Administrator's Pocket Consultant

Total Page:16

File Type:pdf, Size:1020Kb

Administrator's Pocket Consultant spine = 1.63” Windows® 7 About the Author William R. Stanek is a Microsoft® ADMINISTRATOR’S POCKET CONSULTANT Most Valuable Professional with 20+ years of experience in systems The practical, portable guide to Windows 7! management and advanced Windows 7 programming. He is an award- Consultant Pocket Administrator’s Portable and precise, this pocket-sized guide delivers ® winning author who’s written more ready answers for administering computers running than 100 books, including Windows Windows 7. Zero in on core commands and techniques Server® 2008 Inside Out. He is the using quick-reference tables, instructions, and lists. series editor for the Administrator’s You’ll get the focused information you need to save Pocket Consultant line of books. Windows 7 time and get the job done—whether at your desk or in the fi eld. Get fast facts to: • Manage system confi guration, startup, and boot • Deploy and customize the operating system • Confi gure Group Policy settings and preferences • Install hardware devices and drivers • Administer disks, fi le systems, and storage MORE RESOURCES FOR IT PROFESSIONALS • Set up and troubleshoot TCP/IP networking • Confi gure RAS, mobile, and wireless connectivity Windows Server 2008 Inside Out • Manage access, security, and availability for shared William R. Stanek resources ISBN 9780735624382 • Use remote management and remote assistance • Defi nitive, in-depth reference ® capabilities • Hundreds of timesaving solutions • Scripts, job aids, eBook on CD • Manage TPM and BitLocker ® Drive Encryption • Troubleshoot and resolve system issues See inside cover William R. Stanek Author and Series Editor microsoft.com/mspress Stanek ISBN: 978-0-7356-2699-7 90000 U.S.A. $34.99 [Recommended] Administrator’s Operating Systems/ 9 780735 626997 Part No. X15-74131 Part Windows Pocket Consultant Cyan Magenta Yellow Black Windows® 7 Administrator’s Pocket Consultant William R. Stanek A01T_626997.indd 1 07/20/09 3:40:31 PM PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2010 by William Stanek All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Library of Congress Control Number: 2009932696 Printed and bound in the United States of America. 1 2 3 4 5 6 7 8 9 QWE 4 3 2 1 0 9 Distributed in Canada by H.B. Fenn and Company Ltd. A CIP catalogue record for this book is available from the British Library. Microsoft Press books are available through booksellers and distributors worldwide. For further infor­mation­about­international­editions,­contact­your­local­Microsoft­Corporation­office­or­contact­ Microsoft Press International directly at fax (425) 936-7329. Visit our Web site at www.microsoft. com/mspress. Send comments to [email protected]. Microsoft, Microsoft Press, Active Desktop, Active Directory, ActiveX, Aero, Authenticode, BitLocker, DirectX, Excel, Internet Explorer, MS, MS-DOS, MSN, Outlook, PowerPoint, ReadyBoost, ReadyDrive, SuperFetch, Visual Basic, Visual Studio, Win32, Windows, Windows Media, Windows NT, Windows PowerShell, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The example companies, organizations, products, domain names, e-mail addresses, logos, people,­places,­and­events­depicted­herein­are­fictitious.­No­association­with­any­real­company,­ organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. Acquisitions Editor: Juliana Aldous Developmental Editor: Karen Szall Project Editor: Carol Vu Editorial Production: Publishing.com Technical Reviewer: Jim Johnson; Technical Review services provided by Content Master, a member of CM Group, Ltd. Cover: Tom Draper Design Body Part No. X15-74130 A02L_626997.indd 2 07/20/09 3:43:24 PM Contents Introduction xix Chapter 1 Introduction to Windows 7 Administration 1 Getting Started with Windows 7 . 2 Understanding 64-Bit Computing . 8 Installing Windows 7 . 10 Preparing for Windows 7 Installation 10 Performing a Windows 7 Installation 12 Running Windows 7 . 15 Using Action Center and Activating Windows 17 Running Windows 7 in Groups and Domains 20 Power Plans, Sleep Modes, and Shutdown 25 Windows 7 Architecture . 27 Chapter 2 Deploying Windows 7 37 Working with Windows PE . 37 Understanding Windows PE 38 Configuring Windows PE 40 Preparing a Build Environment 41 Creating a Build: The Essentials 47 Creating a Bootable USB Flash Drive 55 Booting to an Image from a Hard Disk 56 Adding Windows PE Images to Windows Deployment Services 57 Working with Windows RE . 58 Creating a Customized Windows RE Image 58 Creating Windows RE Recovery Media 59 What do you think of this book? We want to hear from you! Microsoft is interested in hearing your feedback so we can continually improve our books and learning resources for you. To participate in a brief online survey, please visit: microsoft.com/learning/booksurvey iii A03C_626997.indd 3 07/24/09 5:06:24 PM Adding Windows RE Images to Windows Deployment Services 60 Deploying Windows with a Customized Windows RE 61 Creating Windows Images for Deployment . 65 Understanding Windows Imaging 65 Creating a Windows Install Image 67 Configuring and Using Windows Deployment Services . 71 Setting Up Windows Deployment Services 71 Importing Images 73 Installing Windows from an Image 74 Capturing Images 75 Managing Access and Prestaging Computers 76 Customizing Windows Images 78 Chapter 3 Configuring User and Computer Policies 83 Group Policy Essentials . 83 Accessing and Using Local Group Policies 85 Accessing and Using Site, Domain, and Organizational Unit Policies 88 Configuring Policies . 90 Viewing Policies and Templates 90 Enabling, Disabling, and Configuring Policies 91 Adding or Removing Templates 92 Working with File and Data Management Policies . 92 Configuring Disk Quota Policies 92 Configuring System Restore Policies 95 Configuring Offline File Policies 95 Working with Access and Connectivity Policies . 102 Configuring Network Policies 102 Configuring Remote Assistance Policies 104 Working with Computer and User Script Policies . 106 Controlling Script Behavior Through Policy 106 Assigning Computer Startup and Shutdown Scripts 108 Assigning User Logon and Logoff Scripts 109 iv Contents A03C_626997.indd 4 07/24/09 5:06:24 PM Working with Logon and Startup Policies . 109 Using Classic Logon vs . Simple Logon 110 Setting Policy-Based Startup Programs 111 Disabling Run Lists Through Policy 111 Chapter 4 Automating Windows 7 Configuration 113 Understanding Group Policy Preferences . 113 Configuring Group Policy Preferences . 115 Working with Management Actions 115 Working with Editing States 117 Working with Alternative Actions and States 119 Managing Preference Items . 120 Creating and Managing a Preference Item 120 Setting Common Tab Options 121 Chapter 5 Managing User Access and Security 125 Understanding User and Group Accounts . 125 Local User Account Essentials 126 Group Account Essentials 128 Domain vs . Local Logon 130 Managing User Account Control and Elevation Prompts . 131 Redefining Standard User and Administrator User Accounts 131 Optimizing User Account Control and Admin Approval Mode 133 Managing Local Logon . 137 Creating Local User Accounts in a Homegroup or Workgroup 137 Granting Access to an Existing Domain Account to Allow Local Logon 138 Changing Local User Account Types 139 Creating Passwords for Local User Accounts 140 Recovering Local User Account Passwords 141 Controlling Logon: Welcome Screens and Classic Logons 142 Contents v A03C_626997.indd 5 07/24/09 5:06:24 PM Removing Accounts and Denying Local Access to Workstations 144 Managing Stored Credentials . 144 Adding Windows or Generic Credentials 145 Adding Certificate-Based Credentials 147 Editing Windows Vault Entries 147 Backing Up and Restoring the Windows Vault 148 Removing Windows Vault Entries 149 Managing Local User Accounts and Groups . 149 Creating Local User Accounts 150 Creating Local Groups for Workstations 152 Adding and Removing Local Group Members 154 Enabling or Disabling Local User Accounts 155 Creating a Secure Guest Account 156 Renaming Local User Accounts and Groups 157 Deleting Local User Accounts and Groups 158 Managing Remote Access to Workstations . 159 Configuring Remote Assistance 160 Configuring Remote Desktop Access 162 Making Remote Desktop Connections 165 Chapter 6 Configuring Windows 7 Computers 167 Supporting Computers Running Windows 7 . 168 Working with the Computer Management Console 168 Getting Basic System and Performance Information 170 Getting Advanced System Information 175 Working with WMI Control 176 Using System Support Tools . 179 Working with Disk Cleanup 180 Verifying System Files with File Signature Verification 182 Managing System Configuration, Startup, and Boot 184 Managing System Properties . 190 The Computer Name Tab 190 The Hardware Tab 192 The Advanced Tab 192 vi Contents A03C_626997.indd 6
Recommended publications
  • Network Printing Guide
    Network Printing Guide Windows 95/98/Me Configuration Windows 2000 Configuration Windows XP Configuration Windows NT 4.0 Configuration NetWare Configuration Macintosh Configuration Appendix For safe and correct use of this machine, please be sure to read the Safety Information in the Operating Instructions that comes with the machine before you use it. Introduction To get maximum versatility from this machine all operators should carefully read and follow the instruc- tions in this manual. Please keep this manual in a handy place near the machine. Important Contents of this manual are subject to change without prior notice. In no event will the company be li- able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper- ating the machine. Software Version Conventions Used in this Manual • NetWare 3.x means NetWare 3.12 and 3.2. • NetWare 4.x means NetWare 4.1, 4.11 and IntranetWare. Trademarks Apple, AppleTalk, EtherTalk, LaserWriter, Macintosh and Mac are registered trademarks of Apple Computer, Inc. Ethernet is a registered trademark of Xerox Corporation. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation in the United States and/or other countries. Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corpora- tion. Novell, NetWare and NDS are registered trademarks of Novell, Inc. PostScript is a registered trademark of Adobe Systems, Incorporated. Sun is a registered trademark of Sun Microsystems, Inc. SunOS is a trademark of Sun Microsystems, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies.
    [Show full text]
  • Windows 7 Operating Guide
    Welcome to Windows 7 1 1 You told us what you wanted. We listened. This Windows® 7 Product Guide highlights the new and improved features that will help deliver the one thing you said you wanted the most: Your PC, simplified. 3 3 Contents INTRODUCTION TO WINDOWS 7 6 DESIGNING WINDOWS 7 8 Market Trends that Inspired Windows 7 9 WINDOWS 7 EDITIONS 10 Windows 7 Starter 11 Windows 7 Home Basic 11 Windows 7 Home Premium 12 Windows 7 Professional 12 Windows 7 Enterprise / Windows 7 Ultimate 13 Windows Anytime Upgrade 14 Microsoft Desktop Optimization Pack 14 Windows 7 Editions Comparison 15 GETTING STARTED WITH WINDOWS 7 16 Upgrading a PC to Windows 7 16 WHAT’S NEW IN WINDOWS 7 20 Top Features for You 20 Top Features for IT Professionals 22 Application and Device Compatibility 23 WINDOWS 7 FOR YOU 24 WINDOWS 7 FOR YOU: SIMPLIFIES EVERYDAY TASKS 28 Simple to Navigate 28 Easier to Find Things 35 Easy to Browse the Web 38 Easy to Connect PCs and Manage Devices 41 Easy to Communicate and Share 47 WINDOWS 7 FOR YOU: WORKS THE WAY YOU WANT 50 Speed, Reliability, and Responsiveness 50 More Secure 55 Compatible with You 62 Better Troubleshooting and Problem Solving 66 WINDOWS 7 FOR YOU: MAKES NEW THINGS POSSIBLE 70 Media the Way You Want It 70 Work Anywhere 81 New Ways to Engage 84 INTRODUCTION TO WINDOWS 7 6 WINDOWS 7 FOR IT PROFESSIONALS 88 DESIGNING WINDOWS 7 8 WINDOWS 7 FOR IT PROFESSIONALS: Market Trends that Inspired Windows 7 9 MAKE PEOPLE PRODUCTIVE ANYWHERE 92 WINDOWS 7 EDITIONS 10 Remove Barriers to Information 92 Windows 7 Starter 11 Access
    [Show full text]
  • Login with Amazon Developer Guide for Websites
    Login with Amazon Developer Guide for Websites Login with Amazon: Developer Guide for Websites Copyright © 2017 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates. All other trademarks not owned by Amazon are the property of their respective owners Contents Welcome .................................................................................................................................................. 2 How Do I...? .............................................................................................................................................. 2 Understanding Login with Amazon ........................................................................................................... 3 Login with Amazon Conceptual Overview ................................................................................................. 4 Single Sign-On (SSO) for Web ................................................................................................................. 6 Single Sign-On (SSO) for Mobile ............................................................................................................. 7 Access Token ............................................................................................................................................ 7 Authorization Code ................................................................................................................................... 7 Refresh Token ..........................................................................................................................................
    [Show full text]
  • Arc Hydro Geoprocessing Tools - Tutorial
    Arc Hydro Geoprocessing Tools - Tutorial Version 2.0 – October 2011 ESRI 380 New York St., Redlands, CA 92373-8100, USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Arc Hydro GP Tools v 2.0 – Tutorial Copyright © 2011 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as expressly permitted in writing by Esri. All requests should be sent to Attention: Contracts Manager, Esri, 380 New York Street, Redlands, CA 92373-8100, USA. The information contained in this document is subject to change without notice. October 2011 i Arc Hydro GP Tools v 2.0 – Tutorial Table of Contents Introduction 5 Objective 5 Loading Arc Hydro Tools Toolbox 5 Accessing the Arc Hydro Geoprocessing Tools Help 7 Arc Hydro Tools Configuration 9 Arc Hydro Setup 10 1. Set Target Locations 10 2. Set Batch Target Locations 13 3. Standard Geoprocessing Configuration 15 Terrain Preprocessing 16 1. Level DEM 17 2. DEM Reconditioning 22 3. Assign Stream Slope 25 4. Burn Stream Slope 27 5. Build Walls 28 6. Sink Prescreening 29 7. Sink Evaluation 29 8. Sink Selection 31 9. Fill Sinks 32 10. Flow Direction 33 11.
    [Show full text]
  • Security Assessment Security Policy Assessment
    Security Assessment Security Policy Assessment Prepared for: Jonathan Doe Prepared by: Austin Archer 3/23/2018 CONFIDENTIALITY NOTE: The information contained in this report is for the exclusive use of the client specified above and may contain confidential, privileged and non-disclosable information. If the recipient of this report is not the client or addressee, such recipient is strictly prohibited from reading, photocopying, distributing or otherwise using this report or its contents in any way. Scan Date: 4/1/2014 Security Policy Assessment SECURITY ASSESSMENT Table of Contents 1 - Summary 1.1 - Sampled Systems 2 - Local Security Settings (Sampled Systems) 2.1 - Account Policies 2.1.1 - Password Policy 2.1.2 - Account Lockout Policy 2.2 - Local Policies 2.2.1 - Audit Policy 2.2.2 - User Rights Assignment 2.2.3 - Security Options PROPRIETARY & CONFIDENTIAL Page 2 of 14 Security Policy Assessment SECURITY ASSESSMENT 1 - Summary 1.1 - Sampled Systems IP Addresses Computer Name Operating System 10.0.7.28 tandem Windows 7 Enterprise 172.20.1.3, 10.0.1.3 DC01 Windows Server 2012 Standard PROPRIETARY & CONFIDENTIAL Page 3 of 14 Security Policy Assessment SECURITY ASSESSMENT 2 - Local Security Settings (Sampled Systems) 2.1 - Account Policies 2.1.1 - Password Policy Policy Setting Computers Enforce password history 0 passwords remembered TANDEM 24 passwords remembered DC01 Maximum password age 42 days All Sampled Minimum password age 1 days All Sampled Minimum password length 7 characters All Sampled Password must meet complexity requirements
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • Copyrighted Material
    11_783269 bindex.qxp 11/10/06 11:15 AM Page 209 Index applications (defined), 205. See also programs Numerics arranging windows, 43–44 100% button (Internet Explorer 7), 99–100 assigning sounds to program events, 24 audio visualizations, 186 A Windows Media Player 11, 183, 185–186 accessibility options, 156 audio CDs. See CDs accessories, 205 Audio Description feature, 157 account types, 169 AutoComplete feature (Internet Explorer 7), 101 accounts (administrative), 169 automatic updates with Windows Update, 161–162, 167 accounts (e-mail), 124 AutoPlay, 13, 148, 151 accounts (user) Autosearching feature (Internet Explorer 7), 113 account types, 169 adding, 169 creating, 169 B deleting, 170 backgrounds for desktop, 24 managing, 168, 170 Backup and Restore Center, 140–143, 146 names, 169 Backup Files dialog box, 141 Parental Controls, 170 backups passwords, 169 CompletePC Backup utility, 140–142 pictures, 169–170 DVD discs, 142 switching, 74 File and Folder Backup utility, 140–142 User Account Control (UAC), 170 Send To shortcut menu command, 64–65 activity reporting, 165 stopping, 141 activity reports, 166 BitLocker drive encryption, 163–164 Add Printer Wizard, 149–151 blocking Add to Library dialog box, 187 computer use, 165 adding Web sites, 165 bookmarks to Favorites Center, 102 blog, 208 gadgets, 31–32 bookmarks (Internet Explorer 7) icons, 35 adding to Favorites Center, 102 languages, 155–156 deleting, 104 music, 187 importing, 101 printers, 149–151 moving, 103–105 user accounts, 169 organizing, 103–105 address bar, 15–16 renaming, 104 address book, 128–130 selecting, 103 Address toolbar, 41 browser (defined), 208. See also Internet Explorer 7 adjusting volume, 152 browsing offline.
    [Show full text]
  • Operating System Transactions
    Operating System Transactions Donald E. Porter, Owen S. Hofmann, Christopher J. Rossbach, Alexander Benn, and Emmett Witchel Department of Computer Sciences, The University of Texas at Austin {porterde,osh,rossbach,abenn1,witchel}@cs.utexas.edu ABSTRACT Programming; D.4.7 [Operating Systems]: Organization Applications must be able to synchronize accesses to oper- and Design ating system resources in order to ensure correctness in the face of concurrency and system failures. System transac- General Terms tions allow the programmer to specify updates to heteroge- Design, Performance, Security neous system resources with the OS guaranteeing atomicity, consistency, isolation, and durability (ACID). System trans- Keywords actions efficiently and cleanly solve persistent concurrency Transactions, Operating Systems, TxOS, Race Conditions, problems that are difficult to address with other techniques. Transactional Memory For example, system transactions eliminate security vulner- abilities in the file system that are caused by time-of-check- 1. INTRODUCTION to-time-of-use (TOCTTOU) race conditions. System trans- actions enable an unsuccessful software installation to roll Applications often need to group accesses to operating system resources (such as files and signals) into logical units, back without disturbing concurrent, independent updates to the file system. just as multithreaded applications must group accesses to This paper describes TxOS, a variant of Linux 2.6.22 that shared data structures into critical regions. For example, implements system transactions. TxOS uses new implemen- local user and group accounts on Linux and similar oper- tation techniques to provide fast, serializable transactions ating systems are stored across three files that need to be /etc/passwd /etc/shadow with strong isolation and fairness between system transac- mutually consistent: , , and /etc/group.
    [Show full text]
  • Teach Yourself TCP/IP in 14 Days, Second Edition
    Teach Yourself TCP/IP in 14 Days Second Edition Preface to Second Edition About the Author Overview Introduction 1. Open Systems, Standards, and Protocols 2. TCP/IP and the Internet 3. The Internet Protocol (IP) 4. TCP and UDP 5. Gateway and Routing Protocols 6. Telnet and FTP 7. TCP/IP Configuration and Administration Basics 8. TCP/IP and Networks 9. Setting Up a Sample TCP/IP Network: Servers 10. Setting Up a Sample TCP/IP Network: DOS and Windows Clients 11. Domain Name Service 12. Network File System and Network Information Service 13. Managing and Troubleshooting TCP/IP 14. The Socket Programming Interface Appendix A: Acronyms and Abbreviations Appendix B: Glossary Appendix C: Commands Appendix D: Well-Known Port Numbers Appendix E: RFCs Appendix F: Answers to Quizzes This document was produced using a BETA version of HTML Transit 2 Teach Yourself TCP/IP in 14 Days, Second Edition The second edition of Teach Yourself TCP/IP in 14 Days expands on the very popular first edition, bringing the information up-to-date and adding new topics to complete the coverage of TCP/IP. The book has been reorganized to make reading and learning easier, as well as to provide a more logical approach to the subject. New material in this edition deals with installing, configuring, and testing a TCP/IP network of servers and clients. You will see how to easily set up UNIX, Linux, and Windows NT servers for all popular TCP/IP services, including Telnet, FTP, DNS, NIS, and NFS. On the client side, you will see how to set up DOS, Windows, Windows 95, and WinSock to interact with a server.
    [Show full text]
  • Operating System Transactions
    Operating System Transactions Donald E. Porter, Owen S. Hofmann, Christopher J. Rossbach, Alexander Benn, and Emmett Witchel Department of Computer Sciences, The University of Texas at Austin {porterde,osh,rossbach,abenn1,witchel}@cs.utexas.edu ABSTRACT 1. INTRODUCTION Applications must be able to synchronize accesses to operating sys- Applications often need to group accesses to operating system tem resources in order to ensure correctness in the face of concur- resources (such as files and signals) into logical units, just as mul- rency and system failures. System transactions allow the program- tithreaded applications must group accesses to shared data struc- mer to specify updates to heterogeneous system resources with the tures into critical regions. For example, local user and group ac- OS guaranteeing atomicity, consistency, isolation, and durability counts on Linux and similar operating systems are stored across (ACID). System transactions efficiently and cleanly solve persis- three files that need to be mutually consistent: /etc/passwd, tent concurrency problems that are difficult to address with other /etc/shadow, and /etc/group. techniques. For example, system transactions eliminate security Applications currently struggle to make consistent updates to vulnerabilities in the file system that are caused by time-of-check- system resources. In current operating systems, individual system to-time-of-use (TOCTTOU) race conditions. System transactions calls are generally atomic and isolated from the rest of the system, enable an unsuccessful software installation to roll back without but it is difficult, if not impossible, to condense complex opera- disturbing concurrent, independent updates to the file system. tions into a single system call.
    [Show full text]
  • Nhdplus User Guide Page Ii of 115 This Guide Is Intended for Use with the Following Nhdplus Schema Versions
    NNHHDDPPlluuss UUsseerr GGuuiiddee June 1, 2006 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page ii of 115 This guide is intended for use with the following NHDPlus schema versions. NHDPlus Component Schema Version Catchment Grid 01 Catchment Shape 01 Catchment Flowline Attributes 01 Elevation Grid 01 Flow Accumulation & Direction Grids 01 NHD 01 Stream Gage Events 01 2/3/2006 NHDPlus User Guide Page iii of 115 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page iv of 115 Table of Contents Acknowledgments.......................................................................................................................... ix Introduction to NHDPlus ................................................................................................................ 1 Data Package Content and Directory Structure .......................................................................... 3 NHDPlus Schema ....................................................................................................................... 5 Projection Information................................................................................................................ 7 NHDPlus Versioning System ..................................................................................................... 8 Feature Class Descriptions............................................................................................................ 11 Attribute Table Descriptions........................................................................................................
    [Show full text]
  • In Windows Server 2008 R2 and Windows Server 2008 (The Former Containing the Later Release of Hyper-V)
    Hyper-V Microsoft Hyper-V Developer(s) Microsoft Initial release July 26, 2008 (KB950050)[1][2] R2 Service Pack 1 Stable release (KB976932)[3][4] / March 15, 2011; 15 months ago Windows 8 (both its server and client versions) (future) and Operating system Windows Server 2008 or standalone Type Virtual machine License Proprietary Hyper V Slide 1 of 21 Microsoft Hyper-V ■ Microsoft Hyper-V, ✦ codenamed Viridian ✦ and formerly known as Windows Server Virtualization, ✦ is a hypervisor-based virtualization system for x86-64 systems ■ A beta version of Hyper-V was shipped with certain x86-64 editions of Windows Server 2008, and the finalized version (automatically updated through Windows Update) was released on June 26, 2008 ■ Hyper-V has since been released in a free stand-alone version, and has been upgraded to Release 2 (R2) status Hyper V Slide 2 of 21 Versions and variants ■ Hyper-V exists in two variants: ✦ as a stand-alone product called Microsoft Hyper-V Server 2008 (Hyper-V Server 2008 R2 for the second release), ✦ and as an installable role in Windows Server 2008 R2 and Windows Server 2008 (the former containing the later release of Hyper-V). ■ The stand-alone version of Hyper-V is free, and was released on October 1, 2008. ■ It is a variant of the core installation of Windows Server 2008 that includes full Hyper-V functionality; other Windows Server 2008 roles are disabled, and there are limited Windows Services. ■ The free Hyper-V Server 2008 variant is limited to a command line interface (CLI), where configuration of the "Host" or "Parent" (Hyper-V Server 2008) OS, physical hardware and software is done using shell commands.
    [Show full text]