Paul Mcfedries Windows 98 Professional Reference Edition

Total Page:16

File Type:pdf, Size:1020Kb

Paul Mcfedries Windows 98 Professional Reference Edition Paul McFedries Windows 98 Professional Reference Edition Paul McFedries SAMS 201 West 103rd Street Indianapolis, IN 46290 Introduction xxxvi Part I Unleashing Windows 98 Installation and Startup 1 Preparing for the Windows 98 Installation 3 Look Before You Leap: How the Setup Process Works 4 Startup and System Check 4 Information Collection 7 Emergency Startup Disk Creation and File Installation 7 Hardware Detection 8 Windows 98 Configuration 10 Root Directory Files Created by Setup 11 What Happens to Existing DOS Files? 12 Windows 98 System Requirements 13 Preparing Your System: A Checklist 16 Check Your System Requirements 16 Back Up Your Files 16 Clean Up Your Hard Disk 17 Turn Off Internet Explorer 4's Web Integration 18 Reset "Numeric Tails" 18 If You're Upgrading, Prepare Windows 18 Check and Defragment Your Hard Disk 19 Create a Bootable Floppy Disk 20 Shut Down Any Unnecessary TSRs 21 Use MSD to Print a System Report 21 Some Notes About Dual- (and Multi-) Booting 22 Dual-Booting and FAT32 23 Dual-Booting with Windows 3.x 23 Dual-Booting with Windows NT 27 Dual-Booting with OS/2 Warp 28 Multi-Booting with Three or More Operating Systems 29 Summary 30 2 From Disc to Disk: Installing Windows 98 31 Getting Setup Started 32 Performing a Clean Installation 32 Options for Starting Setup 34 Running Setup from Your Hard Disk 34 Setup's Command-Line Options 34 After Setup Is Under Way 36 Supplying the Setup Wizard with Information 38 Select Directory 38 Change Directory 38 Save System Files 38 Setup Options 39 User Information 43 Windows Components 43 Select Components 44 Identification 45 Computer Settings 45 Establishing Your Location 45 Startup Disk 46 Start Copying Files 46 Finishing the Installation 46 Hardware Detection 46 Setting the Time Zone 47 Entering a Windows Password 47 The Home Stretch 48 Do You NeedAUTOEXEC.BAT and CONFIG.SYS? 48 Adding and Removing Windows 98 Components 49 Adding Windows 98 Components 50 Adding Components from the Windows 98 CD-ROM 50 Extracting Files from the Windows 98 Cabinet Archives 51 Using the Web to Update Your Windows 98 Configuration 51 Removing Windows 98 Components 53 Removing Your Old Windows Files 54 Uninstalling Windows 98 55 Using the Windows 98 Uninstall Feature 55 Uninstalling Windows 98 by Hand 57 Summary 58 3 Start Me Up: Controlling Windows 98 Startup 59 The Boot Process, from Powerup to Startup 60 Custom Startups with the Windows 98 Startup Menu 63 Logged (\B00TL0G.TXT) 64 Safe Mode 64 Step-by-Step Confirmation 65 Command Prompt Only 66 Safe Mode Command Prompt Only 66 Previous Version of MS-DOS 66 Shortcut Keys for Startup Menu Options 66 Paul McFedries' Windows 98 viii — UNLEASHED Custom Startups with MSDOS.SYS 67 Opening MSDOS. SYS 67 The [Paths] Section 69 The [Options] Section 70 Creating Your Own Startup Logo 72 Command-Line Switches for Starting Windows 98 73 Troubleshooting Windows 98 Startup 75 When to Use the Various Startup Menu Options 75 A Step-by-Step Strategy 78 Windows 98 Won't Start in Safe Mode 80 Miscellaneous Startup Snags 81 Understanding the Windows 98 Shutdown Process 86 The Shut Down Command 86 The Log Off Command 88 Customizing the Windows 98 Shutdown Screens 89 Summary 90 4 What's New and Noteworthy in Windows 98 91 The Web Comes to the Desktop 92 Windows 98 Knows the Internet 93 Support for New Hardware Gadgets 95 New Windows 98 System Tools 97 New Multimedia Bells and Whistles 99 Communications and Networking 100 Other New Shell and Customization Features 102 Making the Move from Windows 3.x 104 The Desktop: Your New Windows Home 104 Some New Windows 98 Concepts You Should Know 105 Understanding Windows 98 Objects 106 Folders: Directories and Then Some 109 Long Filenames (Finally!) 109 Shortcuts (Or, Can I Get There from Here?) 112 A Tour of the Taskbar 113 Control Panel: The Windows 98 Customization Center 121 Summary 124 Part II Unleashing Windows 98 Customization and Optimization 5 Web Integration and the Active Desktop 127 Why Integrate the Web? 128 Working with Web Integration 129 How Web Integration Affects the Windows 98 Interface 130 Turning Web Integration On and Off 131 Toggling Web Page View On and Off 132 Creating Custom Web Views for Your Folders 133 Customizing the Active Desktop 140 Toggling the Active Desktop On and Off 141 Changing the HTML Desktop Wallpaper 141 Adding Desktop Items 143 Working with Desktop Items 146 Summary 147 6 Customizing the Taskbar, Start Menu, and Display 149 Tweaking the Taskbar 150 Sizing the Taskbar 150 Moving the Taskbar 151 Displaying and Creating Taskbar Toolbars 152 Taskbar Properties 154 Customizing the Start Menu 156 Adding and Removing Start Menu Shortcuts 157 Working with the Start Menu Folder Directly 161 Start Menu Tricks 164 Display Settings: A Desktop to Call Your Own 168 Wallpapering the Desktop 168 Working with Desktop Patterns 169 Setting the Screen Saver 170 Renovating the Desktop: Colors, Fonts, and Sizes 172 Changing the Effects Properties 177 Changing the Display Settings 178 TweakUI: The Interface Power Toy 181 Summary 182 7 Setting Accessibility Options, User Profiles, and More 185 Accessible Windows: Working with the Accessibility Settings 186 Easier Access to the Keyboard 186 For the Hearing Impaired: SoundSentry and ShowSounds 189 For the Visually Impaired: High Contrast 190 Moving the Mouse Pointer via the Keyboard: MouseKeys 191 General Options for All Accessibility Settings 193 Easier Accessibility Access: The Accessibility Wizard 194 A Zoom with a View: Microsoft Magnifier 195 Personalized Windows: Working with User Profiles 196 Creating a User Profile 197 Working with User Settings 198 Worldwide Windows: Customizing the Regional Settings 199 Summary 200 Paul McFedries' Windows 98 UNLEASHED 8 Customizing the Mouse, Keyboard, and Other Input Devices 201 Manipulating Mouse Properties 202 Setting Up the Mouse for Southpaws 202 Setting the Double-Click Speed 203 Trying Different Pointers on for Size 203 Controlling the Tracking Speed 205 Activating Pointer Trails 205 Extra IntelliPoint Goodies 206 Customizing the Mouse with TweakUI 210 Customizing the Keyboard 211 Setting the Delay and Repeat Rate..... 211 Typing with the United States-International Keyboard Layout 212 Working with Keyboard Languages 214 Using the Microsoft Natural Keyboard 216 IntelliType Options 217 Calibrating a Game Controller 218 Summary 219 9 Performance Tuning: Optimizing Memory and Disk Access 221 Windows 98 and Memory: A Primer 223 Memory in the Pre-Windows 98 World 223 The Move to 32 Bits 226 How Windows 98 Handles Memory 227 Performance Tuning: General Considerations 231 Using System Monitor 232 Examining Performance Properties 234 General Performance Tuning Suggestions 235 Optimizing Memory 236 Using System Monitor to Track Memory Settings 237 Managing the Swap File 239 Optimizing System Resources 241 Miscellaneous Ideas for Optimizing Memory 244 Optimizing Disk Access 245 Optimizing Cluster Size 245 A Spring Cleaning for Your Hard Drive 253 Using Protected-Mode Drivers 254 Enabling Hard Drive DMA Support in Windows 98 255 Making Cache Adjustments 256 Overcoming File Fragmentation with Disk Defragmenter 259 Getting Started with Disk Defragmenter 260 Running Disk Defragmenter 261 Disk Defragmenter Settings 262 Using Disk Defragmenter from the Command Line 263 Summary 263 10 Getting the Most Out of Device Manager and Hardware Profiles 265 Windows 98's Hardware Innovations 266 The Situation Before Windows 98 266 Device Support in Windows 98 269 Understanding Device Drivers 271 Device Driver Architecture 271 Virtual Device Drivers Versus Real-Mode Drivers 272 Device Driver Loading at Startup 273 Understanding Plug and Play 275 The Plug and Play BIOS 275 Plug and Play Devices 276 Plug and Play in Windows 98: The Configuration Manager.... 276 Working with the Device Manager 277 Viewing Devices by IRQ, I/O Port, and DMA Channel 278 Printing a System Report 279 Removing a Device 280 Viewing Device Properties 280 Viewing and Adjusting a Device's Resources 281 Changing Drivers via the Device Manager 283 Adjusting Device Settings 284 Enabling IRQ Steering in Windows 98 285 Setting Up Hardware Profiles 286 Creating a New Hardware Profile 287 Adding and Removing Devices in a Hardware Profile 288 Dealing with Ambiguous Profiles 288 Notes About Hot-Docking and Hardware Profiles 289 Summary 290 11 Device Advice: Dealing with Devices in Windows 98 291 Adding New Hardware 292 The Plug and Play Phase 292 Automatically Detecting New Devices 293 Specifying New Devices Manually '. 293 Working with CD-ROM Drives 295 CD-ROM Drive Specifications 295 Windows 98 and CD-ROMs 297 The AutoPlay Feature 297 DVD: Welcome to the Next Level 298 Paul McFedries' Windows 98 I UNLEASHED Getting Great Graphics 299 Understanding Graphics Adapters 300 Installing a Graphics Adapter Driver 304 Windows 98 and Your Monitor 305 Changing the Monitor Type 305 Activating Your Monitor's Energy-Saving Features 306 Enabling Windows 98's Multiple-Monitor Support 307 Working with PC Card (PCMCIA) Devices 310 Windows 98 and PC Cards 310 Inserting a PC Card Device 311 Removing a PC Card Device 311 Setting PC Card Properties 312 Setting Up an Infrared Device 313 Adjusting the IrDA Driver's Properties 315 Transferring Files Via an Infrared Connection 317 Power Management in Windows 98: OnNow and ACPI 318 Understanding Advanced Power Management 319 Monitoring Battery Life 320 Working with Power Management Properties : 323 Drivers for Other Devices 323 Communications Device Drivers 324 Keyboard Device Drivers 324 Mouse Device Drivers 325 Printer Device
Recommended publications
  • Optimizing and Protecting Hard Drives ‐ Chapter # 9
    Optimizing and Protecting Hard Drives ‐ Chapter # 9 Amy Hissom Key Terms antivirus (AV) software — Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates’ VirusScan and Norton AntiVirus are two popular AV packages. backup — An extra copy of a file, used in the event that the original becomes damaged or destroyed. boot sector virus — An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems. buffer — A temporary memory area where data is kept before being written to a hard drive or sent to a printer, thus reducing the number of writes to the devices. chain — A group of clusters used to hold a single file. child, parent, grandparent backup method — A plan for backing up and reusing tapes or removable disks by rotating them each day (child), week (parent), and month (grandparent). cross-linked clusters — Errors caused when more than one file points to a cluster, and the files appear to share the same disk space, according to the file allocation table. defragment — To “optimize” or rewrite a file to a disk in one contiguous chain of clusters, thus speeding up data retrieval. differential backup — Backup method that backs up only files that have changed or have been created since the last full backup. When recovering data, only two backups are needed: the full backup and the last differential backup. disk cache — A method whereby recently retrieved data and adjacent data are read into memory in advance, anticipating the next CPU request.
    [Show full text]
  • MX2 Reference Guide, Rev A
    MX2 Reference Guide MX2A137REFGD October 2000 E-EQ-MX2RG-A-ARC Copyright © 2000 by LXE Inc. An EMS Technologies Company All Rights Reserved MX2A1 3 7REFGD REV I S I ON A REGULATORY NOTICES Notice: LXE Inc. reserves the right to make improvements or changes in the products described in this manual at any time without notice. While reasonable efforts have been made in the preparation of this document to assure its accuracy, LXE assumes no liability resulting from any errors or omissions in this document, or from the use of the information contained herein. Copyright Notice: This manual is copyrighted. All rights are reserved. This document may not, in whole or in part, be copied, photocopied, reproduced, translated or reduced to any electronic medium or machine-readable form without prior consent, in writing, from LXE Inc. Copyright © 2000 by LXE Inc., An EMS Technologies Company 125 Technology Parkway, Norcross, GA 30092, U.S.A. (770) 447-4224 LXE is a registered trademark of LXE Inc. All other brand or product names are trademarks or registered trademarks of their respective companies or organizations. Note: The original equipment’s Reference Manual is copyrighted by PSC® Inc. This manual has been amended by LXE® Inc., for the MX2 and Docking Stations with PSC’s express permission. Notice: The long term characteristics or the possible physiological effects of radio frequency electromagnetic fields have not been investigated by UL. FCC Information: This device complies with FCC Rules, part 15. Operation is subject to the following conditions: 1. This device may not cause harmful interference and 2.
    [Show full text]
  • Scala Infochannel Player Setup Guide
    SETUP GUIDE P/N: D40E04-01 Copyright © 1993-2002 Scala, Inc. All rights reserved. No part of this publication, nor any parts of this package, may be copied or distributed, transmitted, transcribed, recorded, photocopied, stored in a retrieval system, or translated into any human or computer language, in any form or by any means, electronic, mechanical, magnetic, manual, or otherwise, or disclosed to third parties without the prior written permission of Scala Incorporated. TRADEMARKS Scala, the exclamation point logo, and InfoChannel are registered trademarks of Scala, Inc. All other trademarks or registered trademarks are the sole property of their respective companies. The following are trademarks or registered trademarks of the companies listed, in the United States and other countries: Microsoft, MS-DOS, Windows, Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, DirectX, DirectDraw, DirectSound, ActiveX, ActiveMovie, Internet Explorer, Outlook Express: Microsoft Corporation IBM, IBM-PC: International Business Machines Corporation Intel, Pentium, Indeo: Intel Corporation Adobe, the Adobe logo, Adobe Type Manager, Acrobat, ATM, PostScript: Adobe Systems Incorporated TrueType, QuickTime, Macintosh: Apple Computer, Incorporated Agfa: Agfa-Gevaert AG, Agfa Division, Bayer Corporation “Segoe” is a trademark of Agfa Monotype Corporation. “Flash” and “Folio” are trademarks of Bauer Types S.A. Some parts are derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm. JPEG file handling is based in part on the work of the Independent JPEG Group. Lexsaurus Speller Technology Copyright © 1992, 1997 by Lexsaurus Software Inc. All rights reserved. TIFF-LZW and/or GIF-LZW: Licensed under Unisys Corporation US Patent No. 4,558,302; End-User use restricted to use on only a single personal computer or workstation which is not used as a server.
    [Show full text]
  • Microsoft Windows 95 Reviewer’S Guide
    1 CHAPTER 10 Systems Management Windows 95 is the first version of Windows expressly designed for manageability. The design ensures that management of the Windows 95 PC is accessible both locally and remotely via a privileged network manager. Network security is used to determine administrator-privileged accounts using pass-through security. Windows 95 also provides for PC users to be logically separated from the underlying configuration of their PCs so that the PC and user configurations and privileges can be managed independently. As a result, network managers can allow users to “rove” on the network—that is, log on from virtually any PC on the network and then operate from a desktop that has the correct settings and network privileges. The logical separation also means that a single PC can be shared by multiple users, each with a different desktop configuration and different network privileges. Given the proliferation of PCs connected to corporate networks, the Windows 95 PC must be able to participate in any network-wide management schemes. Windows 95 is designed to meet various network management criteria by providing built-in support for several of the key network management standards. With this infrastructure built into Windows 95, network management applications will be able to provide tools for network managers to keep PCs and networks running more efficiently and cost effectively. Open management interfaces are key to the management implementation in Windows 95. Where a standard exists, Windows 95 implements an enabling technology to embrace the standard—for example, an SNMP agent is supplied to enable remote management of Windows 95 PCs via any number of third-party SNMP consoles.
    [Show full text]
  • Install Guide
    THIS BOX CONTAINS: • (1) CD (your game!) • Install Guide (16 pp.) with quick installation instructions, directions for creating a floppy boot disk, configurations for a variety of memory management systems and Troubleshooting answers to possible problems. • Playguide (24 pp.) covering movement, fighting, interaction and so on. • Reference Card lists keyboard commands for a single-glance reminder. • Top Line — news brief, courtesy of the World Economic Consortium. • Anti-Terrorist Site Security — guide to keeping your WEC installation safe from armored, gun-toting turncoats and other menaces, annotated by General Maxis. • Resistance Handbook — written briefing for new rebel recruits. • Registration Card — please tell us who you are! CRUSADER: NO REMORSE ™ INSTALL GUIDE Welcome to Crusader: No Remorse. This guide includes quick installation instructions for users more familiar with the process, and a detailed, step-by- step guide to installing the game. If you experience any difficulty, consult Troubleshooting (page 9). To avoid compatibility or memory problems, please take a moment to confirm that your machine matches the System Require- ments described on page 2. Remember, you may safely stop at any time during installation and return to DOS with q, except when files are being copied. QUICK INSTALLATION Note: If you are running a disk cache such as SMARTDrive, you need to disable it to ensure a clean installation. (This only affects the installation of the game. SMARTDrive will work normally during gameplay.) Refer to your SMARTDrive documentation or make a system boot disk as described in Boot Disks (page 4) to disable this cache. 1. Turn on your computer and wait for the DOS prompt.
    [Show full text]
  • Hacks, Cracks, and Crime: an Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Missouri, St. Louis University of Missouri, St. Louis IRL @ UMSL Dissertations UMSL Graduate Works 11-22-2005 Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers Thomas Jeffrey Holt University of Missouri-St. Louis, [email protected] Follow this and additional works at: https://irl.umsl.edu/dissertation Part of the Criminology and Criminal Justice Commons Recommended Citation Holt, Thomas Jeffrey, "Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers" (2005). Dissertations. 616. https://irl.umsl.edu/dissertation/616 This Dissertation is brought to you for free and open access by the UMSL Graduate Works at IRL @ UMSL. It has been accepted for inclusion in Dissertations by an authorized administrator of IRL @ UMSL. For more information, please contact [email protected]. Hacks, Cracks, and Crime: An Examination of the Subculture and Social Organization of Computer Hackers by THOMAS J. HOLT M.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2003 B.A., Criminology and Criminal Justice, University of Missouri- St. Louis, 2000 A DISSERTATION Submitted to the Graduate School of the UNIVERSITY OF MISSOURI- ST. LOUIS In partial Fulfillment of the Requirements for the Degree DOCTOR OF PHILOSOPHY in Criminology and Criminal Justice August, 2005 Advisory Committee Jody Miller, Ph. D. Chairperson Scott H. Decker, Ph. D. G. David Curry, Ph. D. Vicki Sauter, Ph. D. Copyright 2005 by Thomas Jeffrey Holt All Rights Reserved Holt, Thomas, 2005, UMSL, p.
    [Show full text]
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • Strategies of Computer Worms
    304543_ch09.qxd 1/7/05 9:05 AM Page 313 CHAPTER 9 Strategies of Computer Worms “Worm: n., A self-replicating program able to propagate itself across network, typically having a detrimental effect.” —Concise Oxford English Dictionary, Revised Tenth Edition 313 304543_ch09.qxd 1/7/05 9:05 AM Page 314 Chapter 9—Strategies of Computer Worms 9.1 Introduction This chapter discusses the generic (or at least “typical”) structure of advanced computer worms and the common strategies that computer worms use to invade new target systems. Computer worms primarily replicate on networks, but they represent a subclass of computer viruses. Interestingly enough, even in security research communities, many people imply that computer worms are dramatically different from computer viruses. In fact, even within CARO (Computer Antivirus Researchers Organization), researchers do not share a common view about what exactly can be classified as a “worm.” We wish to share a common view, but well, at least a few of us agree that all computer worms are ultimately viruses1. Let me explain. The network-oriented infection strategy is indeed a primary difference between viruses and computer worms. Moreover, worms usually do not need to infect files but propagate as standalone programs. Additionally, several worms can take con- trol of remote systems without any help from the users, usually exploiting a vul- nerability or set of vulnerabilities. These usual characteristics of computer worms, however, do not always hold. Table 9.1 shows several well-known threats. Table
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • Software Deployment by GPO the Next Area to Look at Is Software Deployment Gpos
    MCITP 70-622 Exam Cram: Supporting and Troubleshooting Applications on a Associate Publisher Windows Vista® Client for Enterprise Support Technicians David Dusthimer Copyright © 2008 by Que Publishing All rights reserved. No part of this book shall be reproduced, stored in a retrieval sys- Executive Editor tem, or transmitted by any means, electronic, mechanical, photocopying, recording, or Betsy Brown otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein. Although every Development Editor precaution has been taken in the preparation of this book, the publisher and authors Box Twelve assume no responsibility for errors or omissions. Nor is any liability assumed for dam- Communications, Inc. ages resulting from the use of the information contained herein. ISBN-13: 978-0-7897-3719-9 Technical Editors ISBN-10: 0-7897-3719-1 Chris Crayton Pawan Bhardwaj Library of Congress Cataloging-in-Publication Data Mancuso, Paul. Managing Editor MCITP 70-622 exam cram / Paul Mancuso, David Miller. Patrick Kanouse p. cm. Project Editor ISBN 978-0-7897-3719-9 (pbk. w/cd) Seth Kerney 1. Electronic data processing personnel—Certification. 2. Microsoft software— Examinations—Study guides. 3. Microsoft Windows (Computer file) I. Miller, David. Copy Editor II. Title. Chuck Hutchinson QA76.3.M3245 2008 005.4’46—dc22 Indexer 2008016537 WordWise Printed in the United States of America Publishing, Inc. First Printing: May 2008 Trademarks Proofreader All terms mentioned in this book that are known to be trademarks or service marks Kathy Ruiz have been appropriately capitalized. Que Publishing cannot attest to the accuracy of this information.
    [Show full text]
  • Case Study: Internet Explorer 1994..1997
    Case Study: Internet Explorer 1994..1997 Ben Slivka General Manager Windows UI [email protected] Internet Explorer Chronology 8/94 IE effort begins 12/94 License Spyglass Mosaic source code 7/95 IE 1.0 ships as Windows 95 feature 11/95 IE 2.0 ships 3/96 MS Professional Developer’s Conference AOL deal, Java license announced 8/96 IE 3.0 ships, wins all but PC Mag review 9/97 IE 4.0 ships, wins all the reviews IE Feature Chronology IE 1.0 (7/14/95) IE 2.0 (11/17/95) HTML 2.0 HTML Tables, other NS enhancements HTML <font face=> Cell background colors & images Progressive Rendering HTTP cookies (arthurbi) Windows Integration SSL Start.Run HTML (MS enhancements) Internet Shortcuts <marquee> Password Caching background sounds Auto Connect, in-line AVIs Disconnect Active VRML 1.0 Navigator parity MS innovation Feature Chronology - continued IE 3.0 (8/12/96) IE 3.0 - continued... IE 4.0 (9/12/97) Java Accessibility Dynamic HTML (W3C) HTML Frames PICS (W3C) Data Binding Floating frames HTML CSS (W3C) 2D positioning Componentized HTML <object> (W3C) Java JDK 1.1 ActiveX Scripting ActiveX Controls Explorer Bars JavaScript Code Download Active Setup VBScript Code Signing Active Channels MSHTML, SHDOCVW IEAK (corporations) CDF (XML) WININET, URLMON Internet Setup Wizard Security Zones DocObj hosting Referral Server Windows Integration Single Explorer ActiveDesktop™ Navigator parity MS innovation Quick Launch, … Wins for IE • Quality • CoolBar, Explorer Bars • Componetization • Great Mail/News Client • ActiveX Controls – Outlook Express – vs. Nav plug-ins
    [Show full text]
  • How to Use Rules in Outlook and Outlook Express to Forward Email
    How to use rules in Outlook and Outlook Express to forward email. In Outlook Express (6) 1. Click on the Tools menu and select Options. 2. In options select the Send tab. 3. Make sure the settings for Mail Sending Format has the Plain Text radio button selected. 4. Then click the Plain Text Settings button. 5. Leave the Message format on “MIME”. 6. Uncheck the box at the bottom that says “Indent the original text with…”. 7. Click OK. 8. Now click on the Signatures tab. 9. Make sure if you have a signature(s) listed that the box labeled “Don’t add signatures to Replies and Forwards” is checked. Then click OK. 10. Click on the Tools menu and select Message Rules, and then select Mail. 11. Click on the Mail Rules tab. 12. Click the New Button. 13. In the area labeled 1. Select the Conditions for your rule: Select the box next to Where the Subject line contains specific words (in this example we will use the subject but you could use account or email address if desired). 14. Then in the area labeled 2. Select the Actions for your rule: Select the box next to Forward it to people. 15. In the area labeled 3. Rule Description… click on the blue link that says “contains specific words” then type your member code in the box and click on the Add Button and then click OK. 16. Then in the same area click on the blue link that says “people”, then type in the email address of where you want the email to automatically forward to and then click OK.
    [Show full text]