Download MS Windows Notes

Document related concepts

Features new to Windows XP wikipedia , lookup

Features new to Windows 8 wikipedia , lookup

Features new to Windows 7 wikipedia , lookup

Technical features new to Windows Vista wikipedia , lookup

Transcript
MS Windows Notes
1 August 2010
Contents
1
REFERENCES ...................................................................................................................... 5
2
WINDOWS MOBILE .......................................................................................................... 5
2.1
VERSIONS ........................................................................................................................ 5
2.2
.NET COMPACT FRAMEWORK ......................................................................................... 6
2.2.1 View Version ............................................................................................................... 6
2.3
FONTS .............................................................................................................................. 6
2.3.1 Adding ......................................................................................................................... 6
2.3.2 TrueType vs Raster ..................................................................................................... 7
2.3.3 Internet Explorer ......................................................................................................... 7
2.3.4 Third Party .................................................................................................................. 7
2.4
UNICODE .......................................................................................................................... 8
2.4.1 Understanding Unicode .............................................................................................. 8
2.4.2 Inputting ...................................................................................................................... 8
3
WINDOWS 95 ....................................................................................................................... 9
3.1
FILESYSTEMS AND DISKS ................................................................................................. 9
3.1.1 Restoring the Master Boot Record .............................................................................. 9
3.1.2 Recovering Deleted Files ............................................................................................ 9
3.2
NETWORKING ................................................................................................................ 10
3.2.1 Logon ........................................................................................................................ 10
3.2.2 Logon Packets ........................................................................................................... 11
3.2.3 Peer-to-Peer Networking .......................................................................................... 11
3.2.4 Route command ......................................................................................................... 12
3.2.5 Sharing: File and Printer.......................................................................................... 12
3.3
PROGRAMMING .............................................................................................................. 14
3.3.1 DOSKEY macro definitions ...................................................................................... 14
3.3.2 Environment variables in batch files ........................................................................ 14
3.4
SYSTEM.......................................................................................................................... 14
3.4.1 Desktop ..................................................................................................................... 15
3.4.2 Startup ....................................................................................................................... 15
4
WINDOWS 98 ..................................................................................................................... 15
4.1
INSTALLATION ............................................................................................................... 15
4.2
NETWORKING ................................................................................................................ 20
4.2.1 Internet Connection Sharing ..................................................................................... 20
4.2.2 Microsoft Networking Password............................................................................... 20
1
4.2.3 winpopup ................................................................................................................... 20
4.3
SYSTEM.......................................................................................................................... 21
4.3.1 Active Desktop .......................................................................................................... 21
4.3.2 Configuration Utility................................................................................................. 21
4.3.3 Device Manager ........................................................................................................ 21
4.3.4 IRQs .......................................................................................................................... 21
4.3.5 Multilanguage Support ............................................................................................. 22
4.3.6 Registry – defining boot-time executables ................................................................ 22
4.3.7 Sounds ....................................................................................................................... 23
4.3.8 Start Menu ................................................................................................................. 23
4.3.9 Startup Disk .............................................................................................................. 23
4.3.10 Windows Scripting Host ........................................................................................ 23
4.3.11 Windows Update ................................................................................................... 23
5
WINDOWS NT ................................................................................................................... 23
5.1
HOW TO INSTALL WINDOWS NT ON DELL LATITUDE CPI ............................................. 24
5.1.1 System Specs ............................................................................................................. 24
5.1.2 Procedure .................................................................................................................. 24
5.1.3 Miscellaneous Notes ................................................................................................. 26
5.2
FILESYSTEMS AND DISKS ............................................................................................... 26
5.2.1 fdisk-like program ..................................................................................................... 26
5.2.2 Mapping a drive from the command prompt ............................................................ 27
5.2.3 Unmapping a drive from the command prompt ........................................................ 27
5.3
NETWORKING ................................................................................................................ 27
5.3.1 Browsing ................................................................................................................... 27
5.3.2 Find NetBIOS name of a device ................................................................................ 27
5.3.3 IP Forwarding .......................................................................................................... 27
5.3.4 Sending Messages ..................................................................................................... 27
5.4
PRINTING ....................................................................................................................... 28
5.5
PROGRAMMING .............................................................................................................. 28
5.5.1 Running an autoexec.bat ........................................................................................... 28
5.5.2 Running a command in the background ................................................................... 28
5.5.3 grep-like command.................................................................................................... 28
5.5.4 Scripting (VBScript and JScript) .............................................................................. 28
5.5.5 How to execute a command every time you start a cmd shell .................................. 28
5.5.6 DOSKEY macro definitions ...................................................................................... 28
5.6
SYSTEM.......................................................................................................................... 29
5.6.1 Boot Manager ........................................................................................................... 29
5.6.2 Diagnostics ............................................................................................................... 29
5.6.3 Environment Variables ............................................................................................. 29
5.6.4 How increase the number of lines in the DOS window ............................................ 29
5.6.5 Password Encryption ................................................................................................ 29
5.6.6 Programs auto-started at boot .................................................................................. 29
5.6.7 Registry ..................................................................................................................... 30
5.6.8 Setting Application to open a file type ...................................................................... 31
5.6.9 Services ..................................................................................................................... 31
5.6.10 Service Packs (where to get) ................................................................................. 31
2
5.6.11 Sounds ................................................................................................................... 31
5.6.12 User Profiles ......................................................................................................... 31
5.6.13 Version .................................................................................................................. 31
5.7
RESOURCE KIT ............................................................................................................... 31
6
WINDOWS XP HOME EDITION.................................................................................... 32
6.1
DESKTOP ........................................................................................................................ 32
6.1.1 Screen Saver Slideshow ............................................................................................ 32
6.2
FILES .............................................................................................................................. 33
6.2.1 Icon (.ico) Files ......................................................................................................... 33
6.2.2 Properties .................................................................................................................. 33
6.2.3 Shortnames and UNCs .............................................................................................. 34
6.3
LANGUAGES ................................................................................................................... 34
6.4
NETWORKING ................................................................................................................ 34
6.4.1 File Sharing .............................................................................................................. 34
6.4.2 Workgroup ................................................................................................................ 36
6.4.3 Windows Domain (XP Pro) ...................................................................................... 36
6.5
SECURITY....................................................................................................................... 36
6.6
SYSTEM.......................................................................................................................... 36
6.6.1 Automatically Run Programs .................................................................................... 36
6.6.2 Schedule a Task......................................................................................................... 36
6.6.3 System Restore .......................................................................................................... 36
6.7
USERS ............................................................................................................................ 37
6.7.1 Administrator ............................................................................................................ 37
6.7.2 Default....................................................................................................................... 37
6.7.3 Fast User Switching .................................................................................................. 37
6.7.4 Guest ......................................................................................................................... 38
7
WINDOWS XP PRO .......................................................................................................... 38
7.1
8
REMOTE DESKTOP (RDP) .............................................................................................. 38
WINDOWS 2000 ................................................................................................................. 39
8.1
COMMANDS ................................................................................................................... 39
8.2
FILES .............................................................................................................................. 39
8.2.1 Searching: find vs findstr (grep-like) ........................................................................ 39
8.3
FILESYSTEMS AND DISKS ............................................................................................... 41
8.3.1 Encryption ................................................................................................................. 41
8.3.2 Linking Files ............................................................................................................. 41
8.3.3 Synchronzing/Offline Files........................................................................................ 42
8.3.4 Offline Files Tests ..................................................................................................... 42
8.3.5 Sharing a Directory .................................................................................................. 43
8.4
IIS .................................................................................................................................. 43
8.4.1 Documentation .......................................................................................................... 43
8.4.2 Requirements............................................................................................................. 43
8.4.3 Configuring IIS Server .............................................................................................. 44
8.4.4 Configuring the Default Web Site ............................................................................. 44
8.5
NETWORKING ................................................................................................................ 44
3
8.5.1 DHCP ........................................................................................................................ 44
8.5.2 DNS ........................................................................................................................... 45
8.5.3 Config files ................................................................................................................ 45
8.5.4 Troubleshooting commands ...................................................................................... 45
8.5.5 Workgroup ................................................................................................................ 45
8.6
PERFORMANCE ............................................................................................................... 45
8.6.1 Disk Defragmentation ............................................................................................... 45
8.6.2 Swap File (pagefile) .................................................................................................. 45
8.7
PRINTING ....................................................................................................................... 46
8.7.1 Adding a printer by network name............................................................................ 46
8.7.2 Defining a printer by its IP address .......................................................................... 46
8.8
SYSTEM.......................................................................................................................... 46
8.8.1 Boot Manager ........................................................................................................... 46
8.8.2 Desktop ..................................................................................................................... 46
8.8.3 Environment Variables ............................................................................................. 47
8.8.4 Keyboard Shortcuts ................................................................................................... 47
8.8.5 Log files (Dr. Watson)............................................................................................... 48
8.8.6 Programs auto-started at boot .................................................................................. 48
8.8.7 Registry ..................................................................................................................... 48
8.8.8 Screen Capture.......................................................................................................... 48
8.8.9 Services ..................................................................................................................... 49
8.8.10 Start Menu ............................................................................................................. 49
8.8.11 User Profiles ......................................................................................................... 49
8.8.12 Wallpaper .............................................................................................................. 49
8.8.13 WMI (Windows Management Instrumentation) .................................................... 50
8.9
TERMINAL SERVICES ..................................................................................................... 50
9
WINDOWS 2003 ................................................................................................................. 50
9.1
10
ACTIVE DIRECTORY ....................................................................................................... 50
WINDOWS VISTA............................................................................................................. 51
10.1 BACKUP AND RESTORE .................................................................................................. 51
10.2 LANGUAGES ................................................................................................................... 51
10.2.1 Install / Uninstall Font .......................................................................................... 51
10.2.2 Unicode – 3 ways to enter in Windows ................................................................. 52
10.3 VIRTUAL STORE ............................................................................................................. 53
10.4 VOLUME SHADOW COPY SERVICE ................................................................................. 53
11
.NET SERVER .................................................................................................................... 54
11.1
WHAT IS IT? ................................................................................................................... 54
4
1 References
ask-leo.com
www.petri.co.il
2 Windows Mobile
2.1 Versions
http://pocketpccentral.net/help/which_version_wm.htm
Version Number
3.0.9348
3.0.11171
4.20.xxxx
4.21.xxxx
5.1.xxxx
5.2.xxxx
OS Version
Pocket PC 2000
Pocket PC 2002
Windows Mobile 2003
Windows Mobile 2003 SE
Windows Mobile 5
Windows Mobile 6
http://en.wikipedia.org/wiki/Windows_Mobile
 Originally appearing as the Pocket PC 2000 operating system…
 Windows Mobile 6, formerly codenamed "Crossbow", was released on February 12,
2007 at the 3GSM World Congress 2007. It comes in three different versions: "Windows
Mobile 6 Standard" for Smartphones (phones without touchscreens), "Windows Mobile
6 Professional" for Pocket PCs with phone functionality, and "Windows Mobile 6
Classic" for Pocket PCs without cellular radios. Windows Mobile 6 is powered by
Windows CE 5.0 (version 5.2)… Aesthetically, Windows Mobile 6 was meant to be
similar in design to the then newly released Windows Vista. Functionally, it works much
like Windows Mobile 5, but with much better stability.
 Windows Mobile 6.1 was announced April 1, 2008. The underlying CE versions can be
used to differentiate WM6.0 from WM 6.1. The version of Windows CE in WM 6.0 is
5.2.*, with the final number being a 4 digit build ID (e.g. 5.2.1622 on HTC Wing). In
WM 6.1, the CE version is 5.2.* with a 5 digit build number (e.g. 5.2.19216 on Palm
Treo 800w).
 Windows Mobile 6.5 was never part of Microsoft's mobile phone roadmap, and has been
described by its chief executive, Steve Ballmer, as "not the full release [Microsoft]
wanted" until the multi-touch enabled Windows Mobile 7 (now replaced by Windows
Phone 7) arrives in 2010.
o Version 6.5 is an upgrade to Windows Mobile 6.1 that was unveiled at the 2009
Mobile World Congress in February and released to manufacturers on May 11,
2009, and the first devices running the operating system debuted in late October
'09.
5



o This incremental update includes some significant new added features, such as a
revamped GUI, new today screen with vertically scrollable labels (called
'Titanium'); though is generally regarded as a minor upgrade.
o Some aspects of the user interface have been redesigned with the home screen
resembling that of Microsoft's Zune player and the sliding panel interface of
Windows Mobile 6.1 Standard. This version was designed mainly for easier
finger usage.
The current version is called "Windows Mobile 6.5". It is based on the Windows CE 5.2
kernel.
Windows Mobile (rebranded as Windows Phone with the launch of Windows Phone 7)
Microsoft announced a completely new phone platform, Windows Phone 7, at the Mobile
World Congress in Barcelona on February 15, 2010. Phones running Windows Mobile
6.x will not be upgradeable to version 7.
2.2 .NET Compact Framework
2.2.1 View Version
\windows\cgacutil.exe
v2.0.7045.0 installed by default on Tilt 2 Win Mobile v6.5
Per http://www.raymond.cc/blog/archives/2009/08/29/check-net-compact-framework-versioninstalled-on-windows-mobile/, this version corresponds to .NET CF 2.0 SP2
Download .NET CF 3.5
http://msdn.microsoft.com/en-us/netframework/aa497280.aspx
2.3 Fonts
2.3.1 Adding
http://social.msdn.microsoft.com/Forums/en-US/netfxcompact/thread/656fe904-ec82-4db28875-2e34328d42c8
Tuesday, November 28, 2006 4:47 PM
Michael Koster, MVP
Yes, you can install and use your own TrueType font in a .NET CF 2.0 application. Just copy the
.TTF files to the Windows directory on the device and do a soft reset.
[7/28/10: Tested on HTC Tilt 2 WM6.5 and it worked! Used ]
6
2.3.2 TrueType vs Raster
http://msdn.microsoft.com/en-us/library/aa911450.aspx
Windows Mobile supports TrueType and raster font technologies, but only one font technology
can be used on a specified OS design. Generally, Windows Mobile uses Tahoma as the default
system font.
TrueType is the default in Windows Mobile, but raster technology can be implemented in the OS
design by adding the Raster Fonts Support Catalog item from the Platform Builder Catalog to the
OS design. Once TrueType or raster font technology has been chosen during OS design, you
cannot change technologies with an application.
2.3.3 Internet Explorer
http://msdn.microsoft.com/en-us/library/bb159674.aspx
4/8/2010
A device running Windows Mobile Professional or Windows Mobile Classic includes at least the
following two fonts:


Microsoft Tahoma (default variable-width font).
Courier (default fixed-width font).
A device running Windows Mobile Standard has default system fonts that must not be changed.
The following default system fonts are expected:


Microsoft Segoe, except East Asian versions.
Microsoft Nina (9-point) for East Asian Windows Mobile Standard.
All other fonts are converted to the closest of these fonts, as defined by their font descriptions.
Using the PRE XHTML Element tag for any fixed-width content ensures that Internet Explorer
Mobile selects the correct fixed-width font.
2.3.4 Third Party
http://www.fontmarketplace.com/info/font-help.aspx
WGL stands for Windows Glyph List, developed by Microsoft with approximately 652
characters to address the languages and scripts of Western, Central and Eastern Europe. WGL
fonts contain the following code pages:




codepage 1252 Latin 1
codepage 1250 Latin 2 Eastern Europe
codepage 1251 Cyrillic
codepage 1253 Greek (modern, not classical)
7


codepage 1254 Turkish
codepage 1257 Baltic
http://guides.theology.library.emory.edu/content.php?pid=28190&sid=205411
2.4 Unicode
http://msdn.microsoft.com/en-us/library/aa913854.aspx
Programming with Unicode and NLS
4/8/2010
Windows Mobile supports Unicode version 3.2. Unicode is a worldwide character-encoding
standard that treats all characters as having a fixed width of 2 bytes. It can represent all the
world's characters in modern computer use, including technical symbols and special characters
used in publishing. Because Unicode characters are 2 bytes, Unicode–enabled functions are often
referred to as wide–character functions.
Unicode defines semantics for each character, standardizes script behavior, provides a standard
algorithm for bidirectional text, and defines cross-mappings to other standards. Because each
Unicode character is 16–bits wide, it is possible to have separate values for up to 65,536
characters.
Windows Mobile uses Unicode exclusively at the system level for character and string
manipulation. By implementing Unicode in your applications, you can provide your application
with universal data exchange capabilities for global marketing, using a single binary file for
every possible character code. This simplifies localization of software and improves multilingual
text processing.
2.4.1 Understanding Unicode
http://msdn.microsoft.com/en-us/library/aa913300.aspx
2.4.2 Inputting
http://www.fitaly.com/tabletfitaly/fitalymacros.htm
Fitaly offers full Unicode support. Any unicode character can be produced with the Fitaly macro
language. You can pick any character or string of characters in the Unicode Picker by tapping on
Insert Macro -> special character -> unicode.
http://www.mobiletechreview.com/software/Fitaly-5.htm
http://www.fitaly.com/product/fitalyppc.htm $30
8
Language Extenders:

Paragon:
o http://www.downloadplex.com/Mobile/Windows-Mobile/Application/languageextender-windows-mobile_228276.html
o http://www.paragon-software.com/
o http://www.penreader.com/windows-mobile-software/Language_Extender.html
$25 for lite version, $50 for full version (modern Greek)
o http://www.penreader.com/pocket-pc-software/InterKey.html $25 (Paragon)
o
Not for WM:
 http://en.wikipedia.org/wiki/Unicode_input


http://blogs.msdn.com/b/michkap/archive/2005/05/18/419117.aspx
Typing in random Unicode code points. Unicode IME. Removed after XP.


http://blogs.msdn.com/b/michkap/archive/2006/07/20/671835.aspx
Return of the Unicode IME. Beta.


http://blogs.msdn.com/b/michkap/archive/2008/01/21/7178421.aspx
Table Driven Text Service


http://blogs.msdn.com/b/michkap/archive/2010/03/22/9979228.aspx
Uniscribe
3 Windows 95
3.1 Filesystems and Disks
3.1.1 Restoring the Master Boot Record
Undocumented flag of fdisk (fdisk /mbr) re-writes the MBR to boot only the primary partition
(works in DOS, Win95/98, NT).
3.1.2 Recovering Deleted Files
URL: http://www.ixian.com/ead/misc/win95-undelete.shtml
Last Modified: Fri Aug 29 17:50:36 PDT 1997
9
Visitor Number: 265
http://www.ixian.com/ead/misc/win95-undelete.shtml
If you don't have a payware Windows 95 undelete utility, you can still recover deleted files under
Windows 95: Microsoft supplies UNDELETE.EXE with the OS. If it's not on your Windows 95
CD
under \OTHER\OLDMSDOS (it wasn't on my Windows 95B CD), it's on Microsoft's "Windows
95/Other Utilities" page at <http://www.microsoft.com/windows95/info/otherutils.htm>. Visit
that
page and download the Old MS-DOS Utilities file OLDDOS.EXE
(http://www.microsoft.com/windows/download/olddos.exe).
OLDDOS.EXE is an executable
archive that contains UNDELETE.EXE and several other utilities.
To recover a deleted file, that is, one that you've emptied from the Recycle Bin:
Restart your computer in MS-DOS mode.
CD to the directory from which the file went to the Recycle Bin.
Issue the undocumented MS-DOS command LOCK, enabling direct disk access. (LOCK /?
displays help for the command.)
Issue the command UNDELETE myfile and follow the instructions. If no disk writes have
occurred since the accidental deletion of your file, UNDELETE will successfully recover it.
Issue the command UNLOCK.
Issue the command EXIT. Your computer will reboot and return to Windows mode. If a
future MS-DOS program starts full-streen rather than in a window, press ALT+ENTER to
shrink it and future MS-DOS programs to start in a window. (That is, ALT+ENTER is a
toggle for how MS-DOS programs start, either in a window or full-screen.)
Eric De Mund <[email protected]>
http://www.ixian.com/ead/
3.2 Networking
3.2.1 Logon
Q. Each time I log in I am asked for a password. Is there a way to prevent this?
A. If you do not want to be prompted for a password, set your primary network logon to
Windows Logon. To do so, use the following six steps:
1. Use the right mouse button to click Network Neighborhood, and then click Properties on
the menu that appears.
2. On the Configuration tab, click Windows Logon in the Primary Network Logon box, then
click OK.
10
3.
4.
5.
6.
When Windows prompts you to restart your computer, click No.
Click the Start button, point to Settings, and then click Control Panel.
Double-click the Passwords icon.
On the Change Passwords tab, click the Change Windows Password button, click OK,
then set a blank password.
3.2.2 Logon Packets
3.2.2.1 SAM LOGON Request from Client
When a Windows 95 computer is configured for User-Level access control in Network
Properties, it will send the SAM LOGON request from client packets to the domain controllers
or the Windows NT Server computer for which it is configured. Mssp.vxd is sending these
packets through the Windows 95 redirector to \MAILSLOT\MSSP on the security provider.
This is pass-through authentication being done from the Windows 95 computer. Windows 95
does not implement its own unique user-level security mechanism, so it must use the services of
an existing user-level security provider, in this case a Windows NT domain controller or
Windows NT Server computer, on the network. The Windows 95 computer sends these packets
during its boot sequence to dynamically locate its security provider in preparation for future
pass-through authentication needs.
3.2.2.2 LM1.0/2.0 LOGON Request from Client
The LM1.0/2.0 LOGON request from client packets are the standard Windows NT logon
validation packets sent to \MAILSLOT\TEMP\NETLOGON on the domain controller where the
Windows 95 computer is configured to perform its network logon request. This is controlled
through the Client for Microsoft Networks properties page on the Windows 95 computer.
3.2.3 Peer-to-Peer Networking
- add NetBEUI protocol
- remove "Client for NetWare Networks" and IPX/SPX
- "File and Print Sharing..." (Win95) or "Access Control" (Win98)
grant access to others for files (and printers)
- "Identification" tab
set computer name (unique on LAN) and workgroup name (not
case-sensitive, must be same for all computers on LAN)
- set "Primary Network Login" to "Client for Microsoft Networks"
- share a drive by right clicking on the drive icon in "My Computer" ->
Sharing -> Shared As and give the drive a name for how it is to be
seen by others. Specify "Access Type" and Password (can be blank).
11
- user must login, not cancel the login prompt (even though there's
no network security server. For example, specify user name as
"guest" with no password. Otherwise, "Network Neighborhood" will
be empty.
3.2.4 Route command
C:\var\dns>route ?
### don't have to specify MASK ###
Manipulates network routing tables.
ROUTE [-f] [command [destination] [MASK netmask] [gateway]]
-f
Clears the routing tables of all gateway entries. If this is
used in conjunction with one of the commands, the tables are
cleared prior to running the command.
command
Specifies one of four commands
PRINT Prints a route
ADD
Adds a route
DELETE Deletes a route
CHANGE Modifies an existing route
destination Specifies the host to send command.
MASK
If the MASK keyword is present, the next parameter is
interpreted as the netmask parameter.
netmask
If provided, specifies a sub-net mask value to be associated
with this route entry. If not specified, if defaults to
255.255.255.255.
gateway
Specifies gateway.
All symbolic names used for destination or gateway are looked up in the
network and host name database files NETWORKS and HOSTS, respectively. If
the command is print or delete, wildcards may be used for the destination and
gateway, or the gateway argument may be omitted.
3.2.5 Sharing: File and Printer
domain (also known as the pass-through domain): used by 95 server to validate clients
12
3.2.5.1 Passwords
credentials – Windows term for user name/password
passwords can’t have punctuation in them
3.2.5.2 Access Control
Select the type of access control:


share-level – “password-protected shares”
user-level – requires a “security provider” (e.g. an NT workstation either standalone or a
member of a domain) to store list of user names
using Control Panel->Networking->Access Control.
3.2.5.3 Accessing share from NT/2000 client
1.
2.
3.
4.
Map a drive and configure it to connect automatically at boot up
Reboot the NT/2000 client
Log in to the NT/2000 client
The client will attempt to connect the mapped drive and will prompt you for a password
(no user name). Specify the password.
If you don’t connect the mapped drive when you first log in, and then later attempt to connect,
you will be prompted for a username and password. Supposedly, you can specify
“computer_name\administrator” as the username, where “computer_name” is the name of the
Windows 95/98 box serving the share. I couldn’t get this to work.
3.2.5.4 Accessing off-line 98 share from 2000 client
Case 1: On LAN with 98 server. Boot. Login. Prompted for share password. Provide password
and it connects.
Case 2: On LAN with 98 server. Boot. Login. Prompted for share password. Press Escape. In
Windows Explorer, attempted to expand the off-line share. Prompted for share password.
Provide password and it connects.
Case 3: Not on LAN with 98 server. Boot. Login. Not prompted for share password (access via
off-line copies)
Case 4: Not on LAN with 98 server. Already logged in. Connect to LAN. Attempt to
synchronize. Prompted for share username and password. Try the following
combinations:
User
Password
Result
13
computer_name\administrator
computer_name\admin
administrator
admin
computer_name\2000_username
2000_username
computer_name\98_username
98_username
password
password
password
password
password
password
password
password
password
computer_name
password
2000computer_name
password
2000computer_name\administrator password
failure
failure
failure
failure
failure
failure
failure
failure
failure
failure
failure
failure
failure
Log off 2000. Logon again. Not prompted for share password (access via off-line
copies).
Conclusion: If you want to synchronize, the LAN connection to the 98 server must be active
when the 2000 client boots (or least before initially logging in).
3.3 Programming
3.3.1 DOSKEY macro definitions
in order to say "wc somefile":
“doskey wc perl \usr\bin\wc.p $L $*”
3.3.2 Environment variables in batch files
set VAR=value
rem
@echo off
3.4 System
winipcfg
regedit
starting apps automatically at Windows startup:
14
- startup group
- LOAD= and RUN= lines in WIN.INI
\windows\system\sysedit.exe - edits WIN.INI, SYSTEM.INI, AUTOEXEC.BAT, and
CONFIG.SYS simultaneously
win :
start windows, skip Windows advertizing
shift-double click
loads but doesn't run app (iconifies it)
PROGMAN.INI
saves icon positions
WINHELP.EXE
hypertext applet
3.4.1 Desktop
c:\windows\desktop contains icons of objects visible on background
3.4.2 Startup
While booting (before the graphic Windows screen appears), press F8 repeatedly to get the “MS
Windows 9x Startup Menu”
4 Windows 98
4.1 Installation
power on machine and press DEL during memory check to get to CMOS settings
swap boot order of disk to (1) slave (2) master
Boot->Hard Drive (press ‘+’ on PS)
disable primary master (so Win98 install won’t detect it and try to install over it)
Advanced->IDE Configuration->Primary IDE Master, press ‘+’ to change Type from “Auto” to
“None”
save changes and power off
insert Win98 SE (Second Edition) CD in drive
insert startup floppy disk (that comes with win98) into drive and power on
format slave drive (c:)
run setup.exe on CD
15
new bare installation takes 243MB
install winzip
Display: Dell E770s on Rage 128 Pro, High color 16 bit
Screen area: 1024x768
Kingston EtheRx PCI 10/100 Fast Ethernet Adapter (KNE110TX)
Aztech MDP3900V-U Modem on COM2
install video driver
Insert Dell Resource CD
rcdmenu.exe -> Drivers -> Win98 -> ATI 16MB Rage 128 Pro -> setup.exe
install modem driver
insert modem CD
\manuals\modem\us\instal98.htm
Aztech MDP3900 56K modem
driver file is BRDG4035.INF
added MDP3900V-W to COM1
Control Panel->Add New Hardware->No, device isn’t in list->PCI Communication Device
Factory install settings:
Control Panel->System->Device Manager
Display Adapters
Rage 128 Pro
Memory Range 000A0000-000AFFFF
Memory Range 000B0000-000BFFFF
I/O Range 03B0-03BB
I/O Range 03C0-03DF
Interrupt Request 11
Memory Range F8000000-F8FFFFFF
Memory Range F0100000-F0103FFF
I/O Range 9000-90FF
Memory Range 000C0000-000CAFFF
Memory Range F0120000-F013FFFF
Floppy disk controllers
Standard Floppy Disk Controller
I/O Range 03F0-03F5
I/O Range 03F7-03F7
Interrupt Request 6
Direct Memory Access 2
Hard disk controllers
Intel 82371AB/EB PCI Bus Master IDE Controller
I/O Range 01F0-01F7
16
I/O Range 03F6-03F6
Interrupt Request 14
I/O Range 0170-0177
I/O Range 0376-0376
Interrupt Request 15
I/O Range 1420-142F
Primary IDE contoller (dual fifo)
I/O Range 01F0-01F7
I/O Range 03F6-03F6
Interrupt Request 14
I/O Range 1420-1427
Secondary IDE contoller (dual fifo)
I/O Range 0170-0177
I/O Range 0376-0376
Interrupt Request 15
I/O Range 1428-142F
HCFMODEM
MDP3900 PCI Modem Enumerator
Interrupt Request 9
Memory Range F0000000-F000FFFF
I/O Range 1440-1447
Keyboard
Standard 101/102-Key or Microsoft Natural Keyboard
I/O Range 0060-0060
I/O Range 0064-0064
Interrupt Request 1
Modem
MDP900V-U Modem
I/O Range 02F8-02FF
(Modem tab says “Port: COM2”)
Parallel cable on LPT1
(Modem tab says “Port: Printer Port (LPT1”)
Serial cable on COM1
(Modem tab says “Port: Communications Port (COM1)”)
Mouse
PS/2 Compatible Mouse Port
Interrupt Request 12
Multi-function adapters
TBS Montego II Multifunction PCI Platform
Interrupt Request 10
Memory Range F0040000-F007FFFF
I/O Range 1438-143F
I/O Range 1430-1437
Network adapters
Dial-Up Adapter (no resources tab)
Kingston EtheRx PCI 10/100 Fast Ethernet Adapter (KNE110TX)
17
Interrupt Request 11
Memory Range F0010000-F00100FF
I/O Range 1000-10FF
NTS PPPoE (no resources tab)
Ports (COM & LPT)
Communications Port (COM1)
I/O Range 03F8-03FF
Interrupt Request 4
ECP Printer Port (LPT1)
I/O Range 0378-037F
I/O Range 0778-077F
Interrupt Request 7
Direct Memory Access 3
Sound, video and game controllers
TBS Montego II Gameport Interface
I/O Range 0201-0201
TBS Montego II MPU-401 Interface
I/O Range 0330-033F
TBS Montego II PCI Audio
Interrupt Request 10
Memory Range F0040000-F007FFFF
I/O Range 1438-143F
I/O Range 1430-1437
TBS Montego II Sound Blaster Pro Emulation
I/O Range 0240-024F
Interrupt Request 5
Direct Memory Access 1
I/O Range 0388-038B
Wave Device for Voice Modem (no resources tab)
Wave sound driver for the TotalRecorder (no resources tab)
System devices
Advanced Power Management support (no resources tab)
Direct memory access controller
I/O Range 0000-000F
I/O Range 0081-008F
I/O Range 00C0-00DF
Direct Memory Access 4
Intel 82371EB PCI to ISA bridge (ISA mode) (no resources tab)
Intel 82371EB Power Management Controller (no resources tab)
Intel 82443BX Pentium II Processor to AGP controller
I/O Range 9000-9FFF
Memory Range F0100000-F01FFFFF
Memory Range F8000000-FBFFFFFF
Intel 82443BX Pentium II Processor to PCI bridge
Memory Range F4000000-F7FFFFFF
IO read data port for ISA Plug and Play enumerator
18
empty
Motherboard resources
I/O Range 0370-0371
I/O Range 00EA-00EB
Memory Range FFFC0000-FFFFFFFF
Motherboard resources
I/O Range 04D0-04D1
I/O Range 8000-803F
I/O Range 7000-700F
Motherboard resources
Memory Range 000E0000-000E3FFF
Motherboard resources
Memory Range 000CB000-000CBFFF
Numeric data processor
I/O Range 00F0-00FF
Interrupt Request 13
PCI bus
I/O Range 0CF8-0CFF
Plug and Play BIOS (no resources tab)
Processor support (no resources tab)
Programmable interrupt controller
I/O Range 0020-0021
I/O Range 00A0-00A1
Interrupt Request 2
System board
System board extension for PnP BIOS
Memory Range 00000000-0009FFFF
Memory Range 000E4000-000FFFFF
Memory Range 00100000-07FFFFFF
Memory Range FFF80000-FFFBFFFF
System CMOS/real time clock
I/O Range 0070-0071
Interrupt Request 8
System speaker
I/O Range 0061-0061
System timer
I/O Range 0040-0043
Interrupt Request 0
Universal Serial Bus controllers
Intel 82371AB/EB PCI to USB Universal Host Controller
Interrupt Request 9
I/O Range 1400-141F
USB Root Hub (no resources tab)
New Install
missing HCFMODEM, Modem, Multi-function adapters, Sound, video and game controllers
19
added Other Devices (PCI Communications Device, PCI Ethernet Controller, PCI Multimedia
Audio Device, USB Camera)
On General tab of PCI Communications Device, click “Reinstall Driver”
HCFMODEM and Modem appear, but Modem “is not configured correctly”.
Warm reboot. Detects device.
On General tab of PCI Ethernet Controller, click “Reinstall Driver”. Need Win98SE CD.
Warm reboot. Detects device. Configure IP address. Warm reboot. can ping self.
install Norton AV 2000
install Adaptec CD burner software
install DVD driver
burn CD of install (approx 300MB)
create a startup disk (Control Panel->Add/Remove Programs->Startup Disk)
4.2 Networking
winipcfg
4.2.1 Internet Connection Sharing
see http://windowsupdate.microsoft.com/default.htm
Very easy to install and configure
1. When installed on the gateway machine, it sets the IP addr to 192.168.0.1/24
2. On other machines, manually set IP addr to something on same subnet, default gateway
to 192.168.0.1, DNS servers to whatever the ISP provided.
winipcfg shows “IP Routing Enabled” with a big black check mark
can assign private addresses to other boxes via DHCP
Control Panel->Internet Options->Connections->Sharing
Doesn’t work with NTS’s Enternet 300 PPPoE client.
4.2.2 Microsoft Networking Password
c:\windows\username.pwl
4.2.3 winpopup
20
Send/receive short text messages to/from individual users/computers or an entire workgroup.
4.3 System
4.3.1 Active Desktop
The integration of Windows and Internet Explorer. To switch between Active Desktop and
regular desktop, right click on an empty area of the desktop and select “Active Desktop->View
As Web Page”.
4.3.2 Configuration Utility
msconfig.exe -> General -> Advanced -> Enable Startup Menu (before Windows launches, it
prompts how you want to boot, e.g. in safe mode)
4.3.3 Device Manager
Ideally, when you open the Device Manager window in Windows 95/98, none of the individual
device categories should be open (expanded) and you should not see any yellow-colored symbols
(markers) preceding any of the devices within the individual categories. For example, the
presence of a yellow exclamation mark (!) preceding a device usually means that the device has a
resource conflict, typically an IRQ conflict or an I/O address range conflict. The presence of a
yellow question mark (?) usually means that for some reason the device driver for that device did
not install correctly. Additionally, the presence of a red X over an icon means that Windows
installed the device and then determined that it was necessary to disable the device to prevent it
from causing problems with another installed device. A red X could also be the result of
someone deliberately disabling the device from within its Properties box.
4.3.4 IRQs
To see list of in-use IRQs:
Control Panel -> System -> Device Manager -> Computer -> Properties (right click)
Browse through the list of in-use IRQ numbers to see if there are any numbers missing from the
sequence. Any number that is missing is an IRQ number that is available for use by another
device. If all the IRQ numbers between 00 and 15 are in-use, that means there are no “free” IRQs
available for the network adapter card to use. Although PCI devices, such as this network
adapter, are supposed to be able to share an IRQ, sometimes they cannot do so. In such cases, the
card will not install and Windows will not be able to detect it, and subsequently, install its driver.
If possible, try to locate an IRQ that has only one device using it and see if you can reassign that
21
device to another IRQ; otherwise, you may have to physically remove one of the other devices in
order to free an IRQ for the network adapter card to use.
As a side note, when you see IRQ Holder for PCI Steering or ACPI IRQ Holder for PCI IRQ
Steering beside an IRQ number, understand that this is not an additional device assigned to this
IRQ. IRQ Holder for PCI Steering is a tag that indicates the IRQ is to be used only for PCI
devices and not for ISA devices. In other words, Windows has reserved that IRQ solely for use
with Plug and Play devices, not for so-called legacy devices. ACPI IRQ Holder for PCI IRQ
Steering is a tag that indicates the electrical power to this device can be managed in accordance
with the Advanced Configuration and Power Interface specification. This feature enables
Windows to control the amount of power supplied to the device, e.g., to reduce power to the
device (low-power mode) when it is not in use.
4.3.5 Multilanguage Support
Control Panel->Add/Remove Programs->Windows Setup->Multilanguage Support
Select Cyrillic for Russian (this installs the Cyrillic fonts)
Control Panel->Keyboard->Language
Add Russian and “Enable indicator on taskbar” (this enables the ability to switch between the
English and Russian keyboards using Left-Alt-Shift)
4.3.6 Registry – defining boot-time executables
The following defines which programs to run at boot time:
HKEY_LOCAL_MACHINE->Software->Microsoft->Windows->CurrentVersion->Run
4.3.6.1 Customize Win98 ScanReg
ScanReg is a built-in utility that, by default, monitors and backs up the Windows 98 Registry at
least once a day. The default behavior of ScanReg can be controlled through settings listed in
SCANREG.INI. It allows you to increase or decrease the number of saved Registry backups on
disk (the default is five), change where Registry backups are stored, specify additional files (such
as AUTOEXEC.BAT and CONFIG.SYS) to be saved with each Registry backup, and disable
automatic backups or automatic optimization.
4.3.6.2 Registry Changes on the Fly
Some of the changes you make in the Windows Registry don't take effect until you reboot. But if
you want to see the effect of a changed Registry entry, you can refresh the Desktop and reload
Registry defaults without rebooting. Press Ctrl+Alt+Del. Select Explorer in the Task list and
22
click the End Task button. When the Shutdown dialog box appears, choose No. A Program Not
Responding dialog box for Explorer will appear on the Desktop. Click the End Task button to
restart Explorer, reloading system settings from the current Windows Registry.
4.3.7 Sounds
Control Panel->Sounds
C:\windows\media contains the default sounds used (e.g. “The Microsoft Sound.wav”)
4.3.8 Start Menu
c:\Windows\Start Menu contains short cuts for items that appear on the main Start menu. The
sub-directory Programs contains sub-dirs and short cuts for items that appear on Start>Programs.
4.3.9 Startup Disk
To create, select Start->Settings->Control Panel->Add/Remove Programs->Startup Disk
4.3.10
Windows Scripting Host
Write scripts to automate tasks in Windows (Add/Remove Programs->Windows Setup>Accessories)
On Win98SE CD->tools->reskit->scripting
complete programmers ref at http://www.microsoft.com/management
4.3.11
Windows Update
windowsupdate.microsoft.com
Auto-detects availability of updates to system or application software that have been released
after the versions currently installed.
Don’t need Service Pack if running 98 Second Edition.
5 Windows NT
23
5.1 How to Install Windows NT on Dell Latitude CPi
5.1.1 System Specs
modem card: Megahertz 3CCM156
c:\images\3ccm156.exe
Ethernet card: 3Com Megahertz 10/100 LAN CardBus, 3CCFE575BT-D
c:\images\ethernet_driver.zip (?)
Video Neomagic MagicMedia 256AV, resolution 1024x768
c:\images\d4039d00.exe (NM 2200 driver for SP3+)
Softex PC Card Controller, NT 4.0 SP 4,5,6
installs from HD
c:\images\pcma03.exe
5.1.2 Procedure
(modem and ethernet cards removed)
boot to 98
put NT CD in drive
g:\i386\autorun.exe
click "Windows NT Setup"
"NT files found at path g:\i386" -> ENTER
(copies files to c:) -> ENTER
reboot manually
"To set up Windows NT now, press ENTER"
(detects IDE CD-ROM) -> ENTER
(msg about HD having more than 1024 cylinders) -> ENTER
accept license agreement (Pg Dn then F8)
(msg displaying hw/sw components) -> ENTER
select partition to install in
"Choose the location where you want these files to be installed:"
\winnt -> ENTER
"To skip the exhaustive examination, press ESC" -> ESC
"Press ENTER to restart your computer"
"1) Gathering information about your computer" -> Next
Setup Options -> Typical (not "Portable") -> Next
(name and organization)
(registration) -> 32498-OEM-0039315-35440
(computer name)
(administrator account)
(Emergency repair disk) -> No
24
Install the most common components -> Next
"2) Installing Windows NT Networking" -> Next
"This computer will participate on a network:"
Wired to the network -> Next
Network Adapters: Select from list...
MS Loopback adapter -> OK -> Next
TCP/IP & NetBEUI -> Next -> Next
Do you wish to use DHCP -> No
Specify an IP address: 192.168.1.3/24 -> OK -> Next
Make this computer a member of workgroup:
WORKGROUP -> Next
"3) Finishing Setup" -> Finish
Set time zone to "GMT -8 (Pacific)" -> Close
"The system found 'vga compatible display adapter'" -> OK -> OK
Restart computer
Apply SP5 (c:\images\sp5i386.exe) -> Restart
put formatted diskette in floppy drive
run c:\images\d4039d00.exe (to create Neomagic video driver diskette)
Settings -> Control Panel -> Display -> Settings -> Display
Type... -> Change... -> Have Disk... -> OK -> OK -> Yes ("install
a third-party driver") -> OK -> Close -> Close
"Do you want to restart your computer now?" -> Yes
"A new graphics driver has been installed..." -> OK
In "Display Properties", set "Desktop Area" to "1024x768" and press OK
run c:\images\pcma03.exe
"Unzip To Folder: e:\Dell\Drivers\0A03R" -> Unzip -> OK
follow prompts to install Softex
("Install Now" -> Open -> Accept -> "Click this button to
install Softex..." -> "I Understand" -> OK -> "Restart Now")
(Softex Diagnostics runs) -> Next -> Next -> Finish -> reboots
automatically
Insert Ethernet card
"Install system provided driver for this card" -> OK -> Continue
Adapter: [2] 3Com Megahertz 10/100 LAN CardBus PC Card (Ethernet)
Specify an IP address: 10.1.1.1/8 -> OK -> Reboot Now
Delete loopback adapter
change IP to 192.168.1.3/24
Reboot
(can now ping 192.168.1.1)
25
insert Modem card -> OK
Settings -> Control Panel -> PC Card (PCMCIA) shows red X over icon
of Ethernet adapter, but "Softex PC Card Controller" says both
adapters are available for use.
cd e:\temp
c:\images\3ccm156.exe
put formatted diskette in floppy drive
install.bat (to create modem driver diskette)
"My Computer" -> Dial-Up Networking -> Install
"Files Needed" -> h:\i386 -> OK
"Do you want RAS setup to invoke the modem installer to enable you
to add a modem?" -> Yes -> "Don't detect my modem; I will
select it from a list." -> Next -> "Have Disk..." -> OK ->
Next -> COM2 -> Finish -> "Add RAS Device" (COM2) -> OK ->
"Remote Access Setup" -> Continue -> Restart
5.1.3 Miscellaneous Notes
HAL = Hardware Abstract Layer
rdisk = creates emergency repair disk (?)
"route -p add 165.19.0.0 mask 255.255.0.0 167.146.24.1"
net stop dhcp
net start dhcp
ipconfig /all
ipconfig /renew
boot.ini contains NT Boot Mgr entries
explorer.exe -> View -> Options -> Show All Files
attrib -r -h -s c:\boot.ini
Dell contacts
NTWS support: 888-596-3355 x69222
NT server support: 800-967-1068
5.2 Filesystems and Disks
5.2.1 fdisk-like program
Start->Programs->Administrative Tools (Common)->Disk Administrator
26
5.2.2 Mapping a drive from the command prompt
net use j: \\computer-name ...
5.2.3 Unmapping a drive from the command prompt
net use /del j:
5.3 Networking
5.3.1 Browsing
If NT network is setup as a workgroup, instead of keeping a master browse list for the WAN by a
domain master browser it needs to get a list from each subnet.
5.3.2 Find NetBIOS name of a device
C:\usr\data\technote>nbtstat -A 167.146.24.59
NetBIOS Remote Machine Name Table
Name
Type
Status
--------------------------------------------WAL_DGREI00
<00> UNIQUE
Registered
SAFEWAY01
<00> GROUP
Registered
WAL_DGREI00
<20> UNIQUE
Registered
WAL_DGREI00
<03> UNIQUE
Registered
SAFEWAY01
<1E> GROUP
Registered
WAL_DGREI00
<6A> UNIQUE
Registered
WAL_DGREI00
<87> UNIQUE
Registered
MAC Address = 00-08-C7-2B-C3-A8
Also try "net view \\computer-name" or "net view ip.addr"
5.3.3 IP Forwarding
Control Panel->Networking->TCP/IP->Properties->Routing->IP Forwarding
5.3.4 Sending Messages
net send computer-name message - creates a popup on other Windows machines
27
5.4 Printing
to add a network printer:
- Network Neighborhood
- 2x click on server and login
- right click on printer name and Install
5.5 Programming
5.5.1 Running an autoexec.bat
Right click on MSDOS icon -> Properties -> Shortcut -> add "/k autoexec.bat"
after cmd.exe in the Target field
5.5.2 Running a command in the background
Use "start /b" or "start /min"
5.5.3 grep-like command
findstr /i STRING FILENAME(S)
5.5.4 Scripting (VBScript and JScript)
http://msdn.microsoft.com/scripting/
5.5.5 How to execute a command every time you start a cmd shell
Properties -> Shortcut -> Target, specify '/k string'
Also works in Win98.
5.5.6 DOSKEY macro definitions
in order to say "wc somefile":
28
“doskey wc=perl \usr\bin\wc.p $L $*”
5.6 System
5.6.1 Boot Manager
c:\boot.ini contains NT Boot Mgr entries; read-only; modify boot delay via
Start->Settings->Control Panel->System->Startup/Shutdown
attrib c:\boot.ini -r -s
edit c:\boot.ini
attrib c:\boot.ini +r +s
5.6.2 Diagnostics
winmsd - equivalent to msd in DOS
Right click on Network Neighborhood -> System Information
5.6.3 Environment Variables
Control Panel -> System -> Environment tab
5.6.4 How increase the number of lines in the DOS window
Properties -> Layout -> Window Size -> Height, specify '40'
5.6.5 Password Encryption
Different algorithm than used on Win95/98.
5.6.6 Programs auto-started at boot
C:\WINNT\Profiles\All Users|Administrator|...\Start Menu\Programs\Startup
Start->Programs->Startup (show "All Users", programs started in tray)
29
5.6.7 Registry
regedit
What is the Registry?
http://www.windows2000faq.com/Articles/Index.cfm?ArticleID=14734
A. A. Originally there were .ini files in Windows, however the problem with .ini files are many,
e.g. size limitations, no standard layout, slow access, no network support etc. Windows 3.1 (yes
Windows not Windows NT) had a registry which was stored in reg.dat and could be viewed
using regedit.exe and was used for DDE, OLE and File Manager integration. In Windows NT the
Registry is at the heart of NT and is where nearly all information is stored, and is split into a
number of subtrees, each starting with HKEY_ to indicate that it is a handle that can be used by a
program.
HKEY_LOCAL_MACHINE This contains information about the hardware configuration and
installed software.
HKEY_CLASSES_ROOT This is just a link to
HKEY_LOCAL_MACHINE\SOFTWARE\Classes and contains links between applications and
file types as well as information about OLE.
HKEY_CURRENT_CONFIG Again this is a link to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\Current and
contains information about the current configuration.
HKEY_CURRENT_USER This is a link to HKEY_USERS\<SID of User> and contains
information about the currently logged on users such as environment, network connections,
printers etc.
HKEY_USERS Contains information about actively loaded user profiles, including .default
which is the default user profile.
Each of the subtrees has a number of keys, which in turn have a number of subkeys. Each
key/subkey can have a number of values which has 3 parts
The name of the value, e.g. Wallpaper
The type of the value, e.g. REG_SZ (which is a text string)
The actual value of the value, e.g. "c:\winnt\savilltech.bmp"
To edit the registry there are two tools available, regedt32.exe and regedit.exe.Regedit.exe has
better search facilities, but does not support all of the Windows NT registry value types. If you
want to just have a look around the Registry:
Start a registry editor (regedit.exe or regedt32.exe)
In Regedt32.exe you can set the registry to read only mode which means you won't corrupt
anything :-) (Options - Read Only Mode)
Select the HKEY_USERS subkey
Move to the .default - Control Panel - Desktop and you will see a number of values in the right
hand pane.
One of them is wallpaper and this is the background that is displayed before you logon.
30
5.6.8 Setting Application to open a file type
Explorer -> View -> Options... -> File Types tab
5.6.9 Services
Control Panel->Services
“net start” lists running services
“net start <service_name>” starts a service
“net stop <service_name>” stops a service
5.6.10
Service Packs (where to get)
support.microsoft.com/support/ntserver/Content/ServicePacks/Default.asp
5.6.11
Sounds
Control Panel->Sounds
C:\winnt\media contains the default sounds used (e.g. “The Microsoft Sound.wav”)
5.6.12
User Profiles
C:\WINNT\Profiles\<username>\Personal
5.6.13
Version
C:\> winver
5.7 Resource Kit
Another possibility is a utility in the Windows NT resource kit called sc.exe. You can use this
utility to do many things such as configure, start, stop, and delete services (there are several
additional options available).
Hyena will let you stop the service and change the startup to manual but if you want to delete the
service(s) entirely you might consider using the "sc" command-line utility as I described below:
Syntax for changing/deleting the SNMP service:
31
sc <hostname> [command] [service name] <option1> <option2>...
(Note: We might need to consider using sc \\machinename stop snmptrap to first stop a service.
Although this is probably not required since the following command simply deletes the service
from the registry, it may still be prudent to make sure the service is stopped until the machine is
rebooted. Otherwise, the service might actually remain active until the next reboot. Further
testing is required.)
sc \\machinename delete snmptrap
This could be configured in a batch file and modified as necessary using replaceable parameters
for the hostname. Hyena can be used to create this batch file using it's macro builder facility.
Since most things you might try rely on the systems to be active on your network, you will
probably have to continue your clean-up process over and over again until you are sure you got
every system. Hyena has some logging capability so that might prove useful. If you have access
to the netsvc command-line utility from your workstations you could modify the login script to
have any remaining systems report the existence of the SNMP service to you using the
following:
Look for SNMP service
netsvc \\machinename snmp /query | find "Service is running" && net send
machinname SNMP Service found!
Note: The netsvc utility is found in the Windows NT resource kit!
Good luck!
6 Windows XP Home Edition
6.1 Desktop
6.1.1 Screen Saver Slideshow
Q: I use Windows XP, and I'd like to use a few of my digital pictures for the screensaver--is
there an easy way to do this?
32
--Submitted by: Nancy S. of Santa Fe, New Mexico
A: To run your pictures as a slide show in XP, this is what you have to do:
First, select the pictures you want to use and set up a special folder with those pictures in it and
make a note where you saved that folder (in what directory, on what drive, and so on). You will
need this info later.
Next, go to your Desktop, right-click on the Desktop.
Scroll down to Properties, Click the Screensaver tab. Toward the middle of this dialog box there
is a drop-down box with the words "Screen Saver." Scroll down that box until you see My
Pictures Slideshow and click it; to the right of this drop-down box is a button that says Settings;
click it.
You should see the words "Use pictures in this folder" and a Browse button; click the button.
This is where you look for that file you created earlier with all your pictures that you want to use
for the screensaver. After you have found the file folder with the pictures, click OK.
You can now adjust how fast you want the pictures to change and so on, then click OK again.
This brings you back to the Display Properties dialog box, and you can see your screensaver
pictures. Click OK, and you are finished.
--Submitted by: Nedda H. of Palm Harbor, Florida
6.2 Files
6.2.1 Icon (.ico) Files
An icon is the graphic displayed next to a file name in Windows Explorer.
The .ico file for SomeApplication generally resides under C:\Program Files\SomeApplication.
6.2.2 Properties
To change the program that opens a file:
1. Right-click the file you want to open in a different program, and then click Properties.
2. On the General tab, click Change.
3. Click the name of the program in which you want the file to open.
Note: This change affects all files that have the same file name extension as the file you selected.
For example, if you change the program that opens a .jpg file, all .jpg files will open in this
program.
Creating Windows XP Icons
http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/winxpicons.asp
33
6.2.3 Shortnames and UNCs
In the days before Windows, filenames under MS-DOS could only be 11 characters long. For
compatibility with old programs that relied on that, for every file with a name longer than that,
Windows creates a unique "shortname". For example, if your file is named
"thisisalongfilename.isntit", a DIR /X in a command shell may show the shortname as
"THISIS~1.ISN".
Note the Short Filenames are the shortened version of Long Filenames that are created to fit the
8.3 format. That is, the name is only 8 characters and the extension is only 3 characters. The
system maintains both in its directory structure.
UNC is an acronym for Universal Naming Convention. By example, the FileName
"C:\temp\test.doc" would be represented by "\\?\C:\temp\test.doc".
6.3 Languages
Control Panel -> Date, Time, Language, and Regional Options -> Regional and Language
Options -> Languages tab -> Details -> Add
changes are user specific
6.4 Networking
6.4.1 File Sharing
Once you have run the Network Setup Wizard,
(or if you had decided to skip it),
the checkbox to share become active :
I share my drive, define the name to be displayed
on other systems as the Sharename and I allow
other network users to change my files.
Note: this is different to NT4 and Windows2000,
where I can assign permissions based on
usergroups and even single users, but similar
to the security settings on Windows95/98/ME.
If you need to have User-level security, you need
to use Windows XP Professional.
Unlike Windows95/98/ME, I could not find
a possibility to protect a network share with
a password : once you have shared a disk or folder,
everyone has access to your data.
34
http://www.jimthompson.net/xphome/File_Sharing.htm
http://www.practicallynetworked.com/sharing/xp/filesharing.htm
Q: I am still unable to map a share on the XP computer to the 98
computer. When I try, I get the message:
"\\$XPcomputer is not accessible. No permission to access resource."
The funny thing is, I originally mapped a share on the XP box, and it
had continued to connect at each bootup, so somehow the 98 box did
have some permission. However, I disconnected it trying to see if I
could reconnect, and now I can't.
A: Peter, did you try un-sharing and re-sharing the inaccessible folder
on Windows XP, as I suggested in my reply to your previous message?
Since (according to that message) your computer runs XP Home Edition,
you're on the right track by looking at the Guest account. Home
Edition always validates access requests via the Guest account,
regardless of the user's actual credentials.
Make sure that the Guest account is enabled for network access by
entering this command on XP:
net user guest /active:yes
Make sure that there's no network password for the Guest account:
1. Click Start | Run.
2. Type "control userpasswords2" in the box and click OK:
3. Click Guest.
4. Click Reset Password.
5. Click OK without entering a new password.
Have you ever started XP Home Edition in Safe mode and set file access
permissions? If so, that opens up another set of possible problems
and solutions.
-Best Wishes,
Steve Winograd, MS-MVP (Windows Networking)
35
6.4.2 Workgroup
Start -> Control Panel -> Performance and Maintenance -> System -> Computer Name
(changing this doesn’t seem to take)
Use “Network Setup Wizard” (Control Panel -> Network and Internet Connections -> Set up or
change your home or small office network) to define workgroup and enable sharing
Beware that the Network Setup Wizard automatically and silently enables Internet Connection
Firewall.
6.4.3 Windows Domain (XP Pro)
To join a domain, Control Panel -> System -> Computer Name -> Network ID
6.5 Security
5 Steps To Secure Windows XP Home
http://netsecurity.about.com/cs/windowsxp/a/aa042204_2.htm
Microsoft Windows Security 101
http://netsecurity.about.com/cs/windowsxp/a/aa100903.htm
6.6 System
6.6.1 Automatically Run Programs
Registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_USER\<SID>\Software\Microsoft\Windows\CurrentVersion\Run
6.6.2 Schedule a Task
http://support.microsoft.com/kb/308569
6.6.3 System Restore
Use this dialog to control how much disk space Windows uses to store checkpoints.
36
6.7 Users
6.7.1 Administrator
To login as Administrator, boot computer press F8 after the BIOS check (on Compaq, press the
F8 key repeatedly when the first screen appears, about once every second, until a menu appears).
Administrator account only visible when no other users (except Guest) exist or booted in safe
mode.
6.7.2 Default
vaio, Administrator, Guest (disabled by default)
6.7.3 Fast User Switching
In Microsoft Windows XP, if you enable the Fast User Switching feature, multiple user accounts
can log on to a computer simultaneously. This article describes how to enable and use this
feature. With Fast User Switching, users can switch sessions without closing Windows,
programs, and so forth. For example, User A is logged on and is browsing the Internet, User B
wants to log on to their user account and check their e-mail account. User A can leave their
programs running while User B logs on and checks their e-mail account. User A can then return
to their session where their programs would still be running.
Fast User Switching is enabled by default in Windows XP Home Edition and Professional on
computers with more than 64 megabytes (MB) of RAM. However, Fast User Switching is not
available on Windows XP Professional-based computers that are part of a domain network.
37
6.7.3.1 Enable or Disable Fast User Switching
To enable Fast User Switching, you must also enable the “Use the Welcome screen” option. This
feature cannot be used if your computer is a member of a domain. To enable Fast User
Switching:
1.
2.
3.
4.
Log on to the computer as an administrator.
Click Start, click Control Panel, and then click User Accounts.
Click Change the way users log on or off.
If it is not already selected, click to select the Use the Welcome screen check box.
NOTE: The Use Fast User Switching check box is unavailable until you click to select
the Use the Welcome screen check box.
5. Click to select the Use Fast User Switching check box, and then click Apply Options.
Quit the User Accounts tool.
6.7.3.2 To Switch Users
When a user initiates the Switch User option, the computer returns to the Welcome screen. The
current user's session remains active and another user can now log on and use the computer. You
can initiate the Switch User command in any of the following ways:



Click Start, click Log off, and then click Switch User.
Open Task Manager (CTRL+ALT+DELETE), and then click Switch User on the Shut
Down menu.
Hold down the Windows key, and then press the L key).
6.7.4 Guest
Setting Guest User Password
Once you have the black command prompt window open you will type the following:
net user guest <password>
7 Windows XP Pro
7.1 Remote Desktop (RDP)
http://ask-leo.com/how_can_i_access_my_windows_xp_machine_remotely.html
You can happily use remote desktop across the internet as long as the server is not protected by a
firewall such as a broadband router. If it is and your firewall or router supports it you can open
port 3389 on the firewall and forward that to the machine you want to connect to. Note that if
there is more than one machine behind the firewall then only one can be connected to across the
firewall this way.
38
8 Windows 2000
8.1 Commands
The TLIST and KILL commands can be power tools when fighting a frozen Windows computer,
process, or application.
8.2 Files
8.2.1 Searching: find vs findstr (grep-like)
From: Smith, Christopher D.
Sent: Thursday, October 27, 2005 10:38 AM
To: Enterprise Management Tools.NS.ATIS
Subject: FYI: UNIX grep like functionality within Windows: using find / findstr
For those who require a grep-like utility in the Windows environment, there are 2 string
searching programs included with Windows. "find.exe" is the less powerful utility that allows
simple string searching. The syntax is very much like Unix "grep". ex:
find "failed" upgrade.log
will return all lines in the file upgrade.log containing the pattern "failed".
"findstr.exe" provides more capability, including matching patterns at the beginning/end of a
line, searching files in directories and subdirectories, regular expressions, etc. Please see the
syntax of both commands below for more info:
find /?
Searches for a text string in a file or files.
FIND [/V] [/C] [/N] [/I] [/OFF[LINE]] "string" [[drive:][path]filename[ ...]]
/V
Displays all lines NOT containing the specified string.
/C
Displays only the count of lines containing the string.
/N
Displays line numbers with the displayed lines.
/I
Ignores the case of characters when searching for the string.
/OFF[LINE] Do not skip files with offline attribute set.
"string" Specifies the text string to find.
[drive:][path]filename
Specifies a file or files to search.
39
If a path is not specified, FIND searches the text typed at the prompt
or piped from another command.
findstr /?
Searches for strings in files.
FINDSTR [/B] [/E] [/L] [/R] [/S] [/I] [/X] [/V] [/N] [/M] [/O] [/P] [/F:file]
[/C:string] [/G:file] [/D:dir list] [/A:color attributes] [/OFF[LINE]]
strings [[drive:][path]filename[ ...]]
/B
/E
/L
/R
/S
Matches pattern if at the beginning of a line.
Matches pattern if at the end of a line.
Uses search strings literally.
Uses search strings as regular expressions.
Searches for matching files in the current directory and all
subdirectories.
/I
Specifies that the search is not to be case-sensitive.
/X
Prints lines that match exactly.
/V
Prints only lines that do not contain a match.
/N
Prints the line number before each line that matches.
/M
Prints only the filename if a file contains a match.
/O
Prints character offset before each matching line.
/P
Skip files with non-printable characters.
/OFF[LINE] Do not skip files with offline attribute set.
/A:attr Specifies color attribute with two hex digits. See "color /?"
/F:file Reads file list from the specified file(/ stands for console).
/C:string Uses specified string as a literal search string.
/G:file Gets search strings from the specified file(/ stands for console).
/D:dir Search a semicolon delimited list of directories
strings Text to be searched for.
[drive:][path]filename
Specifies a file or files to search.
Use spaces to separate multiple search strings unless the argument is prefixed
with /C. For example, 'FINDSTR "hello there" x.y' searches for "hello" or
"there" in file x.y. 'FINDSTR /C:"hello there" x.y' searches for
"hello there" in file x.y.
Regular expression quick reference:
.
Wildcard: any character
*
Repeat: zero or more occurrences of previous character or class
^
Line position: beginning of line
$
Line position: end of line
[class] Character class: any one character in set
[^class] Inverse class: any one character not in set
[x-y] Range: any characters within the specified range
40
\x
Escape: literal use of metacharacter x
\<xyz Word position: beginning of word
xyz\> Word position: end of word
For full information on FINDSTR regular expressions refer to the online Command
Reference.
8.3 Filesystems and Disks
8.3.1 Encryption
Win2kPro EFS (Encrypted File System)
8.3.2 Linking Files
I am installing 20 Netcool clients on Windows 2000 and would like to configure the system to
have all of the clients look at a one particular file for the client configuration. In the Unix world I
simply create a soft link pointing to the one file. However, I am not quite sure how to do it in the
Gates world. The goal is to have all of the clients looking at this one file so that if a
configuration change needs to be done it only has to take place in one location.
Thanks,
Ric Chura
Ric,
Depending on how the app is configured you may be able to just us a UNC to the file. Example:
\\servername\sharename\filename
If the customer is using Active Directory you can push an application and any desktop or
security policy settings to the desktop with Group Policy. There is thousands of setting that you
can use in group policy
that allow you to control and secure the desktop. Group policy can control anything from icons
on the desktop, redirecting files, renaming local admin account or IPSEC requirements when
accessing specific
servers.
So instead of running around installing the netcool client on all the desktops you could create a
group policy object that is applied to the workstations that you want with the setting that you
want. AD will
apply the changes when the desktop boots or a user logs on.
Don Happe.
41
8.3.3 Synchronzing/Offline Files
“Any shared files or folders on a Microsoft network can be made available offline. You can
make files available offline from any computer that supports Server Message Block-based
(SMB) File and Printer Sharing, including Windows 95, Windows 98, and Windows NT 4.0.
Offline Files is not available on Novell NetWare networks.”
1. Enable use of offline files: 2x click “My Computer” -> Tools -> Folder Options ->
“Offline Files” tab -> “Enable Offline Files”
2. Specify files/folders to be available offline: 2x click “My Computer”, select file/folder
desired, File-> “Make Available Offline”. This (launches a wizard the first time and)
copies the network files to a special folder called “Offline files”.
To undo making a file or folder available offline:
1. Close all Explorer windows and open files in the folder to be undone.
2. In “My Computer”, right-click the item and click “Make Available Offline” again to
remove the check mark.
Win2k shows a computer icon in the status area of the Start menu bar. Click on it to reconnect
after disconnecting.
If you disconnect from the network, you can still access files/folders by the original drive letter
and path.
“By default, Offline Files stores shared network files in the root directory of your hard disk. You
can use Offline Files Cache Mover (cachemov.exe), available in the Windows 2000 Professional
Resource Kit, to change the cache location.” Can’t verify this statement from Windows Help.
Offline files are stored in c:\winnt\CSC (a hidden directory)
8.3.4 Offline Files Tests
“Server” is the network file server (in this case Win98). “Laptop” is the Win2k machine.
1. On Laptop, create a folder and file in an offline folder while disconnected. Win2k
automatically creates it on Server when access to Server is re-established.
2. On Laptop, modify a file in an offline folder while disconnected. Win2k updates the file
on Server when access re-established.
3. On Server, modify a file in an offline folder while Laptop is disconnected. Win2k
updates the file on Laptop when access re-established.
4. On both Server and Laptop, modify same file in offline folder while disconnected. When
access re-established, Win2k prompts for direction: (1) keep both, renaming Laptop’s
copy (2) keep overwrite Server’s copy with Laptop’s copy (3) overwrite Laptop’s copy
with Server’s copy.
5. On Laptop, try to delete offline folder from Explorer while disconnected. Explorer gives
error message: must be connected to server.
42
6. On Laptop, try to rename an offline file from all caps to all lower case while
disconnected. Explorer changes it back to upper case.
7. On Server, delete an offline folder while Laptop is disconnected. When access reestablished, knowledge of folder on Laptop is retained through several syncs but
eventually goes away.
8.3.5 Sharing a Directory
To share a directory on a Win2K machine in a workgroup:
1. Enable sharing on a directory
2. Create a group (e.g. “team”)
Control Panel -> Administrative Tools -> Computer Management ->
Local Users and Groups -> Groups -> Action -> New Group...
3. Create users
4. Add users to group
5. In Windows Explorer, right click on directory and select Sharing... Note that the root
directory of a disk (the default share) cannot be shared on the network.
6. Select “Share this folder”
7. Specify a share name
8. Click “Permissions”
9. Click “Add” and add the group (e.g. “team”)
Note: You can also add individual users. If you get an error message saying “This location
contains more than 10000 objects. Only the first 10000 objects will be shown”, the user you
want may not appear in the list. Specify the user manually in the lower pane, e.g.
“visa\jsommerv”.
To map the newly shared directory to another Windows machine:
1. In Windows Explorer, selects Tools -> Map Network Drive
2. In the “Folder:” field, specify the full path to the new share, e.g. \\teamserver\docs
3. When prompted, enter the user name and password of a user created above
8.4 IIS
8.4.1 Documentation
http://www.microsoft.com/windows2000/en/server/iis
8.4.2 Requirements
Server must have static IP address.
43
8.4.3 Configuring IIS Server
Start -> Programs -> Administrative Tools -> Internet Services Manager ->
right click the computer name -> Properties
8.4.4 Configuring the Default Web Site
Start -> Programs -> Administrative Tools -> Internet Services Manager ->
expand the computer name (left pane) -> right click Default Web Site -> Properties
Create a C:\Inetpub\wwwroot\default.htm so that user’s won’t get “Under construction”
message.
8.5 Networking


The “File and Printer Sharing for Microsoft Networks” component is the equivalent of
the Server service in Windows NT 4.0.
The “Client for Microsoft Networks” component is the equivalent of the Workstation
service in Windows NT 4.0.
8.5.1 DHCP
Features:
 multicast address allocation
 rogue DHCP server detection – Active Directory maintains a list of all authorized DHCP
servers. So, Win2K DHCP servers can’t provide service if they aren’t authorized. But,
other DHCP servers (e.g. WinNT) can.
 enhanced monitoring and statistics – warns when running out of addresses; stats include:
number of available addresses, number of messages processed, number of
requests/acknowledgements/declines.
 support for new vendor-specific and class ID options
 Windows clustering – enables administration of a number of DHCP servers as a single
system; uses a central database; clustering is available in the Win2K Advanced Server
and DataCenter products.
Default lease time is 8 days.
Client renews lease when lease period has elapsed 50%. If no response from server, client keeps
lease until 87.5% of lease elapsed. Then, it broadcasts for a new address. When restarted, client
attempts to renew old IP address. If no response, contacts old default gateway and continues if
gateway responds. If no response from gateway, client assumes an address in the reserved range
(169.254.0.1 to 169.254.255.254) and broadcasts for a new address every 5 minutes.
ipconfig [ /release | /renew ]
44
8.5.2 DNS
8.5.2.1 Suffix search list
Control Panel -> Network and Dial-up Connections -> Right click on “Local Area Connection”
and select Properties -> Double click on “Internet Protocol (TCP/IP)” -> Advanced -> DNS tab > Select “Append these DNS suffixes (in order)” -> Add suffixes
8.5.3 Config files
\winnt\system32\drivers\etc\hosts
\winnt\system32\drivers\etc\services
8.5.4 Troubleshooting commands
ping
tracert
pathping - pinpoints where end-to-end packet loss is occuring
8.5.5 Workgroup
Settings->Control Panel->Administrative Tools->Computer Management->
right click on Computer Management (Local) and select Properties
8.6 Performance
8.6.1 Disk Defragmentation
My Computer -> right click -> Manage -> Disk Defragmenter (same path for WinXP)
8.6.2 Swap File (pagefile)
www.petri.co.il/pagefile_optimization.htm
My Computer -> right click -> Properties -> Advanced -> Performance Options
Initial size should be at least 1.5X physical memory
Max size should be 3X physical memory
Make the initial size the same as the max size (avoids pagefile fragmentation)
45
8.7 Printing
8.7.1 Adding a printer by network name
Start -> Run -> \\servername\printername
8.7.2 Defining a printer by its IP address
Find the IP address of an HP LaserJet using: Test -> PCL Config Page -> Select
Add Printer -> Next -> Local printer (deselect "Automatically
detect and install my Plug and Play printer) -> Next ->
Create a new port: Standard TCP/IP Port -> Next -> Next ->
Printer Name or IP Address: 172.32.57.27 -> Next -> Finish
Manufacturers: HP, Printers: HP LaserJet 4000 Series PCL ->
Printer name: JPMC LJ 4000 PCL -> Next -> Do not share this printer ->
Do you want to print a test page? Yes -> Next -> Finish
May need "route add -p 172.32.0.0 mask 255.255.0.0 172.32.57.250"
if default route is out the dial-up interface.
8.8 System
8.8.1 Boot Manager
modify boot delay via
Start -> Settings -> Control Panel -> System -> Advanced -> Startup and Recovery
8.8.2 Desktop
8.8.2.1 Quick Launch Toolbar
You don't have to go to C:\Windows\Application Data\Microsoft\Internet
Explorer\Quick Launch to add or remove icons on the Quick Launch Toolbar. You can drag
and drop shortcuts directly on to the toolbar. Many times people want shortcuts to programs.
You can drag and drop them from anywhere in the Start Menu or the desktop. I even was able to
drag and drop the Recycle Bin and My Computer onto the toolbar.
46
If you want to remove an icon from the toolbar, right-click it and choose Delete from the pop-up
menu. Karl calls the right mouse button the "do it to it" action. He says that this term helps
people remember that clicking the right mouse button gives them a list of actions that apply to
whatever item they happen to be clicking on (desktop icon, toolbar, file and so on).
8.8.3 Environment Variables
To view, Control Panel -> Administrative Tools -> Computer Management -> System Tools ->
System Information -> Software Environment -> Environment Variables
Right click on “My Computer” -> Properties -> Advanced tab -> Environment Variables
8.8.4 Keyboard Shortcuts
Press
CTRL+C
CTRL+X
CTRL+V
CTRL+Z
DELETE
SHIFT+DELETE
CTRL while dragging an
item
CTRL+SHIFT while
dragging an item
F2
CTRL+RIGHT ARROW
CTRL+LEFT ARROW
CTRL+DOWN ARROW
CTRL+UP ARROW
CTRL+SHIFT
SHIFT
CTRL+A
F3
CTRL+O
ALT+ENTER
ALT+F4
CTRL+F4
ALT+TAB
To
Copy.
Cut.
Paste.
Undo.
Delete.
Delete selected item permanently without placing the item in the
Recycle Bin.
Copy selected item.
Create shortcut to selected item.
Rename selected item.
Move the insertion point to the beginning of the next word.
Move the insertion point to the beginning of the previous word.
Move the insertion point to the beginning of the next paragraph.
Move the insertion point to the beginning of the previous
paragraph.
with any of the arrow keys Highlight a block of text.
with any of the arrow keys Select more than one item in a window
or on the desktop, or select text within a document.
Select all.
Search for a file or folder.
Open an item.
View properties for the selected item.
Close the active item, or quit the active program.
Close the active document in programs that allow you to have
multiple documents open simultaneously.
Switch between open items.
47
ALT+ESC
F6
F4
SHIFT+F10
ALT+SPACEBAR
CTRL+ESC
ALT+Underlined letter in
a menu name
Underlined letter in a
command name on an
open menu
F10
RIGHT ARROW
LEFT ARROW
F5
BACKSPACE
ESC
SHIFT
Cycle through items in the order they were opened.
Cycle through screen elements in a window or on the desktop.
Display the Address bar list in My Computer or Windows Explorer.
Display the shortcut menu for the selected item.
Display the System menu for the active window.
Display the Start menu.
Display the corresponding menu.
Carry out the corresponding command.
Activate the menu bar in the active program.
Open the next menu to the right, or open a submenu.
Open the next menu to the left, or close a submenu.
Refresh the active window.
View the folder one level up in My Computer or Windows
Explorer.
Cancel the current task.
when you insert a CD into the CD-ROM drive
8.8.5 Log files (Dr. Watson)
Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log and user.dmp
8.8.6 Programs auto-started at boot
C:\Documents and Settings\All Users|Administrator|...\Start Menu\Programs\Startup
Start->Programs->Startup (show "All Users", programs started in tray)
8.8.7 Registry
regedit – Win 95/98; can only read 2000 db
regedt32 – NT/2000
8.8.8 Screen Capture
Pressing the PrtSc key copies a picture of the entire desktop onto the clipboard which you can
paste into MS Word. Pressing Alt-PrtSc copies a picture of the active window onto the
clipboard.
48
8.8.9 Services
Control Panel->Administrative Tools->Services
8.8.10
Start Menu
Turn off “show recently used commands”:
Start -> Settings -> Taskbar & Start Menu… -> Use Personalized Menus
8.8.11
User Profiles
C:\Documents and Settings\<username>
8.8.12
Wallpaper
Wallpaper is the background color or image on the screen. There are three different possible
settings for wallpaper.
Login screen
“Computer Locked”
screen
Desktop (logged in)
HKEY_USERS\.DEFAULT\Control Panel\Desktop\wallpaper (full
path to image) and TileWallpaper (0=no, 1=yes)
HKEY_CURRENT_USER\Control Panel\Desktop\Wallpaper and
WallpaperStyle (0=Centered - the default, 1=Tiled, 2=Stretched).
Changing this value overrides the Desktop wallpaper setting.
HKEY_CURRENT_USER\Control Panel\Desktop\Wallpaper and
WallpaperStyle (0=Centered - the default, 1=Tiled, 2=Stretched)
Alternatively, select:
Control Panel -> Display -> Background
or
Right click on Desktop and select Properties.
Requires “Active Desktop” to be enabled. Must be set after the
“Computer Locked” registry key.
When changing the registry, you must log off and back on, or reboot, in order to see the updated
wallpaper.
Default image files are C:\WINNT\*.bmp. The images for the login and “computer locked”
screens must be bitmaps. The desktop wallpaper may be a JPEG.
HTML Wallpaper
You can put any text-based document onto your desktop as part of your wallpaper. Just open
Notepad and type whatever you want to appear on your desktop, then save the file with an .HTM
49
extension. Right-click on the desktop, select Properties and select the "Web" tab. Select the
"New" button, select "Web site" and click OK. Use the browse button to find your new file.
Click OK, then OK again. Note that this is a real HTML document because you gave it an .HTM
extension. If you know how to create HTML documents by typing commands or using an
authoring tool, you can spice it up with colors, sound, graphics, video, live links, ActiveX, Java
or anything you choose.
8.8.13
WMI (Windows Management Instrumentation)
Tool for viewing and changing system properties on a remote or local computer
Must be a member of the Administrators group to modify administrative properties
8.9 Terminal Services
two modes:
 application server – requires Terminal Services Licensing server
 remote administrator
Control Panel -> Add/Remove Programs -> Add/Remove Windows Components
requires reboot
Client install image in c:\winnt\system32\clients\tsclient folder. The net sub-folder
contains software for a network install. The other sub-folders contain floppy disk images.
9 Windows 2003
9.1 Active Directory
AD first introduced in Win2000.
Forest can contain multiple Windows domains. Forest defines schema (user, groups, OUs,
applications such as Exchange) for the domains. Domain is a security boundary and has a
separate name space. Peer domains (discontinguous name space), child domain.
Trust in NT 4.0: 1-way (domain X trusts domain Y, but Y doesn’t trust X; domain Y
users/groups can access domain X resources, X still must explicitly grant access specific
users/groups in Y); and 2-way trust (bi-directional).
Trust in AD Forest: automatically establishes trust between member domains. Still have to
explicitly grant access to specific users/groups
AD also provides “transitive trust”: if A trusts B, and B trusts C, then A trusts C
50
10 Windows Vista
10.1 Backup and Restore
Windows Complete PC Restore – Restores the contents of your hard disk from a backup. For
more information, search Help and Support for "complete PC restore." Windows Complete PC
Backup and Restore is not included with Windows Vista Starter, Windows Vista Home Basic,
or Windows Vista Home Premium.
(http://windowshelp.microsoft.com/Windows/en-US/Help/2b3724d1-f4ad-5b26-16dc3e9e66f4be5e1033.mspx)
10.2 Languages
Control Panel > Regional and Language Options > Keyboards and Languages tab > Change
Keyboards
10.2.1
Install / Uninstall Font
Windows comes with a variety of fonts already installed.
If you want to install additional fonts, you must first download them. You can download fonts
from a software program, the Internet, or your organization's network.
Note
Before you download a font, make sure you trust the source.
To install a font
1.Open Fonts by clicking the Start button , clicking Control Panel, clicking Appearance and
Personalization, and then clicking Fonts.
2.Click File, and then click Install New Font.
If you don’t see the File menu, press ALT.
3.In the Add Fonts dialog box, under Drives, click the drive where the font that you want to
install is located.
4.Under Folders, double-click the folder containing the fonts that you want to add.
5.Under List of fonts, click the font that you want to add, and then click Install.
51
To uninstall a font
1.Open Fonts by clicking the Start button , clicking Control Panel, clicking Appearance and
Personalization, and then clicking Fonts.
2.Click the font that you want to uninstall. To select more than one font at a time, press and hold
down CTRL while you click each font.
3.On the File menu, click Delete.
If you don’t see the File menu, press ALT.
10.2.2
Unicode – 3 ways to enter in Windows
http://www.johndcook.com/blog/2008/08/17/three-ways-to-enter-unicode-characters-inwindows/
(1) In Microsoft Word you can insert Unicode characters by typing the hex value of the character
then typing Alt-x. You can also see the Unicode value of a character by placing the cursor
immediately after the character and pressing Alt-x. This also works in applications that use the
Windows rich edit control such as WordPad and Outlook.
Pros: Nothing to install or configure. You can see the numeric value before you turn it into a
symbol. It’s handy to be able to go the opposite direction, looking up Unicode values for
characters.
Cons: Does not work with many applications.
(2) Another approach which works with more applications is as follows. First create a registry
key under HKEY_CURRENT_USER of type REG_SZ called EnableHexNumpad, set its value to 1, and
reboot. Then you can enter Unicode symbols by holding down the Alt key and typing the plus
sign on the numeric keypad followed by the character value. When you release the Alt key, the
symbol will appear. This approach worked with most applications I tried, including Firefox and
Safari, but did not with Internet Explorer.
Pros: Works with many applications. No software to install.
Cons: Requires a registry edit and a reboot. It’s awkward to hold down the Alt key while typing
several other keys. You cannot see the numbers you’re typing. Doesn’t work with every
application.
(3) Another option is to install the UnicodeInput utility. This worked with every application I
tried, including Internet Explorer. Once installed, the window below pops up whenever you hold
down the Alt key and type the plus sign on the numeric keypad. Type the numeric value of the
character in the box, click the Send button, and the character will be inserted into the window
that had focus when you clicked Alt-plus.
52
Pros: Works everywhere (as far as I’ve tried). The software is free. Easy to use.
Cons: Requires installing software.
[8/1/10 – didn’t work for me on Vista. DD]
10.3 Virtual Store
\Users\<username>\AppData\Local\VirtualStore\Program Files
\Users\<username>\AppData\Roaming\<application name>
10.4 Volume Shadow Copy Service
Volume Snapshot Service (VSS)
Start > command > right click > Run as administrator
c:\> vssadmin list shadows [shows number of shadow copies]
c:\> vssadmin list volumes [lists volumes that are eligible for shadow copies]
c:\> vssadmin list shadowstorage [shows how much disk space is currently used for shadow
storage]
Space reserved for shadow storage defaults to 15% of total disk size or 30% of available space.
Vista stores up to 64 shadow copies on a single volume at one time.
53
Must enter maxsize as a number followed by a units abbreviation:
If no maxsize is specified, Vista sets the limit to “unbounded”. Max size must be at least 300MB
to 1GB.
Reboot after running cmd.
11 .Net Server
11.1 What is it?
NETWORK WORLD NEWSLETTER: CURRID & COMPANY's
TECHNOLOGY EXECUTIVE
11/11/02
Today's focus: What is .Net Server 2003?
By Linda Musthaler
Although Microsoft has been talking about its sweeping .Net strategy for at least a year now,
many companies are still trying to determine what .Net means to them. In fact, many IT
professionals have trouble articulating what .Net even is. That's because it's less of a specific
product or tool than it
is a "set of technology architectures and products, and a renewed developer and partner
initiative," according to Aberdeen Group. "Simply put," says Aberdeen in its report 'Microsoft
.Net: A Foundation for Connected Business,' ".Net is software that connects information, people,
systems and devices."
Uh, well, OK, that's clear as mud. No wonder customers are confused about it.
54
A few weeks ago I had the opportunity to listen to the voice of reason when it comes to
Microsoft products and strategy. That voice belongs to Mark Minasi, a technology writer and
speaker.
Minasi was addressing several hundred technical-types at HP Enterprise Technical Symposium,
and his mission was to help these folks determine the value of .Net Server to their own
organizations. His status as "independent consultant" frees him from the binds of recommending
a product for the sake of
sales. He has written 19 books on topics such as Windows NT, 2000 and XP; Linux; LANs; and
PC upgrades and maintenance. He's also a Certified MCSE 2000 and A7 Level Computer
Expert.
In short, he knows his stuff, and he knows how to explain it to others.
The talk I heard was primarily about Windows .Net Server 2003, although he did give passing
mention to the .Net strategy as a whole. He likened it to IBM's old Systems Network
Architecture, which was a way of tying together a bunch of disparate IBM products to make it
look like they were developed
as a coherent set of tools. In a sense, that's what Microsoft is doing with .Net - taking products
that were developed in silos and adding features and extensions that allow them to function
together as "Web services." Minasi says the .Net strategy is "good overall," but it's hard to point
to many "must have" features. There are "many very likable things" about it, though.
At the heart of the .Net strategy is .Net Server 2003, which comes in various versions. Minasi
describes .Net Server 2003 Standard Edition as "Windows 2000 Server, Version 1.1." He calls
the product name change "a double-em-double-you," or a Microsoft Marketing Word. Don't be
fooled by the fancy new
name, he says, as this is basically an upgrade that is small scale, relative to the introduction of
Windows 2000 a few years ago.
That doesn't mean it's an upgrade to be ignored, though. He identified several major .Net Server
selling points that network managers should be interested in:
* The wireless support found in Windows XP, including security that uses .Net's RADIUS server
in combination with certificates and Active Directory to authenticate your device.
* Messenger Server Support, which allows you to communicate via instant messaging with
people in the Passport directory or via Exchange 2000.
* XP networking features, for setting up good basic network services.
* Improvements in Active Directory (although to get the most benefit, you need to upgrade all
your servers).
* New security features as well as better reliability (the main reason to upgrade from Windows
NT).
* Improved desktop and remote support.
55
* Whole new services, in the form of a complete e-mail server with a POP3 component and a
stripped-down version of SQL Server.
All told, the improvements in this update of Windows 2000 are significant enough to warrant a
look at .Net Server 203. However, he's not urging wholesale upgrades of all of your Windows
2000 servers. (If you're still using Windows NT, however, you should make this upgrade when
it becomes available, he says.)
Minasi says .Net Server works fine with clients running Windows 2000, NT 4, and even W9x
systems, so you aren't forced to upgrade your desktops.
For more of Mark's sage advice on the topic, visit his web site at http://www.minasi.com/. Take
the time to subscribe to his free newsletter, in which he shares his experience and helpful
suggestions from readers. With technology getting more complex every day, and the marketing
hype growing exponentially, it's nice to be counseled by a voice of reason.
Linda Musthaler is vice president of Currid & Company. You can write to her at
[email protected].
______________________________________________________________
About Currid & Company:
Currid & Company (http://www.currid.com) researches information technology and how it can
change the rules of business. Analysts focus on emerging technologies and methods by which
organizations can obtain the best results from these innovations. Currid & Company offers
consulting services to computer industry and corporate clients to help define and fulfill the
potential of these exciting technologies. To learn more about emerging technologies that affect
your business and your life, visit http://www.YourDigitalMinute.com, brought to you by Currid
& Company.
56