WINDOWS® 8.1 in DEPTH Copyright © 2014 by Pearson Education, Inc

Total Page:16

File Type:pdf, Size:1020Kb

WINDOWS® 8.1 in DEPTH Copyright © 2014 by Pearson Education, Inc Windows® 8.1 Brian Knittel Paul McFedries 800 East 96th Street Indianapolis, Indiana 46240 WINDOWS ® 8.1 IN DEPTH Copyright © 2014 by Pearson Education, Inc. All rights reserved. No part of this book shall be reproduced, stored in a Editor-in-Chief retrieval system, or transmitted by any means, electronic, mechanical, photo- Greg Wiegand copying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information con- Executive Editor tained herein. Although every precaution has been taken in the preparation of Rick Kughen this book, the publisher and author assume no responsibility for errors or omis- sions. Nor is any liability assumed for damages resulting from the use of the Development Editor information contained herein. Todd Brakke ISBN-13: 978-0-7897-5281-9 Managing Editor ISBN-10: 0-7897-5281-6 Sandra Schroeder Library of Congress Control Number: 2014930138 Printed in the United States of America Senior Project Editor Tonya Simpson First Printing: March 2014 Trademarks Copy Editor All terms mentioned in this book that are known to be trademarks or service Cheri Clark marks have been appropriately capitalized. Que Publishing cannot attest to the Senior Indexer accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Cheryl Lenser Windows is a registered trademark of Microsoft Corporation. Technical Editor Warning and Disclaimer Karen Weinstein Every effort has been made to make this book as complete and as accurate as Editorial Assistant possible, but no warranty or fitness is implied. The information provided is on Cindy Teeters an “as is” basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages aris- Interior Designer ing from the information contained in this book. Anne Jones Special Sales For information about buying this title in bulk quantities, or for special sales Cover Designer opportunities (which may include electronic versions; custom cover designs; Matt Coleman and content particular to your business, training goals, marketing focus, or Compositor branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. Bronkella Publishing For government sales inquiries, please contact [email protected] For questions about sales outside the U.S., please contact [email protected] CONTENTS AT A GLANCE Introduction 1 I Starting Out with Windows 8.1 1 Meet Windows 8.1 7 2 Installing or Upgrading Windows 8.1 29 3 Your First Hour with Windows 8.1 59 II Using Windows 8.1 4 Using the Windows 8.1 Interface 95 5 Windows Apps and the Windows Store 131 6 Managing Files and Searching 153 7 Devices and Printers 177 8 Accessories and Accessibility 197 III Multimedia and Imaging 9 Windows Media Player 211 10 Windows Media Center 225 11 Windows and Imaging Devices 241 12 Scanning and Faxing 257 13 More Windows 8.1 Media Tools 271 IV Windows 8.1 and the Internet 14 Getting Connected 281 15 Using Internet Explorer 11 303 16 Windows 8.1 Internet Communications 331 17 Troubleshooting an Internet Connection 355 V Networking 18 Creating a Windows Network 371 19 Connecting Your Network to the Internet 415 20 Networking with Other Operating Systems 435 21 Using a Windows Network 457 22 Troubleshooting Your Network 489 VI Maintaining Windows 8.1 23 Windows Management Tools 507 24 Tweaking and Customizing Windows 557 25 Managing Hard Disks and Storage Spaces 589 26 Troubleshooting and Repairing Problems 619 27 Managing Your Software 653 28 Managing Your Hardware 667 29 Editing the Windows Registry 691 30 Command-Line and Automation Tools 711 iv Windows 8.1 In Depth VII Security 31 Protecting Windows from Viruses and Spyware 731 32 Protecting Your Data from Loss and Theft 759 33 Protecting Your Network from Hackers and Snoops 791 34 Protecting Yourself from Fraud and Spam 823 VIII Windows on the Move 35 Windows on Mobile Devices 839 36 Wireless Networking 849 37 Computing on the Road 861 38 Meetings, Conferencing, and Collaboration 889 39 Remote Desktop and Remote Access 903 Appendixes A Virtualization 925 B Command-Line Utilities 933 Index 971 Contents v CONTENTS Introduction 1 Graphics Requirements 32 Hardware Requirements for Various I Starting Out with Windows 8 Windows 8.1 Features 32 Preparing Your System: A Checklist 33 1 Meet Windows 8.1 7 Check Your System Requirements 34 An Overview of Windows 8.1 7 Back Up Your Files 34 Should I Get Windows 8.1? 11 Clean Up Your Hard Disk 34 Windows 8.1 Versions 13 Check and Defragment Your Hard Upgrading Windows 16 Disk 34 Create a System Image Backup and a What’s New in Windows 8.1? 18 System Repair Disc 35 A Tale of Two Windows: The Start Screen Versus the Desktop 18 Installing Windows 8.1 36 Touch-a Touch-a Touch-a Touch Me! 19 Upgrading to Windows 8.1 39 Windows 8–Style Apps 20 Upgrading from Windows 8 39 Charmed, I’m Sure 20 Upgrading from Windows 7 40 Online User Accounts 21 Running the Upgrade 40 File Explorer Ribbon 21 The Windows Store 22 Dual- (and Multi-) Booting Windows 8.1 42 Management Tools 23 Dual-Booting Windows 8.1 43 Installation and Setup 24 Multi-Booting with Three or More Storage Spaces 24 Operating Systems 44 Improved Web Browsing with Internet Using Windows Boot Manager 44 Explorer 11 24 Faster Startup 25 Customizing the Boot Configuration Secure Boot 25 Data 46 Integrated Cellular Data Connections 26 Using Windows Boot Manager to Modify What Changed Between Windows 8 and the BCD 47 8.1 26 Using Startup and Recovery to Modify the BCD 47 Life Without the Start Menu 27 Using the System Configuration Utility to Modify the BCD 48 2 Installing or Upgrading Using BCDEDIT to Customize the Startup Windows 8.1 29 Options 51 Windows 8.1 System Requirements 29 Installing Windows 8.1 Components 56 Processor Requirements 30 Memory Requirements 30 Storage Requirements 31 vi Windows 8.1 In Depth 3 Your First Hour with Windows 8.1 59 If You’re Moving to Windows 8.1 from XP 88 The First Things to Do After Starting Control Panel Wordiness 88 Windows 8.1 59 Where’s My Stuff? The User Profile Structure 88 A Quick Tour of the Important Windows 8.1 Compatibility and Virtualization 90 Features 60 User Account Control 91 The Lock and Sign On Screens 60 The New Taskbar 93 The Start Screen 62 Jumplists 94 Windows 8–Style Apps (Don’t Call It Metro) 63 Using the Charms 63 Part II: Using Windows 8.1 The Touch Tour 65 Important Keyboard Shortcuts 66 4 Using the Windows 8.1 Interface 95 The Desktop, or Who Moved My Start Menu? 66 Taking a Tour of the Windows 8.1 Windows Explorer Is Now Called File Interface 95 Explorer 67 The App Bar 97 Search Before You Look 69 The Charms Menu 99 Getting to the Management Tools 69 Navigating the Start Screen 100 Setting Up User Accounts 71 Navigating the Start Screen with a Microsoft Versus Local Accounts 71 Mouse 101 Create New Accounts 72 Navigating the Start Screen with a Change Account Settings 74 Keyboard 102 Before You Forget Your Password 75 Navigating the Start Screen with a Touch Just One User? 76 Interface 104 Downloading Critical Updates 76 Working with Running Apps 106 Snapping an App 106 Personalizing Windows 8.1 77 Switching Between Running Apps 108 Personalize Screen Settings 77 Shutting Down an App 109 Tune Up the Taskbar 78 Important Adjustments and Tweaks 78 Working with Notifications 110 Transferring Information from Your Old Searching via the Start Screen 111 Computer 80 Windows Easy Transfer 80 Customizing the Start Screen 113 Resizing a Tile 113 How the Heck Do I Shut This Thing Moving a Tile 114 Off? 84 Creating an App Group 114 Turning Off a Live Tile 116 More Than You Wanted to Know 85 Pinning a Program to the Start After You Forget Your Password 85 Screen 117 Using a Password Reset Disk 87 Pinning a Website to the Start Accessing the Real Administrator Screen 117 Account 87 Displaying the Administrative Tools on the Apps Screen 117 Contents vii Adding Shutdown and Restart Tiles to Video 148 the Start Screen 119 Weather 149 Customizing the Start Screen Background 121 Installing Apps from the Windows Store 149 Customizing the Lock Screen 122 Uninstalling Apps 150 Customizing the Lock Screen Background 122 Sharing App Data 150 Controlling the Apps Displayed on the Lock Screen 123 6 Managing Files and Searching 153 Disabling the Lock Screen 124 Understanding File Types 153 Bypassing the Start Screen 125 File Types and File Extensions 153 Booting Directly to the Desktop 125 File Types and the Registry 154 Accessing Start Menu Items from the Taskbar 126 Navigating the Windows 8.1 Folder Pinning a Program to the Taskbar 126 Windows 156 Using Desktop Programs as the Folder Navigation 157 Defaults 128 Instant Search 158 The Ribbon 158 5 Windows Apps and the Windows The Navigation Pane 158 Store 131 Basic File and Folder Chores: The The Windows Apps 131 Techniques Used by the Pros 159 Calendar 133 Selecting Files with Check Boxes 159 Camera 134 Resolving File Transfer Conflicts 161 Desktop 134 Expert Drag-and-Drop Techniques 162 Finance 135 Taking Advantage of the Send To Food & Drink 136 Command 162 Games 136 The Recycle Bin: Deleting and Health & Fitness 137 Recovering Files and Folders 163 Internet Explorer 137 File Maintenance Using the Open and Mail 139 Save As Dialog Boxes 165 Maps 139 Metadata and the File Explorer Property Music 140 System 166 News 141 Desktop Searching 168 People 142 As-You-Type Searches with Instant Photos
Recommended publications
  • Usporedba Linux I Microsoft Poslužiteljske Infrastrukture Kao Potpore Poslovanju Malih Tvrtki
    USPOREDBA LINUX I MICROSOFT POSLUŽITELJSKE INFRASTRUKTURE KAO POTPORE POSLOVANJU MALIH TVRTKI Stanešić, Josip Undergraduate thesis / Završni rad 2020 Degree Grantor / Ustanova koja je dodijelila akademski / stručni stupanj: Algebra University College / Visoko učilište Algebra Permanent link / Trajna poveznica: https://urn.nsk.hr/urn:nbn:hr:225:716198 Rights / Prava: In copyright Download date / Datum preuzimanja: 2021-10-02 Repository / Repozitorij: Algebra Univerity College - Repository of Algebra Univerity College VISOKO UČILIŠTE ALGEBRA ZAVRŠNI RAD Usporedba Linux i Microsoft poslužiteljske infrastrukture kao potpore poslovanju malih tvrtki Josip Stanešić Zagreb, veljača 2020. Pod punom odgovornošću pismeno potvrđujem da je ovo moj autorski rad čiji niti jedan dio nije nastao kopiranjem ili plagiranjem tuđeg sadržaja. Prilikom izrade rada koristio sam tuđe materijale navedene u popisu literature, ali nisam kopirao niti jedan njihov dio, osim citata za koje sam naveo autora i izvor, te ih jasno označio znakovima navodnika. U slučaju da se u bilo kojem trenutku dokaže suprotno, spreman sam snositi sve posljedice, uključivo i poništenje javne isprave stečene dijelom i na temelju ovoga rada. U Zagrebu 1. veljače 2020. Josip Stanešić Predgovor Želio bih se zahvaliti svom mentoru i profesoru Vedranu Dakiću, profesorima Silviju Papiću i Jasminu Redžepagiću kao i svim ostalim profesorima na uloženom trudu, prenesenom znanju i odličnom preddiplomskom studiju. Također se želim zahvaliti obitelji na svoj podršci pruženoj tijekom studija. Prilikom uvezivanja rada umjesto ove stranice ne zaboravite umetnuti original potvrde o prihvaćanju teme završnog rada kojeg ste preuzeli u studentskoj referadi Sažetak Male tvrtke osnova su ekonomije Europe. U suvremenom poslovanju IT tehnologija i samim time IT infrastruktura nužni su za poslovanje čak i u tvrtkama kojima osnovna djelatnost nije u području informacijsko-komunikacijskih tehnologija.
    [Show full text]
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Microsoft Security Intelligence Report
    Microsoft Security Intelligence Report Volume 20 | July through December, 2015 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. This document is provided “as-is.” Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Copyright © 2016 Microsoft Corporation. All rights reserved. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Authors Charlie Anthe Dana Kaufman Anthony Penta Cloud and Enterprise Security Azure Active Directory Team Safety Platform Nir Ben Zvi Nasos Kladakis Ina Ragragio Enterprise and Cloud Group Azure Active Directory Team Windows and Devices Group Patti Chrzan Daniel Kondratyuk Tim Rains Microsoft Digital Crimes Unit Azure Active Directory Team Commercial Communications Bulent Egilmez Andrea Lelli Paul Rebriy Office 365 - Information Windows Defender Labs Bing Protection Geoff McDonald Stefan Sellmer Elia Florio Windows Defender Labs Windows Defender Labs Windows Defender Labs Michael McLaughlin Mark Simos Chad Foster Identity Services Enterprise Cybersecurity Bing Group Nam Ng Roger Grimes Enterprise Cybersecurity Vikram Thakur Microsoft IT Group Windows Defender Labs Paul Henry Niall O'Sullivan Alex Weinert Wadeware LLC Microsoft Digital Crimes Unit Azure Active Directory Team Beth Jester Daryl Pecelj Terry Zink Windows Defender Microsoft IT Information
    [Show full text]
  • Mac OS X Server Administrator's Guide
    034-9285.S4AdminPDF 6/27/02 2:07 PM Page 1 Mac OS X Server Administrator’s Guide K Apple Computer, Inc. © 2002 Apple Computer, Inc. All rights reserved. Under the copyright laws, this publication may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Computer, Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Apple, the Apple logo, AppleScript, AppleShare, AppleTalk, ColorSync, FireWire, Keychain, Mac, Macintosh, Power Macintosh, QuickTime, Sherlock, and WebObjects are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. AirPort, Extensions Manager, Finder, iMac, and Power Mac are trademarks of Apple Computer, Inc. Adobe and PostScript are trademarks of Adobe Systems Incorporated. Java and all Java-based trademarks and logos are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Netscape Navigator is a trademark of Netscape Communications Corporation. RealAudio is a trademark of Progressive Networks, Inc. © 1995–2001 The Apache Group. All rights reserved. UNIX is a registered trademark in the United States and other countries, licensed exclusively through X/Open Company, Ltd. 062-9285/7-26-02 LL9285.Book Page 3 Tuesday, June 25, 2002 3:59 PM Contents Preface How to Use This Guide 39 What’s Included
    [Show full text]
  • Windows Server 2012 R2 Directaccess
    Windows Server 2012 R2 DirectAccess Deployment Guide UPDATED: 25 March 2021 Windows Server 2012 R2 DirectAccess Copyright Notices Copyright © 2002-2021 Kemp Technologies, Inc. All rights reserved. Kemp Technologies and the Kemp Technologies logo are registered trademarks of Kemp Technologies, Inc. Kemp Technologies, Inc. reserves all ownership rights for the LoadMaster and Kemp 360 product line including software and documentation. Used, under license, U.S. Patent Nos. 6,473,802, 6,374,300, 8,392,563, 8,103,770, 7,831,712, 7,606,912, 7,346,695, 7,287,084 and 6,970,933 kemp.ax 2 Copyright 2002-2021, Kemp Technologies, All Rights Reserved Windows Server 2012 R2 DirectAccess Table of Contents 1 Introduction 5 1.1 Document Purpose 5 1.2 Intended Audience 5 1.3 Related Firmware Version 5 1.4 About the Author 6 1.5 Assumptions 6 2 Load Balancing DirectAccess 7 2.1 Example Environment Setup 8 2.2 Prerequisites 9 3 Virtual Service Configuration 10 3.1 Enable Subnet Originating Requests Globally 10 3.2 Configure DirectAccess for Load Balancing 11 3.3 Configure the Servers Virtual Services 11 3.3.1 Configure a DirectAccess Server Virtual Service 12 3.3.2 Configure an Additional Virtual Service for the DirectAccess Server 13 3.3.3 Configure a Network Location Server (NLS) Virtual Service 14 3.3.4 Configure an NLS (Offloaded) Virtual Service 15 3.4 Configure DirectAccess to use a Load-Balanced NLS 17 3.5 Configure Geographic Load Balancing for NLS 18 4 Multisite Configuration and Load Balancing 22 4.1 Configure DirectAccess for Multisite 22 kemp.ax
    [Show full text]
  • Windows 8 Intermediate Training Course Outline
    Phone: 0800 003150 Email: [email protected] This course is designed for those who have a basic knowledge of Windows 8, the latest version of Microsoft’s Windows operating system, and want to expand on it. Windows 8 Intermediate Training Course provides development of knowledge and skills in the new features of Windows 8 and enhancements of old ones so that participants enjoy enhanced use of the operating system. Course Length: 1.0 days Advanced users of Windows 8 may consider our Windows 8 Advanced Training Course. This highly valuable and dynamic training course is now available New Zealand wide including Auckland, Wellington, Christchurch. Windows 8 Intermediate Training Course Outline Foreword: This intermediate training course in Windows 8 provides participants with skills in customising Windows 8, customising the Start screen and Lock screen, changing settings, working with tiles, using the Music app and Video app, using basic Windows desktop applications, and more. This comprehensive course helps participants use all the basic and enhanced features of Windows 8 expertly. Outcomes: This short, extensive course is the fastest way to develop a deep understanding and skills in using Windows 8. After completing this course, participants will have achieved mastery in: Customising title display Working with titles Modifying the start screen Customising the lock screen, search settings, privacy and sharing settings, and password settings Using the video app, music app and camera app Games app Using Windows media player Understanding
    [Show full text]
  • F5 and Windows Server 2012 Directaccess/Remote Access Services
    White Paper F5 and Windows Server 2012 DirectAccess/Remote Access Services The F5 BIG-IP platform provides high availability, performance, and scalability when used to deliver traffic management and load balancing for the Microsoft Windows Server 2012 Remote Access Solutions: DirectAccess and Remote Access Services. by Ryan Korock Technical Director, Microsoft Solutions White Paper F5 and Windows Server 2012 Direct Access/Remote Access Services Contents Introduction 3 Benefits of Using F5 Products with DirectAccess and VPN 3 Architecture 4 A DirectAccess/VPN Server Front End 5 A Layered Approach with DirectAccess/VPN Servers 5 Dual Interface Vs. Single Interface DirectAccess/VPN Deployments 6 Single Site Vs. Multisite Deployment 8 Conclusion 9 2 White Paper F5 and Windows Server 2012 Direct Access/Remote Access Services Introduction For Windows 8 and Windows Server 2012, Microsoft has taken two remote access technologies found in previous versions of Windows Server, DirectAccess and VPN Server, and pulled them under the same management umbrella called simply Remote Access. F5 technologies can be deployed to manage traffic and balance loads on these services. Originally introduced in Windows Server 2008 R2 and Windows 7, DirectAccess shifted previous remote access technology. Unlike traditional VPNs, in which connections have been manually initiated at the user level, DirectAccess makes use of a seamless, system-level connection. This means that remote, domain-joined systems will automatically and securely build a corporate network presence upon boot. VPN, formerly known as Remote Access Services (RAS), was introduced in Windows NT and includes the traditional Windows VPN technologies, including IKEv2, SSTP, PPTP, and L2TP. Windows Server 2012 customers can deploy DirectAccess, VPN, or both, and it is often beneficial to deploy both.
    [Show full text]
  • AWS Site-To-Site VPN User Guide AWS Site-To-Site VPN User Guide
    AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN User Guide AWS Site-to-Site VPN: User Guide Copyright © Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon. AWS Site-to-Site VPN User Guide Table of Contents What is Site-to-Site VPN ..................................................................................................................... 1 Concepts ................................................................................................................................... 1 Working with Site-to-Site VPN ..................................................................................................... 1 Site-to-Site VPN limitations ......................................................................................................... 2 Pricing ...................................................................................................................................... 2 How AWS Site-to-Site VPN works ........................................................................................................ 3 Site-to-Site VPN Components .....................................................................................................
    [Show full text]
  • Solarwinds Engineer's Toolset Administrator Guide
    SolarWinds Engineer's Toolset Version 11.0.3 Administrator Guide Last Updated: Friday, August 19, 2016 © 2016 SolarWinds Worldwide, LLC. All rights reserved. This document may not be reproduced by any means nor modified, decompiled, disassembled, published or distributed, in whole or in part, or translated to any electronic medium or other means without the prior written consent of SolarWinds. All right, title, and interest in and to the software and documentation are and shall remain the exclusive property of SolarWinds and its respective licensors. SOLARWINDS DISCLAIMS ALL WARRANTIES, CONDITIONS OR OTHER TERMS, EXPRESS OR IMPLIED, STATUTORY OR OTHERWISE, ON SOFTWARE AND DOCUMENTATION FURNISHED HEREUNDER INCLUDING WITHOUT LIMITATION THE WARRANTIES OF DESIGN, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, AND NONINFRINGEMENT. IN NO EVENT SHALL SOLARWINDS, ITS SUPPLIERS, NOR ITS LICENSORS BE LIABLE FOR ANY DAMAGES, WHETHER ARISING IN TORT, CONTRACT OR ANY OTHER LEGAL THEORY EVEN IF SOLARWINDS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. The SolarWinds and other SolarWinds marks, identified on the SolarWinds website, as updated from SolarWinds from time to time and incorporated herein, are registered with the U.S. Patent and Trademark Office and may be registered or pending registration in other countries. All other SolarWinds trademarks may be common law marks or registered or pending registration in the United States or in other countries. All other trademarks or registered trademarks contained and/or mentioned herein are
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • Factorytalk Linx Getting Results Guide
    FactoryTalk Linx Getting Results Guide Rockwell Automation Publication LNXENT-GR001V-EN-E - March 2021 Supersedes Publication LNXENT-GR001U-EN-E - September 2020 Getting Results Original Instructions FactoryTalk Linx Getting Results Guide Important User Information Read this document and the documents listed in the additional resources section about installation, configuration, and operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards. Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by suitably trained personnel in accordance with applicable code of practice. If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be impaired. In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this equipment. The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and diagrams. No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this manual. Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited. Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
    [Show full text]
  • Program Name Run Command About Windows Winver Add a Device
    List of Run Commands in Win7/8 to Windows Managment By Shree Krishna Maharjan in some commands need to use .msc Program Name Run Command About Windows winver Add a Device devicepairingwizard Add Hardware Wizard hdwwiz Advanced User Accounts netplwiz Authorization Manager azman Backup and Restore sdclt Bluetooth File Transfer fsquirt Calculator calc Certificates certmgr Change Computer Performance Settings systempropertiesperformance Change Data Execution Prevention Settings systempropertiesdataexecutionprevention Change Printer Settings printui Character Map charmap ClearType Tuner cttune Color Management colorcpl Command Prompt cmd Component Services comexp Component Services dcomcnfg Computer Management compmgmt.msc Computer Management compmgmtlauncher Connect to a Network Projector netproj Connect to a Projector displayswitch Control Panel control Create A Shared Folder Wizard shrpubw Create a System Repair Disc recdisc Credential Backup and Restore Wizard credwiz Data Execution Prevention systempropertiesdataexecutionprevention Default Location locationnotifications Device Manager devmgmt.msc Device Pairing Wizard devicepairingwizard Diagnostics Troubleshooting Wizard msdt Digitizer Calibration Tool tabcal DirectX Diagnostic Tool dxdiag Disk Cleanup cleanmgr Disk Defragmenter dfrgui Disk Management diskmgmt.msc Display dpiscaling Display Color Calibration dccw Display Switch displayswitch DPAPI Key Migration Wizard dpapimig Driver Verifier Manager verifier Ease of Access Center utilman EFS REKEY Wizard rekeywiz Encrypting File System
    [Show full text]