See also maintenance Phoenix BIOS beep codes, 440–445 defragmenting hard disks, 69–71 plug-ins Performance Information and Tools, 217–218, 380–398 browsers accessing, 217 identifying attacks, 148–149 Advanced Tools, 385–398 plus (+) sign Disk Defragmenter, 396–397 Internet searches, 273, 274 Event Log, 386 policies Performance Monitor, 386–393 Application Control Policies, 89–90 Resource Monitor, 393–395 group policies, 87–91 System Information panel, 396 local, 89–90 Task Manager, 396 restoring folders, 263 Computer Management console, 227–229 ports Disk Cleanup, 385 managing firewall rules, 406 Event Log, 219–221 router control, 411–412 indexing options, 383 Windows Firewall Performance Monitor, 222–223 rules, 25–26 power settings, 383 power cables Resource Monitor, 223–224 monitors, 101 System Health Report, 226–228 Power Options dialog box, 384, 385 System Information tool, 224–225 Power Options panel, 383 Visual Effects, 380–382 Power Options section, 133–134 Windows Task Manager, 224 power settings, 383 Rd command 477

power supplies, 98, 102, 295–296 troubleshooting, 170–171 connectors, 305 manually setting, 170–172 jump-starting PCs, 309 Windows XP Mode, 175 laptops Program Compatibility Assistant, 29–30 electricity, 304 Program Compatibility troubleshooter, 172–173 spikes, 102 program files, 200 Pretty Good Privacy (PGP) encryption, 347 programs Previous Versions compared to processes and services, 208 accessing, 163 compatibility backups, 165, 166 Program Compatibility Assistant, 29–30 restoring previous versions of files, 163–166 Windows XP Mode, 31–33 settings, 164 dupliware, 211 printing exiting in Linux, 329 system tray, 206–207 privacy, 49, 144 Microsoft Management Console, 259 Internet, 152–153 shutting down Problem Exists Between Chair And Keyboard (PEBCAK), 79 End Process Tree option, 207 Problem Steps Recorder, 285–287 Safe Mode, 208–209 accessing, 285 Windows Task Manager, 207–208 auto-launching, 379 Programs And Services tab (Windows Firewall With Advanced Security management panel), 406 process Programs Only setting (UAC), 42 monitoring, 393–395 Properties dialog box, 170–171, 245, 379 processes Resources tab, 209 compared to applications and services, 208 protocols definition, 208 managing firewall rules, 406 Internet searches, 208 TCP/IP (Transport Control Protocol and Internet Processes tab (Windows Task Manager), 207 Protocol), 406 processors, 96, 297–298 Public folder, 200 graphics cards, 300 Public Key Policies section, 355 legacy support, 37 Performance Monitor, 387 Q static electricity quotes safety, 304 Internet searches, 273 product keys, 8 R program compatibility RAID (Redundant Array of Independent Disks) . See RAID Microsoft list, 171 /R command, 250 notifications, 173–175 Rd command, 253 Program Compatibility troubleshooter, 172–173 478 reading

reading Registry Editor BitLocker encrypted hard disks, 362 accessing, 413 Event Log, 221 restoring, 416–417 Windows files in Linux sections, 414 EFS (Encrypted File System), 328 settings, 247, 413, 415 reattaching removing, 248–249 virtual hard disks (VHD), 110 VBScript, 417 rebooting, 214 WMI (Windows Management Instrumentation), 417 recording problems (Problem Steps Recorder), 286 Registry Editor, 246 recovering accessing, 246, 413 data REG_LINK, 415 Advanced EFS Data Recovery, 360 REG_MULTI_SZ, 415 Cipher .exe, 360 REG_NONE, 415 EFS (Encrypted File System) files, 359 REG_QWORD, 415 Recovery tab (Properties dialog box), 379 REG_RESOURCE_LIST, 415 Redundant Array of Independent Disks . See RAID REG_RESOURCE_REQUIREMENTS_LIST, 415 .REG files REG_SZ, 415 registry, 416 reinstalling REG_BINARY, 415 data loss, 4 REG_DWORD, 415 Reliability History REG_EXPAND_SZ, 415 viewing, 19 REG_FULL_RESOURCE_DESCRIPTOR, 415 Remote Assistance, 281–285 regional settings, 11 connections, 282–286 registry, 246–249, 260–261 Easy Connect, 283 backups, 249, 416–417 invitations, 283 copying files, 321 remote computers finding information, 419 firewalls, 278 Group Policies, 416 Windows Remote Desktop, 280 Jscript, 417 Remote Desktop keys Ubuntu Linux, 330–331 adding, 417–418 Windows Remote Assistance, 281–285 backups, 418 Windows Remote Desktop, 278–280 deleting, 417–418 Remote Desktop, 278–280 editing, 417–418 Remote Desktop Connection dialog box, 279 names, 419 Remote Desktop in Ubuntu, 330–331 MMC (Microsoft Management Console), 416 removable drives optimizers, 74 EFS (Encrypted File System), 347–360 .REG files, 416 NTFS (New Technology File System), 347 restoring 479

removable optical discs resolution backups, 66 graphics cards, 306 removable storage Resource Monitor, 223–224, 393–395 blocking access to, 90–91 Resources By Connection command, 377 removing Resources By Type command, 377 device drivers, 190–191 Resources folder, 202, 261 registry settings, 248–249 Resources tab (Properties dialog box), 209 viruses restarting manually, 157–158 computers Ren command, 253 after software crashes, 214 repair disc . See system repair disc disabling automatic restarts, 215 repairing restore points Boot menu with bootrec .exe, 251–252 creating, 168 damage from attacks, 153–162 Restore section (Backup And Restore window), 61–62 anti-malware software, 153 restoring BIOS viruses, 159–161 Backup and Restore, 57–60 McAfee Stinger, 154–155 data onlne virus scanners, 153 with Linux distributions, 325–330 removing viruses, 157–158 with other PCs, 321–324 restoring Windows 7 from backups, 159 data rom backups, 61–62 Safe Mode, 155–156 EFS (Encrypted File System) keys, 352–354 viruses hiding, 161–162 files, 262 PCs previous versions, 163–166 system repair disc, 250–254 System File Checker, 239–240 repelling attacks, 137–144 files from backups, 61–62 Action Center, 137–138 hard disks, 4 anti-malware software, 140–144 Internet Explorer anti-virus software, 138–140 factory resetting, 235–237 reports registry, 416–417 SpinRite, 341 Windows system health reports, 397 custom installs, 315–317 rescue tools file by file, 320–321 Ashampoo WinOptimizer, 344 from backups, 313–315 GRC SpinRite, 341–343 images on other PCs, 319–321 O&O Disk Recovery, 344 Windows 7 Zinstall, 337 from backups, 159 zPOD, 320, 337–340 from system image, 63–64 Reset Internet Explorer Settings section, 235–237 repair disc, 249–254 zPOD, 338–340 480 restoring (continued)

restoring (continued) screen resolution Windows 7 from system repair disc, 64–65 graphics cards, 306 Windows 7 with System Restore, 168–169 screenshots, annotating (Problem Steps Recorder), 286 riser cards, 97 scripts Rivera, Rafael, 293 Copype .cmd, 265 Rogev Visual Basic VBScript, 259 Magic Card, 51 Search Roll Back Driver, 193–194 troubleshooting, 129–130 rolling back search engines device drivers, 193–194 Internet searches, 273 Root folder, 200 searches routers Internet blocks processes, 208 troubleshooting, 412 troubleshooters, 399 port control, 411–412 searches (Internet), 273–277 rules secpol (Security Policies) Windows Firewall, 25–26 EFS certificates, 355 managing, 405–406 sections setting Connection Security Rules, 410 registry, 414 running security Internet Explorer without add-ons, 233–234 anti-malware software . See anti-maleware software anti-spyware software, 48 S anti-virus software . See anti-virus software Safe Boot checkbox, 241–243 BitLocker, 43–47 Safe Mode, 176–177, 241–243, 243, 254 browsers, 48 repairing damage from attacks, 155–156 common Windows problems, 213 shutting down programs, 208–209 email attachments, 48 safety encryption static electricity, 304 EFS (Encrypted File System), 347–360 SATA (Serial ATA) connectors, 298–299 File Encryption Certificate Manager, 359 scanners PGP (Pretty Good Privacy), 347 virus firewalls, 47 repairing damage from attacks, 153–154 ShieldsUp! test, 402 scanning engines updates, 47 Norton Internet Security/Norton 360, 39 Windows Firewall, 401–403 /ScanOS switch, 252 Windows Remote Desktop, 278, 280 scheduling Internet, 49 Data Collector Sets, 393 Internet Explorer, 35 Scope tab (Windows Firewall With Advanced Security management panel), 406 legacy code, 35 shutting down 481

PCs, 51 Change Advanced Power Settings, 134 personal information, 144 Computer Configuration (Group Policy Editor), 87–88 phishing filters, 48 DEP (Data Execution Prevention), 382 restoring folders, 263 Group Policy Editor, 87 shopping online, 49 Previous Versions, 164 spam filters, 48 Program Compatibility Assistant, 30 User Account Control (UAC), 40–43 registry, 247, 413, 415 settings, 41–42 removing, 248–249 user errors to avoid, 47–50 User Account Control (UAC), 41–42 Windows, 35 User Configuration (Group Policy Editor), 87–88 Windows Firewall, 23–26 virtual memory, 381 Windows Update, 48 Wait To Kill Service Timeout, 132–133 Windows XP Mode, 32 Windows 7 installation Security folder, 260 changing, 8–11 Security section (Action Center), 402 Windows Firewall, 24–25 Self-Monitoring, Analysis, and Reporting Technology . Windows Firewall Advanced security, 403–411 See SMART Windows Remote Desktop, 279 Serial ATA (SATA), 298–299 Settings tab (Task Scheduler), 371 Service Pack setup troubleshooting, 130–131 EFS (Encrypted File System), 348–351 service packs Shared Folders (Computer Management Console), 90 slipstreaming, 272 Shared Folders option, 376 System File Checker, 240 shareware, 7, 75 ServiceProfiles folder, 260 Shell user folders services moving, 57–58 compared to applications and processes, 208 ShieldsUp! test, 402 Computer Management console, 378–379 shopping online definition, 208 security, 49 diagnosing with boot log, 241–243 shortcut keys, 431–437 managing, 244–246 Show Hidden Devices command, 377 recovery specialists, 344 Show Hidden Devices option, 185 shutting down, 208 shrinking turning off, 245 partitions, 55–57 Services panel, 244–246, 378–379 shutting down accessing, 244 programs settings End Process Tree option, 207 Action Center, 19 Safe Mode, 208–209 BIOS, 95–97 Windows Task Manager, 207–208 Boot Order, 64 services, 208 482 shutting down (continued)

shutting down (continued) anti-spyware, 48 software to diagnose problems, 205 anti-virus, 27–28, 38–40 Windows AVG Anti-Virus/AVG Security Suite, 140 troubleshooting, 132–133 installing after Windows 7 installation, 7 Sign of Four, 205 Malwarebytes, 39 Sisoftware Sandra, 289–290 Microsoft Security Essentials, 38, 139 size Microsoft Windows Malicious Software Removal Tool, 39 hard disks, 7 Norton Internet Security/Norton 360, 39, 140 virtual hard disks (VHD), 108 repelling attacks, 138–140 SkyDrive, 46, 62 updates, 47 sleeping options, 133–134 Windows Virtual PC, 117 slipstreamed installation DVDs Windows XP Mode, 117 creating, 263–272 Ashampoo WinOptimizer, 344 new image file creation, 270 auto-running, 76 requirements, 264 backups Windows 7 fresh install, 267–270 Backup and Restore, 61–62 Windows 7 installation DVD, 270–272 Nero, 62 WinPE (Windows Pre-Installation Environment), 264–267 NTI Shadow, 62 slipstreaming common Windows problems, 213 definition, 263 compatibility, 28–33 service packs, 272 Microsoft list, 171 SMART notifications, 173–175 (Self-Monitoring, Analysis, and Reporting Technology), 100 Program Compatibility Assistant, 29–30 smart cards Program Compatibility troubleshooter, 172–173 EFS (Encypted File System), 356–359 troubleshooting, 170–171 sockets, 94 Windows XP Mode, 175 software craplets, 211 Advanced EFS Data Recovery, 360 crashes anti-malware, 38–40, 140–144 rebooting, 214 malicious, 150–151 dupliware, 211 Malwarebytes, 39, 143 EnCase Forensic, 360 Microsoft Security Essentials, 38 GRC SpinRite, 341–343 Microsoft Windows Malicious Software Removal installing Tool, 142–143 media player software, 212 repairing attack damage, 153 software categories, 211 SpyBot Search & Destroy, 39 stability, 75 Spyware Blaster, 144 Windows functionalities, 212 Spyware Terminator, 39, 76, 143 Linux, 330–332 Windows Defender, 39, 141–142 strong passwords 483

malware SpyBot Search & Destroy, 39 installing after Windows 7 installation, 7 spyware O&O Disk Recovery, 344 anti-spyware OpenOffice, 327 Windows Defender, 26–27 Passware Kit Forensic, 364 Spyware Blaster, 144 product keys, 8 Spyware Terminator, 39, 76, 143 shareware, 7 SSDs (Solid State Disks) shutting down to diagnose problems, 205 SpinRite, 343 third-party Ssytem Recovery Options slipstreaming, 272 Windows Memory Diagnostic option, 253–254 third-party help software starting Acronis Disk Director, 292 Internet Explorer Acronis True Image, 291, 313 resetting when IE doesn’t start, 237 GoToAssist, 290 Windows 7 Norton Ghost, 291, 313 backups, 179 Paragon Partition Manager, 291 diagnostic startups, 241–243 Sisoftware Sandra, 289–290 Last Known Good Configuration, 176–177 SpinRite, 291 Safe Mode, 155–156, 176–177, 254 Windows Memory Diagnostic, 291 Startup Repair, 178–179 Windows Sysinternals, 290 troubleshooting, 131–132, 175–179 Zinstall zPOD, 290 Windows Startup Repair, 177–178 third-party rescue tools . See rescue tools Startup Repair trial version, 7 install DVDs, 178–179 trialware, 211 restoring Windows 7, 314 updates, 48 system repair disc, 178–179 after installing new software, 8 startups legacy support, 36 dual-boot systems, 6 zPOD, 320, 337–340 static electricity, 93 Software Environment (System Information tool), 225 memory cards, 97 Solid State Disks (SSDs) safety, 304 SpinRite, 343 step-by-step approach sound controllers, 183 diagnosing problems, 205–210 sound drivers unplugging hardware, 209–210 troubleshooting, 126–128 minimum Windows configuration, 206–208 spam, 146–147 storage filters, 48 backups, 66–67 spikes, 102 storing SpinRite, 291 backups, 314 Surface Analysis Monitor, 342 strong passwords, 147–148 484 subscriptions

subscriptions surge protectors, 102 Microsoft TechNet, 277–279 SuSe, 335 support switches legacy, 35–36 /FixBoot, 252 processors, 37 /FixMbr, 252 updates, 36 /ScanOS, 252 Windows 8, 203 System32 folder, 202, 258, 262 Windows XP Mode, 36–37 System and Security panel, 9 third-party software System and Security section (Action Center), 21 Acronis Disk Director, 292 System Configuration dialog box, 243 Acronis True Image, 291, 313 System File Checker, 239–240, 263 GoToAssist, 290 accessing, 239 Norton Ghost, 291, 313 creating slipstreamed installation DVDs, 263–272 Paragon Partition Manager, 291 new image file creation, 270 Sisoftware Sandra, 289–290 requirements, 264 SpinRite, 291 Windows 7 fresh install, 267–270 Windows Memory Diagnostic, 291 Windows 7 installation DVD, 270–272 Windows Sysinternals, 290 WinPE (Windows Pre-Installation Environment), 264–267 Zinstall zPOD, 290 resetting Internet Explorer, 237 third-party websites service packs, 240 Annoyances, 293 System Health Report, 226–228 ATI support, 293 system health reports, 397 Computing .net, 292 system image Gibson Research, 293 restoring Windows 7 from, 63–64 How-To Geek, 292 System Image Recovery, 179–180 Long Climb, The, 294 System Information panel, 396 MSDN, 293 System Information tool, 224–225 NVidia, 293 System Monitor Tech PC Forums, 292 Linux, 331–332 Tom’s Hardware, 292 system preferences Within Windows, 293 installing Windows 7, 7–12 Windows Help, 289 changing settings, 8–11 Windows Remote Assistance, 281–285 MSConfig, 11–12 supports System Preparation Tool window, 268, 269 legacy System Properties dialog box Windows vNext, 37–38 Advanced tab, 10 Surface Analysis Monitor, 342 System Recovery Options accessing, 250 UAC (User Account Control) 485

system repair disc, 249–254 temporary files advanced options, 250 clearing, 72–73 restoring Windows 7 from, 64–65 temproary files, 262 Startup Repair, 178–179 tests system rescue disc ShieldsUp!, 402 creating, 63–64 third parties System Restore, 166–170 slipstreaming packs, 272 configuring, 167–168 Tom’s Hardware, 292 creating restore points, 168 toolbars Previous Versions, 163–166 identifying attacks, 147–148 restoring Windows 7, 168–169 toollbars undoing changes, 169–170 malicious, 148 viruses, 161 TPM Administration link, 362 system restores Transparent Operation mode, 361 Linux distributions, 325–330 Transport Control Protocol and Internet Protocol (TCP/ IP), 406 system testers trial version software, 7 Linux, 332–333 trialware, 75, 211 system tools, 370–377 Triggers tab (Task Scheduler), 371 Event Viewer, 373–376 Trojans, 150 attaching tasks to events, 374–375 Antivirus 2010, 150 creating custom views, 375–376 troubleshooters, 398–400, 404 event log filtering, 374–375 Action Center, 194–195 Task Scheduler, 370–372 searching, 399 system tray troubleshooting exiting programs, 206–207 devices, 101 T Troubleshooting panel, 398 Task Manager, 396 TrueCrypt, 46 shutting down programs, 207–208 turning off . See disabling tasks computers after software crashes, 214 attaching to events, 374–375 EFS (Encrypted File System), 354 Task Scheduler, 370–372 Internet Explorer, 237 Task Scheduler (Computer Management console), 90–91 services, 245 tasks (Task Scheduler) Type command, 253 adding, 372 displaying, 372 U UAC (User Account Control), 30, 40–43, 79–80 exporting, 372 settings, 41–42 TCP/IP (Transport Control Protocol and Internet Protocol), 406 System Restore, 166 Tech PC Forums, 292 486 Ubuntu Linux

Ubuntu Linux, 334 upgarding accessing Windows drive, 327 compared to installing, 4–6 managing drives, 328 UPSes (uninterruptable power supplies), 102 managing partitions, 329 USB3 devices Remote Desktop, 330–331 troubleshooting, 135 restoring Windows 7, 325–330 USB Flash drives System Monitor, 331–332 encrypting with BitLocker, 43 system testers, 332–333 USB Key mode, 361 undoing User Account Control, 19 System Restore changes, 169–170 User Account Control dialog box, 80 uninstalled programs User Account Control (UAC), 30, 40–43, 79–80 removing registry settings, 248–249 settings, 41–42 uninterruptable power supplies (UPS), 102 System Restore, 166 UNIX, 203 user accounts unplugging Guest Mode, 50 devices managing, 80–86 to diagnose problems, 205 administrator passwords, 81–83 hardware, 209–210 guest accounts, 83 Update Install Parental Controls, 84–87 troubleshooting, 130–131 user acounts updates AT Service Account Configuration link, 372 anti-virus software, 47 User Authentication mode, 361 device drivers, 192–194 User Configuration section (Group Policy Editor), 87 firewalls, 47 user errors installed software, 8 security, 47–50 Internet Explorer, 238 users legacy code, 21 UAC (User Account Control), 79–80 legacy support, 36 Users folder, 200, 324 Microsoft Windows Malicious Software Removal Tool, 39, utilities . See individual names of 142–143 hardware, 211 security, 21 software, 48 V User Account Control (UAC), 40 vacuuming PCs, 98 Windows Defender, 39, 142 VBScript Windows Update, 20–23, 48, 76 registry, 417 Internet Explorer, 238 vbs files, 259 running after Windows 7 installation, 8 troubleshooting, 129 Windows Defender, 26, 142 Watson, Doctor (Sign of Four) 487

versions Windows Virtual PCs, 115–117 consumer, 199 Windows XP Mode, 36–37, 111, 115–117 control virtualization hard disks (VHD) . See also virtualization backup programs, 63 virtual machines, 103, 104 New Technology (NT), 199 virtual machines (VM) VHDs (virtual hard disks), 105–115 Zinstall, 337 booting from, 110–115 zPod, 337 creating, 105–109 zPOD, 320 installing Windows 7 on, 111–112 virtual memory names, 109 changing size, 9–10 reattaching, 110 settings, 381 size, 108 Virtual PC Management console, 117 VHDs (virtualization hard disks) . See also virtualization viruses . See also anti-virus software video cables anti-virus software, 138–140 monitors, 101 backups, 161 video controllers, 183 BIOS, 159–161 viewing email, 161 Data Collector Sets, 392 email attachments, 48 devices hidden viruses, 161–162 IRQs (interrupt requests), 209 removing extensions (file), 257 manually, 157–158 hidden files, 257 using other PCs, 158–159 Reliability History, 19 System Restore, 161 views virus scanners custom views repairing damage from attacks, 153–154 creating, 375–376 Visual Basic VBScript scripts, 259 virtual hard disks (VHD), 105–115 Visual Effects, 380–382 booting from, 110–115 VMs (virtual machines), 103, 104 creating, 105–109 Zinstall, 337 installing Windows 7 on, 111–112 zPod, 320, 337 names, 109 vNext, 37 partitions, 108 W reattaching, 110 Wait To Kill ServiceTimeout setting, 132–133 size, 108 warning beep codes (BIOS), 94, 439–445 virtualization, 103 . See also virtualization hard disks (VHD) warning triangles (Device Manager), 184 benefits, 105–106 Watson, Doctor (Sign of Four), 205 compared to dual booting, 104 Windows Virtual PC, 111 488 web browsers

web browsers Paragon Partition Manager, 291 clearing temporary files, 72–73 PC Tune-Up, 74 Google Chrome, 239 privacy, 152–153 Internet Explorer . See Internet Explorer security, 49 Mozilla Firefox, 239 Sisoftware Sandra, 289 plug-ins SkyDrive, 46 identifying attacks, 148–149 SpinRite, 291 security, 48 Tech PC Forums, 292 Web folder, 261 Tom’s Hardware, 292 web sites TrueCrypt, 46 Acronis Disk Director, 292 Windows Memory Diagnostic, 291 Acronis True Image, 291 Windows Sysinternals, 290 Advanced EFS Data Recovery, 360 Windows XP Mode, 33 Annoyances, 293 Within Windows, 293 Ashampoo Winoptimizer, 74 Zinstall, 337 ATI support, 293 Zinstall zPOD, 290 AVG Anti-Virus/AVG Security Suite, 140 websites CCleaner, 73 Microsoft Knowledge Base, 206 Computing .net, 292 WI-FI networks EnCase Forensic, 360 troubleshooting, 125 Gibson Research, 293 Wi-Fi USB dongles, 101 Gibson Research Corporation, 51 windows Glary Utilities, 73 Backup And Restore, 61–62 GoToAssist, 290 BitLocker Drive Encryption, 362 How-To Geek, 292 Command Prompt Long Climb, 294 cutting/pasting in, 114 malicious Local Group Policy Editor, 22 attacks, 149–150 Local Security Policy, 88, 355 Microsoft Answers, 276–277 Manage Add-ons, 232 Microsoft Fix it Center, 195 Performance Information and Tools, 218 Microsoft Security Essentials, 139 System Preparation Tool, 268, 269 Microsoft Support, 274–275 Windows Firewall With Advanced Security, 25–26 Microsoft TechNet, 276–277 Windows Microsoft Windows 7 Solution Center, 274–275 Blue Screen of Death (BSOD), 214–215 MSDN, 293 configuration Norton Ghost, 291 minimum configuration, 206–208 Norton Internet Security/Norton 360, 140 images NTI Shadow, 62 restoring on other PCs, 319–321 NVidia, 293 maintenance, 50 Windows 7 Disk Defragmenter dialog box 489

messages Disk Cleanup, 71–72 Actoin Center, 18 Glary Utilities, 73 restoring installing software, 75 custom installs, 315–317 PC Tune-Up, 74 file by file, 320–321 Windows Update, 76 from backups, 313–315 moving files away from, 12–13, 53–57 security, 35 Shell user folders, 57–58 Windows 1 .0, 199 shrinking/extending/creating partitions, 55–57 Windows 2 .0, 199 moving files away from Windows 7 Windows 3 .1, 199 Disk Cleanup Wizard, 53–54 Windows 7 partitions activating, 8 size, 7 backups, 14–16, 63–66 restoring common problems, 213 from backups, 159 compared to other operating systems, 202–203 from system image, 63–64 editions, 423 repair disc, 249–254 features, 425–429 zPOD, 338–340 files restoring from system repair disc, 64–65 System Restore, 166–170 shutting down files associations troubleshooting, 132–133 troubleshooting, 125–126 starting installation DVD backups, 179 creating slipstreamed installation DVDs, 270–272 diagnostic startups, 241–243 installing Last Known Good Configuration, 176–177 annual reinstallation, 77 Safe Mode, 155–156, 176–177, 254 clean installs versus upgrades, 4–6 Startup Repair, 178–179 for slipstreamed installation DVD creation, 267–270 troubleshooting, 131–132, 175–179 on VHDs (virtual hard disks), 111–112 Windows Startup Repair, 177–178 preventing problems, 4 troubleshooting when not genuine, 128 system preferences, 7–12 versions, 199 loading screen, 182 WI-FI networks troubleshooting, 135 troubleshooting, 125 maintenance writing files to disks annual reinstallation, 77 troubleshooting permission issues, 121–125 Ashampoo Winoptimizer, 74 Windows 7 certification auto-running software, 76 hardware, 75 CCleaner, 73 Windows 7 Control Panel clearing temporary files, 72–73 System and Security panel, 9 defragmenting hard disks, 69–71 Windows 7 Disk Defragmenter dialog box, 70 490 Windows 8

Windows 8 Windows NT, 199 legacy support, 203 Windows NT 3 .1, 199 Windows 95, 199 Windows NT 4 .0, 199 Windows 98, 199 Windows .old folder, 317, 317–318 Windows Backup and Restore . See Backup and Restore Windows Pre-Installation Environment (WinPE) . Windows Defender, 26–27, 39, 141–142 creating, 264–267 updates, 142 Windows registry . See registry Windows Update, 26 Windows Remote Assistance, 281–285 Windows Encrypted File System . See EFS connections, 282–286 Windows Experience Index, 218 Easy Connect, 283 Windows Firewall, 23–26, 401–403 invitations, 283 Advanced security settings, 403–411 Windows Remote Desktop, 278–280 adding Inbound rules, 406–409 firewalls, 278 adding Outbound rules, 406–409 Windows services managing firewall rules, 405–406 Computer Management console, 378–379 setting Connection Security Rules, 410 Windows Startup Repair, 177–178 advanced settings, 24–25 Windows Sysinternals, 290 Diagnose/Repair feature, 26–27 Windows System Image Backup, 314–316 port control for routers, 411–412 Windows Task Manager, 224 resetting, 404 accessing, 224 rules, 25–26 shutting down programs, 207–208 settings, 24–25 Windows Troubleshooting Platform (WTP), 293 troubleshooters, 404 Windows Update, 20–23, 48, 76 Windows Remote Desktop, 280 Group Policy, 22–23 Windows Firewall with Advanced Security (Local Security Internet Explorer, 238 Policy Editor), 89 running after Windows 7 installation, 8 Windows Firewall With Advanced Security management troubleshooting, 129 panel, 403 Windows Defender, 26, 142 Connection Security Rules, 410 Windows Virtual PC, 111–112, 115–117 managing firewall rules, 405–406 anti-virus software, 117 Monitoring option, 410–411 Windows Vista, 199 Windows Firewall With Advanced Security window, 25–26 dual-boot systems, 6 Windows folder, 200, 201 Windows vNext, 37 Windows Help, 289 Windows XP, 199 Windows Management Instrumentation (WMI), 379 BitLocker to Go, 362 registry, 417 dual-boot systems, 6 Windows Me, 199 Windows XP Mode, 31–33, 115–117, 175 Windows Memory Diagnostic, 291 anti-virus software, 117 Windows Memory Diagnostic option, 253–254 security, 32 491

virtualization, 36–37 X web site, 33 /X command, 250 Windows XP More, 111–112 Xcopy command, 253 WinPE (Windows Pre-Installation Environment) creating, 264–267 Z Zinstall, 337 winsxs folder, 259 compared to zPOD, 340 WinSxS folder, 262 zPOD, 320, 337–340 wizards Zinstall zPOD, 290 Certificate Export Wizard, 349 zPOD, 320, 337–340 Disk Cleanup, 53–54 256-bit encryption, 339 New Connection Security Rule, 410 compared to Zinstall, 340 WMI (Windows Management Instrumentation), 379 registry, 417 writing files to disk troubleshooting permission issues, 121–125 WTP (Windows Troubleshooting Platform), 293

About the Author Mike Halsey is a technical beta-tester for Microsoft, technology blogger, and teacher of English, Maths, and ICT . He was born on the borders of Surrey, Hampshire, and Berkshire (UK), and now proudly lives in an eco-home in Sheffield with his rescue border collie Jed, whom he dotes on constantly .

He has had a variety of jobs on the way to working in ICT, including spending a few years touring the UK as a club singer and having two photographic exhibitions . His first book, the self-published Windows 7 Power Users Guide, went on sale in 2009 .

Mike also writes for a variety of technology websites, including windows7news.com, windows8news.com, ghacks.net, connectedinternet.co.uk, and his own website thelongclimb.com .

Contacting the Author

Mike can be contacted through his website, www.thelongclimb.com, and is also on Face- book (mike.halsey) and Twitter (@mike_halsey) . What do you think of this book?

We want to hear from you! To participate in a brief online survey, please visit:

microsoft.com/learning/booksurvey

Tell us how well this book meets your needs­—what works effectively, and what we can do better. Your feedback will help us continually improve our books and learning resources for you.

Thank you in advance for your input!

Stay in touch! To subscribe to the Microsoft Press® Book Connection Newsletter—for news on upcoming books, events, and special offers—please visit: microsoft.com/learning/books/newsletter

SurvPage_corp.indd 1 8/14/09 4:40 AM