Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Gralla P. — Windows XP Hacks
Gralla P. — Windows XP Hacks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Windows XP Hacks

Автор: Gralla P.

Аннотация:

Completely revised and updated, this smart collection of insider tips and tricks covers the XP operating system from start to finish, including all the new features that come with Service Pack 2 (SP2). You'll also find timesaving hacks for security, file distribution, digital media, web browsing, and more. An ideal all-in-one resource for XP beginners, as well as more experienced power users.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: second edition

Год издания: 2005

Количество страниц: 572

Добавлена в каталог: 31.03.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
diagnostic services, bypassing ICF firewall      
dictionary attacks      
Digital rights management (DRM)      
digital video cameras      
direct cable connections for networking      
direct cable connections for networking, Ethernet cable, using      
direct cable connections for networking, serial or parallel cable, using      
directories      
directories, files      
directories, printing file listings in Outlook XP      
Disconnect Network Drive option (Explorer Tools menu)      
Disk Cleanup tool      
disk defragmentation, improving      
disk defragmentation, improving, failure of disk defragmenter      
disk defragmentation, improving, getting a better disk defragmenter      
disk defragmentation, improving, running disk defragmenter from command line      
disk space      
disk space, Disk Cleanup warning, disabling      
disk space, DVD burning, requirements for      
disk space, saved by NTFS compression      
Display Properties dialog box      
display settings, changing to run applets      
DLLs, removing from cache memory      
DNS      
DNS, getting IP address of server with netsh      
DNS, settings, customizing for faster Internet access      
DNS, settings, customizing for faster Internet access, HOSTS file      
domain names for remote clients      
DOS      
DOS, applications, memory use and      
DOS, executing commands with MCL command prompt      
double-clicking on .reg files      
DoubleClick online advertising network, opting out of      
DoubleClickSpeed value (Registry)      
Download Accelerator Plus (DAP) program      2nd
drawings, sharing with whiteboard      
drive-by downloads      
DSL      
DSL, Internet access, hub/router settings for      
DSL, resetting modems to repair TCP/IP connection      
DVDs      
DVDs, making your own      
DVDs, storing backups on      
DWORD values (Registry)      2nd
DWORD values (Registry), examples in subkey section listing      
dynamic DNS service      
dynamic IP addresses      
dynamic IP addresses, DHCP      
dynamic IP addresses, mapping to hostnames for servers      
EarthLink, anti-phishing toolbar      
editing the Registry      
editing the Registry, .reg files, using for safety      
editing the Registry, Registry Editor, using      
editing the Registry, tracking changes with RegSpy      
EFS      
Email      2nd 3rd
email addresses, obfuscating for harvesting bots      
email, alternatives to Outlook/Outlook Express      
email, alternatives to Outlook/Outlook Express, Eudora      
email, alternatives to Outlook/Outlook Express, Pegasus      
email, anonymous      
email, backing up and restoring Outlook/Outlook Express data files      
email, backing up and restoring Outlook/Outlook Express data files, add-in software, using      2nd
email, backing up and restoring Outlook/Outlook Express data files, manually backing up Outlook      
email, blocked attachments, opening in Outlook/Outlook Express      
email, blocked attachments, opening in Outlook/Outlook Express, forcing Outlook Express to open blocked file attachments      
email, blocked attachments, opening in Outlook/Outlook Express, forcing Outlook to open blocked file attachments      
email, getting IP address of mail server with netsh      
email, Gmail      [See Gmail]
email, phishing attacks      
email, SMTP service for      
email, spam      [See spam]
email, Thunderbird      
email, web-based, retrieving with your email software      
email, web-based, retrieving with your email software, Hotmail mail, getting with Hotmail Popper      
email, web-based, retrieving with your email software, Yahoo! mail, getting with YahooPOPs!      
EMS Free Surfer Companion      
EMS Free Surfer mk II      
Encrypt/Decrypt feature (PowerDesk)      
Encrypting File System (EFS)      
Encrypting File System (EFS), encrypted files, sharing      
Encrypting File System (EFS), encrypting files and folders      
Encrypting File System (EFS), encrypting files and folders, decrypting files and folders      
Encrypting File System (EFS), encrypting/decrypting from command line      
Entbloess 2 web site
environment variables (system)      
EQUALS operator (Indexing Service)      
error messages      
error messages, Device Manager, decoding      
error messages, Device Manager, decoding, codes, messages, and potential solutions      
error messages, disabling display at startup      
ESP (Eudora Sharing Protocol)      
Ethernet      
Ethernet, cards for direct cable connection networks      
Ethernet, null Ethernet cables      2nd
Ethernet, null Ethernet cables, cheap networking with      
Ethernet, PPPoE (Point-to-Point Protocol over Ethernet)      
Eudora      
Eudora, file sharing through ESP      
Eudora, free, ad-supported version      
Eudora, HTML display, turning off in emails      
Eudora, MoodWatch feature      
Eudora, sending voice messages via email      
Exact Audio Copy program      
Exchange Server (Outlook on), backing up messages, contacts, and calendar      
expanded string value (Registry)      2nd
explicit consent versus implicit consent (for use of personal information)      
expressions in Indexing Service queries      
external antennas for wireless PCs      
fades (XP GUI), controlling      
Fast User Switching, offline files and      
fastdetect switch (boot.ini)      
FAT32 filesystem      
FAT32 filesystem, converting to NTFS      
FAT32 filesystem, NTFS compression and      
Favorites, saving offline with links      
FBI's Internet Fraud Complaint Center      
Federal Trade Commission      
file attachments (blocked) in Outlook/Outlook Express      
file attachments (blocked) in Outlook/Outlook Express, file extensions blocked by Outlook      
file downloads, speeding up      
file encryption key (FEK)      
File Finder feature (PowerDesk)      
file sharing      
file sharing, enabling through ICF firewall      
file sharing, Eudora Sharing Protocol (ESP)      
Files      
files, backing up      
files, encrypting with EFS      
files, generating listings with Windows Explorer      
files, left behind by uninstalled applications      
files, listing all on local disk      
files, mobile file transfers with Briefcase      
files, offline, synchronizing to/from LAN and your laptop      
files, Open With option (Windows Explorer)      
files, printing listings in Outlook XP      
files, Registry information about      
files, viewing with IrfanView      
filesystems      
filesystems, converting others to NTFS      
filesystems, Encrypting File System      
filesystems, NTFS      
Filtering      
filtering, Eudora capabilities for      
filtering, in Outlook spam handling      
filtering, noise filter for Indexing Service searches      
Firefox      
Firefox, anti-phishing add-in      
Firefox, download      
Firewalls      
firewalls, allowing programs to bypass      
firewalls, crackers      
firewalls, email problems with      
firewalls, Internet Connection Firewall (ICF)      
firewalls, logging activity      
firewalls, no-IP.com client, problems connecting      
firewalls, remote access connections and      
firewalls, script kiddies      
firewalls, Trojans      
firewalls, unsolicited inbound traffic, allowing through      
firewalls, Windows XP SP2      
firewalls, ZoneAlarm      2nd
firewalls, ZoneAlarm, configuring to block Trojans      
firewalls, ZoneAlarm, versions of      
FireWire ports, importing video      
first-party cookies      
first-party cookies, customizing IE handling of      
flushing your DNS cache      2nd
Folders      
folders, Compare Folders feature (PowerDesk)      
folders, Copy to Folder and Move to Folder (Explorer context menu)      
folders, encrypting with EFS      
folders, generating listings with Windows Explorer      
folders, hiding with EFS      
folders, hiding with EFS, behavior of encrypted folders      
folders, hiding with EFS, decrypting folders      
folders, hiding with EFS, encrypting folders      
folders, hiding with EFS, encrypting/decrypting from command line      
folders, hiding with EFS, sharing encrypted files      
folders, left behind by uninstalled applications      
folders, listing all on local disk      
folders, offline files, synchronizing to/from LAN to your laptop      
frames per second      
Free Networks.org web site      
FreeNets      
freetext expression search (Indexing Service)      
Fresh Diagnose diagnostic tool      
FTP client (PowerDesk)      
FTP site, hosting with IIS      
G5 boot skin web site      
Gaim instant messenger program      
GAPIS program (Google searches from your desktop)      
gateways, residential      
Genie-Soft, for backups of Outlook/Outlook Express      
ghosted hardware devices      
ghosted hardware devices, displaying with Device Manager      
Gibson Research Corporation      
Gibson Research Corporation, web page listing known spyware      
globally unique identifiers (GUIDs)      
Globally Unique Identifiers (GUIDs), for Windows Media Player      
Gmail      
Google      
Google Toolbar      
Google Toolbar, searching current site instead of entire Web      
Google Toolbar, targeted searches of a particular site      
Google, image search      
Google, searches directly from your desktop (not your browser)      
graphical user interfaces (GUIs)      
Graphics      
graphics, converting to startup screen      
graphics, cursor, importing with AX-Cursors      
graphics, Google image search      
graphics, image conversion      
graphics, image conversion, ImageConverter.EXE      
graphics, image conversion, IrfanView program      
graphics, Paint Shop Pro      
Group Policy Editor      
Group Policy Editor, customizing IE with      
Group Policy Editor, customizing IE with, connection settings      
Group Policy Editor, customizing IE with, IE settings you can modify      
Group Policy Editor, customizing IE with, IE user interface      
Group Policy Editor, customizing IE with, programs setting      
Group Policy Editor, customizing IE with, security settings      
Group Policy Editor, customizing IE with, URLs      
Group Policy Editor, Start Menu and Taskbar, customizing      
guest computer      
guest computer, configuring      
GUIDs      
GUIs (graphical user interfaces)      
hard disk defragmentation      
Hardware      
hardware, hidden, discovering with Device Manager      
hardware, hidden, discovering with Device Manager, ghosted or nonpresent devices      
hardware, hidden, discovering with Device Manager, hidden devices, forcing display of      
hardware, hidden, discovering with Device Manager, occasional showing of ghosted devices      
hardware, network, rated speed versus actual performance      
hardware, networking with direct cable connection      
hardware, networking with direct cable connection, cables and connectors      
hardware, networking with direct cable connection, Ethernet cable      
hardware, networking with direct cable connection, serial or parallel cable      
hardware, Registry information about      
hardware, remapping the keyboard      
hardware, screen resolution, improving      
hardware, troubleshooting with Device Manager error messages      
hardware, troubleshooting with Device Manager error messages, codes, messages, and potential solutions      
header information for email, viewing in Outlook/Outlook Express      
hibernation file, defragmenting      
hidden fields in Word, security risks of      
Hidden File Detector utility      
hives, Registry      
hives, Registry, defragmenting      
hives, Registry, HKEY_CLASSES_ROOT      
hives, Registry, HKEY_CURRENT_CONFIG      
hives, Registry, HKEY_CURRENT_USER      2nd
hives, Registry, HKEY_LOCAL_MACHINE      2nd
hives, Registry, HKEY_USERS      
Hollywood DV-Bridge      
home networks      
home networks, router, resetting to repair TCP/IP connection      
home networks, wireless, setting up      
Host computer      
hosting web site with IIS      
hosting web site with IIS, caching, improving performance with      
hosting web site with IIS, installing IIS      
hosting web site with IIS, MMC snap-in for site administration      
hosting web site with IIS, redirecting incoming incorrect URLs      
hosting web site with IIS, redirecting your site to a URL      
hostnames, mapping to dynamic IP address      
Hosts      
hosts file      2nd 3rd 4th 5th 6th 7th 8th
HOSTS file, comments, adding      
HOSTS file, editing      2nd
HOSTS file, incorrect or outdated listings      
HOSTS file, updating to prevent loss of access to sites      
HOSTS file, web site      
hosts, network name of      
hosts, user permissions      
hotspot fixes      
HTML      
HTML, email addresses, writing in HTML characters      
HTML, special characters, online listing of      
HTML, turning off display in emails to prevent spam attacks      
hubs/routers for home networks      
hung programs, changing time for XP reporting      
ICMP (Internet Control Message Protocol), allowing traffic through ICF firewall      
icons      
icons, creating your own      
icons, creating your own, Microangelo program      
icons, deleting from desktop      
icons, free, download site      
icons, Notification Area, hiding all in      
icons, system objects, changing on desktop      
Identity theft      
IIS      
IISFAQ web site      
Images      
images, converting      
images, converting, ImageConverter.EXE, using      
images, converting, PowerDesk, using      
images, Google searches for      
1 2 3 4 5 6 7
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте