Tricks of the Microsoft Windows Vista Masters / J

Total Page:16

File Type:pdf, Size:1020Kb

Tricks of the Microsoft Windows Vista Masters / J of the Microsoft® Vista Windows ™ J. Peter Bruzzese 800 East 96th Street Indianapolis, Indiana 46240 USA Tricks of the Microsoft® Windows Vista™ Masters ASSOCIATE PUBLISHER Copyright © 2007 by Que Publishing Greg Wiegand All rights reserved. No part of this book shall be reproduced, stored in a retrieval system, or transmitted by any means, electronic, mechanical, photocopying, record- ing, or otherwise, without written permission from the publisher. No patent liability ACQUISITIONS EDITOR is assumed with respect to the use of the information contained herein. Although Loretta Yates every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions. Nor is any liability assumed DEVELOPMENT EDITOR for damages resulting from the use of the information contained herein. Todd Brakke 10-Digit International Standard Book Number: 0-7897-73689-6 13-Digit International Standard Book Number: 978-0-7897-73689-5 MANAGING EDITOR Bruzzese, J. Peter. Gina Kanouse Tricks of the Microsoft Windows Vista masters / J. Peter Bruzzese. — 1st ed. p. cm. PROJECT EDITOR ISBN 0-7897-3689-6 George E. Nedeff 1. Microsoft Windows (Computer file) 2. Operating systems (Computers) I. Title. QA76.76.O63B782157 2007 005.4’46—dc22 COPY EDITOR 2007012299 Megan Wade Printed in the United States of America SENIOR INDEXER First Printing: May 2007 Cheryl Lenser Trademarks All terms mentioned in this book that are known to be trademarks or service marks PROOFREADER have been appropriately capitalized. Que Publishing cannot attest to the accuracy of Harrison Ridge this information. Use of a term in this book should not be regarded as affecting the Editorial Services validity of any trademark or service mark. Warning and Disclaimer TECHNICAL EDITOR Terri Stratton Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis. PUBLISHING COORDINATOR Bulk Sales Cindy Teeters Que Publishing offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales. For more information, please contact MULTIMEDIA DEVELOPER U.S. Corporate and Government Sales Dan Scherf 1-800-382-3419 [email protected] BOOK DESIGNER For sales outside of the U.S., please contact Anne Jones International Sales [email protected] COMPOSITOR Jake McFarland Contents at a Glance Introduction . 1 1 General Tips and Tricks of the Masters . 7 2 Mastering the Control Panel . 51 3 Mastering Administration . 101 4 Security Enhancements . 135 5 Disk Configuration and Volume Tricks . 181 6 Office 2007 Tricks for Vista Masters . 209 7 Master Vista Networking . 233 8 System Recovery and Diagnostic Tricks . 259 9 Mastering the New Vista Apps . 297 10 Group Policy Power . 319 Index . 339 Table of Contents Introduction . .1 Who Are the Vista Masters? . .2 1 General Tips and Tricks of the Masters . .7 Where to Begin . .7 The Welcome Center . .8 Altering the Welcome Center . .9 Disabling the Welcome Center . .10 Shortcut Keys . .10 Windows Key Shortcuts . .11 User Logging Shortcuts . .12 Creating Your Own Shortcuts . .13 Beyond Vista Tools . .14 Desktop Customization . .15 Enhance Explorer Performance . .15 Changing the Boot Graphic . .16 Start Menu Configuration . .17 Command Prompt for Administrators . .19 Tweaking the Clock . .21 Vista DPI Scalings . .22 Using Shift to Slow Down Animations . .23 The Windows Sidebar . .24 Group Policy Settings . .25 Creating a Gadget . .25 The Boot Process: From XP to Vista . .26 Booting Up in XP . .26 The Vista Boot Process . .27 Editing the Boot Process . .28 Dual-Booting XP and Vista . .31 Removing Vista from Your Dual-Boot System . .32 Contents v MSCONFIG: The System Configuration Tool . .33 General . .34 Boot . .34 Services . .35 Startup . .35 Tools . .36 Additional Information . .37 Shortcut Menu: “Shift” Your Shortcuts . .37 Windows Explorer . .39 Saved Searches: What Are They, and How Can You Make Your Own? . .40 Enabling the Preview Pane . .41 Improvements to the Explorer UI . .42 Selecting Files with Check Boxes. .42 Search: The Next Generation . .43 Search Box Tips . .44 Natural Language Search . .45 File List Heading Tips . .46 Beyond the Standard Search: Advanced Search Options . .47 Some Final Search Points: Internet Search, Control Panel Search . .48 Metadata: Organizing Your Documents, Music, and Pictures . .49 How Do You Add Metadata? . .49 Erasing Metadata Before You Share a Document . .50 2 Mastering the Control Panel . .51 Configuring the Control Panel . .51 Expanding Control Panel from the Start Menu . .52 Getting to Applets As Quickly As Possible . .53 Creating a Customized Control Panel Folder . .55 Breaking Down the Control Panel Applets . .56 Add Hardware . .56 AutoPlay . .58 Date and Time . .59 Default Programs . .59 vi Tricks of the Microsoft Windows Vista Masters Device Manager . ..
Recommended publications
  • Unified, Easy-To-Manage Endpoint Security
    Unified, Easy-to-Manage Endpoint Security Microsoft® Forefront™ Protect Business Continuity with Improved Management Client Security protects of Endpoint Security laptops, desktops, and file The release of the next generation of on Windows firewall activities. The agent servers with integrated Forefront client security protects business incorporates proven technologies already protection against laptops, desktops, and file servers against in use on millions of computers worldwide malware. It simplifies viruses, spyware, rootkits, and other and is backed by efficient and effective control of endpoint malware. The solution includes: threat response from the Microsoft security and provides n A single agent that provides antivirus Malware Protection Center. better visibility into the and antispyware protection, vulnerability Forefront Client Security is designed to overall protection of the assessment and remediation, and host simplify administration and save valuable environment. Defenses firewall management. time through its single management are easily managed from n A central management server that console and policy configuration, the Microsoft Forefront enables administrators to configure, central update infrastructure, and Management Console update, and report on agent activity automated endpoint discovery. It also code-named “Stirling.” across the enterprise. integrates with existing investments in Microsoft technologies. The two components work together to www.microsoft.com/ provide unmatched visibility and control To reduce risk,
    [Show full text]
  • Microsoft Security Update for January 2020 Fixes 49 Security Vulnerabilities
    Microsoft Security Update for January 2020 Fixes 49 Security Vulnerabilities Overview Microsoft released the January security update on Tuesday, fixing 49 security issues ranging from simple spoofing attacks to remote code execution, discovered in products like .NET Framework, Apps, ASP.NET, Common Log File System Driver, Microsoft Dynamics, Microsoft Graphics Component, Microsoft Office, Microsoft Scripting Engine, Microsoft Windows, Microsoft Windows Search Component, Windows Hyper-V, Windows Media, Windows RDP, Windows Subsystem for Linux, and Windows Update Stack. Of the vulnerabilities fixed by Microsoft's this monthly update, a total of eight critical vulnerabilities exist in the .NET Framework, ASP.NET, Microsoft Scripting Engine, and Windows RDP. In addition, there are 41 important vulnerabilities. Critical Vulnerabilities The following are eight critical vulnerabilities covered in this update. @NSFOUS 2020 http://www.nsfocus.com Windows RDP CVE-2020-0609、CVE-2020-0610 These two remote code execution vulnerabilities in the Windows Remote Desktop Gateway (RD Gateway) could be exploited by unauthenticated attackers. If the two vulnerabilities are exploited successfully, arbitrary code may be executed on the target system, allowing the attacker to install the program, view, change or delete data, or create a new account with full user rights. To exploit this vulnerability, an attacker needs to send a specially crafted request to the RD gateway of the target system via RDP. This update addresses these issues by correcting the way the RD gateway handles connection requests. For more details about the vulnerabilities and download updates, please refer to Microsoft's official security advisories: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0609 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0610 CVE-2020-0611 This is a remote code execution vulnerability in Windows Remote Desktop clients.
    [Show full text]
  • Rootkit- Rootkits.For.Dummies 2007.Pdf
    01_917106 ffirs.qxp 12/21/06 12:04 AM Page i Rootkits FOR DUMmIES‰ 01_917106 ffirs.qxp 12/21/06 12:04 AM Page ii 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iii Rootkits FOR DUMmIES‰ by Larry Stevenson and Nancy Altholz 01_917106 ffirs.qxp 12/21/06 12:04 AM Page iv Rootkits For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2007 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permit- ted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission.
    [Show full text]
  • Internet Explorer 9 Features
    m National Institute of Information Technologies NIIT White Paper On “What is New in Internet Explorer 9” Submitted by: Md. Yusuf Hasan Student ID: S093022200027 Year: 1st Quarter: 2nd Program: M.M.S Date - 08 June 2010 Dhaka - Bangladesh Internet Explorer History Abstract: In the early 90s—the dawn of history as far as the World Wide Web is concerned—relatively few users were communicating across this Internet Explorer 9 (abbreviated as IE9) is the upcoming global network. They used an assortment of shareware and other version of the Internet Explorer web browser from software for Microsoft Windows operating system. In 1995, Microsoft Microsoft. It is currently in development, but developer hosted an Internet Strategy Day and announced its commitment to adding Internet capabilities to all its products. In fulfillment of that previews have been released. announcement, Microsoft Internet Explorer arrived as both a graphical Web browser and the name for a set of technologies. IE9 will have complete or nearly complete support for all 1995: Internet Explorer 1.0: In July 1995, Microsoft released the CSS 3 selectors, border-radius CSS 3 property, faster Windows 95 operating system, which included built-in support for JavaScript and embedded ICC v2 or v4 color profiles dial-up networking and TCP/IP (Transmission Control support via Windows Color System. IE9 will feature Protocol/Internet Protocol), key technologies for connecting to the hardware accelerated graphics rendering using Direct2D, Internet. In response to the growing public interest in the Internet, Microsoft created an add-on to the operating system called Internet hardware accelerated text rendering using Direct Write, Explorer 1.0.
    [Show full text]
  • INSECURE-Mag-8.Pdf
    Hello everyone, welcome to issue 8 of (IN)SECURE. We’re happy to report that our subscriber list is growing strong. This, combined with the e-mails and quality article submissions, is a clear indication that the security community has embraced this concept and found it to be a valuable resource. This issue is packed full with material for every knowledge level and will especially be of interest to those that want to know more about the inner workings of the Payment Card Industry since we got two articles related to the topic. Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com Defend Windows web servers with ThreatSentry 3.0 ThreatSentry 3.0 is a Host Intrusion Prevention System (HIPS) specifically designed to address internal and external unauthorized system access and cyber-criminal threats on Web servers utilizing Microsoft Internet Information Services (IIS). Since its introduction, IIS has grown in popularity and ranks as one of the most widely used platforms for enabling simple to sophisticated Web sites and Web-based applications.
    [Show full text]
  • Security Policy Page 1 of 20
    Security Policy Page 1 of 20 Security Policy This security policy contains data to configure services and network security based on the server’s role, as well as data to configure registry and auditing settings. Server: VENGWIN207 Services Service Name Startup Mode Description Issues, manages, and removes X.509 certificates for such applications such as Active Directory Certificate S/MIME and SSL. If the service is stopped, Disabled Services certificates will not be issued. If this service is disabled, any services that explicitly depend on it will fail to start. AD DS Domain Controller service. If this service is stopped, users will be unable to log Active Directory Domain Services Disabled on to the network. If this service is disabled, any services that explicitly depend on it will fail to start. AD FS Web Agent Authentication The AD FS Web Agent Authentication Service Disabled Service validates incoming tokens and cookies. Adobe Acrobat Updater keeps your Adobe Adobe Acrobat Update Service Automatic software up to date. Sends logging messages to the logging database when logging is enabled for the Active Directory Rights Management Services role. If this service is disabled or stopped AdRmsLoggingService Disabled when logging is enabled, logging messages will be stored in local message queues and sent to the logging database when the service is started. Processes application compatibility cache Application Experience Disabled requests for applications as they are launched Provides administrative services for IIS, for example configuration history and Application Pool account mapping. If this Application Host Helper Service Disabled service is stopped, configuration history and locking down files or directories with Application Pool specific Access Control Entries will not work.
    [Show full text]
  • Companion to Deliverable D3.1 Survey on DPWS
    Ref. Ares(2011)1133498 - 24/10/2011 ICT IP Project Companion to Deliverable D3.1 Survey on DPWS http://www.choreos.eu template v8 Project Number : FP7-257178 Project Title : CHOReOS Large Scale Choreographies for the Future Internet Deliverable Number : Companion to D3.1 Title of Deliverable : Survey on DPWS Nature of Deliverable : Report Dissemination level : Public Licence : Creative Commons Attribution 3.0 License Version : 1.0 Contractual Delivery Date : 30 September 2011 Contributing WP : WP3 Editor(s) : Sandrine Beauche (INRIA) Author(s) : Sandrine Beauche (INRIA) Abstract Device Profile for Web Service (DPWS) is a specification to enable Web Services on resource constrained devices. In particular, tackling the mobility of these devices, this specification allows discovering services dynamically and accessing them. So, DPWS seems to be successor to UPnP, relying on a subset of the Web Services standards and SOAP messages over UDP in order to deal with resource constraints. The founders of this specification are Microsoft as well as the actors of the SIRENA European ITEA project, who aimed at leveraging SOA architectures to seamlessly interconnect embedded devices in the domain of industrial applications, telecommunications and automation. This project was a first promising contribution. As a follow-up to this, these actors are working on (1) extensions to add more features, like reliability and security, (2) new implementations to deal with a higher diversity of devices, from tiny devices to servers, and (3) tools to facilitate incorporating DPWS in other new technologies, and to improve device management in Windows or e-Management in factories. In this document, we survey the DPWS specifications, the existing implementations, and the related projects that apply or improve DPWS.
    [Show full text]
  • Copyrighted Material
    Index Numerics Address Resolution Protocol (ARP), 1052–1053 admin password, SOHO network, 16-bit Windows applications, 771–776, 985, 1011–1012 900, 902 Administrative Tools window, 1081–1083, 32-bit (x86) architecture, 124, 562, 769 1175–1176 64-bit (x64) architecture, 124, 562, 770–771 administrative tools, Windows, 610 administrator account, 1169–1170 A Administrators group, 1171 ADSL (Asynchronous Digital Subscriber Absolute Software LoJack feature, 206 Line), 1120 AC (alternating current), 40 Advanced Attributes window, NTFS AC adapters, 311–312, 461, 468–469 partitions, 692 Accelerated Graphics Port (AGP), 58 Advanced Computing Environment (ACE) accelerated video cards (graphics initiative, 724 accelerator cards), 388 Advanced Confi guration and Power access points, wireless, 996, 1121 Interface (ACPI) standard, 465 access time, hard drive, 226 Advanced Graphics Port (AGP) card, access tokens, 1146–1147 391–392 Account Operators group, 1172 Advanced Graphics Port (AGP) port, 105 ACE (Advanced Computing Environment) Advanced Host Controller Interface (AHCI), initiative, 724 212–213 ACPI (Advanced Confi guration and Power Advanced Micro Devices (AMD), 141–144 Interface) standard, 465 Advanced Packaging Tool (APT), 572 Action Center, 1191–1192 Advanced Power Management (APM) Active Directory Database, 1145–1146, 1183 standard, 465 active heat sink, 150 Advanced Programmable Interrupt active matrix display, LCD (thin-fi lm Controller (APIC), 374 transistor (TFT) display), 470 Advanced RISC Computing Specifi cation active partition, 267,
    [Show full text]
  • Online Xml to Xsd Schema
    Online Xml To Xsd Schema Hyman enchants scoldingly while bendy Wilton meddle close or pickles gaudily. Synchromesh Ingamar commercialise euhemeristically and stellately, she staving her dressings synchronise mesally. Forrester is volitionally unsoftening after expired Lenard revoke his physalias diaphanously. Vb is located on the xml instance files from that you find a xml online to xsd schema output csv in the left it Generate editable HTML5 forms for any XML Schema XML schemas XSDs contain more wealth of information about release data is allowed in an. If you are not been logged and enumerations, or drawing in xsd online calculation of these analytical services defined by using xmllint to transfer the. An XML Schema document is created and opened for each namespace found there the XML file Each schema is opened as casual temporary. Online free environment to generate XSD schema from XML data have now. Free Online XSD to XML Converter The Generate Sample XML feature generates a sample XML file based on your XML Schema XSD file You made use this. A growing complex of XML schema-creation tools are becoming available option's a. It preserves schema entities, xml schema components by mastering science and warning could make it is temporarily suspended for. Convert XML Schema XSD to Java Pojo Classes Online. Free Online XML Validator Against XSD Schema Tool. How to generatecreate a schema xsd from an XML document Step 1 click Open File button and empire the xml file from the file system made you cloud access or love the xml file from internet via URL click By URL Step 2 click the Generate XSD button the generated schema will be displayed in an indented XML format.
    [Show full text]
  • Emaintenance Related Ontologies
    Technical Report eMaintenance Related Ontologies By Mustafa Aljumaili Karina Wandt Under the Supervision of Ramin Karim Division of Operation, Maintenance and Acoustics Engineering Luleå University of Technology, 2012. 1 Preface Standards, data exchange models and communication protocols are important aspects in order to achieve data interoperability between different systems in Maintenance, operations and inside an organization hierarchy. In addition, the demand of reusable software components has also increased significantly in industrial field that lead to research accelerating and work development. Therefore, a lot of challenges need to be faced in order to achieve interoperability. Some of them are how to standardize interfaces between components and how to solve the difficulty of data integration among the different components and systems. When developing eMaintenance solutions as support to maintenance decision-making, integration architecture for data exchange between different data sources is important. The design of integration architecture is highly depended on structure of the mechanism that defines the structure of the data elements and also describes the relation between these elements, i.e. ontology. However, ontologies have a high impact on the integration architecture of eMaintenance solutions and affect its efficiency. Hence, this report aims to investigate the state-of-the-art in ontologies related to maintenance. This technical report is to investigate the state-of-the-art with respect to ontologies aimed for maintenance data exchange. The aim of the study is to analyse and explore available standards for data exchange in eMaintenance solutions and data management system in both production and Maintenance. The report describes the characteristics and also main usage domain for the investigated ontologies.
    [Show full text]
  • The Outer Edge Page 1 the Outer Edge
    October 2019 The Outer Edge Page 1 The Outer Edge Next meeting: Saturday, Oct.. 26 (fourth Saturday) October 2019 Vol. 33, No. 2 Whole No. 3732 ISSN 1055-4399 Newsletter of the Channel Islands PC Users Group The Friendly Computer Club Helping Make Computers Friendly COMMAND.COM By Ed Lynch, president Attendance at the Septem- he holiday season is approaching quickly. Michael’s program on “Windows Tips and Tricks,” demonstrated again that there are nu- ber 2019 meeting was 32 merous ways to accomplish the same task in Windows. The photo members and guests. T series renaming should save time identifying all those photos, allow- ing more time with family and friends. Those tips and tricks are very power- ful. I maybe should learn the new ways. I will admit that I am not a strong WINDOWS supporter. I do not have the option to not use it. Windows 10 appears to me to be the most secure yet. That eliminates my first complaint. Windows 10 is supposed to be the last How to contact us operating system. I thought that would eliminate the obsolescence of the soft- ware. I find features in programs that ran in the initial The Outer Edge ……………[email protected] release are now failing. I guess software and hardware General Info (Ventura County will now have to reference Windows build xxxx and Computers)..............805-289-3960 above. The hardware support has immensely improved. Mailing Address: P.O. Box 51354, It is hard to find a device, be it PCIe, eSATA, USB and Oxnard, CA 93031-1354 maNy others that are not supported and function as Email addresses for board members are expected right out of the box without loading drivers.
    [Show full text]
  • Top 10 Tools Ed Bott
    WINDOWS 10 IT PRO ESSENTIALS Top 10 Tools Ed Bott PUBLISHED BY Microsoft Press A division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright © 2016 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-1-5093-0278-9 First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com on the “Trademarks” webpage are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Developmental Editor Rosemary Caperton Editorial Production: Dianne Russell, Octal Publishing, Inc. Copyeditor: Bob Russell, Octal Publishing, Inc. Cover: Twist Creative • Seattle Visit us today at MicrosoftPressStore.com • Hundreds of titles available – Books, eBooks, and online resources from industry experts • Free U.S. shipping • eBooks in multiple formats – Read on your computer, tablet, mobile device, or e-reader • Print & eBook Best Value Packs • eBook Deal of the Week – Save up to 60% on featured titles • Newsletter and special offers – Be the first to hear about new releases, specials, and more • Register your book – Get additional benefits Contents Introduction .....................................................
    [Show full text]