Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Gralla P. — Windows XP Hacks
Gralla P. — Windows XP Hacks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows XP Hacks

Автор: Gralla P.

Аннотация:

Windows XP is the latest, most reliable, and best-looking version of the Windows operating system to emerge yet. As the result of the unification of Microsoft's corporate series (Windows NT and 200) with the home series (Windows 95, 98, and Me), Windows XP offers much that is pleasing to its users: rock-solid stability and a fresh new look. But power users who want to take command of their operating systems will find the same old frustrations: it's never been easy to get under the hood of a Windows system and Windows XP is no exception.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2003

Количество страниц: 412

Добавлена в каталог: 05.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
desktops      
desktops, command-line prompt on      
desktops, control for current users by Registry hive      
desktops, customizing background, color and system icons      
desktops, deleting unnecessary icons      
desktops, hiding icons that can't be deleted      
desktops, reducing icon numbers to conserve RAM      
desktops, removing "unremovable" icons
desktops, showing Windows version on      
desktops, system object icons, changing      
desktops, Virtual Desktop Manager      
desktops, Virtual Desktop Manager, activating the toolbar      
desktops, Virtual Desktop Manager, customizing      
desktops, Virtual Desktop Manager, switching between desktops      
desktops, Windows 2000, using in XP      
Destroy File feature (PowerDesk)      
Detect Hidden Files (Word Tools menu)      
Device manager      
Device Manager, error messages, decoding      
Device Manager, error messages, decoding, error codes, messages, and potential solutions      
Device Manager, hidden hardware, discovering      
DHCP (Dynamic Host Configuration Protocol)      
DHCP, getting informationon with ipconfig      
DHCP, IP address assigned by, renewing      
diagnostic services, bypassing ICF firewall      
dictionary attacks      
digital music files, skipping and popping      
digital video cameras      
direct cable connections for networking      
direct cable connections for networking, cables and connectors      
direct cable connections for networking, Ethernet cable, using      
direct cable connections for networking, serial or parallel cable, using      
directories      [See also files; folders]
directories, printing file listings in Outlook XP      
Disconnect Network Drive option (Explorer Tools menu)      
disk defragmentation, improving      
disk defragmentation, improving, boot files, defragmenting      
disk defragmentation, improving, failure of disk defragmenter      
disk defragmentation, improving, getting a better disk defragmenter      
disk defragmentation, improving, running disk defragmenter from command line      
disk space      
disk space, Disk Cleanup warning, disabling      
disk space, DVD burning, requirements for      
disk space, saved by NTFS compression      
Diskeeper defragmenter      
Display Properties dialog box      
display settings, changing to run applets      
DLLs, removing from cache memory      
DNS      
DNS, getting information on servers with ipconfig      
DNS, getting IP address of server with netsh      
DNS, settings, customizing for faster Internet access      
DNS, settings, customizing for faster Internet access, cache settings      
DNS, settings, customizing for faster Internet access, fixing DNS problems      
DNS, settings, customizing for faster Internet access, HOSTS file      
domain names for remote clients      
DOS      
DOS, applications, memory use and      
DOS, executing commands with MCL command prompt      
double-clicking on .reg files      
DoubleClick online advertising network, opting out of      
DoubleClickSpeed value (Registry)      
Download Accelerator Plus (DAP) program      
drawings, sharing with whiteboard      [See whiteboard]
driver delays at startup, tracing      
DSL      
DSL, Internet access, hub/router settings for      
DSL, resetting modems to repair TCP/IP connection      
DVDs      
DVDs, making your own      
DVDs, storing backups on      
DWORD values (Registry)      2nd
DWORD values (Registry), creating new (NoLowDiskSpaceChecks)      
DWORD values (Registry), examples in subkey section listing      
dynamic DNS service      
Dynamic Host Configuration Protocol      [See DHCP]
dynamic IP addresses      [See also DHCP]
dynamic IP addresses, mapping to hostnames for servers      
Echo Request messages      
Echo Request messages, sent by ping      
Echo Request messages, sent by tracert      
editing the Registry      
editing the Registry, .reg files, using for safety      [See .reg files]
editing the Registry, Registry Editor, using      [See Registry Editor]
editing the Registry, tracking changes with RegSpy      
EFS      [See Encrypting File System]
Email      
email addresses, obfuscating for harvesting bots      [See spam]
email, alternatives to Outlook/Outlook Express      
email, alternatives to Outlook/Outlook Express, Eudora      
email, alternatives to Outlook/Outlook Express, Pegasus      
email, backing up and restoring Outlook/Outlook Express data files      
email, backing up and restoring Outlook/Outlook Express data files, add-in software, using      2nd
email, backing up and restoring Outlook/Outlook Express data files, manually backing up Outlook      
email, blocked attachments, opening in Outlook/Outlook Express      
email, blocked attachments, opening in Outlook/Outlook Express, forcing Outlook Express to open blocked file attachments      
email, blocked attachments, opening in Outlook/Outlook Express, forcing Outlook to open blocked file attachments      
email, cleaning up text in clips with ClipCache Plus      
email, getting IP adress of mail server with netsh      
email, problems getting from server, troubleshooting      
email, problems with ICF      
email, SMTP service for      
email, spam      [See spam]
email, web-based, retrieving with your email software      
email, web-based, retrieving with your email software, Hotmail mail, getting with Hotmail Popper      
email, web-based, retrieving with your email software, Yahoo! mail, getting with YahooPOPs!      
EMS Free Surfer mk II      
Encrypt/Decrypt feature (PowerDesk)      
Encrypting File System (EFS)      
Encrypting File System (EFS), encrypted files, sharing      
Encrypting File System (EFS), encrypting files and folders      
Encrypting File System (EFS), encrypting files and folders, decrypting files and folders      
Encrypting File System (EFS), encrypting/decrypting from command line      
environment variables (system)      
EQUALS operator (Indexing Service)      
error messages      
error messages, Device Manager, decoding      
error messages, Device Manager, decoding, codes, messages, and potential solutions      
error messages, disabling display at startup      
ESP (Eudora Sharing Protocol)      
Ethernet      
Ethernet, cards for direct cable connection networks      
Ethernet, null Ethernet cables      2nd
Ethernet, null Ethernet cables, cheap networking with      
Ethernet, PPPoE (Point-to-Point Protocol over Ethernet)      
Ethernet, TCP/IP settings for null cable connection      
Eudora      
Eudora, file sharing through ESP      
Eudora, free, ad-supported version      
Eudora, HTML display, turning off in emails      
Eudora, MoodWatch feature      
Eudora, sending voice messages via email      
Exact Audio Copy program      
Excel, command-line switches for starting      
Exchange Server (Outlook on), backing up messages, contacts, and calendar      
expanded string value (Registry)      2nd
explicit consent vs. implicit consent (for use of personal information)      
Explorer      [See Internet Explorer Windows Explorer]
exporting cookies from Internet Explorer      
expressions in Indexing Service queries      
external antennas for wireless PCs      
fades (XP GUI), controlling      
Fast User Switching, offline files and      
fastdetect switch (boot.ini)      
FAT32 filesystem      
FAT32 filesystem, converting to NTFS      
FAT32 filesystem, NTFS compression and      
Favorites, saving offline with links      
file attachments (blocked) in Outlook/Outlook Express      
file attachments (blocked) in Outlook/Outlook Express, file extensions blocked by Outlook      
file downloads, speeding up      
file encryption key (FEK)      
File Finder feature (PowerDesk)      
file sharing      
file sharing, enabling through ICF firewall      
file sharing, Eudora Sharing Protocol (ESP)      
file sharing, spyware in software      
file sharing, TCP/IP, disabling      
file sharing, VPN connections, firewalls and      
file sharing, without pop-up ads and spyware      
Files      
files, backing up      [See backups]
files, capturing and storing with ClipCache Plus      
files, encrypting with EFS      
files, generating listings with Windows Explorer      
files, Indexing Service utility      
files, Indexing Service utility, query language      
files, left behind by uninstalled applications      
files, listing all on local disk      
files, mobile file transfers with Briefcase      
files, offline      
files, offline, snchronizing to/fom LAN and your laptop      
files, Open With option (Windows Explorer)      
files, printing listings in Outlook XP      
files, Registry information about      
files, renaming with Better File Rename      
files, viewing with IrfanView      
filesystems      
filesystems, converting others to NTFS      
filesystems, Encrypting File System      [See EFS]
filesystems, NTFS      [See NTFS]
Filtering      
filtering, Eudora capabilities for      
filtering, in Outlook spam handling      
filtering, noise filter for Indexing Service searches      
Firewalls      
firewalls, Internet Connection Firewall (ICF)      
firewalls, Internet Connection Firewall (ICF), email, problems with ICF      
firewalls, Internet Connection Firewall (ICF), tracking activity with ICF log      
firewalls, no-IP.com client, problems connecting      
firewalls, probing for online vulnerabilities      
firewalls, remote access connections and      
firewalls, unsolicited inbound traffic, allowing through      
firewalls, ZoneAlarm      2nd
firewalls, ZoneAlarm, configuring to block Trojans      
firewalls, ZoneAlarm, versions of      
FireWire ports, importing video      
first-party cookies      
first-party cookies, customizing IE handling of      
flushing your DNS cache      2nd
Folders      
folders, clips stored with ClipCache Plus      
folders, Compare Folders feature (PowerDesk)      
folders, Copy to Folder and Move to Folder (Explorer context menu)      
folders, customizing icons and balloon text      
folders, encrypting with EFS      
folders, generating listings with Windows Explorer      
folders, GUIDs for      
folders, hidden (C:\WINDOWS\INF folder)      
folders, hiding with EFS      
folders, hiding with EFS, behavior of encrypted folders      
folders, hiding with EFS, decrypting folders      
folders, hiding with EFS, encrypting folders      
folders, hiding with EFS, encrypting/decrypting from command line      
folders, hiding with EFS, sharing encrypted files      
folders, left behind by uninstalled applications      
folders, listing all on local disk      
folders, offline files, synchronizing to/from LAN to your laptop      
frames per second      
FreeNets      
FreeNets, networks not part of      
freetext expression search (Indexing Service)      
FTP client (PowerDesk)      
FTP site, hosting with IIS      
FX cables      
GAPIS program (Google searches from your desktop)      
gateways, residential      [See residential gateways]
Genie-Soft, for backups of Outlook/Outlook Express      
ghosted hardware devices      
ghosted hardware devices, displaying with Device Manager      
Gibson Research Corporation      
Gibson Research Corporation, web page listing known spyware      
Glass2K program      
globally unique identifiers (GUIDs)      
Globally Unique Identifiers (GUIDs), for system folders      
Globally Unique Identifiers (GUIDs), for Windows Media Player      
Google      
Google Toolbar      
Google Toolbar, searching current site instead of entire Web      
Google Toolbar, targeted searches of a particular site      
Google, image search      
Google, searches directly from your desktop (not your browser)      
Googlebar (third-party toolbar)      
GPEDIT.MSC command      
graphical user interfaces (GUIs)      [See user interfaces]
Graphics      [See also images]
graphics, converting to startup screen      
graphics, cursor, importing with AX-Cursors      
graphics, Google image search      
graphics, image conversion      
graphics, image conversion, ImageConverter.EXE      
graphics, image conversion, IrfanView program      
graphics, screenshots      [See screenshots]
Group Policy Editor      
Group Policy Editor, customizing IE with      
Group Policy Editor, customizing IE with, connection settings      
Group Policy Editor, customizing IE with, IE settings you can modify      
Group Policy Editor, customizing IE with, IE user interface      
Group Policy Editor, customizing IE with, programs setting      
Group Policy Editor, customizing IE with, security settings      
Group Policy Editor, customizing IE with, URLs      
Group Policy Editor, Start Menu and Taskbar, customizing      
groups (folders for ClipCache clips)      
guest computer      
guest computer, configuring      
GUIDs      [See Globally Unique Identifiers]
GUIs (graphical user interfaces)      [See user interfaces]
hard disk defragmentation      [See disk defragmentation]
Hardware      
hardware, hidden, discovering with Device Manager      
hardware, hidden, discovering with Device Manager, ghosted or nonpresent devices      
hardware, hidden, discovering with Device Manager, hidden devices, forcing display of      
hardware, hidden, discovering with Device Manager, occasional showing of ghosted devices      
hardware, network, rated speed vs. actual performance      
hardware, networking with direct cable connection      
hardware, networking with direct cable connection, cables and connectors      
hardware, networking with direct cable connection, Ethernet cable      
hardware, networking with direct cable connection, serial or parallel cable      
hardware, Registry information about      
hardware, remapping the keyboard      
hardware, screen resolution, improving      
hardware, troubleshooting with Device Manager error messages      
hardware, troubleshooting with Device Manager error messages, codes, messages, and potential solutions      
header information for email, viewing in Outlook/Outlook Express      
hexadecimal numbers (DWORD values as)      
hibernation file, defragmenting      
hibernation, NetBEUI protocol and      
hidden and ghosted devices      [See hardware]
hidden fields in Word, security risks of      
Hidden File Detector utility      
hives, Registry      
hives, Registry, defragmenting      
hives, Registry, HKEY_CLASSES_ROOT      
hives, Registry, HKEY_CURRENT_CONFIG      
hives, Registry, HKEY_CURRENT_USER      2nd
hives, Registry, HKEY_LOCAL_MACHINE      2nd
hives, Registry, HKEY_USERS      
Hollywood DV-Bridge      
home networks      [See also networking; residential gateways]
home networks, router, resetting to repair TCP/IP connection      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте