Abstract Functions, 281 Accelerators, 215–216 Accessibility, 57, 472–480

Total Page:16

File Type:pdf, Size:1020Kb

Abstract Functions, 281 Accelerators, 215–216 Accessibility, 57, 472–480 Chen_Rev_Index 12/6/06 11:09 AM Page 497 Index Abstract functions, 281 Application Compatibility Toolkit, 287–288 Accelerators, 215–216 Application Data vs. My Documents, 450–451 Accessibility, 57, 472–480 Application Verifier, 288 Active Accessibility feature, 480 Arithmetic library for Calc, 337 AddRef method, 274 Arrows,up-down controls,354–355 Address spaces, large, 451–455 Auto-reset events, 112–114 Adjustor thunks, 274–275 Advanced Options dialog, 2–3, 57 Background operations in power management, All Programs list, 403–404 455–457 Alt key for blinking caret, 343–344 Backward compatibility, 283 Alt+Esc hotkey, 58 16-bit DOS and Windows, 288–290 Alt+Tab order, 58–59 BIOS clock, 301–302 Always on top, 58, 436 bugs in, 293–294 Analog clocks, 51 Deer Hunter, 293 Animal-named functions, 22–23 DirectX video driver, 298–299 Animations, stealing, 305 Display Control Panel, 308–309 ANSI code page, 379–390 drive letters, 292–293 converting with Unicode, 391–392 error code, 297–298 UTF-8 as, 431–432 GetWindowText, 45–46 ANSI strings, 164 hardware, 141–142 Anti-aliased fonts, 459–462 intentional crashes, 283 Anti-piracy holograms, 25–26 listview controls, 300–301 Anti-symmetry rule, 243 operating system patches, 299–300 AOL CDs, 487 Printers Control Panel, 306–307 497 Chen_Rev_Index 12/6/06 11:09 AM Page 498 498 index Backward compatibility (Continued) BS_* button styles, 232, 234 QueryInterface, 303–305 “Bug Bunny,” 494 reserved filenames, 290–292 Bug reports, whimsical, 482–483 Shell Folders key, 294–296 Bugs undocumented behavior, 286–288 debugging as security hole, 397–398 undocumented functions, 23–24 identifying, 293–294 undocumented resources, 305 Build numbers undocumented structures, 284–286 service pack, 39–40 version numbers, 302–303 Windows 95, 38–39 visual style, 309 BUNNY function, 22–23 Balloon tips, 4, 427–428 Base addresses, DLL, 351–353 CabView PowerToy, 36 Based pointers, 401 Caches, memory leaks from, 259–266 Battery power detection, 455–457 Calc tool, unnoticed changes to, 336–337 BEAR function, 22–23 Callback functions, 23–24 Behavior, undocumented, 286–288 Cancel button Beta release numbers, 38–39 as default, 3–5 Betamax format, 249 and X buttons, 237 BIOS clock, 301–302 Caption icon, 85–86 BitBlt function, 442 Caret, blinking, 343–344 Bitmap brushes, 95–98 Carriage return (CR) in line terminators, Bitmaps on high DPI displays, 464–465 334–335 Black clock icon, 54 Cars Blank taskbar buttons, 59–60 check engine lights, 5 Blaster worm, 67 door locks, 15–16 Blinking caret, 343–344 electric, 249 Blue-screen crashes, 396–397 Case mapping, 373–375 Blue swirling arrows icon, 53 Casts to LPARAM, 321–322 BN_CLICKED notification, 236 CComPtr template, 267–269 Boeing 747, modems on, 147 CD AutoPlay PowerToy, 36 Boldface on menus, 62 CD-ROM ghost drives, 142–143 Boot sectors, Windows setup for, 409–410 CDs Booting in Windows 95, 20–22 AOL, 487 Border wars, 20 autoplay settings, 406–407 BOZOSLIVEHERE function, 24 ejecting, 408–409 Brady Bunch, The, 312 Certification process for drivers, 145–146, 397 Brickell, Edie, 28 Changes BROADCAST_QUERY_DENY value, 421 nonlocal effects of, 484–485 Broadcasting messages, 340–341 timestamp, 241–242 Brushes unnoticed, 336–337 DC, 98–100 Check engine lights, 5 hollow, 119 CheckDlgRecursion macro, 156 for tiling effects, 95–98 Class brush, 118–119, 96–97 Chen_Rev_Index 12/6/06 11:09 AM Page 499 index 499 Classic templates Content Watson, 329 16-bit, 164–172 Context menus 32-bit, 172–181 boldface on, 62 ClearType technique, 459–462 for caption icon, 85–86 Client areas timed, 138–139 in frame windows, 199–200 Contracts, interface, 245–248 sunken, 432 Control Panel applications, 245–248 Clocks and Tweak UI, 33 BIOS, 301–302 and Windows 95 installation, 34 black, 54 Controls on taskbar, 50–51 for dialogs, 202–204 painting, 89–93 focus on, 227–229 Clocks chips, overclocking, 148–150 IDs for, 225–227 CloseHandle function, 425 Converting CoCreateGuid function, 298–299 DLUs to pixels, 199, 202–203 Code bloat, 31 nonmodal dialog boxes to modal, 207–211 Code-modality vs. UI-modality, 123–126 between Unicode and ANSI, 391–392 Code pages, 379–388 Cooperative multitasking, 45 ANSI, 388 Coordinated universal time (UTC) OEM, 388–390 and BIOS clock, 301–302 Code segments, 72 and daylight saving time, 239–240 CoGetMalloc function, 324–329 Copying Color displays,monochrome text on,459–462 timestamps changes in, 241–242 Color, icon label, 56–57 when dragging files, 64–65 COLOR_WINDOW, 119 Costs, product-support, 32 Columnists, 28, 34–35, 76 CoTaskMemAlloc function, 324–329 COM objects CoUninitialize function, 268–269 layout, 272–274 Countries in geopolitics, 20, 439 teardown, 268 Covered windows, determining, 93–95 COMCTL32.DLL file, 338 CP/M operating system, 333–334 Command Prompt Here PowerToy, 36 CPU meter, 63 Comments? button, 408 CPU usage, 411–412 Commutative diagrams, 187–188 CR (carriage return) in line terminators, comp.unix.wizards problem, 490–491 334–335 Compaction process, 72 Crashes Compatibility. See Backward compatibility intentional, 283 Compatibility subsystems, 289 from uncertified drivers, 396–397 Compilers CreateActCtx function, 248 code pages with, 383 CreateDialog function, 197, 222 Visual C++. See Visual C++ compiler CreateDialogIndirectParam function, CON filename, 290–292 197–198, 206 Connectivity, network, 457–459 CreateDialogParam function, 197–198, Connectors, blowing dust out of, 68–69 213, 221 Chen_Rev_Index 12/6/06 11:09 AM Page 500 500 index CreateEvent function, 112 dialog box IDs, 232–233 CreateFile function, 331 menu commands, 62 CreateFileMapping function, 398 selectors, 319 CreateMenu function, 86–88 shell font, 412–415 CreateMutex function, 332 Ta skbar p ositi on, 4 9 –50 CreatePatternBrush function, 96–97 DefDlgProc function, 152–159, 226–227 CreatePopupMenu function, 86–88 DefDlgProcEx macro, 156 CreateProcess function, 249 Defect tracking system, 289 CreateStdAccessibleObject function, 478 DeferWindowPos function, 435–436 CreateThread function, 332 Defragmenting undefragmentable structures, 284 CreateWindowEx function, 166, 201, 203 Defrauding WHQL, 145–146 Critical sections, 110–111 DefWindowProc function, 85 CSIDL_APPDATA directory, 451 for accessibility, 479 CSIDL_LOCAL_APPDATA directory, 451 for default colors, 99 CSIDL_MYDOCUMENTS directory, 450 Delay-load feature, 418 CSRSS.EXE program, 423 DeleteObject function, 96–97 CTL3D.DLL library, 16 Deleting Ctrl+Z, 333–334 Device Manager, 65–66 Custom right-click menus, 85–86 options, 12 Customers, death threats from, 486–487 DeliverIncomingSentMessages Customized Web site icons, 62–63 pseudo-function, 360, 368, 370 DeliverMessage pseudo-function, 359–360 DAD (Desktop Applications Division), 490 Denial-of-service attacks, 393 Data tampering attacks, 393 Descriptors, 73–75 Date/Time Control Panel, 350–351 DeskMenu PowerToy, 36 Davis, Jeff, 493 Desktop Daylight saving time, 239–241 disabling, 433–434 DBCS (double byte character sets), 431 Remote Desktop Connection, 440–443 DC brush, 98–100 taskbar on, 343 DDE (Dynamic Data Exchange) window, 120–121 messages, 371 Desktop Applications Division (DAD), 490 ddeexec key, 66 Desktop composition, 95, 466–467 Death threats, 486–487 desktop.ini file Deaths from improper case mapping, 374–375 opening at logon, 55–56 Debugging for folders, 59 as security hole, 397–398 Desktop Window Manager (DWM), 95, psychic, 410–412 466–467 vtables in, 401 Destroyed windows, messages for, 139–140 Decoys, 306–309 Destroying Deer Hunter game, 293 menus, 88–89 DEFAULT_GUI_FONT font, 353–354 modal dialogs, 121–122 Defaults DestroyWindow function, 203 dialog box answers, 3–5, 151–159 Destructors, 267–272 Chen_Rev_Index 12/6/06 11:09 AM Page 501 index 501 Dev O’Day hat, 494–495 DIALOGEX resource, 187, 194, 412, 415 Device Manager, deleting, 65–66 Dictionaries, spell-checking, 27 Dialog boxes, 151 Direct Annotation feature, 480 accelerators in, 215–216 DirectX alternative designs, 154–163 DirectX 4, 330–331 controls for, 202–204 video driver interface, 298–299 focus on, 227–229 Disabled controls IDs for, 225–227 focus on, 228 converting nonmodal to modal, 207–211 X buttons, 237 creating, 197–198 Disabling default answers to, 3–5, 151–159 desktops, 433–434 default IDs for, 232–233 vs. removing, 12 DefDlgProc for, 226–227 windows, 120–122 destroying, 121–122 Discardable resources, 313 frame windows for, 198–202 Discarding code, 72 hidden, 335–336 Disco parties, 495 IsDialogMessage for, 229–236 Disk quotas, 394 loops, 204 DispatchMessage function, basic, 204–207 130–131, 214, 224–225, 365 need for, 224–225 Display Control Panel, 308–309 structure, 207 Displaying subtleties in, 211–214 pop-up windows, 471–472 navigation in, 214–215 strings, 103–110 nested, 216–224 Displays procedures, 151–163 high DPI, 462–467 resizing, 222–224 monochrome text on, 459–462 with unanswerable questions, 7, 8–9 Distribution list names, 490–491 unexpected, 3–5, 489 DLGC_* flags, 232, 233–236 Dialog templates, 163–164 DLLs. See Dynamic link libraries (DLLs) 16-bit DLUs (dialog units), 165 classic, 164–172 converting to pixels, 199, 202–203 extended, 181–187 for dialog templates, 414–415 32-bit in high DPI displays, 462 classic, 172–181 DM_GETDEFID message, 229, 232–233 extended, 187–194 DM_SETDEFID message, 227–229, 232–233 purpose, 195 Documents, printing order, 66–67 summary, 195, 196 DoesDriverSupport function, 298 Dialog units (DLUs), 165 DoModal function, 157, 208–212 converting to pixels, 199 Dongle rumor, 28 for dialog templates, 414–415 Door locks, 15–16 in high DPI displays, 462 DOS DialogBox function, 129, 208 backward compatibility for, 288–290 DialogBoxIndirectParam function, 205 code page in, 389 Chen_Rev_Index 12/6/06 11:09 AM Page 502 502 index Double byte character sets (DBCS), 431 Dynamic Data Exchange (DDE) messages, 371 Downward-pointing blue arrow icon, 53 Dynamic link libraries (DLLs) DPI in high DPI displays, 462–467 16-bit Windows resources, 314 Dr.
Recommended publications
  • Panadapter for Ft1000mp with a PMSDR and Hamradio Deluxe Cat/ Logging Application
    Panadapter for FT1000mp with a PMSDR and Hamradio deluxe Cat/ logging application Hardware and Software • PMSDR (you don’t need the switchboard plug- in!) • FT1000mp • Soundcard for the PMSDR (I use the EMU 0202 USB) • WinradHD ( now called HDSDR) • Omnirig Cat software (A COM component for transceiver/receiver CAT control) • VSPE ( virtual serial ports emulator) • Hamradio deluxe ( version 5.0 build 2837 (always use the last one)) • Tweak UI (This PowerToy gives you access to system settings that are not exposed in the Windows XP default user interface, including mouse settings, Explorer settings, taskbar settings, and more. • UHF Female (SO-239) Tee Coaxial Adapter Connector • Two phone jacks male • One BNC plug male • 3x UHF male (pl-259) • RG-8 coax To Prepare the Hardware The first two RG-8 Coax cables can be short (1 foot/30cm). Make two equal ones of them with on one end the Male Phone jack and on the other end the PL 259 connector. The length of the third cable depends of the distance between the back of your FT1000mp and the PMSDR. On one end of that last RG-8 coax cable you have to connect the BNC and on the other end the PL-259. To download the software It depends on your settings on what place the downloads will be set. All my downloads will be placed on my desktop, but most computers will place them in the map called Downloads. Download WinradHD (now called HDSDR) form this site: http://www.hdsdr.de/ Download also the latest DLL-file for Winrad from the site: http://www.iw3aut.altervista.org/ (At this time the latest one are DELL 3.3 rev2) Download Omnirig Cat from this site: http://www.dxatlas.com/OmniRig/ Download VSPE form this site: http://www.eterlogic.com/Downloads.html (Choose virtual serial ports emulator.
    [Show full text]
  • Attacker Antics Illustrations of Ingenuity
    ATTACKER ANTICS ILLUSTRATIONS OF INGENUITY Bart Inglot and Vincent Wong FIRST CONFERENCE 2018 2 Bart Inglot ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Rock Climber ◆ Globetrotter ▶ From Poland but live in Singapore ▶ Spent 1 year in Brazil and 8 years in the UK ▶ Learning French… poor effort! ◆ Twitter: @bartinglot ©2018 FireEye | Private & Confidential 3 Vincent Wong ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Baby Sitter ◆ 3 years in Singapore ◆ Grew up in Australia ©2018 FireEye | Private & Confidential 4 Disclosure Statement “ Case studies and examples are drawn from our experiences and activities working for a variety of customers, and do not represent our work for any one customer or set of customers. In many cases, facts have been changed to obscure the identity of our customers and individuals associated with our customers. ” ©2018 FireEye | Private & Confidential 5 Today’s Tales 1. AV Server Gone Bad 2. Stealing Secrets From An Air-Gapped Network 3. A Backdoor That Uses DNS for C2 4. Hidden Comment That Can Haunt You 5. A Little Known Persistence Technique 6. Securing Corporate Email is Tricky 7. Hiding in Plain Sight 8. Rewriting Import Table 9. Dastardly Diabolical Evil (aka DDE) ©2018 FireEye | Private & Confidential 6 AV SERVER GONE BAD Cobalt Strike, PowerShell & McAfee ePO (1/9) 7 AV Server Gone Bad – Background ◆ Attackers used Cobalt Strike (along with other malware) ◆ Easily recognisable IOCs when recorded by Windows Event Logs ▶ Random service name – also seen with Metasploit ▶ Base64-encoded script, “%COMSPEC%” and “powershell.exe” ▶ Decoding the script yields additional PowerShell script with a base64-encoded GZIP stream that in turn contained a base64-encoded Cobalt Strike “Beacon” payload.
    [Show full text]
  • Microsoft Patches Were Evaluated up to and Including CVE-2020-1587
    Honeywell Commercial Security 2700 Blankenbaker Pkwy, Suite 150 Louisville, KY 40299 Phone: 1-502-297-5700 Phone: 1-800-323-4576 Fax: 1-502-666-7021 https://www.security.honeywell.com The purpose of this document is to identify the patches that have been delivered by Microsoft® which have been tested against Pro-Watch. All the below listed patches have been tested against the current shipping version of Pro-Watch with no adverse effects being observed. Microsoft Patches were evaluated up to and including CVE-2020-1587. Patches not listed below are not applicable to a Pro-Watch system. 2020 – Microsoft® Patches Tested with Pro-Watch CVE-2020-1587 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2020-1584 Windows dnsrslvr.dll Elevation of Privilege Vulnerability CVE-2020-1579 Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability CVE-2020-1578 Windows Kernel Information Disclosure Vulnerability CVE-2020-1577 DirectWrite Information Disclosure Vulnerability CVE-2020-1570 Scripting Engine Memory Corruption Vulnerability CVE-2020-1569 Microsoft Edge Memory Corruption Vulnerability CVE-2020-1568 Microsoft Edge PDF Remote Code Execution Vulnerability CVE-2020-1567 MSHTML Engine Remote Code Execution Vulnerability CVE-2020-1566 Windows Kernel Elevation of Privilege Vulnerability CVE-2020-1565 Windows Elevation of Privilege Vulnerability CVE-2020-1564 Jet Database Engine Remote Code Execution Vulnerability CVE-2020-1562 Microsoft Graphics Components Remote Code Execution Vulnerability
    [Show full text]
  • The Double-Edged Sword of Backward Compatibility: the Adoption of Multi-Generational Platforms in the Presence of Intergenerational Services
    The Double-Edged Sword of Backward Compatibility: The Adoption of Multi-Generational Platforms in the Presence of Intergenerational Services Il-Horn Hann Byungwan Koh Marius F. Niculescu Robert H. Smith School of Business Haskayne School of Business Scheller College of Business University of Maryland University of Calgary Georgia Institute of Technology College Park, MD 20742 Calgary, AB T2N 1N4 Atlanta, GA 30308 [email protected] [email protected] [email protected] Information Systems Research, 2016, Vol 27(1), pp. 112-130 Permalink: http://dx.doi.org/10.1287/isre.2015.0615 Abstract We investigate the impact of the intergenerational nature of services, via backward compatibility, on the adoption of multi-generational platforms. We consider a mobile Internet platform that has evolved over several generations and for which users download complementary services from third party providers. These services are often intergenerational: newer platform generations are backward compatible with respect to services released under earlier generation platforms. In this paper, we propose a model to identify the main drivers of consumers’ choice of platform generation, accounting for (i) the migration from older to newer platform generations, (ii) the indirect network effect on platform adoption due to same-generation services, and (iii) the effect on platform adoption due to the consumption of intergenerational services via backward compatibility. Using data on mobile Internet platform adoption and services consumption for the time period of 2001 – 2007 from a major wireless carrier in an Asian country, we estimate the three effects noted above. We show that both the migration from older to newer platform generations and the indirect network effects are significant.
    [Show full text]
  • Mcafee Foundstone Fsl Update
    2017-SEP-12 FSL version 7.5.958 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 22374 - (MSPT-Sept2017) Microsoft Windows NetBIOS Remote Code Execution (CVE-2017-0161) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-0161 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Windows could lead to remote code execution. The flaw lies in NetBIOS. Successful exploitation by a remote attacker could result in the execution of arbitrary code. 22388 - (MSPT-Sept2017) Microsoft Internet Explorer Memory Corruption Remote Code Execution (CVE-2017-8749) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-8749 Description A vulnerability in some versions of Microsoft Internet Explorer could lead to remote code execution. Observation A vulnerability in some versions of Microsoft Internet Explorer could lead to remote code execution. The flaw is due to a memory corruption error. Successful exploitation by a remote attacker could result in the execution of arbitrary code. The exploit requires the user to open a vulnerable website, email or document. 22404 - (MSPT-Sep2017) Microsoft Win32k Graphics Remote Code Execution Vulnerability (CVE-2017-8682) Category: Windows Host Assessment -> Patches and Hotfixes (CATEGORY REQUIRES CREDENTIALS) Risk Level: High CVE: CVE-2017-8682 Description A vulnerability in some versions of Microsoft Windows could lead to remote code execution.
    [Show full text]
  • THE OFFICE WORKERS GUIDE to a USB THUMB DRIVE Makeuseof.Com
    THE OFFICE WORKERS GUIDE TO A USB THUMB DRIVE By: Tina Sieber MakeUseOf.com This manual is intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this guide is prohibited. P a g e 2 MakeUseOf.com | Tina Sieber THE OFFICE WORKERS GUIDE TO A USB THUMB DRIVE Table of Contents Introduction and Technical Background ............................................................................. 5 What is a USB flash drive? ................................................................................................... 5 What is a memory stick used for? ...................................................................................... 6 What should I know before buying a thumb drive? ........................................................... 7 Case:...................................................................................................................................... 7 Capacity: .............................................................................................................................. 7 Transfer rate: ......................................................................................................................... 8 What type of flash drive do I need? ................................................................................... 10 Generic ............................................................................................................................... 10 High Performance .............................................................................................................
    [Show full text]
  • NCD Thinpath PC Installation Guide and Release Notes Copyright Copyright © 2001 by Network Computing Devices, Inc
    NCD ThinPATH PC Installation Guide and Release Notes Copyright Copyright © 2001 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network Computing Devices, Inc. shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. This document contains information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Network Computing Devices, Inc. Trademarks Network Computing Devices, ThinSTAR, ThinPATH, and XRemote are registered trademarks of Network Computing Devices, Inc. Explora, Explora Pro, ECX, HMX, HMXpro, HMXpro24, WinCenter, WinCenter Pro, WinCenter Connect, NCDnet, and NCDware are trademarks of Network Computing Devices, Inc. Other product and company names mentioned herein are the trademarks of their respective owners. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. NCD cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Disclaimer THE SOFTWARE PRODUCTS ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, NCD FURTHER DISCLAIMS ALL WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY,
    [Show full text]
  • Office DDE – Code Execution Without Macros
    Cyber Threat Intelligence Report office DDe – coDe execution without macros teChniCal threat analysis Cyber Threat Intelligence (CTI) Team Telekom Security T-Systems International GmbH Contact: [email protected] Document ProPerties Version 1.1 ClassifiCation leVel Public filename CTI_Report_OFFICE_DDE_THREAT_ANALYSIS.docx Keywords Malicious office documents, DDE, dynamic data exchange Create date 11/07/2017 04:13:00 PM last Changed 13.04.2018 10:58:00 AM offiCe DDE – Code exeCution without maCros 1.1 Cyber Threat Intelligence Report office DDe – coDe execution without macros ........................................................................ 1 1 summary ............................................................................................................................ 3 2 Dynamic Data exchange (DDe) .......................................................................................... 4 3 subject of investigation .................................................................................................. 8 4 analysis ............................................................................................................................ 10 4.1 Distribution OF Locky/Trickbot ............................................................................................ 10 4.2 Distribution of Cerber .......................................................................................................... 14 4.3 Distribution of Vortex .........................................................................................................
    [Show full text]
  • Command-Line IP Utilities This Document Lists Windows Command-Line Utilities That You Can Use to Obtain TCP/IP Configuration Information and Test IP Connectivity
    Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 Command-Line IP Utilities This document lists Windows command-line utilities that you can use to obtain TCP/IP configuration information and test IP connectivity. Command parameters and uses are listed for the following utilities in Tables 1 through 9: ■ Arp ■ Ipconfig ■ Netsh ■ Netstat ■ Pathping ■ Ping ■ Route ■ Tracert ARP The Arp utility reads and manipulates local ARP tables (data link address-to-IP address tables). Syntax arp -s inet_addr eth_addr [if_addr] arp -d inet_addr [if_addr] arp -a [inet_address] [-N if_addr] [-v] Table 1 ARP command parameters and uses Parameter Description -a or -g Displays current entries in the ARP cache. If inet_addr is specified, the IP and data link address of the specified computer appear. If more than one network interface uses ARP, entries for each ARP table appear. inet_addr Specifies an Internet address. -N if_addr Displays the ARP entries for the network interface specified by if_addr. -v Displays the ARP entries in verbose mode. -d Deletes the host specified by inet_addr. -s Adds the host and associates the Internet address inet_addr with the data link address eth_addr. The physical address is given as six hexadecimal bytes separated by hyphens. The entry is permanent. eth_addr Specifies physical address. if_addr If present, this specifies the Internet address of the interface whose address translation table should be modified. If not present, the first applicable interface will be used. Pyles, Carrell, and Tittel 1 Guide to TCP/IP: IPv6 and IPv4, 5th Edition, ISBN 978-13059-4695-8 IPCONFIG The Ipconfig utility displays and modifies IP address configuration information.
    [Show full text]
  • The New York Society Library Presents: Windows XP: Tips and Tricks Ingrid Richter Head of System
    The New York Society Library Presents: Windows XP: Tips and Tricks Ingrid Richter Head of System WINDOWS XP: TIPS & TRICKS INDEX OPERATING SYSTEMS Windows XP………………………………………………………………………….. Page 03 Windows Vista………………………………………………………………………. Page 04 ADDING MORE SPACE Clean up hard drive………………………………………………………………… Page 05 Remove Programs…………………………………………………………………… Page 05 Turn off System Restore…………………………………………………………. Page 06 SPEED UP YOUR COMPUTER Remove Startup Programs……………………………………………………….. Page 07 Disable Unused Services……………………………………………………………. Page 07 Disable Indexing Service……………………………………………………………. Page 08 Remove Visual Effects………………………………………………………………… Page 08 Add Virtual Memory……………………………………………………………………. Page 09 SECURITY Upgrade to Service Pack 2………………………………………………………….. Page 10 Review Error Logs………………………………………………………………………… Page 11 TOOLS Download PowerToys…………………………………………………………………… Page 12 Kelly’s Korner………………………………………………………………………………. Page 13 Shortcut Keys……………………………………………………………………………… Page 13 Page 2 Printed: 10/20/06 WINDOWS XP: TIPS & TRICKS OPERATING SYSTEMS WINDOWS XP (HOME & PROFESSIONAL) http://www.microsoft.com/windowsxp/default.mspx Windows XP is faster than 2000 and the interface is more colorful. Windows XP comes with Movie Maker, built-in CD writer support, speech recognition, a firewall and Remote Desktop Connection, allowing you to connect to your computer remotely. You need to register your copy with Microsoft when you buy XP. There are two versions of XP on the market: Professional and Home Edition. Windows XP runs off of the NT platform. • The Desktop is the space used to run programs. My Computer (all the contents of your computer) and Recycle Bin (anything you wish to remove from your computer) will always be on the desktop. Network Neighborhood (if your computer is connected to a network) and My Documents may also be on the desktop. • The Start Menu is located in the bottom left-hand corner of the screen.
    [Show full text]
  • September 2006 If Your Browser Does Not
    September 2006 If your browser does not support HTML or you have trouble clicking on links, go to the online version of this newsletter at http://www.intellivisionlives.com/media/newsletters /current.html (type or paste this URL into your web browser if you can't click on it). COME TO THE RETROTOPIA CLASSIC GAMING PARTY SEPTEMBER 30 It's party time! In May, Intellivision sponsored a bitchin' party during E3. We called it RETROTOPIA and held it at the Arena Interactive Lounge on Santa Monica Blvd. in Los Angeles. Arena is the primo video game venue around. 50" Hi-Def TVs hooked up to PlayStation 2s and Xbox 360s. Custom vibration-feedback sofas. For the party, we added classic arcade machines and live music. It was great! It was so popular that we decided to make it a regular event, open to all classic-gaming fans. Our next Retrotopia will be September 30 at 8 PM. There will be classic console games - Intellivision, Atari 2600, Nintendo - for unlimited play on the big screens. Classic arcade machines set on free play. Plus contests and door prizes. The special musical guests will be The Megas - a Mega Man tribute band. You can check them out at myspace.com/themegas. Some of the Blue Sky Rangers will be showing up. Here's your chance to challenge them on your favorite Intellivision game. And you can try out the as-yet unreleased Intellivision Lives! for the Nintendo DS! Admission is $15, but go to retrotopia.com for a $5 discount! We hope to see you there! Not in the LA area? You can listen to the event live on allgames.com or get the podcast on their site a few days later.
    [Show full text]
  • U3-1033 Ovation Netdde Server
    Ovation NetDDE Server User Guide Section Title Page Summary of Changes Section 1. Introduction 1-1. Overview. 1-1 1-2. NetDDE Server Features. 1-1 1-3. DDE Overview . 1-2 1-3.1. Application or Service Name. 1-2 1-3.2. Topic . 1-2 1-3.3. Item . 1-3 1-3.4. Network DDE . 1-4 1-4. Limitations . 1-5 Section 2. Getting Started 2-1. Section Overview . 2-1 2-2. Requirements . 2-1 2-2.1. System . 2-1 2-2.2. Hardware . 2-1 2-2.3. Software . 2-2 2-2.4. License Server . 2-2 2-3. Setup . 2-4 2-3.1. Environment Variables Required for Setup. 2-5 2-3.2. Linked Libraries. 2-6 2-3.3. Files Installed During Setup. 2-7 2-3.4. Registry Entries . 2-8 2-3.5. Security . 2-10 2-4. Setup Procedure . 2-10 2-5. Configuration . 2-11 2-5.1. Permissions . 2-11 2-6. Un-installation. 2-11 Section 3. Using NetDDE 3-1. Section Overview . 3-1 3-2. Syntax for Calls. 3-1 Glossary Index 12/00 i U3-1033 (Rev 1) Westinghouse Process Control, Inc. Proprietary Class 2C Summary of Changes This revision of “Ovation NetDDE Server User Guide” (U3-1033) reflects the following changes: • System topic has now been changed to wwwdde_system. • DataCreate and DataOriginate topics are removed from the WDPF NetDDE Server. • The machine name must appear when the point information (or Item) link is created on the WDPF NetDDE Server machine or accessed remotely in Excel or any other DDE supported application.
    [Show full text]