|
|
Авторизация |
|
|
Поиск по указателям |
|
|
|
|
|
|
|
|
|
|
Gralla P. — Windows XP Hacks |
|
|
Предметный указатель |
startup, speeding up with boot defragment
startup, speeding up with BootVis utility, using
startup, user logins, controlling with Registry
stationery (Outlook), backup files for
statistics (usage), in Eudora
Stay Invisible web site (free, public proxy servers)
Steganos Internet Anonym 5 software
storage of backups
streaming music, saving to your PC
streaming music, saving to your PC, capturing in MP3 format
string array values (Registry) 2nd
string values (Registry) 2nd
string values (Registry), editing
string values (Registry), examples in subkey section listing
Style-XP program
subdomain (provided by TZO.com)
subkeys, Registry
subkeys, Registry, full section of (example)
subkeys, Registry, Shell
subkeys, Registry, values
Sun JVMs
Sun JVMs, checking for
Sun JVMs, uninstalling older
Super MP3 Recorder program
supernodes
surfing the web anonymously
surfing the Web anonymously, software for
surfing the Web anonymously, Web-based anonymizer
SurfSaver program
switches (boot.ini file)
Synchronization
synchronization, files between two computers
synchronization, offline files 2nd
synchronization, offline files, on-demand and scheduled
synchronization, Outlook files between laptop and PC
synchronization, web pages saved to hard disk
synchronization, whiteboard sessions
sysoc.inf file, entries for "uninstallable" programs
system applets, categorizing
system beeps, turning off
System Configuration Utility, disabling startup programs
System files
system files, compressing, effects on performance
system files, Windows File Protection
system folders, GUIDs for
system objects, changing
system objects, changing, desktop icons 2nd
system objects, changing, text and balloon tips, using the Registry
system organization to aid backups
System performance
system performance, checking and tweaking
system performance, checking and tweaking, memory bandwidth test
system performance, RAM, making the most of
system performance, RAM, making the most of, better memory use with Task Manager
system performance, RAM, making the most of, general advice for
system performance, Registry hacks to speed up XP
system performance, Registry hacks to speed up XP, disabling 8.3 name creation in NTFS
system performance, Registry hacks to speed up XP, menu speed
system performance, Registry hacks to speed up XP, place kernel into RAM
system performance, Registry hacks to speed up XP, prefetch parameters, altering
system performance, repair and recovery with Recovery Console
system performance, repair and recovery with Recovery Console, commands for examining the system
system performance, repair and recovery with Recovery Console, fixing MBR, boot sector, or boot menu
system performance, repair and recovery with Recovery Console, fixing Windows
system performance, repair and recovery with Recovery Console, floppy copy and access to all drives and folders
system performance, repair and recovery with Recovery Console, starting Recovery Console
system performance, tracking with Performance Console
system performance, tracking with Performance Console, logs, setting up
system performance, tracking with Performance Console, performance alerts
system performance, tracking with Performance Console, viewing performance logs
system performance, Windows XP visual effects and
System Restore point
System Restore point, backing up the Registry
System Restore point, creating before removal of XP components
system sounds, choosing for theme
System Tray [See Notification Area]
Task Manager
Task Manager, better memory use with
Task Manager, better memory use with, identifying memory-hogging applications with Process Tab
Task Manager, better memory use with, Performance tab memory reporting, summary of
taskbar
Taskbar, customizing with XP Professional Group Policy Editor
Taskbar, cutomizing with TweakUI
Taskbar, hiding icons in Notification Area
TCP/IP
TCP/IP, closing down TCP ports
TCP/IP, closing ports and blocking protocols
TCP/IP, common TCP Internet ports
TCP/IP, DHCP-assigned IP addresses
TCP/IP, NetBEUI protocol, using with
TCP/IP, NetBEUI protocol, using with, disabling TCP/IP sharing
TCP/IP, null Ethernet connection settings
TCP/IP, repairing broken connections
TCP/IP, repairing broken connections, resetting TCP/IP stack to original configuration
TCP/IP, troubleshooting problems with ping
TCP/IP, troubleshooting with ipconfig
TechSmith, SnagIt screen capture tool
Telnet
Telnet, firewalls and
Telnet, security risks of open port
templates (Outlook), backup files for
text
text editors, editing .reg files
text, balloon tips for folders, customizing
text, balloon tips for system objects, changing
text, cleaning up in clips with ClipCache Plus
text, sharing with whiteboard [See whiteboard]
themes (XP)
themes (XP), applying new
themes (XP), copyright laws and
themes (XP), creating your own
themes (XP), online sources for
third-party cookies
third-party cookies, customizing IE handling of
third-party cookies, managers for
thumbnails (Windows Explorer), decreasing image quality
Time To Live (TTL), reported by ping
times and dates [See dates and times]
Toolbars
toolbars, customizing appearance of
toolbars, Google and Ask Jeeves, for Internet searches
toolbars, Outlook settings, backup files for
toolbars, VDM, configuration menu
Tools menu (Windows Explorer), removing items from
tracert
tracert, useful switches
TradeKeys utility
Trans-XP program
Transparency
transparency, Trillian messaging program, use of
transparency, XP windows
Trillian (instant messaging program)
Trillian (instant messaging program), privacy options, customizing
Trillian (instant messaging program), Pro version
Trillian (instant messaging program), skins, choosing for
Trojan horses
Trojan horses, blocking with ZoneAlarm firewall
Trojan horses, ports used by
troubleshooting network connections
troubleshooting network connections, netsh tool
troubleshooting network connections, pathping command
troubleshooting network connections, TCP/IP problems, with ping
troubleshooting network connections, tracing network and internal data path with tracert
troubleshooting services, bypassing ICF firewall
trustworthy credential agencies and software publishers
TTL (Time to Live), reported by ping
Tweak-XP program
TweakMP, Media Player (Version 9), using with
TweakUI utility
TweakUI utility, controlling animated effects, fades, and shadowing
| TweakUI utility, creating customized XP interfaces
TweakUI utility, customizing Taskbar
TweakUI utility, customizing XP interface
TweakUI utility, customizing XP interface, exact XP version and build, showing on desktop
TweakUI utility, customizing XP interface, hiding undeletable desktop icons
TweakUI utility, customizing XP interface, Windows Explorer
TweakUI utility, Most Frequently Used Programs List, banning programs from
UDP, closing ports for
unary NOT operator (!)
uninstalling applications
uninstalling applications, cleaning up after
uninstalling applications, removing access to certain Microsoft programs
uninstalling applications, removing uninstall entries from uninstalled programs
uninstalling XP components and utilities
updates, NTFS date and time stamps
URLs
URLs, customizng for Internet Explorer
URLs, redirecting misspelled
URLs, redirecting your web site to
URLSpellCheck for IIS
usage statistics (Eudora)
USB
USB, devices, hidden
USB, importing analog video
USB, polling, increasing interval so laptops can enter power-saving state
user accounts, changing graphic for
user interfaces
user interfaces, changing XP elemets to Windows 2000
user interfaces, components, hiding to prevent accidental removal
user interfaces, Control Panel
user interfaces, Control Panel, building customized
user interfaces, Control Panel, displaying applets in cascading menu
user interfaces, Control Panel, hidden applets, running
user interfaces, Control Panel, hiding applets with Registry
user interfaces, Control Panel, hiding applets with XP Pro Group Policy Editor
user interfaces, Control Panel, hiding unused applets
user interfaces, Control Panel, recategorizing applets
user interfaces, creating customized with TweakUI
user interfaces, creating customized with TweakUI, Taskbar
user interfaces, cursors and icons, creating your own
user interfaces, customizing with the Registry
user interfaces, customizing with the Registry, adding folders to Open dialog
user interfaces, customizing with the Registry, hiding all icons in Notification Area
user interfaces, customizing with the Registry, hiding certain icons in Notification Area
user interfaces, customizing with the Registry, turning off system beeps
user interfaces, customizing with WindowBlinds
user interfaces, customizing with WindowBlinds, creating your own skins
user interfaces, customizing with WindowBlinds, dowloading skins from the Internet
user interfaces, desktop icons and system objects, renaming/changing
user interfaces, graphic for your user account, changing
user interfaces, IE, customizing with Group Policy Editor
user interfaces, Most Frequently Used Programs List
user interfaces, Most Frequently Used Programs List, banning programs from with the Registry
user interfaces, Most Frequently Used Programs List, banning programs from with TweakUI
user interfaces, Most Frequently Used Programs List, banning programs with Registry
user interfaces, Most Frequently Used Programs List, changing number of programs in
user interfaces, Most Frequently Used Programs List, killing with Registry hack
user interfaces, older Windows programs, forcing to use XP common controls
user interfaces, Pegasus email software, eccentricities of
user interfaces, Pinned Programs List
user interfaces, removing "uninstallable" XP utilities
user interfaces, removing "unremovable" desktop icons
user interfaces, Start Menu and Taskbar, customizing with Group Policy Editor
user interfaces, themes
user interfaces, themes, applying new
user interfaces, themes, creating your own
user interfaces, themes, online sources for
user interfaces, transparent windows, creating
user logins
user logins, autologon, enabling
user logins, controlling with Registry
users
users, changing name of registered user with Registry hack
users, HKEY_CURRENT_USER Registry hive
users, HKEY_USERS Registry hive
users, host computer, permissions for
users, Security Identifiers (SIDs)
utilities (XP basic), improving on
utilities (XP basic), improving on, backups
utilities (XP basic), improving on, backups, getting a better backup program
utilities (XP basic), improving on, backups, mapping out backup plan
utilities (XP basic), improving on, backups, system organization that aids backup process
utilities (XP basic), improving on, backups, Windows XP backup utilities
utilities (XP basic), improving on, clipboard enhancement with ClipCache Plus
utilities (XP basic), improving on, disk defragmentation
utilities (XP basic), improving on, disk defragmentation, boot files, defragmenting
utilities (XP basic), improving on, disk defragmentation, failure of disk defragmenter
utilities (XP basic), improving on, disk defragmentation, getting a better disk defragmenter
utilities (XP basic), improving on, disk defragmentation, running disk defragmenter from command line
utilities (XP basic), improving on, screenshot tips
utilities (XP basic), improving on, screenshot tips, SnagIt capture tool, using
utilities (XP basic), improving on, screenshot tips, XP's built-in screen capture
utilities (XP basic), improving on, universal messaging with Trillian
utilities (XP basic), improving on, virtual desktops
utilities (XP basic), improving on, Windows Messenger, going beyond messaging
utilities (XP basic), improving on, Windows Messenger, going beyond messaging, collaborating with whiteboard
utilities (XP basic), improving on, Windows Messenger, going beyond messaging, sharing applications
utilities (XP basic), improving on, Windows Messenger, going beyond messaging, using .NET alerts with
utilities (XP), removing "uninstallable"
values, registry
values, Registry, adding and deleting
values, Registry, adding and deleting, creating new
values, Registry, creating new (NoLowDiskSpaceChecks)
values, Registry, deleting for uninstalled programs
values, Registry, deleting using .reg files
values, Registry, DoubleClickSpeed value for the mouse
values, Registry, editing, creating, or deleting with Registry Editor
values, Registry, examples in subkey section listing
values, Registry, primary data types
VDM [See Virtual Desktop Manager]
verbs (in documents), searching for alternative forms
video bit rate
video display size
videos, making with Windows Movie Maker
videos, making with Windows Movie Maker, capturing video properly
videos, making with Windows Movie Maker, digital video camera, using
videos, making with Windows Movie Maker, DVDs, making
videos, making with Windows Movie Maker, recording video, best settings for
videos, making with Windows Movie Maker, recording video, best settings for, preset profiles
viewer for files (IrfanView)
Virtual Desktop Manager (VDM)
Virtual Desktop Manager (VDM), activating
Virtual Desktop Manager (VDM), customizing
Virtual Desktop Manager (VDM), customizing, background images, changing
Virtual Desktop Manager (VDM), customizing, keyboard shortucts for switching desktops
Virtual Desktop Manager (VDM), customizing, preview screen
Virtual Desktop Manager (VDM), customizing, removing program name from toolbar
Virtual Desktop Manager (VDM), customizing, taskbar buttons for programs running
Virtual Desktop Manager (VDM), customizing, toolbar configuration menu
Virtual Desktop Manager (VDM), switching between desktops
Virtual machines [See also JVMs]
virtual machines, Microsoft VM
Virtual private network (VPN)
Virtual Private Network (VPN), ICF (Internet Connection Firewall) use and
Virtual Private Network (VPN), residential gateways and
Virtual Private Network (VPN), setting up
virus masquerading as WindowBlinds installer
visual effects (XP), system performance and
voice messages vial email (in Eudora)
WAN MAC address
WAN requests, blocking from network
wannabes, attacks through Internet connections
war chalking symbols
war driving for WiFi access
war driving for WiFi access, building wireless cantenna
war driving for WiFi access, definition of
war driving for WiFi access, Network Stumbler program
war driving for WiFi access, Network Stumbler program, networks not part of FreeNet
WAV format, saving streaming audio to
WAVClean program
|
|
|
Реклама |
|
|
|
|
|
|