<<

Tweak It and Freak It: A Killer Guide to Making Associate Publisher Windows Run Your Way Greg Wiegand Copyright © 2009 by Que Publishing Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, Rick Kughen photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of Development Editor the information contained herein. Although every precaution has been Rick Kughen taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed for Managing Editor damages resulting from the use of the information contained herein. Patrick Kanouse ISBN-13: 978-0-789-73822-6 ISBN-10: 0-7897-3822-8 Project Editor of Congress Cataloging-in-Publication Data Seth Kerney McFedries, Paul. Tweak it and freak it : a killer guide to making Windows work your Editor way / Paul McFedries. -- 1st ed. . cm. Barbara Hacha ISBN 978-0-7897-3822-6 1. Windows () 2. Operating systems Indexer (Computers) I. . Tim Wright QA76.76.O63M398285 2009 005.4'46--dc22 Proofreader 2009008951 Suzanne Thomas Printed in the United States of America First Printing: March 2009 Technical Editor Terri Stratton Trademarks All terms mentioned in this book that are known to be trademarks or Publishing Coordinator service marks have been appropriately capitalized. Que Publishing can- Cindy Teeters not attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or Book Designer service mark. Anne Jones Warning and Disclaimer Composition Every effort has been made to this book as complete and as accu- rate as possible, but no warranty or fitness is implied. The information Bronkella Publishing, LLC provided is on an “as is” basis. The author and the publisher shall have neither liability nor responsibility to any person or entity with respect to Reviewers any loss or damages arising from the information contained in this Andy Walker book. Aaron Ricadela Bulk Sales Gareth Branwyn Que Publishing offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For information, please contact U.S. Corporate and Government Sales 1-800-382-3419 [email protected] For sales outside of the U.S., please contact International Sales [email protected] Introduction

undreds of millions of use Windows every day, Hand it’s a safe bet that some of them would not describe themselves as happy Windows campers. Regardless of skill level, most people have something they dislike about ܖ Who Should Read This Book? Windows, and they often have a whole laundry list of gripes. “Why can’t Windows do this rather than that?” “Why does ܖ Conventions Used in This Book Windows do X instead of Y?”“Wouldn’t it be great if Windows could do Z?” Scratch the of most Windows users and you’ll come upon a seething cauldron of unmet needs, unre- INTRODUCTION quited desires, and unending frustration being stuck with Windows the way it is.

However, a funny thing happens when you tell people that IN THIS it doesn’t have to be this way, that they don’t have to put up with the out-of-the-box Windows experience: An initial skepticism soon gives way and their eyes light up with an almost forgotten feeling—hope. Specifically, the hope that they really can make Windows smarter, safer, faster, more flexible, and more aligned to their needs. 2 Tweak It and Freak It: A Killer Guide to Making Windows Run Your Way

The secret behind this hope? Tweaks, tweaks, and more tweaks! Most people think that Windows is set in stone, but that apparently solid surface is really just a thin veneer that Microsoft slaps onto Windows to ensure that new and 22 fumble-fingered users don’t get into trouble. Strip off that veneer and a whole world comes into view, one that’s eminently tweakable, moddable, hackable, customizable, and personalizable. Within this world lie tools and technologies that anyone can use to tweak and tune almost every aspect of Windows, from startup to , from the interface to the , from security to scripting.

Tweak It and Freak It! Tweak It and Freak It: A Killer Guide to Making Windows Run Your Way is your guide to this tweakable Windows landscape. With a lighthearted and lightly irreverent tone, and with a bare minimum of jargon and technical claptrap, this book takes you through hundreds of useful, unique, and easy tweaks designed to improve and Windows XP. The key words here are useful, unique, and easy: ܖ Useful—Any monkey can, say, reverse the interface shadows, but what’s the point of doing that? In this book, if a hack doesn’t you get your work done, solve a problem, or make Windows more secure or reliable, it didn’t make the cut. ܖ Unique—There are lots of Windows tweaks available on the Internet and in other books, so you certainly don’t want another conglomera- tion of the same old Registry hacks. Instead, this book presents a fresh collection of tweaks that include many custom hacks that I’ve built over the years. ܖ Easy—A tweak that takes you an hour to implement and yet saves only a few seconds a day isn’t much of a tweak. This book focuses on tweaks that you can implement with a few steps, or with easy-to- understand plug-and-play scripts.

My goal with this book is to empower you to take a hands-on, do-it-yourself approach to tweaking Windows. In the end, you’ll no longer have a version of Windows that Microsoft thinks you should have, but rather a tweaked and tuned version that suits the way you work and play. INTRODUCTION 3

Who Should Read This Book? This book is aimed at Windows users who have a gripe, a beef, or an ax to grind and are looking for ways to overcome their Windows woes and short- comings with targeted, easy-to-implement tweaks and tune-ups. This book will also appeal to curious users who want to travel down different Windows roads, rebellious users who want to thumb their noses at standard-issue Windows techniques, and power users who want to get the most of Windows. To that end, this book includes the following features: ܖ A focus on practical, useful tweaks rather than mere tricks. ܖ Tweaks for both Windows Vista and Windows XP. ܖ Icons that show you which operating systems the tweak works with and the difficulty level of each tweak. ܖ Unique tweaks, many of which have never been seen before. ܖ Explanations of key concepts for novice users. ܖ In-depth coverage of the inner workings of each hack for more experi- enced users. ܖ A friendly and lightly humorous tone that I trust will make you feel at home with the subject and keep boredom at bay.

Conventions Used in This Book To make your life easier, this book includes various features and conventions that help you get the most out of this book: Steps Throughout the book, I’ve broken many building, upgrading, and repairing tasks into easy-to-follow step-by-step procedures. Things you Whenever I suggest that you type something, what you type appears in a bold monospace . Filenames, folder These things appear in a monospace font. names, and code Commands Commands and their syntax use the monospace font, too. Command placeholders (which stand for what you actually type) appear in an italic monospace font. 4 Tweak It and Freak It: A Killer Guide to Making Windows Run Your Way

Pull-down menu I use the following style for all application menu commands commands: Menu, Command, where Menu is the name of the menu you pull down and Command is the name 22 of the command you select. Here’s an example: File, Open. This means that you pull down the File menu and select the Open command.

This book also uses the following boxes to draw your attention to important (or merely interesting) information:

The Note box pres- The Tip box tells you note ents asides that give tip about methods that are you more information about the easier, faster, or more efficient current topic. These tidbits pro- than the standard methods. vide extra insights that offer a better understanding of the task.

The all- caution important Caution box tells you about potential accidents waiting to happen. There are always ways to mess things up when you’re working with computers. These boxes help you avoid those traps and pitfalls.

Online Chapters I had such a good writing this book that I actually ended up writing too much! Way too much, in fact, but that’s not a problem in this day and age because what wouldn’t fit between the covers of the book can easily fit between the covers of my website. And that’s just what I’ve done: Six of this book’s chapters are available online at my site. Just point your favorite to www.mcfedries.com/TweakItFreakIt. These files are also freely available from Que Publishing at www.informit.com/ title/0789738228. There, you’ll also information on Que’s other products. CHAPTER37

Running Scripts

ou’ve seen throughout this book that tweaking Win- dows involves making changes to object properties, Y ܖ program options, Registry , group policies, and Understanding Windows Script other under-the-hood adjustments. It’s surprising how often Host a simple change—such as checking or unchecking a check ܖ Introducing Script Files box or activating an option button—can make a major dif- ܖ ference (hopefully for the better!) in how Windows works. Running Script Files Directly ܖ However, there are lots of Windows tweaks where these Using WScript for Windows- Based Scripts more straightforward adjustments aren’t enough. Instead, IN THIS CHAPTER you have to bring out the heavy-duty tools: scripts. Through- ܖ Using CScript for Command- out this book, I’ve helped you unlock the potential of Win- Line Scripts dows by providing you with sample scripts that automate ܖ Script Properties and .wsh routine or cumbersome tasks and take advantage of the Files power that only scripting and programming can provide. This isn’t a programming book, so I’ve tried not to over- whelm you with too many scripts. However, there are quite a few, and it’s important that you know how to get those scripts onto your system and run them. 440 PART X Tools for Tweaking Windows

That’s the goal of this chapter. You won’t learn how to program scripts, but you will This chapter does note not teach you how to learn how to unlock their power by run- program in either VBScript or ning them on your system. JavaScript. If you’re looking for a programming tutorial, my VBA for the Office 2007 System (Que, 2007) Understanding is a good place to . (VBScript is a subset of VBA— As you might know, is for Applications.) For JavaScript, really just an empty container application try my Special Edition Using that’s designed to host different data for- JavaScript (Que, 2001). mats, including ActiveX controls, various file formats (such as docu- ments and worksheets), and several ActiveX scripting engines. A scripting engine is a dynamic link library (DLL) that provides programmatic support for a particular . Internet Explorer supports two such scripting engines: VBScript (VBScript.dll) and JavaScript (JSscript.dll). This enables web to write small programs—scripts—that interact with the user, control the browser, set cookies, open and close windows, and more. Although these scripting engines don’t offer full-blown programmability (you can’t compile scripts, for example), they do offer modern programming structures such as loops, conditionals, variables, and objects. In other words, they’re a huge leap beyond what a mere can do. The Windows Script Host is also a container application, albeit a scaled-down application in that its only purpose in life is to host scripting engines. Right out of the box, the Windows Script Host supports both the VBScript and JavaScript engines. However, Microsoft designed the Windows Script Host to be a universal host that can support any ActiveX-based scripting engine. Therefore, third-party vendors also offer scripting engines for languages such as , Tcl, and . The key difference between Internet Explorer’s script hosting and the Windows Script Host is the environment in which the scripts run. Internet Explorer scripts are –based, so they control and interact with either the web page or the web browser. The Windows Script Host runs scripts within the Windows or from the command prompt, so you use these scripts to con- trol various aspects of Windows. Here’s a sampling of the things you can do: ܖ Execute Windows programs. ܖ Create and modify shortcuts. ܖ Use Automation to connect and interact with Automation-enabled applications such as Microsoft Word, Outlook, and Internet Explorer. CHAPTER 37 Running Scripts 441

ܖ Read, add, and delete Registry keys Scripts are and items. caution obviously ܖ Access the VBScript and JavaScript very powerful and can access and object models, which give access to modify the sensitive innards of your system. Therefore, take extra the , runtime error mes- care if you decide to download sages, and more. scripts from the Internet. In fact, I ܖ Use pop-up dialog boxes to display highly recommend that you only information to the user and deter- grab scripts from sources that you trust completely. mine which button the user clicked to dismiss the dialog box. ܖ Read environment variables, which are system values that Windows Home keeps in memory, such as the folder into which is installed—the %SystemRoot% —and the name of the computer—the %ComputerName% environment variable. ܖ Deal with network resources, including mapping and unmapping - work drives, accessing user data (such as the username and user domain), and connecting and disconnecting network printers. ܖ Script the Windows Management Instrumentation (WMI) interface.

What about speed? After all, you wouldn’t want to load something that’s the size of Internet Explorer each time you need to run a simple script. That’s not a problem because, as I’ve said, the Windows Script Host does nothing but host scripting engines, so it has much less memory overhead than Internet Explorer. That means that your scripts run quickly. For power users looking for a Windows-based batch language, the Windows Script Host is a welcome tool.

Introducing Script Files Scripts look complex, but they’re actually nothing but simple text files. This means that you can create and edit script files using Notepad or some other text editor. You can use a such as WordPad to create and edit scripts, but you must make sure that you save these files using the program’s Text Only document type. For VBScript, a good alternative to Notepad is the editor that comes with either Visual Basic or any program that supports VBA (such as the Office suite). Just remember that VBScript is a subset of VBA (which is, in turn, a subset of Visual Basic), so it does not support all objects and features. 442 PART X Tools for Tweaking Windows

In a web page, you use the tags, and then surround those with the and tags. In the tag, include the id attribute and set it to a unique value that identifies the job. Finally, sur- round all the jobs with the and tags. Here’s an example:

Save the file using the (.wsf ) extension.

Using CScript for Command-Line If you write a lot of Scripts note scripts, the Microsoft Script Debugger is an excellent The Windows Script Host has a second host programming tool. If there’s a front-end application called CScript problem with a script, the - (CScript.exe), which enables you to run ger can help you pinpoint its scripts from the command line. In its sim- location. For example, the debug- ger enables you to step through plest form, you launch CScript and use the the script’s execution one state- name of the script file (and its path, if ment at a time. If you don’t have required) as a parameter, as in this example: the Microsoft Script Debugger, you can download a copy from cscript myscript.vbs msdn2.microsoft.com/ en-us/library/ms950396.aspx. CHAPTER 37 Running Scripts 445

The Windows Script Host displays the following banner and then executes the script:

Microsoft (R) Windows Script Host Version 5.6 for Windows Copyright () Microsoft Corporation. All rights reserved.

As with WScript, the CScript host has an extensive set of parameters you can specify:

CSCRIPT [filename] [arguments] [//B] [//D] [//E:engine] [//H:host] [//I] ➥[//Job:xxxx] [//S] [//T:ss] [//X] [//LOGO | //NOLOGO] [//U]

This syntax is almost identical to that of WScript, but it adds the following three parameters: //LOGO Displays the Windows Script Host banner at startup //NOLOGO Hides the Windows Script Host banner at startup //U Uses for redirected input/output from the console

Script Properties and .wsh Files In the previous two sections, you saw that the WScript and CScript have a number of parameters you can specify when you execute a script. It’s also possible to set some of these options by using the properties associated with each script file. To see these properties, right-click a script file and then click Properties. In the properties sheet that appears, display the Script , shown in Figure 37.1. You have two options: Stop Script After Specified Number of Seconds—If you activate this check box, Windows shuts down the script after it has run for the num- ber of seconds specified in the associated spin box. This is useful for scripts that might hang during execution. For example, a script that attempts to enumerate all the mapped network drives at startup might hang if the network is unavailable. Display Logo When Script Executed in Command Console—As you saw in the previous section, the CScript host displays some banner text when you run a script at the command prompt. If you deactivate this check box, the Windows Script Host suppresses this banner (unless you use the //LOGO parameter). 446 PART X Tools for Tweaking Windows

FIGURE 37.1 In a script file’s properties sheet, use the Script tab to set some default options for the script.

When you make changes to these properties, the Windows Script Host saves your settings in a new file that has the same name as the script file, except with the .wsh (Windows Script Host Settings) extension. For example, if the Rather than setting script file is MyScript.vbs, the settings are note properties for indi- stored in MyScript.wsh. These .wsh files are vidual scripts, you might prefer to text files organized into sections, much like set global properties that apply to the WScript host itself. Those .ini files. Here’s an example: global settings then apply to [ScriptFile] every script that runs using the Path=C:\Users\Paul\Documents\Scripts\ WScript host. To do this, run CreateShortcut.vbs WScript.exe without parameters. This displays the properties sheet [Options] for WScript, which contains only =10 the Script tab shown in Figure DisplayLogo=0 37.1. The settings you choose in the properties sheet are stored in To use these settings when running the the following Registry key: script, use either WScript or CScript and specify the name of the .wsh file: HKLM\Software\Microsoft\ Windows Script Host\Settings wscript myscript.wsh Index

Address bar (Internet Numerics Explorer) editing, 41 802.11n standard, 6 list, clearing, 106-108 searching with, 184-186 A adjusting rate of cursor, 206 abbreviating long filenames in font size, 207-209 Command Prompt, 432-433 admin approval mode Access Denied message, config- (Administrator account), uring for standard users, activating, 139 127-128 administrative hidden shares, accessing disabling, 342 Mac shares in Windows, 331, 334 Administrator account, 126, router setup , 22 135 Run command, 30 activating, 136, 138 admin approval mode, activating Administrator activating, 139 account, Command Prompt, running 136-139 automatically, 140-141 Activity Reporting (Parental programs, running, 143-144 Controls), 116 renaming, 71-72 ad hoc wireless networks, scripts, running, 141-142 creating, 374-376 Administrators group, 126 adding ads, removing from recorded icons to Quick Launch tool- TV shows, 252-254 bar, 380 advanced filters, 287 parameters to Command Prompt commands, 430-432 Aero Glass, 202 programs with Open With Aero interface, turning off, dialog box, 319 202 switches to Command Prompt animated , disabling, 43 commands, 430-432 anonymous proxy servers, 112 tabs to Windows Explorer, configuring, 114 320-321 web proxies, 112 448 antivirus programs

antivirus programs, 26 automatic startup launch blinking cursor, widening, application compatibility, configuring, 384 205-206 resolving in Windows using blocking Vista, 381-383 snap-in, 386-388 access to Registry, using Startup folder, 384 applications 406-407 using the Registry, 385 base priority, modifying, childrens’ access to preventing, 388-389 163 websites, 120-122 non-native documents, AutoSearch feature , 95-99 opening, 62-65 (Internet Explorer), 41 websites from adding performance, optimizing, cookies, 111 15 B Boolean operators, 293 restricting access to chil- broken services, resetting, dren, User Controls, Back Up Files Wizard 398-399 117-118 (Windows Vista), 298-300 security suites, 26 browsing history, deleting, background programs, 15 starting from Command 102-105 Prompt, 433-435 backing up built-in accounts, renam- grouping, 200 Registry, 407-408 ing, 71-72 customizing, 201-202 restore points, creating, disabling, 201 280-282 Windows Vista C APs (access points), signal backing up to network leakage, 368 changing, script properties, location, 298-300 446 AQS (Advanced Query restoring from Complete Syntax), properties, PC backup, 305-306 check boxes, selecting files, 288-289 Windows XP 54-55 ASR utility, restoring backing up to network clearing Address bar list in Windows XP, 306 location, 300-301 Internet Explorer, 106-108 assigning static IP backups, restoring to ClearType feature, turning addresses, 324-327 Vista, 307-308 on, 34-35 restoring with ASR utility, associating, documents 306 The Cloak, 112 with non-native applica- system image, creating clocks, displaying for dif- tions, 62-65 in Windows Vista, ferent time zones, 225 attachments (email) as 302-303 cmd.exe, switches, 428-429 security risk, 25 in Windows XP, 303-304 Command Prompt, 425 Audit Account Logon backup jobs, 300 access, preventing, 427 Events policy, error codes, Backup Utility, using in applications, starting, 73-78 Windows Vista, 309-310 433-435 auditing logon failures, 72, base priority, modifying, BCDEDIT, running, 427 75-78 163 cmd. exe, switches, 428-429 feature BCDEDIT, running within (Internet Explorer), 39 commands Command Prompt editing, 436-437 automatic installs, session, 427 entering multiple on disabling, 83 blink rate of cursor, adjust- single line, 436 automatic mode, ing, 206 parameters, 430-432 disabling on Vista, 347 defragmenting the hard drive in Windows XP 449

recalling, 435-436 proxy servers, 114 system image switches, 430-432 remote administration, in Windows Vista, folders, opening, 262 358-359 302-303 in Windows Vista, Remote connec- in Windows XP, 303-304 264-265 tions via the Internet, cropping photos, 241-242 in Windows XP, 262-264 358 long filenames, abbreviat- host IP address, deter- CScript, 444-445 ing, 432-433 mining, 356 Ctrl+Alt+Delete access, running automatically for listening port, changing, configuring, 21 Administrator account, 355-356 cursor 140-141 port forwarding, blink rate, adjusting, 206 sessions, starting, 426 enabling, 357 widening, 205-206 text, copying, 437 , custom logo, adding, 215 enabling, 356 command-line Windows Vista, 220-221 Windows Vista for multi- external commands, Windows XP, 216, 219 running, 429-430 ple monitors, 209 customizing internal commands, connecting to remote com- New menu, 314-317 running, 429-430 puters with scripts, Open With dialog box, scripts, running, 444-445 359-362 317-318 commands Contacts list, exporting to photo import names, , 325 , 46 243-244 , 261 converting in Start Places bar, 222 , 131-132 menu to menus, 175-176 using Group Policy commercials, removing cookies, 110-111 Editor, 223-224 from recorded TV shows, using the Registry, 225 copying text from 252, 254 Remote Desktop Command Prompt, 437 compatibility issues with Connection software, core (CPU), 391 programs, resolving in 351-354 Windows Vista, 381-383 CPUs rip settings on Windows core, 391 Media Player, 230-234 compatibility layers, 382 dual core, 391 Search box properties, complexity requirements processor affinity, config- 61-62 for passwords, enforcing, uring, 392 search providers, 188-189 148-150 processor scheduling, 15 taskbar grouping, 201-202 compressing video files, crackers, 20-24 254-256 cycles, 163 crawlers, 96 configuring creating Access Denied message custom search providers, D for standard users, 188-189 127-128 panoramic shots from default buttons, 36 Ctrl+Alt+Delete access, 21 multiple photos, 245 default sharing, disabling, direct -startup access, .reg files, 414-416 336 161 Registry keys, 416 DNS , 194-195 defragmenting the hard search folders, 294 OpenDNS, 191-194 drive in Windows XP, strong passwords, 146 policies, 423 269-272 processor affinity, 392 450 Delete Confirmation dialog boxes, disabling

Delete Confirmation dialog in Windows XP, 216, messages boxes, disabling, 56-57, 59 219 blocking, 95-99 deleting file extensions, 31-32 reading in , 26, browsing history, 102-105 Quick Launch icons, 380 93-95 Web History, XP computers in Windows replies, sending to differ- 108-110 Vista Network Map, ent address, 51 oldest files in a folder, 327-330 sending through custom 257-260 DNS database, configuring, SMTP port, 49-50 Registry keys, 415-417 194-195 enabling DHCP servers, 324 documents, opening in Administrator account, 136-138 dialog boxes, default non-native applications, ClearType feature, 34-35 button, 36 62-65 Guest account, 130-131 direct post-boot access, domain name resolution, Parental Controls, 115 configuring, 161 190 QuickEdit mode, 438 OpenDNS, 190-194 disabling security zones in Internet animated GIFs, 43 DOSKEY commands Explorer, 26 automatic installs, 83 editing, 436-437 protection on automatic startup launch multiple, entering on Windows Defender, 23 for programs, 388-389 single line, 436 write caching, 16 default sharing, 336 recalling, 435-436 encryption, 19, 79 hidden administrative downloading Group Policy WPA, 369 shares, 342 Settings Reference, 420 enforcing password Open With dialog box, DPI () setting, policies, 148-155 319 adjusting, 207-209 Recycle Bin Delete error codes for Audit Confirmations, 56-59 dual core CPUs, 391 Account Logon Events Recycle Bin Properties dynamic IP addresses, 324 policy, 73-75 command, 58-59 , displaying services, 166, 168-170 E Security log events, 75 SSID broadcasting, exact matches, finding in 370-371 Ease of Access Center, 207 , 293 startup GUI, 160 taskbar grouping, 201 editing exceptions transparency effects on command-line creating Aero interface, 10 commands, 436-437 for Windows Firewall, user accounts, 129-130 .reg files, 414 86-87, 90 Registry keys for discovering currently binary values, 413 Services in IIS 7, 92-93 logged on users, 132-133 DWORD, 413 scope, 86 Disk Management snap-in, QWORD, 413 executing multiple jobs in partitioning the hard string values, 412 scripts, 444 drive, 275-276 email, 45 execution core, 391 displaying attachments as security expiring users’ passwords, clocks for different time risk, 25 151-152 zones, 225 Contacts list, deactivating custom logos, 215 automatic update in Windows Vista, feature, 46 220-221 hard drives 451

exporting firewalls, 22 group policies, 420 Contacts list to text file, hardening, 84 parallel Registry settings, 46 testing, 22 420 Registry to .reg file, 409 Windows Firewall, creat- Remove Properties from extensions ing exceptions, 86-87, the Recycle Bin Context displaying, 31-32 90 Menu policy, 58 turning on, 33 flash drives, caching Group Policy Editor, external commands, SuperFetch, 11-14 419-420 running, 429-430 Flickr, publishing photos Access Denied message, to, 247 configuring for standard users, 127-128 Flip, 202 F Group Policy window, 422 Flip 3D, 202 launching, 421 favorite programs list, 173 folders logon failures, auditing, file downloads, blocking, adding to search index, 75 122 286 Places bar, customizing, file extensions, turning on, NTFS security permis- 223-224 33 sions, setting, 339 policies, configuring, 423 oldest files, deleting, usernames, hiding on file , selecting for 257-260 logon screen, 70 ripped music, 231-232 opening at command Group Policy Settings file sharing, 24 prompt, 262 Reference, downloading, disabling, 336 in Windows Vista, 420 enabling, 336-338 264-265 Group Policy snap-in, Mac shares, accessing in in Windows XP, 262-264 configuring automatic Windows, 331, 334 opening with single startup launch, 386-388 NTFS security permis- mouse click, 164-166 sions, setting, 339 taking ownership of, Group Policy window, 422 user accounts, creating, 265-267 Guest account 338-339 font size, adjusting, 207, enabling, 130-131 files 209 renaming, 71-72 deleting oldest from foreground programs, 15 folders, 257-260 encrypting, 79 forgotten passwords, H recovering, extensions, displaying, handles, 403 31-32 155-156 multiple, renaming, hard drive 261-262 G defragmenting in opening with single Windows XP, 269-272 partitioning, 273-276 mouse click, 164-166 Gigabit Ethernet, 7 searching for with Search hard drives global Windows Script Host box, 61-62 cache, 15 properties, setting, 446 selecting, 53-55 free space, determining video files, compressing, Google, deleting web on remote computers, 254-256 history, 108-110 277-280 filtering spam, 99 graphics performance, tun- performance, optimizing, ing with Visual Effects 15 finding exact matches in tab (System Properties SATA, 16 Windows Search, 293 dialog box), 8-9 452 hard drives

upgrading, 6 notification area icons, security zones, enabling, write caching, enabling, hiding, 197, 199-200 26 16 Quick Launch icons, tabbed browsing, 189-190 hardening your firewall, 84 displaying, 380 tabs, switching between, unused, removing from 42 hardware, upgrading, 6 Start menu, 179-180 IP addressing hidden accessories IIS 7 dynamic IP addresses, 324 (Windows XP), unin- installing, 90-91 information, displaying, stalling, 394 World Wide Web Services, 325 hidden shares, viewing, creating exceptions, static IP address, assign- 341 92-93 ing, 324-327 hidden wireless networks, import names (photos), ipconfig command, 325 connecting to, 371-374 customizing, 243-244 hiding importing Registry from J-K notification area icons, .reg file, 410 197-200 incoming messages, auto- JavaScript, 440 shared folders, 340 matically copying to usernames in logon jobs, 444 server, 47 screen, 68-70 increasing, DPI value, 207, highlighted programs keyboard shortcuts, select- 209 (Start menu), disabling, ing Quick Launch icons, 178-179 installed programs, writing 380 to text file, 396, 398 history buffer (DOSKEY), keys (Registry) recalling commands, installing binary values, editing, 435-436 IIS 7, 90-91 413 Remote Desktop HKEY_CLASSES_ROOT root creating, 416 Connection software on key, 403 deleting, 415-417 Windows XP, 350 DWORD, editing, 413 HKEY_CURRENT_CONFIG internal commands, editing, 412 root key, 404 429-430 QWORD, editing, 413 HKEY_LOCAL_MACHINE Internet, allowing Remote renaming, 416 root key, 404 Desktop connections, saving to favorites, 411 HKEY_USERS root key, 404 355-358 string values, editing, 412 subkeys, 404 hovering, 165 Internet Explorer searching for, 417 HTML (HyperText Markup Address bar keys pane (Registry Editor), Language), 93 editing, 41 403 hung processes, killing, list, clearing, 106-108 killing hung processes, 395-396 searching with, 184-186 animated GIFs, disabling, 395-396 hyperthreading, 392 43 AutoComplete feature, 39 L I browsing history, deleting, 102-105 launching Googe Web History, delet- icons Command Prompt ing, 108-110 adding to in Start menu, sessions, 426 home page, loading mul- 174 Group Policy Editor, 421 adding to Quick Launch tiple at startup, 37-39 toolbar, 380 networking 453

Local Security Policy long filenames, abbreviat- multiple files Editor, 422 ing in Command Prompt, renaming, 261-262 programs at startup, 384 432-433 selecting, 54 using Group Policy snap- lost passwords, recovering, multiple jobs, executing in in, 386-388 155-156 scripts, 444 using Startup folder, 384 using the Registry, 385 multiple logins Registry Editor, 402 M managing, 147, 151-155 password policies, enforc- Ad-Aware, 23 Mac shares, accessing in ing, 148-150 least-privileged user, 125 Windows, 331, 334 multiple monitor configu- legacy keys, 386 managing multiple logins, ration, 209 links (Start menu), - 147 music ing to menus, 175-176 password changes, requir- media sharing, enabling, loading multiple home ing, 151-155 234-236 pages at startup, 37-39 password policies, enforc- recording , ing, 148-150 selecting, 231-232 Local Security Policy recording quality, select- Editor, 422 McNealy, Scott, 101 ing, 233 Administrator account, media sharing, enabling, ripping to network loca- activating, 137 234, 236 tion, 234 Local Users and Groups memory on video cards, snap-in, activating viewing, 8 Administrators account, messages (email) N 137 blocking, 95-99 name column (Registry location, selecting for reading in plain text, Editor settings pane), ripped music, 230 93-95 404-405 locking your computer, Microsoft Script Debugger, NAS (network-attached 19-20 444 storage), 298 logged-on user accounts, minimum password natural language searches, discovering, 132-133 length, enforcing, 148-150 291-293 logging in modifying base priority of network location, selecting Ctrl+Alt+Delete access, programs, 163 for ripped music, 234 configuring, 21 monitors, multiple monitor Network Map, displaying direct-post-startup access, configuration, 209 configuring, 161 XP computers, 327-330 mouse logon failures, auditing, network sharing, enabling, hovering, 165 336-338 72, 75-78 pointer, moving to default logon screen, hiding user- button, 36 networking names, 68-70 single-clicking, configur- backing up to network, ing, 165-166 298 logos, customizing in Windows Vista, for Windows Vista, 215 MP3 files, 232 298-300 for Windows XP, 216, multiple commands, enter- in Windows XP, 300-301 219-221 ing on single line, 436 media sharing, enabling, 234-236 454 networking

recording TV shows to Outlook 2003, reading performance network, location, email in plain text, 26 enhancing with hardware 250-251 Outlook 2007, reading upgrades, 6 remote computers, deter- email in plain text, 26 graphics, tuning with mining hard disk space, Visual Effects tab 277-280 (System Properties static IP address, assign- Contacts list, deactivating dialog box), 8-9 ing, 324-327 automatic update optimizing, 15 feature, 46 prefetcher, 10 New menu, customizing, email, reading in plain 314-317 text, 26 permissions, 19 nonbroadcast wireless net- for accessing Registry, works, connecting to, setting, 408 371-374 P taking ownership of files, 265-267 notification area icons, packet sniffers, 369 hiding, 199-200 photos Pagefile. file, 283 cropping, 241-242 NTFS paging files panoramic, creating from files, encrypting, 79 moving to another hard multiple photos, 245 security permissions, drive, 283 photo import names, cus- setting, 339 optimizing, 282-283 tomizing, 243-244 panoramic shots, creating publishing to Flickr O from multiple photos, 245 account, 247 red eye, removing, 240 old passwords, preventing parameters adding to Command PIF (program information users from reusing, file) files, 431 153-155 Prompt commands, 430-432 pinned programs list, 173 Open With dialog box for Windows Script Host, Places bar, customizing, application, removing 443 222 from file type, 318 using Group Policy Editor, associating documents Parental Controls 223-224 with applications, 64-65 Activity Reporting, 116 using the Registry, 225 customizing, 317-318 enabling, 115 disabling, 319 Parkinson’s Law of Data, policies, configuring, 423 programs, adding/remov- 249 port forwarding, enabling, ing, 319 partitioning the hard 357 OpenDNS, configuring, drive, 273-276 prefetcher, 10 190-194 passwords, 20 preventing opening lost passwords, - Command Prompt access, documents in non-native ing, 155-156 427 applications, 62-65 multiple logins, manag- programs from starting files with single mouse ing, 147 automatically, 388-389 click, 164-166 policies, enforcing, users from changing pass- new tabs in Internet 148-155 words, 153 Explorer, 189 strong passwords, creat- optimizing ing, 146 paging file, 282-283 pasting text from performance, 15 Command Line, 437 remote computers 455

privacy Quick Launch toolbar, 380 automatic startup launch, cookies, 110-111 QuickEdit mode, 438 configuring, 385 proxy servers backing up, 407-408 configuring, 114 blocking access to, web proxies, 112-113 R 406-407 Player exporting to .reg file, 409 options, 105 RAM, increasing, 6 handles, 403 processors. See CPUs reading email in plain importing from .reg file, text, 26, 93-95 410 programs keys adding with Open With ReadyBoost, 11-14 creating, 416 list, 319 recalling command lines, deleting, 415-417 automatic startup launch, 435-436 editing, 412-413 preventing, 388-389 recorded TV shows, editing exporting to .reg file, base priority, modifying, out commercials, 252-254 409 163 renaming, 416 compatibility issues, recording TV shows to net- saving to Favorites, 411 resolving in Windows work location, 250-251 New menu, customizing, Vista, 381, 383 recording file format, 315-317 configuring to launch at selecting for ripped Open With dialog box, startup, 384 music, 231-232 customizing, 317-318 using Group Policy snap- recording quality, selecting parallel group policy set- in, 386-388 for ripped music, 233 tings, 420 using Startup folder, 384 recovering lost passwords, Places bar, customizing, using the Registry, 385 155-156 225 disabling highlighting in Recycle Bin delete confir- Start menu, 178-179 Recycle Bin mations, disabling, removing with Open With Delete Confirmation 58-59 list, 319 dialog boxes, disabling, Recycle Bin Properties running as administrator, 56-59 command 143-144 Properties command, disabling, 58-59 starting from Command disabling, 58-59 root keys, 403 Prompt, 433-435 red eye, removing from securing, 405 properties photos, 240 subkeys, 404 of AQS, 288-289 reducing time for run- searching for, 417 of scripts ning applications, 171 user name, changing, changing, 446 .reg files 411-412 viewing, 445 creating, 414-416 Registry Editor, 401 Proxity, 112 editing, 414 Find feature, 417 proxy servers, 112-114 exporting Registry keys keys pane, 403 to, 409 publishing photos to Flickr launching, 402 exporting Registry to, 409 account, 247 settings pane, 404-405 importing Registry from, remote administration, 410 configuring, 358-359 keys, deleting, 415 Q remote computers Registry TabBar, 320 connecting to with scripts, .reg files 359, 362 quality of recording, select- creating, 414-416 determining ing for ripped music, 233 editing, 414 version, 364-365 456 remote computers

determining Windows renaming version, 362-364 Administrator account, S hard disk space, deter- 71-72 SATA (Serial Advanced mining, 277-280 Guest account, 71-72 Technology Attachment) multiple files, 261-262 Remote Desktop hard drives, 16 Connection software Registry keys, 416 script tag, 442 allowing connections via replies (email), sending to the Internet, 358 different email address, scripting engine, 440 host IP address, deter- 51 scripts, 442 mining, 356 requiring users to change CScript, 444-445 listening port, changing, passwords, 151-155 installed programs, writ- 355-356 ing to text file, 396-398 resetting broken services, port forwarding, jobs, 444 398-399 enabling, 357 logon failures, auditing, Windows Firewall, con- resolving program compat- 76-78 figuring, 356 ibility issues in Vista, 381, Microsoft Script Debugger, customizing, 351-354 383 444 installing on Windows XP, restore points, creating, multiple jobs, executing, 350 280-282 444 Remote Desktop hosting, restoring properties configuring Run command to Start changing, 446 on Windows Vista, menu, 30 viewing, 445 347-349 Windows Vista from remote computers, con- on Windows XP, 349-350 Complete PC backup, necting to, 359, 362 running as administrator, Removable Storage 305-306 141-142 Management, restoring Windows XP backups to VBScript, 441 Windows XP backups to Vista, 307-308 version of service pack, Vista, 307-308 Windows XP with ASR utility, 306 determining on remote Remove Properties from computers, 364-365 the Recycle Bin Context restricting access to version of Windows, Menu policy, 58 children determining on remote removing Parental Controls, computers, 362-364 applications from file 115-116 Windows Script Host, type’s Open With menu, User Controls, 117-122 parameters, 443 318 rip setting, customizing on Search box, 59-62 commercials from , search engines, Address recorded TV shows, 230-234 bar-based searching, 252-254 root keys, 403 184-186 programs with Open With routers, configuring, 22 dialog box, 319 search folders, creating, red eye from photos, 240 RPC (Remote Procedure 294 stored remote desktop Call), 358 search prefix, 185 credentials, 343 run command, 30 search providers, customiz- unused icons from Start running ing, 188-189 menu, 179-180 commands, 429-430 REN command, 261 applications, reducing kill time, 171 scripts, 442-445 switches 457

searching security suites, 26 links, converting to advanced filters, 287 security zones, enabling in menus, 175-176 AQS properties and Internet Explorer, 26 pinned programs list, 173 values, 288-289 Run command, 30 for subkeys, 417 selecting Search box, 59-61 natural language files, 53-55 customizing, 61-62 searches, 291-293 Quick Launch icons, 380 shorcuts, adding to, 174 Windows , sending email messages unused icons, removing, adding folders to search replying to different 179-180 index, 286 address, 51 starting secure desktop mode, 127 through custom SMTP applications from port, 49-50 security Command Prompt, auditing logon failures, service pack version, deter- 433-435 72, 75-78 mining on remote com- Command Prompt ses- principles, 18 puters, 364-365 sions, 426 built-in accounts, renam- services, disabling, 166-170 startup. See also automatic ing, 71-72 settings pane (Registry startup launch Command Prompt access, Editor), 404-405 direct post-startup access preventing, 427 configuring, 161 shared folders, hiding, 340 Ctrl+Alt+Delete access, startup GUI, disabling, configuring, 21 sharing, enabling media 160 sharing, 234-236 email, 93-99 Startup folder, configuring encrypting files, 79 shortcuts, pinning to Start automatic startup encryption, 79 menu, 174 launch, 384 file sharing, 24 signal leakage, 368 firewalls, configuring, 22 startup items, creating locking your computer, single-clicking, configur- with the Registry, 386 19-20 ing, 164-166 static IP addresses, assign- maintaining system SMB (Server Message ing, 324-327 updates, 24 Block), 331 stored remote desktop cre- passwords, 20 SMTP, sending messages dentials, removing, 343 Registry, 405 through, 49-51 Stratton, Terri, 246 backing up, 407-408 Snap To feature, 36 blocking access to, strong passwords, creating, 406-407 Soper, Mark Edward, 251 146 user name, changing, spam, avoiding, 95-96, 99 subkeys, 404 411-412 spyware protection, 23 finding, 417 spyware protection, 23 SSID broadcasting, SuperFetch, 10 viruses, thwarting, 25-27 caching, 11-14 wireless networks, 368 disabling, 370-371 nonbroadcast wireless standard users group, 126 switches networks, connecting configuring Access Denied adding to Command to, 371-374 messages, 127-128 Prompt commands, 430-432 signal leakage, 368 START command, syntax, for cmd.exe, 428-429 SSID broadcasting, 433-434 disabling, 370-371 for WHOAMI command, Start menu 132 WPA, 369 highlighted programs, disabling, 178-179 458 switching between browser tabs

switching between browser transparency effects, turn- currently logged on, tabs, 42 ing off on Aero interface, determining, 132-133 syntax for START com- 10 disabling, 129-130 mand, 433-434 Trojan Horse programs, 25 Guest account, enabling, 130-131 system image, creating turning off Aero interface, standard users, configur- in Windows Vista, 202 ing Access Denied mes- 302-303 turning on sage, 127-128 in Windows XP, 303-304 ClearType feature, 34-35 User Controls System Properties dialog file extensions, 33 restricting access to box, graphics perform- TV shows children, 117-118 ance, tuning, 8-9 commercials, removing Time Limits, 118-120 system RAM, increasing, 6 from recordings, 252, Web Restrictions, 120-122 254 utility usernames recording to network loca- Registry, backing up, 408 changing with Registry, tion, 250-251 restore points, creating, 411-412 280-282 type column (Registry hiding in logon screen, Editor settings pane), 404 68, 70 T U V tabbed browsing, 41, 189-190 UAC (User Account values (AQS), 288-289 tabs, adding to Windows Control), 18 VBA for the Office 2007 Explorer, 320-321 least-privileged user, 125 System (Que, 2007), 440 taking ownership of files, uninstalling hidden acces- VBScript, 440-441 265-267 sories in Windows XP, 394 logon failures, auditing, Task Scheduler, configur- unneeded services, 78 ing automatic startup disabling, 166-170 version of service pack, launch, 384 unused icons, removing determining on remote taskbar grouping, 200 from Start menu, 179-180 computers, 364-365 customizing, 201-202 upgrading hardware, 6 version of Windows, deter- disabling, 201 user accounts mining on remote com- taskbar thumbnails, 202 Administrator account, puters, 362-364 testing firewalls, 22 135 video cards activating, 136-138 text, copying from effect on system perform- admin approval mode, Command Prompt, 437 ance, 8 139 memory, 8 threads, 42 Command Prompt, run- upgrading, 7 thwarting ning automatically, video files, compressing, crackers, 22-24 140-141 254-256 viruses, 25-27 programs, running, 143-144 viewing time limits, enforcing for hidden shares, 341 children, 118-120 scripts, running, 141-142 script properties, 445 time sucks, 197 creating for file sharing, time zones, displaying dif- 338-339 ferent clocks for, 225 Windows XP 459

virtual memory, paging spyware protection, command prompt, open- file enabling, 23 ing folders from, moving to another hard Windows Explorer, adding 264-265 drives, 283 tabs, 320-321 custom logo, displaying, optimizing, 282-283 220-221 Windows Firewall, 85 viruses, thwarting, 25-27 default button, 36 exceptions, creating, Event Viewer, displaying Vista. See Windows Vista 86-90 Security log events, 75 Visual Effects tab (System Windows Logo key, 380 hidden wireless networks, Properties dialog box), Windows connecting to, 371-372 tuning graphics perform- email, reading in plain locking your computer, ance, 8-9 text, 26 19-20 incoming messages, auto- Network Map, displaying W-X-Y-Z matically copying to XP computers, 327-330 server, 47 program compatibility issues, resolving, wardriving, 368 Windows Media Player 381-383 custom rip settings, creat- WAV files, 232 Quick Launch toolbar, ing, 230-234 web bugs, 93 380 privacy options, 105 web proxies, 112 ReadyBoost, 11-14 Windows Script Host, Registry, backing up, 407 Web Restrictions (User 440-442 See also Registry Controls), 120-122 CScript, 444-445 Registry Editor, launch- web servers, IIS 7 global properties, setting, ing, 402 exceptions, creating for 446 Remote Desktop hosting, World Wide Web Microsoft Script Debugger, configuring, 347-349 Services, 92-93 444 restoring from Complete installing, 90-91 parameters, 443 PC backup, 305-306 WEP (Wired Equivalent scripts, running, 442 search folders, creating, Privacy), 369 Windows Search Engine 294 WHOAMI command, exact matches, finding, SuperFetch, 10 131-132 293 caching, 11-14 folders, adding to search system image, creating, widening blinking cursor, index, 286 302-303 205-206 Windows thumbnails, 202 usernames, hiding on Window Search Engine, logon screen, 68 advanced filters, 287 Windows Vista ad hoc wireless networks, Windows Vista Guide to Windows Components creating, 374-376 Scripting, Automation, Wizard, uninstalling hid- Aero interface, turning off and Command Line Tools den accessories, 394 transparency effects, 10 (Que 2009), 426 Windows Configuration backing up to a network, Windows Vista Media utility, preventing auto- 298-300 Center, 251 matic startup launch for check box-based file selec- Windows XP programs, 389 tion, enabling, 54-55 ad hoc wireless networks, Windows Defender ClearType feature, turn- creating, 376 automatic startup launch, ing on, 34-35 backing up to a network, preventing for selected 300-301 programs, 389 460 Windows XP

Backup Utility, using in APs, signal leakage, 368 Vista, 309-310 nonbroadcasting, con- ClearType feature, turn- necting to, 371-374 ing on, 35 securing, 368 command prompt, open- SSID broadcasting, ing folders from, disabling, 370-371 262-264 WPA, 369 custom logo, displaying, WMA files, 231-232 216-219 default button, 36 WMA Pro files, 231 Event Viewer, displaying WMI (Windows Security log events, 75 Management hard drive, defragment- Instrumentation) script, ing, 269-272 determining free disk hidden accessories, unin- space on remote comput- stalling, 394 ers, 277-280 hidden wireless networks, WPA (Wi-Fi Protected connecting to, 372, 374 Access), 369 hung processes, killing, write caching, 16 395-396 locking your computer, writing installed programs 19-20 to text file, 396-398 Professional version, hid- ing usernames on logon screen, 68 Registry, backing up, 407-408. See also Registry Registry Editor, launch- ing, 402 Remote Desktop Connection software installing, 350 Remote Desktop hosting, configuring, 349-350 restoring with ASR utility, 306 system image, creating, 303-304 usernames, hiding on logon screen, 68 wireless networks ad hoc, creating in Windows Vista, 374-376 in Windows XP, 376