Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio. See also Sound Recorder Administrator account, 172 device for Windows Movie Maker administrator, for Group Policy, 124 recording, 409 Advanced Audio Properties dialog, 341 Windows Media Player for, 391 Advanced Backup mode, 30–33 Audio Tuning Wizard, 201 Restore and Manage Media tab, authenticated network access, 212 32–33, 33 author of movie clip, 412 AIF files, 396 auto-hide taskbar, 370 AIFC files, 396 AutoComplete Settings dialog, AIFF files, 396 162, 162 Airbrush tool (Paint), 253 autodial configuration, 223 alerts, 262 Automated System Recovery from saved files, 263 Wizard, 36 from Windows Messenger, 406 automatic redial feature, 219 alignment in WordPad, 422 Automatic Reset of accessibility Alt key, StickyKeys to keep active, 4 options, 4 Alt+Tab key to switch between appli- automatic updates. See Windows cations, 368–369 Update animated menus, 86–87 AutoPlay, 27 animated screen character, for AVI files, 396 searches, 326–327 Appearance and Themes control panel, 26 B for fonts, 117 Application log, 93, 94 background for Desktop, 82 applications. See programs Backup, 27–36 Arabic language, 298 Advanced mode, 30, 30–33 area code, in phone dialing, 266 Automated System Recovery Wizard, 36 Armenian language, 298 options, 33–35 ascii command (FTP), 122 of WMI repository, 418 ASCII format, 418 backup jobs, 27 ASF files, 396 Backup or Restore Wizard, 27–30 associating programs with file exten- sions, 116 What to Backup screen, 28 ASX files, 396 What to Restore screen, 29 attachments to e-mail, 242 basic disks, 77 426 2986IDX.qxd 9/6/01 12:12 AM Page 427 COLLECTIONS OF MOVIE CLIPS batch command, 291 CD Quality audio, 339 binary command (FTP), 122 CD-R drive, copying media files blind copies of e-mail, 242 to, 401 blink rate of cursor, 4 CD-ROM blocking senders of e-mail, 249–250 adding program from, 12 BMP files, 251 autoplay following insertion, 27 bold type in WordPad, 422 copying songs from, 398 BOOT.INI file, 360 starting Recovery Console from, BounceKeys, 5 289–290 bridge connections, 223 CD Writing Wizard, 39, 39–40 broadband connection, 210 CDA files, 396 general properties, 218 Character Map, 40, 40–42 for Internet, 213 chat in NetMeeting, 202 Browse feature, 36 chdir command, 291 Brush tool (Paint), 253 Check Disk dialog box, 42 bullets in WordPad, 421, 422 Chinese language, 298 burning CDs, 39–40 chkdsk command, 291 ClickLock option, 186 Clip menu (Windows Movie Maker), C 413–414 Clipboard, 43–45 cache for Web pages, 156 capturing screen images to, 38 Calculator, 37–38 to copy from Character Map, 41 call waiting, disabling, 266 placing audio file in, 337 callback for incoming connec- ClipBook tion, 215 accessing another user's, 45 Called Station Identifier (CSID), 108 saving Clipboard contents to, 44 calling card for phone dialing, 267 ClipBook Viewer, 43–45 camera clock, 56, 366, 366 configuration, 312–315 displaying, 370 photographs from, 194, 315 Close button, 45 recording from, 408 closing canceling print job, 283 modem connection, 229 Caps Lock key, and accessibility, 4 user sessions, 333 capturing images, 38 .CLP file extension, 43 catalogs in Indexing Service, 139–143 cls command, 291 searching, 143, 143 code page conversion tables, 302 cd command, 291 collections of movie clips, 407 427 2986IDX.qxd 9/6/01 12:12 AM Page 428 COLOR color Computer Management (MMC snap- for Desktop, 82 in), 48 in Internet Explorer, 156 Disk Management, 76 maximum number, 87–88 computers. See also System Properties in Paint, 254 dialog in WordPad, 422 acceptance of remote connec- tion, 304 Color Eraser tool (Paint), 252 information about components, color management 362–363 for monitor, 90 logon/logoff, 175 for printers, 278 name and workgroup for, 350 color scheme power management for, 271–273 for dialog boxes, 85 searching for, 325 of screen items, 5 transferring files between old and Colors menu (Paint), 255 new, 112 COM+ (Component Services), 45 turning off, 379 Command Prompt, 46, 46–47 connection pooling, for ODBC, 54 communications, network connec- contacts. See also Address Book tions for, 209–210 sharing between identities, 25 Communications program in Windows Messenger, 406 group, 47. See also Network Connections Contacts folder, 22 Fax Services, 106–112 Content Advisor, 159–161 NetMeeting, 196–208 context-sensitive help for dialog boxes, 134–135, 390–391 Network Setup Wizard, 224–225 Control Panel, 48–49, 49. See also New Connection Wizard, 213, Microsoft Management Console 213–214, 225–229 (MMC) snap-ins Phone Dialer, 9999 Add New Hardware, 8–10 Remote Desktop Connection, Add or Remove Programs, 10–13 304–306 Appearance and Themes, 26 CompactFlash card, copying media files to, 401 Display, 80–90 compatibility of programs, wizard to Folder Options, 114–117 test, 288, 288–289 Game controllers, 123 compression Keyboard, 166–167 of audio, 339 Local Security Policy, 168–170 of drives, folders and files, 47–48 Mouse, 185–188 computer administrator user Network and Internet Connec- account, 380 tions, 208 opening, 346 428 2986IDX.qxd 9/6/01 12:12 AM Page 429 DESKTOP TOOLBAR other options, 235 Curve tool (Paint), 253 Performance and Maintenance, 263 Customize Classic Start Menu dialog, Phone and Modem Options, 374, 374 265–269 Customize Toolbar dialog, 101 Power Options, 271–273 Printers and Faxes, 273–285 Printers and Other Hardware, 285 D Regional and Language Options, 296–302 Data Sources (ODBC), 51–55 Scanners and Cameras, 312–315 date Scheduled Tasks, 316–322 customizing regional options, 298 Sounds and Audio Devices, 340–344 inserting in WordPad, 421 System, 349–359 Date and Time Properties dialog, 56, Taskbar and Start Menu, 369–375 56–57 conversations, tracking in Outlook deaf, sound features for, 4 Express, 250–251 debugging, writing information to cookies, 155 file, 357 deleting, 156 default connection, 222 security settings for, 158 default language, 299 copy and paste, in Address Book, 16 default Web browser, Internet Explorer as, 164 copy command, 291 del command, 291 copying delete command, 291 disks, 49 deleting files and folders, 50 contacts in Address Book, 15 floppy disks, 49 cookies, 156 songs from CD, 398 icons from Desktop, 83 user accounts, 355 Recycle Bin for, 293–296, 294 counters Scheduled Tasks, 319 logs, 259–260 themes, 82 performance, 257–258 user accounts, 355, 382 cover page for faxes, 110 Desktop, 57, 57–58 editor, 111, 111–112 remote connection, 304–306 CSID (Called Station Identifier), 108 remote sharing in NetMeeting, 203 Ctrl key, StickyKeys to keep active, 4 Desktop Items dialog, 82–84 currency, customizing regional options, 298 General tab, 83, 83 cursor blink rate, 166 Web tab, 83–84 cursor for visually impaired, 4 Desktop toolbar, 367 429 2986IDX.qxd 9/6/01 12:12 AM Page 430 DEVICE DRIVERS device drivers DirectX, 66–69 for keyboard, 167 Diagnostic tool, 67 for ODBC, 53 disable command, 291 for printers, 278 disabling for shared printer, 279–280 local area connection, 211 uninstalling, 60 Welcome Screen, 389–390 updating, 12, 58 Disk Cleanup, 69–71, 71 Device Manager (MMC snap-in), Disk Defragmenter (MMC snap-in), 58–64, 59, 351 71–75 Action menu, 59–63 Disk Management (MMC snap-in), View menu, 63–64 75–80, 76 DHCP (Dynamic Host Configuration disk Properties dialog box, General Protocol), 64–65 tab, 195 Diagnostic Startup, 359 disk space, 80 dial-in server, 214–216 Disk Cleanup to increase available, dial-up connections, 209 69–71, 71 configuration, 163 emptying Recycle Bin to increase, 294 general properties, 217, 217 for hibernation, 273 for Internet, 213 program use of, 11 operator-assisted dialing for, 223 diskpart command, 291 dialog boxes disks appearance of, 85, 85–87 copying, 49 help for, 134–135 names for, 195 What's This, 390–391 Display Properties dialog, 58, 80–90 DIB files, 251 Appearance tab, 85, 85–87 digital camera Desktop tab, 82–84 installing, 313–314 Screen Saver tab, 84–85 photographs from, 194, 315 Settings tab, 87–90 recording from, 408 Themes tab, 81, 81–82 digital certificates, 161–162 documents digital IDs, in Address Book, 20 clearing from Start menu, 374 digital signatures, verification, creating 112–113 using multiple languages, 300–301 dir command, 291 in WordPad, 423–424 direct connection, 211 printing, 280–282 general properties, 218 properties, 283–284 directories.
Recommended publications
  • Windows NT® 4 for Dummies® File:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM
    Table of contents Windows NT® 4 For Dummies® file:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM Table of Contents Windows NT® 4 For Dummies® Introduction About This Book How to Use This Book And What about You? How This Book Is Organized Part I: Introducing Windows NT (Bare-Bones Stuff) Part II: Making Windows NT Do Something Part III: Using Windows NT Applications Part IV: Been There, Done That: Quick References for Moving to Windows NT Part V: Getting Help Part VI: The Part of Tens Icons Used in This Book Where to Go from Here Part I: Intro to Windows NT (Bare Bones Stuff) Chapter 1: What Is Windows NT? What Is This "Windows" Stuff, Anyway? What Does Windows NT 4 Do? Why Should I Bother Using Windows NT? Will I Like Windows NT 4 Better than Windows NT 3.51? What's the Difference between Windows NT Workstation and Windows NT Server? Bracing Yourself for Windows NT 4 Chapter 2: Boring Information, Bothersome Computer Parts The Computer Microprocessor Floppy Disks, Compact Discs (CDs), and Disk Drives Floppy disk flipping What disk drives does Windows NT like? What does "write-protected" mean? Driving with compact discs The Mouse and That Double-Click Stuff Cards and Monitors Keyboards Groups of keys More key principles Print Screen: the one fun, weird code key Modems Printers Networks Sound Cards (Disgusting Bioactive Noises) Parts Required by Windows NT Chapter 3: Windows NT Stuff Everybody Thinks You Already Know Backing Up Your Work Clicking 1 of 9 07/14/99 08:29:14 Table of contents Windows NT® 4 For Dummies® file:///P|/VSCAN/TOSCAN/MT/NT4DUM/NT4.HTM
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • The Recovery Console Content
    The Recovery Console Content 1. Common .....................................................................................................................3 2. Invoke the Recovery Console......................................................................................3 2.1. Start from Media...................................................................................................3 2.2. Start using RIS .....................................................................................................4 2.3. Installation ............................................................................................................5 2.3.1. Attended ........................................................................................................5 2.3.2. Un-attended...................................................................................................6 2.4. Un-installation.......................................................................................................6 2.5. Windows NT 4.0 ...................................................................................................6 2.6. 64-bits ..................................................................................................................7 3. Commands..................................................................................................................7 3.1. Commands In-depth ...........................................................................................10 3.1.1. BOOTCFG...................................................................................................10
    [Show full text]
  • Technology in India Useful Commands on Your Computer
    Technology in India Useful Commands on your Computer Run Commands ------------------------------------------------------------------- compmgmt.msc - Computer management devmgmt.msc - Device manager diskmgmt.msc - Disk management dfrg.msc - Disk defrag eventvwr.msc - Event viewer fsmgmt.msc - Shared folders gpedit.msc - Group policies lusrmgr.msc - Local users and groups perfmon.msc - Performance monitor rsop.msc - Resultant set of policies secpol.msc - Local security settings services.msc - Various Services msconfig - System Configuration Utility regedit - Registry Editor msinfo32 - System Information sysedit - System Edit win.ini - windows loading information(also system.ini) winver - Shows current version of windows mailto: - Opens default email client command - Opens command prompt Run Commands to access the control panel ------------------------------------------------------------------- appwiz.cpl - Add/Remove Programs control admintools - Adminastrative Tools control color - The Display with the appearance tab open control date/time - Date and Time properties control folders - Folder Options control fonts - Fonts Folder control infrared - Infrared folder if available control netconnections - Network and Dial-up Connections window control netware - Netware window if installed and available control panel - Control Panle control printers - Printers Folder control printers control schedtasks - Schedule tasks window ccontrol telephony - Location information window control userpasswords - User Accounts desk.cpl - Display Properties findfast.cpl
    [Show full text]
  • Technical Information, You Will Find Several Different Types of Symbols Are Used to Identify Different Sections of Text
    Technical FAST/TOOLS R10.01 Information System Hardening Windows 7/8, Windows Server 2008/2012 TI 50A01A10-02EN (Rev. 1.0) Yokogawa Electric Corporation TI 50A01A10-02EN 2-9-32, Nakacho, Musashino-shi, Tokyo, 180-8750 Japan ©Copyright June 2015 (YK) Tel.: 81-422-52-2006 Fax.: 81-422-52-2540 1st Edition June 30, 2015 (YK) Blank Page i Introduction n Purpose In order to protect systems from network related security vulnerabilities, it is important to harden the operating system on which the application is running. This document describes the hardening procedure to be followed for FAST/TOOLS R10.01 systems running Microsoft operating systems. n Validity This document is primarily intended for internal Yokogawa use when engineering projects that use FAST/TOOLS on Microsoft operating systems. n Definitions, Abbreviations and Acronyms AV : Antivirus software DMZ : DeMilitarized Zone GSC : Global SCADA Center SCADA : Supervisory Control And Data Acquisition n References [1] McAfee VirusScan Enterprise version 8.8, YHQ recommended antivirus software. [2] IT Security Guide for System Products (Common Information) TI30A15B30-01E. All Rights Reserved Copyright © 2015, Yokogawa Electric Corporation TI 50A01A10-02EN June 30, 2015-00 ii n Symbol Marks Throughout this Technical Information, you will find several different types of symbols are used to identify different sections of text. This section describes these icons. CAUTION Identifies instructionsthat must be observed in order to avoid physical injury and electric shock or death to the operator. IMPORTANT Identifies importantinformation required to understand operations or functions. TIP Identifies additionalinformation. SEE ALSO Identifies asource to be referred to. n Trademark • FAST/TOOLS is registered trademark of Yokogawa Electric Corporation.
    [Show full text]
  • Bitlocker Group Policy Settings
    BitLocker Group Policy Settings Updated: September 13, 2013 Applies To: Windows 8, Windows 8.1, Windows Server 2012, Windows Server 2012 R2 This reference topic for the IT professional describes the function, location, and effect of each Group Policy setting that is used to manage BitLocker Drive Encryption. Overview To control what drive encryption tasks the user can perform from the Windows Control Panel or to modify other configuration options, you can use Group Policy administrative templates or local computer policy settings. How you configure these policy settings depends on how you implement BitLocker and what level of user interaction will be allowed. Note A separate set of Group Policy settings supports the use of the Trusted Platform Module (TPM). For details about those settings, see Trusted Platform Module Services Group Policy Settings. BitLocker Group Policy settings can be accessed using the Local Group Policy Editor and the Group Policy Management Console (GPMC) under Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption. Most of the BitLocker Group Policy settings are applied when BitLocker is initially turned on for a drive. If a computer is not compliant with existing Group Policy settings, BitLocker may not be turned on or modified until the computer is in a compliant state. When a drive is out of compliance with Group Policy settings (for example, if a Group Policy setting was changed after the initial BitLocker deployment in your organization, and then the setting was applied to previously encrypted drives), no change can be made to the BitLocker configuration of that drive except a change that will bring it into compliance.
    [Show full text]
  • Rapid Recovery 6.2 Commands and Scripting Reference Guide 2 Forcescheduledarchive
    Rapid Recovery 6.2 Commands and Scripting Reference Guide Table of Contents Introduction to Rapid Recovery.........................................................................................................10 Command Line Management utility...................................................................................................11 Commands..................................................................................................................................... 12 ApplyLicense.......................................................................................................................... 12 Archive....................................................................................................................................13 CancelActiveJobs...................................................................................................................16 CheckRepository.................................................................................................................... 17 CheckTieredRepository..........................................................................................................18 ConfigureAgentMigration........................................................................................................19 CreateArchiveRepository........................................................................................................20 CreateBootCD.......................................................................................................................
    [Show full text]
  • Zz-Cryptoprevent-Do
    REPLAY 4 ADMINISTRATOR’S GUIDE Copyright 2009/2010 by AppAssure Software , Inc. ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means — graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage and retrieval systems — without the written permission of the publisher. For permission to use material from this publication, contact AppAssure Software, Inc. 1925 Isaac Newton Square, Suite 440 Reston, VA 20190 +1 703-547-8686 [email protected] Replay 4 Administrator’s Guide ii Contents Chapter One: Introduction ............................................................. 1 REPLAY 4 .......................................................................................................................................................... 1 Chapter One: Introduction ........................................................................................................................ 1 What Is In This Guide ......................................................... 1 About Replay 4 ................................................................... 1 What you get with Replay 4 .............................................. 2 What's New in Replay 4? ................................................... 2 Replication for Off-site Backup and Disaster Recovery .............................................. 2 New Enterprise Console ...........................................................................................................
    [Show full text]
  • Microsoft Bitlocker Administration and Monitoring Evaluation Guide
    Microsoft BitLocker Administration and Monitoring Evaluation Guide Technical White Paper Published: August 2011 By Anthony Smith and Jeff Gilbert CONTENTS Executive Summary ............................................................................................................ 3 Introduction ......................................................................................................................... 4 MBAM Components ............................................................................................................ 6 Administration and Monitoring Server 6 Policy Templates 7 Management Workstations 7 MBAM Clients 7 MBAM Deployment and Configuration .............................................................................. 8 Choosing a Server Topology 8 Configuring MBAM Administrator Roles 10 Securing Recovery Data 11 Deploying the MBAM Client to Existing Computers 11 Deploying the MBAM Client With New Operating Systems 13 Configuring the MBAM Client 13 Configuring Group Policy Settings 13 Using Administrative Templates 15 Interacting with the MBAM Client 16 Managing User and PC Exemptions 18 Managing Hardware Compatibility 18 Displaying MBAM Reports 19 Evaluate MBAM ................................................................................................................... 26 For More Information .......................................................................................................... 27 Situation EXECUTIVE SUMMARY MBAM can help any organization Microsoft BitLocker Administration and
    [Show full text]
  • A Records, 244–245, 279 -A Switch in Nbtstat, 190 in Netstat, 186 AAS Deployment Package, 710 .Aas Extension, 712 Abstract
    22_InsideWin_Index 13/3/03 9:50 AM Page 1269 Index A A records, 244–245, 279 ACEs (Access Control Entries) -a switch access masks in, 568–570 in Nbtstat, 190 command-line tools for, 572–576 in Netstat, 186 for cumulative permissions, 577 AAS deployment package, 710 for deny permissions, 578 .aas extension, 712 inheritance in, 579–580, 725–728 Abstract classes, 299–300 object ownership in, 572 Accelerated Graphics Port (AGP) adapters, 164 viewing and modifying, 570–571 Access Control Entries. See ACEs (Access ACKs in DHCP, 101–102 Control Entries) ACL Editor, 570, 723 Access control lists (ACLs) Advanced view in Active Directory security, 732–734 for inheritance, 578, 581 objects in, 339 for ownership, 572 in security descriptors, 559 for special permissions, 723–724 Access Control Settings window, 728 Edit view, 725–726 Access masks for permissions inheritance, 578 in ACEs, 568–570 blocking, 579 in DSOs, 733 settings for, 581 Access requests in Kerberos, 621 viewings, 582 Access rights. See also Permissions ACLs (access control lists) in Active Directory security in Active Directory security, 732–734 delegation, 729–732 objects in, 339 types of, 724–725 in security descriptors, 559 for group policies, 682 ACPI (Advanced Configuration and Power Access tokens Interface) contents of, 560–561 compatibility of, 23–28, 148–149 local, 559 kernel version for, 135 SIDs in, 559, 561, 581 for PnP,17, 147–149 ACCM (Asynchronous-Control- ACPIEnable option, 149 Character-Map), 1124 Activation Account domain upgrades, 496–498 in IA64, 130 BDC, 494–496 in installation, 49–50 PDC, 490–493 unattended setup scripts for, 95 Account lockout policies Active Directory, 238 in domain design, 429 bulk imports and exports in, 353–356 in password security, 593–594 DNS deployment in, 242–243 Account logons, auditing, 647 DNS integration in, 238–239 Account management, auditing, 511, 648 dynamic updates, 244–245 Accounts in domain migration.
    [Show full text]
  • Description of the Windows XP Recovery Console Page 1 of 7
    Page 1 of 7 Description of the Windows XP Recovery Console This article was previously published under Q314058 Article ID : 314058 For a Microsoft Windows 2000 version of this article, see 229716 (http://support.microsoft.com/kb/229716/). Last Review : May 7, 2007 Revision : 3.1 On This Page INTRODUCTION MORE INFORMATION Starting the Windows Recovery Console Using the Command Console Restrictions and limitations of the Recovery Console Available commands INTRODUCTION This article describes the functionality and limitations of the Windows Recovery Console. If your Microsoft Windows XP-based computer does not start correctly or if it does not start at all, you can use the Windows Recovery Console to help you recover your system software. This article discusses the following topics: • How to start the Windows Recovery Console. • How to use the Command Console. • Restrictions and limitations of the Windows Recovery Console. • The commands that are available in the Windows Recovery Console. MORE INFORMATION When you use the Windows Recovery Console, you can obtain limited access to the NTFS file system, FAT, and FAT32 volumes without starting the Windows graphical user interface (GUI). In the Windows Recovery Console, you can: • Use, copy, rename, or replace operating system files and folders. • Enable or disable service or device startup the next time that start your computer. • Repair the file system boot sector or the Master Boot Record (MBR). • Create and format partitions on drives. Note Only an administrator can obtain access to the Windows Recovery Console so that unauthorized users cannot use any NTFS volume. Starting the Windows Recovery Console To start the Windows Recovery Console, use one of the following methods: • Use the Windows Setup floppy disks or the Windows CD-ROM to start your computer.
    [Show full text]
  • Microsoft Desktop Support – ENTERPRISE
    Vendor: Microsoft Exam Code: 70-622 Exam Name: Pro: Microsoft Desktop Support – ENTERPRISE Version: DEMO 1: You are a desktop support technician for your company. Your company monitors user logon times on a daily basis. Yo u need to generate a report when users log on after 9 A.M. and have it sent to your e-mail account . What should you do? A.Create a new task, add the At Log On trigger, run a custom-created VBS file to check the time, and send the e-mail message through the VBS script if the time is after 9 A.M. B.Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, and send the e-mail message through the VBS script if the time is after 9 A.M. C.Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, and send the e-mail message through the task scheduler if the time is after 9 A.M. D.Create a new task, add the At Log On trigger, run a custom-created VBS file to check the logon time, and send the e-mail message through the task scheduler if the time is after 9 A.M. Correct Answers: A 2: You are a desktop support technician for your company. Your company computers run Windows Vista. You need to verify the updates that have been installed on your Windows Vista computer. Which two actions should you perform? (Each correct answer presents a complete solution.
    [Show full text]