Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
MS Windows Notes 1 August 2010 Contents 1 REFERENCES ...................................................................................................................... 5 2 WINDOWS MOBILE .......................................................................................................... 5 2.1 VERSIONS ........................................................................................................................ 5 2.2 .NET COMPACT FRAMEWORK ......................................................................................... 6 2.2.1 View Version ............................................................................................................... 6 2.3 FONTS .............................................................................................................................. 6 2.3.1 Adding ......................................................................................................................... 6 2.3.2 TrueType vs Raster ..................................................................................................... 7 2.3.3 Internet Explorer ......................................................................................................... 7 2.3.4 Third Party .................................................................................................................. 7 2.4 UNICODE .......................................................................................................................... 8 2.4.1 Understanding Unicode .............................................................................................. 8 2.4.2 Inputting ...................................................................................................................... 8 3 WINDOWS 95 ....................................................................................................................... 9 3.1 FILESYSTEMS AND DISKS ................................................................................................. 9 3.1.1 Restoring the Master Boot Record .............................................................................. 9 3.1.2 Recovering Deleted Files ............................................................................................ 9 3.2 NETWORKING ................................................................................................................ 10 3.2.1 Logon ........................................................................................................................ 10 3.2.2 Logon Packets ........................................................................................................... 11 3.2.3 Peer-to-Peer Networking .......................................................................................... 11 3.2.4 Route command ......................................................................................................... 12 3.2.5 Sharing: File and Printer.......................................................................................... 12 3.3 PROGRAMMING .............................................................................................................. 14 3.3.1 DOSKEY macro definitions ...................................................................................... 14 3.3.2 Environment variables in batch files ........................................................................ 14 3.4 SYSTEM.......................................................................................................................... 14 3.4.1 Desktop ..................................................................................................................... 15 3.4.2 Startup ....................................................................................................................... 15 4 WINDOWS 98 ..................................................................................................................... 15 4.1 INSTALLATION ............................................................................................................... 15 4.2 NETWORKING ................................................................................................................ 20 4.2.1 Internet Connection Sharing ..................................................................................... 20 4.2.2 Microsoft Networking Password............................................................................... 20 1 4.2.3 winpopup ................................................................................................................... 20 4.3 SYSTEM.......................................................................................................................... 21 4.3.1 Active Desktop .......................................................................................................... 21 4.3.2 Configuration Utility................................................................................................. 21 4.3.3 Device Manager ........................................................................................................ 21 4.3.4 IRQs .......................................................................................................................... 21 4.3.5 Multilanguage Support ............................................................................................. 22 4.3.6 Registry – defining boot-time executables ................................................................ 22 4.3.7 Sounds ....................................................................................................................... 23 4.3.8 Start Menu ................................................................................................................. 23 4.3.9 Startup Disk .............................................................................................................. 23 4.3.10 Windows Scripting Host ........................................................................................ 23 4.3.11 Windows Update ................................................................................................... 23 5 WINDOWS NT ................................................................................................................... 23 5.1 HOW TO INSTALL WINDOWS NT ON DELL LATITUDE CPI ............................................. 24 5.1.1 System Specs ............................................................................................................. 24 5.1.2 Procedure .................................................................................................................. 24 5.1.3 Miscellaneous Notes ................................................................................................. 26 5.2 FILESYSTEMS AND DISKS ............................................................................................... 26 5.2.1 fdisk-like program ..................................................................................................... 26 5.2.2 Mapping a drive from the command prompt ............................................................ 27 5.2.3 Unmapping a drive from the command prompt ........................................................ 27 5.3 NETWORKING ................................................................................................................ 27 5.3.1 Browsing ................................................................................................................... 27 5.3.2 Find NetBIOS name of a device ................................................................................ 27 5.3.3 IP Forwarding .......................................................................................................... 27 5.3.4 Sending Messages ..................................................................................................... 27 5.4 PRINTING ....................................................................................................................... 28 5.5 PROGRAMMING .............................................................................................................. 28 5.5.1 Running an autoexec.bat ........................................................................................... 28 5.5.2 Running a command in the background ................................................................... 28 5.5.3 grep-like command.................................................................................................... 28 5.5.4 Scripting (VBScript and JScript) .............................................................................. 28 5.5.5 How to execute a command every time you start a cmd shell .................................. 28 5.5.6 DOSKEY macro definitions ...................................................................................... 28 5.6 SYSTEM.......................................................................................................................... 29 5.6.1 Boot Manager ........................................................................................................... 29 5.6.2 Diagnostics ............................................................................................................... 29 5.6.3 Environment Variables ............................................................................................. 29 5.6.4 How increase the number of lines in the DOS window ............................................ 29 5.6.5 Password Encryption ................................................................................................ 29 5.6.6 Programs auto-started at boot .................................................................................. 29 5.6.7 Registry ..................................................................................................................... 30 5.6.8 Setting Application to open a file type ...................................................................... 31 5.6.9 Services ..................................................................................................................... 31 5.6.10 Service Packs (where to get) ................................................................................. 31 2 5.6.11 Sounds ................................................................................................................... 31 5.6.12 User Profiles ......................................................................................................... 31 5.6.13 Version .................................................................................................................. 31 5.7 RESOURCE KIT ............................................................................................................... 31 6 WINDOWS XP HOME EDITION.................................................................................... 32 6.1 DESKTOP ........................................................................................................................ 32 6.1.1 Screen Saver Slideshow ............................................................................................ 32 6.2 FILES .............................................................................................................................. 33 6.2.1 Icon (.ico) Files ......................................................................................................... 33 6.2.2 Properties .................................................................................................................. 33 6.2.3 Shortnames and UNCs .............................................................................................. 34 6.3 LANGUAGES ................................................................................................................... 34 6.4 NETWORKING ................................................................................................................ 34 6.4.1 File Sharing .............................................................................................................. 34 6.4.2 Workgroup ................................................................................................................ 36 6.4.3 Windows Domain (XP Pro) ...................................................................................... 36 6.5 SECURITY....................................................................................................................... 36 6.6 SYSTEM.......................................................................................................................... 36 6.6.1 Automatically Run Programs .................................................................................... 36 6.6.2 Schedule a Task......................................................................................................... 36 6.6.3 System Restore .......................................................................................................... 36 6.7 USERS ............................................................................................................................ 37 6.7.1 Administrator ............................................................................................................ 37 6.7.2 Default....................................................................................................................... 37 6.7.3 Fast User Switching .................................................................................................. 37 6.7.4 Guest ......................................................................................................................... 38 7 WINDOWS XP PRO .......................................................................................................... 38 7.1 8 REMOTE DESKTOP (RDP) .............................................................................................. 38 WINDOWS 2000 ................................................................................................................. 39 8.1 COMMANDS ................................................................................................................... 39 8.2 FILES .............................................................................................................................. 39 8.2.1 Searching: find vs findstr (grep-like) ........................................................................ 39 8.3 FILESYSTEMS AND DISKS ............................................................................................... 41 8.3.1 Encryption ................................................................................................................. 41 8.3.2 Linking Files ............................................................................................................. 41 8.3.3 Synchronzing/Offline Files........................................................................................ 42 8.3.4 Offline Files Tests ..................................................................................................... 42 8.3.5 Sharing a Directory .................................................................................................. 43 8.4 IIS .................................................................................................................................. 43 8.4.1 Documentation .......................................................................................................... 43 8.4.2 Requirements............................................................................................................. 43 8.4.3 Configuring IIS Server .............................................................................................. 44 8.4.4 Configuring the Default Web Site ............................................................................. 44 8.5 NETWORKING ................................................................................................................ 44 3 8.5.1 DHCP ........................................................................................................................ 44 8.5.2 DNS ........................................................................................................................... 45 8.5.3 Config files ................................................................................................................ 45 8.5.4 Troubleshooting commands ...................................................................................... 45 8.5.5 Workgroup ................................................................................................................ 45 8.6 PERFORMANCE ............................................................................................................... 45 8.6.1 Disk Defragmentation ............................................................................................... 45 8.6.2 Swap File (pagefile) .................................................................................................. 45 8.7 PRINTING ....................................................................................................................... 46 8.7.1 Adding a printer by network name............................................................................ 46 8.7.2 Defining a printer by its IP address .......................................................................... 46 8.8 SYSTEM.......................................................................................................................... 46 8.8.1 Boot Manager ........................................................................................................... 46 8.8.2 Desktop ..................................................................................................................... 46 8.8.3 Environment Variables ............................................................................................. 47 8.8.4 Keyboard Shortcuts ................................................................................................... 47 8.8.5 Log files (Dr. Watson)............................................................................................... 48 8.8.6 Programs auto-started at boot .................................................................................. 48 8.8.7 Registry ..................................................................................................................... 48 8.8.8 Screen Capture.......................................................................................................... 48 8.8.9 Services ..................................................................................................................... 49 8.8.10 Start Menu ............................................................................................................. 49 8.8.11 User Profiles ......................................................................................................... 49 8.8.12 Wallpaper .............................................................................................................. 49 8.8.13 WMI (Windows Management Instrumentation) .................................................... 50 8.9 TERMINAL SERVICES ..................................................................................................... 50 9 WINDOWS 2003 ................................................................................................................. 50 9.1 10 ACTIVE DIRECTORY ....................................................................................................... 50 WINDOWS VISTA............................................................................................................. 51 10.1 BACKUP AND RESTORE .................................................................................................. 51 10.2 LANGUAGES ................................................................................................................... 51 10.2.1 Install / Uninstall Font .......................................................................................... 51 10.2.2 Unicode – 3 ways to enter in Windows ................................................................. 52 10.3 VIRTUAL STORE ............................................................................................................. 53 10.4 VOLUME SHADOW COPY SERVICE ................................................................................. 53 11 .NET SERVER .................................................................................................................... 54 11.1 WHAT IS IT? ................................................................................................................... 54 4 1 References ask-leo.com www.petri.co.il 2 Windows Mobile 2.1 Versions http://pocketpccentral.net/help/which_version_wm.htm Version Number 3.0.9348 3.0.11171 4.20.xxxx 4.21.xxxx 5.1.xxxx 5.2.xxxx OS Version Pocket PC 2000 Pocket PC 2002 Windows Mobile 2003 Windows Mobile 2003 SE Windows Mobile 5 Windows Mobile 6 http://en.wikipedia.org/wiki/Windows_Mobile Originally appearing as the Pocket PC 2000 operating system… Windows Mobile 6, formerly codenamed "Crossbow", was released on February 12, 2007 at the 3GSM World Congress 2007. It comes in three different versions: "Windows Mobile 6 Standard" for Smartphones (phones without touchscreens), "Windows Mobile 6 Professional" for Pocket PCs with phone functionality, and "Windows Mobile 6 Classic" for Pocket PCs without cellular radios. Windows Mobile 6 is powered by Windows CE 5.0 (version 5.2)… Aesthetically, Windows Mobile 6 was meant to be similar in design to the then newly released Windows Vista. Functionally, it works much like Windows Mobile 5, but with much better stability. Windows Mobile 6.1 was announced April 1, 2008. The underlying CE versions can be used to differentiate WM6.0 from WM 6.1. The version of Windows CE in WM 6.0 is 5.2.*, with the final number being a 4 digit build ID (e.g. 5.2.1622 on HTC Wing). In WM 6.1, the CE version is 5.2.* with a 5 digit build number (e.g. 5.2.19216 on Palm Treo 800w). Windows Mobile 6.5 was never part of Microsoft's mobile phone roadmap, and has been described by its chief executive, Steve Ballmer, as "not the full release [Microsoft] wanted" until the multi-touch enabled Windows Mobile 7 (now replaced by Windows Phone 7) arrives in 2010. o Version 6.5 is an upgrade to Windows Mobile 6.1 that was unveiled at the 2009 Mobile World Congress in February and released to manufacturers on May 11, 2009, and the first devices running the operating system debuted in late October '09. 5 o This incremental update includes some significant new added features, such as a revamped GUI, new today screen with vertically scrollable labels (called 'Titanium'); though is generally regarded as a minor upgrade. o Some aspects of the user interface have been redesigned with the home screen resembling that of Microsoft's Zune player and the sliding panel interface of Windows Mobile 6.1 Standard. This version was designed mainly for easier finger usage. The current version is called "Windows Mobile 6.5". It is based on the Windows CE 5.2 kernel. Windows Mobile (rebranded as Windows Phone with the launch of Windows Phone 7) Microsoft announced a completely new phone platform, Windows Phone 7, at the Mobile World Congress in Barcelona on February 15, 2010. Phones running Windows Mobile 6.x will not be upgradeable to version 7. 2.2 .NET Compact Framework 2.2.1 View Version \windows\cgacutil.exe v2.0.7045.0 installed by default on Tilt 2 Win Mobile v6.5 Per http://www.raymond.cc/blog/archives/2009/08/29/check-net-compact-framework-versioninstalled-on-windows-mobile/, this version corresponds to .NET CF 2.0 SP2 Download .NET CF 3.5 http://msdn.microsoft.com/en-us/netframework/aa497280.aspx 2.3 Fonts 2.3.1 Adding http://social.msdn.microsoft.com/Forums/en-US/netfxcompact/thread/656fe904-ec82-4db28875-2e34328d42c8 Tuesday, November 28, 2006 4:47 PM Michael Koster, MVP Yes, you can install and use your own TrueType font in a .NET CF 2.0 application. Just copy the .TTF files to the Windows directory on the device and do a soft reset. [7/28/10: Tested on HTC Tilt 2 WM6.5 and it worked! Used ] 6 2.3.2 TrueType vs Raster http://msdn.microsoft.com/en-us/library/aa911450.aspx Windows Mobile supports TrueType and raster font technologies, but only one font technology can be used on a specified OS design. Generally, Windows Mobile uses Tahoma as the default system font. TrueType is the default in Windows Mobile, but raster technology can be implemented in the OS design by adding the Raster Fonts Support Catalog item from the Platform Builder Catalog to the OS design. Once TrueType or raster font technology has been chosen during OS design, you cannot change technologies with an application. 2.3.3 Internet Explorer http://msdn.microsoft.com/en-us/library/bb159674.aspx 4/8/2010 A device running Windows Mobile Professional or Windows Mobile Classic includes at least the following two fonts: Microsoft Tahoma (default variable-width font). Courier (default fixed-width font). A device running Windows Mobile Standard has default system fonts that must not be changed. The following default system fonts are expected: Microsoft Segoe, except East Asian versions. Microsoft Nina (9-point) for East Asian Windows Mobile Standard. All other fonts are converted to the closest of these fonts, as defined by their font descriptions. Using the PRE XHTML Element tag for any fixed-width content ensures that Internet Explorer Mobile selects the correct fixed-width font. 2.3.4 Third Party http://www.fontmarketplace.com/info/font-help.aspx WGL stands for Windows Glyph List, developed by Microsoft with approximately 652 characters to address the languages and scripts of Western, Central and Eastern Europe. WGL fonts contain the following code pages: codepage 1252 Latin 1 codepage 1250 Latin 2 Eastern Europe codepage 1251 Cyrillic codepage 1253 Greek (modern, not classical) 7 codepage 1254 Turkish codepage 1257 Baltic http://guides.theology.library.emory.edu/content.php?pid=28190&sid=205411 2.4 Unicode http://msdn.microsoft.com/en-us/library/aa913854.aspx Programming with Unicode and NLS 4/8/2010 Windows Mobile supports Unicode version 3.2. Unicode is a worldwide character-encoding standard that treats all characters as having a fixed width of 2 bytes. It can represent all the world's characters in modern computer use, including technical symbols and special characters used in publishing. Because Unicode characters are 2 bytes, Unicode–enabled functions are often referred to as wide–character functions. Unicode defines semantics for each character, standardizes script behavior, provides a standard algorithm for bidirectional text, and defines cross-mappings to other standards. Because each Unicode character is 16–bits wide, it is possible to have separate values for up to 65,536 characters. Windows Mobile uses Unicode exclusively at the system level for character and string manipulation. By implementing Unicode in your applications, you can provide your application with universal data exchange capabilities for global marketing, using a single binary file for every possible character code. This simplifies localization of software and improves multilingual text processing. 2.4.1 Understanding Unicode http://msdn.microsoft.com/en-us/library/aa913300.aspx 2.4.2 Inputting http://www.fitaly.com/tabletfitaly/fitalymacros.htm Fitaly offers full Unicode support. Any unicode character can be produced with the Fitaly macro language. You can pick any character or string of characters in the Unicode Picker by tapping on Insert Macro -> special character -> unicode. http://www.mobiletechreview.com/software/Fitaly-5.htm http://www.fitaly.com/product/fitalyppc.htm $30 8 Language Extenders: Paragon: o http://www.downloadplex.com/Mobile/Windows-Mobile/Application/languageextender-windows-mobile_228276.html o http://www.paragon-software.com/ o http://www.penreader.com/windows-mobile-software/Language_Extender.html $25 for lite version, $50 for full version (modern Greek) o http://www.penreader.com/pocket-pc-software/InterKey.html $25 (Paragon) o Not for WM: http://en.wikipedia.org/wiki/Unicode_input http://blogs.msdn.com/b/michkap/archive/2005/05/18/419117.aspx Typing in random Unicode code points. Unicode IME. Removed after XP. http://blogs.msdn.com/b/michkap/archive/2006/07/20/671835.aspx Return of the Unicode IME. Beta. http://blogs.msdn.com/b/michkap/archive/2008/01/21/7178421.aspx Table Driven Text Service http://blogs.msdn.com/b/michkap/archive/2010/03/22/9979228.aspx Uniscribe 3 Windows 95 3.1 Filesystems and Disks 3.1.1 Restoring the Master Boot Record Undocumented flag of fdisk (fdisk /mbr) re-writes the MBR to boot only the primary partition (works in DOS, Win95/98, NT). 3.1.2 Recovering Deleted Files URL: http://www.ixian.com/ead/misc/win95-undelete.shtml Last Modified: Fri Aug 29 17:50:36 PDT 1997 9 Visitor Number: 265 http://www.ixian.com/ead/misc/win95-undelete.shtml If you don't have a payware Windows 95 undelete utility, you can still recover deleted files under Windows 95: Microsoft supplies UNDELETE.EXE with the OS. If it's not on your Windows 95 CD under \OTHER\OLDMSDOS (it wasn't on my Windows 95B CD), it's on Microsoft's "Windows 95/Other Utilities" page at <http://www.microsoft.com/windows95/info/otherutils.htm>. Visit that page and download the Old MS-DOS Utilities file OLDDOS.EXE (http://www.microsoft.com/windows/download/olddos.exe). OLDDOS.EXE is an executable archive that contains UNDELETE.EXE and several other utilities. To recover a deleted file, that is, one that you've emptied from the Recycle Bin: Restart your computer in MS-DOS mode. CD to the directory from which the file went to the Recycle Bin. Issue the undocumented MS-DOS command LOCK, enabling direct disk access. (LOCK /? displays help for the command.) Issue the command UNDELETE myfile and follow the instructions. If no disk writes have occurred since the accidental deletion of your file, UNDELETE will successfully recover it. Issue the command UNLOCK. Issue the command EXIT. Your computer will reboot and return to Windows mode. If a future MS-DOS program starts full-streen rather than in a window, press ALT+ENTER to shrink it and future MS-DOS programs to start in a window. (That is, ALT+ENTER is a toggle for how MS-DOS programs start, either in a window or full-screen.) Eric De Mund <[email protected]> http://www.ixian.com/ead/ 3.2 Networking 3.2.1 Logon Q. Each time I log in I am asked for a password. Is there a way to prevent this? A. If you do not want to be prompted for a password, set your primary network logon to Windows Logon. To do so, use the following six steps: 1. Use the right mouse button to click Network Neighborhood, and then click Properties on the menu that appears. 2. On the Configuration tab, click Windows Logon in the Primary Network Logon box, then click OK. 10 3. 4. 5. 6. When Windows prompts you to restart your computer, click No. Click the Start button, point to Settings, and then click Control Panel. Double-click the Passwords icon. On the Change Passwords tab, click the Change Windows Password button, click OK, then set a blank password. 3.2.2 Logon Packets 3.2.2.1 SAM LOGON Request from Client When a Windows 95 computer is configured for User-Level access control in Network Properties, it will send the SAM LOGON request from client packets to the domain controllers or the Windows NT Server computer for which it is configured. Mssp.vxd is sending these packets through the Windows 95 redirector to \MAILSLOT\MSSP on the security provider. This is pass-through authentication being done from the Windows 95 computer. Windows 95 does not implement its own unique user-level security mechanism, so it must use the services of an existing user-level security provider, in this case a Windows NT domain controller or Windows NT Server computer, on the network. The Windows 95 computer sends these packets during its boot sequence to dynamically locate its security provider in preparation for future pass-through authentication needs. 3.2.2.2 LM1.0/2.0 LOGON Request from Client The LM1.0/2.0 LOGON request from client packets are the standard Windows NT logon validation packets sent to \MAILSLOT\TEMP\NETLOGON on the domain controller where the Windows 95 computer is configured to perform its network logon request. This is controlled through the Client for Microsoft Networks properties page on the Windows 95 computer. 3.2.3 Peer-to-Peer Networking - add NetBEUI protocol - remove "Client for NetWare Networks" and IPX/SPX - "File and Print Sharing..." (Win95) or "Access Control" (Win98) grant access to others for files (and printers) - "Identification" tab set computer name (unique on LAN) and workgroup name (not case-sensitive, must be same for all computers on LAN) - set "Primary Network Login" to "Client for Microsoft Networks" - share a drive by right clicking on the drive icon in "My Computer" -> Sharing -> Shared As and give the drive a name for how it is to be seen by others. Specify "Access Type" and Password (can be blank). 11 - user must login, not cancel the login prompt (even though there's no network security server. For example, specify user name as "guest" with no password. Otherwise, "Network Neighborhood" will be empty. 3.2.4 Route command C:\var\dns>route ? ### don't have to specify MASK ### Manipulates network routing tables. ROUTE [-f] [command [destination] [MASK netmask] [gateway]] -f Clears the routing tables of all gateway entries. If this is used in conjunction with one of the commands, the tables are cleared prior to running the command. command Specifies one of four commands PRINT Prints a route ADD Adds a route DELETE Deletes a route CHANGE Modifies an existing route destination Specifies the host to send command. MASK If the MASK keyword is present, the next parameter is interpreted as the netmask parameter. netmask If provided, specifies a sub-net mask value to be associated with this route entry. If not specified, if defaults to 255.255.255.255. gateway Specifies gateway. All symbolic names used for destination or gateway are looked up in the network and host name database files NETWORKS and HOSTS, respectively. If the command is print or delete, wildcards may be used for the destination and gateway, or the gateway argument may be omitted. 3.2.5 Sharing: File and Printer domain (also known as the pass-through domain): used by 95 server to validate clients 12 3.2.5.1 Passwords credentials – Windows term for user name/password passwords can’t have punctuation in them 3.2.5.2 Access Control Select the type of access control: share-level – “password-protected shares” user-level – requires a “security provider” (e.g. an NT workstation either standalone or a member of a domain) to store list of user names using Control Panel->Networking->Access Control. 3.2.5.3 Accessing share from NT/2000 client 1. 2. 3. 4. Map a drive and configure it to connect automatically at boot up Reboot the NT/2000 client Log in to the NT/2000 client The client will attempt to connect the mapped drive and will prompt you for a password (no user name). Specify the password. If you don’t connect the mapped drive when you first log in, and then later attempt to connect, you will be prompted for a username and password. Supposedly, you can specify “computer_name\administrator” as the username, where “computer_name” is the name of the Windows 95/98 box serving the share. I couldn’t get this to work. 3.2.5.4 Accessing off-line 98 share from 2000 client Case 1: On LAN with 98 server. Boot. Login. Prompted for share password. Provide password and it connects. Case 2: On LAN with 98 server. Boot. Login. Prompted for share password. Press Escape. In Windows Explorer, attempted to expand the off-line share. Prompted for share password. Provide password and it connects. Case 3: Not on LAN with 98 server. Boot. Login. Not prompted for share password (access via off-line copies) Case 4: Not on LAN with 98 server. Already logged in. Connect to LAN. Attempt to synchronize. Prompted for share username and password. Try the following combinations: User Password Result 13 computer_name\administrator computer_name\admin administrator admin computer_name\2000_username 2000_username computer_name\98_username 98_username password password password password password password password password password computer_name password 2000computer_name password 2000computer_name\administrator password failure failure failure failure failure failure failure failure failure failure failure failure failure Log off 2000. Logon again. Not prompted for share password (access via off-line copies). Conclusion: If you want to synchronize, the LAN connection to the 98 server must be active when the 2000 client boots (or least before initially logging in). 3.3 Programming 3.3.1 DOSKEY macro definitions in order to say "wc somefile": “doskey wc perl \usr\bin\wc.p $L $*” 3.3.2 Environment variables in batch files set VAR=value rem @echo off 3.4 System winipcfg regedit starting apps automatically at Windows startup: 14 - startup group - LOAD= and RUN= lines in WIN.INI \windows\system\sysedit.exe - edits WIN.INI, SYSTEM.INI, AUTOEXEC.BAT, and CONFIG.SYS simultaneously win : start windows, skip Windows advertizing shift-double click loads but doesn't run app (iconifies it) PROGMAN.INI saves icon positions WINHELP.EXE hypertext applet 3.4.1 Desktop c:\windows\desktop contains icons of objects visible on background 3.4.2 Startup While booting (before the graphic Windows screen appears), press F8 repeatedly to get the “MS Windows 9x Startup Menu” 4 Windows 98 4.1 Installation power on machine and press DEL during memory check to get to CMOS settings swap boot order of disk to (1) slave (2) master Boot->Hard Drive (press ‘+’ on PS) disable primary master (so Win98 install won’t detect it and try to install over it) Advanced->IDE Configuration->Primary IDE Master, press ‘+’ to change Type from “Auto” to “None” save changes and power off insert Win98 SE (Second Edition) CD in drive insert startup floppy disk (that comes with win98) into drive and power on format slave drive (c:) run setup.exe on CD 15 new bare installation takes 243MB install winzip Display: Dell E770s on Rage 128 Pro, High color 16 bit Screen area: 1024x768 Kingston EtheRx PCI 10/100 Fast Ethernet Adapter (KNE110TX) Aztech MDP3900V-U Modem on COM2 install video driver Insert Dell Resource CD rcdmenu.exe -> Drivers -> Win98 -> ATI 16MB Rage 128 Pro -> setup.exe install modem driver insert modem CD \manuals\modem\us\instal98.htm Aztech MDP3900 56K modem driver file is BRDG4035.INF added MDP3900V-W to COM1 Control Panel->Add New Hardware->No, device isn’t in list->PCI Communication Device Factory install settings: Control Panel->System->Device Manager Display Adapters Rage 128 Pro Memory Range 000A0000-000AFFFF Memory Range 000B0000-000BFFFF I/O Range 03B0-03BB I/O Range 03C0-03DF Interrupt Request 11 Memory Range F8000000-F8FFFFFF Memory Range F0100000-F0103FFF I/O Range 9000-90FF Memory Range 000C0000-000CAFFF Memory Range F0120000-F013FFFF Floppy disk controllers Standard Floppy Disk Controller I/O Range 03F0-03F5 I/O Range 03F7-03F7 Interrupt Request 6 Direct Memory Access 2 Hard disk controllers Intel 82371AB/EB PCI Bus Master IDE Controller I/O Range 01F0-01F7 16 I/O Range 03F6-03F6 Interrupt Request 14 I/O Range 0170-0177 I/O Range 0376-0376 Interrupt Request 15 I/O Range 1420-142F Primary IDE contoller (dual fifo) I/O Range 01F0-01F7 I/O Range 03F6-03F6 Interrupt Request 14 I/O Range 1420-1427 Secondary IDE contoller (dual fifo) I/O Range 0170-0177 I/O Range 0376-0376 Interrupt Request 15 I/O Range 1428-142F HCFMODEM MDP3900 PCI Modem Enumerator Interrupt Request 9 Memory Range F0000000-F000FFFF I/O Range 1440-1447 Keyboard Standard 101/102-Key or Microsoft Natural Keyboard I/O Range 0060-0060 I/O Range 0064-0064 Interrupt Request 1 Modem MDP900V-U Modem I/O Range 02F8-02FF (Modem tab says “Port: COM2”) Parallel cable on LPT1 (Modem tab says “Port: Printer Port (LPT1”) Serial cable on COM1 (Modem tab says “Port: Communications Port (COM1)”) Mouse PS/2 Compatible Mouse Port Interrupt Request 12 Multi-function adapters TBS Montego II Multifunction PCI Platform Interrupt Request 10 Memory Range F0040000-F007FFFF I/O Range 1438-143F I/O Range 1430-1437 Network adapters Dial-Up Adapter (no resources tab) Kingston EtheRx PCI 10/100 Fast Ethernet Adapter (KNE110TX) 17 Interrupt Request 11 Memory Range F0010000-F00100FF I/O Range 1000-10FF NTS PPPoE (no resources tab) Ports (COM & LPT) Communications Port (COM1) I/O Range 03F8-03FF Interrupt Request 4 ECP Printer Port (LPT1) I/O Range 0378-037F I/O Range 0778-077F Interrupt Request 7 Direct Memory Access 3 Sound, video and game controllers TBS Montego II Gameport Interface I/O Range 0201-0201 TBS Montego II MPU-401 Interface I/O Range 0330-033F TBS Montego II PCI Audio Interrupt Request 10 Memory Range F0040000-F007FFFF I/O Range 1438-143F I/O Range 1430-1437 TBS Montego II Sound Blaster Pro Emulation I/O Range 0240-024F Interrupt Request 5 Direct Memory Access 1 I/O Range 0388-038B Wave Device for Voice Modem (no resources tab) Wave sound driver for the TotalRecorder (no resources tab) System devices Advanced Power Management support (no resources tab) Direct memory access controller I/O Range 0000-000F I/O Range 0081-008F I/O Range 00C0-00DF Direct Memory Access 4 Intel 82371EB PCI to ISA bridge (ISA mode) (no resources tab) Intel 82371EB Power Management Controller (no resources tab) Intel 82443BX Pentium II Processor to AGP controller I/O Range 9000-9FFF Memory Range F0100000-F01FFFFF Memory Range F8000000-FBFFFFFF Intel 82443BX Pentium II Processor to PCI bridge Memory Range F4000000-F7FFFFFF IO read data port for ISA Plug and Play enumerator 18 empty Motherboard resources I/O Range 0370-0371 I/O Range 00EA-00EB Memory Range FFFC0000-FFFFFFFF Motherboard resources I/O Range 04D0-04D1 I/O Range 8000-803F I/O Range 7000-700F Motherboard resources Memory Range 000E0000-000E3FFF Motherboard resources Memory Range 000CB000-000CBFFF Numeric data processor I/O Range 00F0-00FF Interrupt Request 13 PCI bus I/O Range 0CF8-0CFF Plug and Play BIOS (no resources tab) Processor support (no resources tab) Programmable interrupt controller I/O Range 0020-0021 I/O Range 00A0-00A1 Interrupt Request 2 System board System board extension for PnP BIOS Memory Range 00000000-0009FFFF Memory Range 000E4000-000FFFFF Memory Range 00100000-07FFFFFF Memory Range FFF80000-FFFBFFFF System CMOS/real time clock I/O Range 0070-0071 Interrupt Request 8 System speaker I/O Range 0061-0061 System timer I/O Range 0040-0043 Interrupt Request 0 Universal Serial Bus controllers Intel 82371AB/EB PCI to USB Universal Host Controller Interrupt Request 9 I/O Range 1400-141F USB Root Hub (no resources tab) New Install missing HCFMODEM, Modem, Multi-function adapters, Sound, video and game controllers 19 added Other Devices (PCI Communications Device, PCI Ethernet Controller, PCI Multimedia Audio Device, USB Camera) On General tab of PCI Communications Device, click “Reinstall Driver” HCFMODEM and Modem appear, but Modem “is not configured correctly”. Warm reboot. Detects device. On General tab of PCI Ethernet Controller, click “Reinstall Driver”. Need Win98SE CD. Warm reboot. Detects device. Configure IP address. Warm reboot. can ping self. install Norton AV 2000 install Adaptec CD burner software install DVD driver burn CD of install (approx 300MB) create a startup disk (Control Panel->Add/Remove Programs->Startup Disk) 4.2 Networking winipcfg 4.2.1 Internet Connection Sharing see http://windowsupdate.microsoft.com/default.htm Very easy to install and configure 1. When installed on the gateway machine, it sets the IP addr to 192.168.0.1/24 2. On other machines, manually set IP addr to something on same subnet, default gateway to 192.168.0.1, DNS servers to whatever the ISP provided. winipcfg shows “IP Routing Enabled” with a big black check mark can assign private addresses to other boxes via DHCP Control Panel->Internet Options->Connections->Sharing Doesn’t work with NTS’s Enternet 300 PPPoE client. 4.2.2 Microsoft Networking Password c:\windows\username.pwl 4.2.3 winpopup 20 Send/receive short text messages to/from individual users/computers or an entire workgroup. 4.3 System 4.3.1 Active Desktop The integration of Windows and Internet Explorer. To switch between Active Desktop and regular desktop, right click on an empty area of the desktop and select “Active Desktop->View As Web Page”. 4.3.2 Configuration Utility msconfig.exe -> General -> Advanced -> Enable Startup Menu (before Windows launches, it prompts how you want to boot, e.g. in safe mode) 4.3.3 Device Manager Ideally, when you open the Device Manager window in Windows 95/98, none of the individual device categories should be open (expanded) and you should not see any yellow-colored symbols (markers) preceding any of the devices within the individual categories. For example, the presence of a yellow exclamation mark (!) preceding a device usually means that the device has a resource conflict, typically an IRQ conflict or an I/O address range conflict. The presence of a yellow question mark (?) usually means that for some reason the device driver for that device did not install correctly. Additionally, the presence of a red X over an icon means that Windows installed the device and then determined that it was necessary to disable the device to prevent it from causing problems with another installed device. A red X could also be the result of someone deliberately disabling the device from within its Properties box. 4.3.4 IRQs To see list of in-use IRQs: Control Panel -> System -> Device Manager -> Computer -> Properties (right click) Browse through the list of in-use IRQ numbers to see if there are any numbers missing from the sequence. Any number that is missing is an IRQ number that is available for use by another device. If all the IRQ numbers between 00 and 15 are in-use, that means there are no “free” IRQs available for the network adapter card to use. Although PCI devices, such as this network adapter, are supposed to be able to share an IRQ, sometimes they cannot do so. In such cases, the card will not install and Windows will not be able to detect it, and subsequently, install its driver. If possible, try to locate an IRQ that has only one device using it and see if you can reassign that 21 device to another IRQ; otherwise, you may have to physically remove one of the other devices in order to free an IRQ for the network adapter card to use. As a side note, when you see IRQ Holder for PCI Steering or ACPI IRQ Holder for PCI IRQ Steering beside an IRQ number, understand that this is not an additional device assigned to this IRQ. IRQ Holder for PCI Steering is a tag that indicates the IRQ is to be used only for PCI devices and not for ISA devices. In other words, Windows has reserved that IRQ solely for use with Plug and Play devices, not for so-called legacy devices. ACPI IRQ Holder for PCI IRQ Steering is a tag that indicates the electrical power to this device can be managed in accordance with the Advanced Configuration and Power Interface specification. This feature enables Windows to control the amount of power supplied to the device, e.g., to reduce power to the device (low-power mode) when it is not in use. 4.3.5 Multilanguage Support Control Panel->Add/Remove Programs->Windows Setup->Multilanguage Support Select Cyrillic for Russian (this installs the Cyrillic fonts) Control Panel->Keyboard->Language Add Russian and “Enable indicator on taskbar” (this enables the ability to switch between the English and Russian keyboards using Left-Alt-Shift) 4.3.6 Registry – defining boot-time executables The following defines which programs to run at boot time: HKEY_LOCAL_MACHINE->Software->Microsoft->Windows->CurrentVersion->Run 4.3.6.1 Customize Win98 ScanReg ScanReg is a built-in utility that, by default, monitors and backs up the Windows 98 Registry at least once a day. The default behavior of ScanReg can be controlled through settings listed in SCANREG.INI. It allows you to increase or decrease the number of saved Registry backups on disk (the default is five), change where Registry backups are stored, specify additional files (such as AUTOEXEC.BAT and CONFIG.SYS) to be saved with each Registry backup, and disable automatic backups or automatic optimization. 4.3.6.2 Registry Changes on the Fly Some of the changes you make in the Windows Registry don't take effect until you reboot. But if you want to see the effect of a changed Registry entry, you can refresh the Desktop and reload Registry defaults without rebooting. Press Ctrl+Alt+Del. Select Explorer in the Task list and 22 click the End Task button. When the Shutdown dialog box appears, choose No. A Program Not Responding dialog box for Explorer will appear on the Desktop. Click the End Task button to restart Explorer, reloading system settings from the current Windows Registry. 4.3.7 Sounds Control Panel->Sounds C:\windows\media contains the default sounds used (e.g. “The Microsoft Sound.wav”) 4.3.8 Start Menu c:\Windows\Start Menu contains short cuts for items that appear on the main Start menu. The sub-directory Programs contains sub-dirs and short cuts for items that appear on Start>Programs. 4.3.9 Startup Disk To create, select Start->Settings->Control Panel->Add/Remove Programs->Startup Disk 4.3.10 Windows Scripting Host Write scripts to automate tasks in Windows (Add/Remove Programs->Windows Setup>Accessories) On Win98SE CD->tools->reskit->scripting complete programmers ref at http://www.microsoft.com/management 4.3.11 Windows Update windowsupdate.microsoft.com Auto-detects availability of updates to system or application software that have been released after the versions currently installed. Don’t need Service Pack if running 98 Second Edition. 5 Windows NT 23 5.1 How to Install Windows NT on Dell Latitude CPi 5.1.1 System Specs modem card: Megahertz 3CCM156 c:\images\3ccm156.exe Ethernet card: 3Com Megahertz 10/100 LAN CardBus, 3CCFE575BT-D c:\images\ethernet_driver.zip (?) Video Neomagic MagicMedia 256AV, resolution 1024x768 c:\images\d4039d00.exe (NM 2200 driver for SP3+) Softex PC Card Controller, NT 4.0 SP 4,5,6 installs from HD c:\images\pcma03.exe 5.1.2 Procedure (modem and ethernet cards removed) boot to 98 put NT CD in drive g:\i386\autorun.exe click "Windows NT Setup" "NT files found at path g:\i386" -> ENTER (copies files to c:) -> ENTER reboot manually "To set up Windows NT now, press ENTER" (detects IDE CD-ROM) -> ENTER (msg about HD having more than 1024 cylinders) -> ENTER accept license agreement (Pg Dn then F8) (msg displaying hw/sw components) -> ENTER select partition to install in "Choose the location where you want these files to be installed:" \winnt -> ENTER "To skip the exhaustive examination, press ESC" -> ESC "Press ENTER to restart your computer" "1) Gathering information about your computer" -> Next Setup Options -> Typical (not "Portable") -> Next (name and organization) (registration) -> 32498-OEM-0039315-35440 (computer name) (administrator account) (Emergency repair disk) -> No 24 Install the most common components -> Next "2) Installing Windows NT Networking" -> Next "This computer will participate on a network:" Wired to the network -> Next Network Adapters: Select from list... MS Loopback adapter -> OK -> Next TCP/IP & NetBEUI -> Next -> Next Do you wish to use DHCP -> No Specify an IP address: 192.168.1.3/24 -> OK -> Next Make this computer a member of workgroup: WORKGROUP -> Next "3) Finishing Setup" -> Finish Set time zone to "GMT -8 (Pacific)" -> Close "The system found 'vga compatible display adapter'" -> OK -> OK Restart computer Apply SP5 (c:\images\sp5i386.exe) -> Restart put formatted diskette in floppy drive run c:\images\d4039d00.exe (to create Neomagic video driver diskette) Settings -> Control Panel -> Display -> Settings -> Display Type... -> Change... -> Have Disk... -> OK -> OK -> Yes ("install a third-party driver") -> OK -> Close -> Close "Do you want to restart your computer now?" -> Yes "A new graphics driver has been installed..." -> OK In "Display Properties", set "Desktop Area" to "1024x768" and press OK run c:\images\pcma03.exe "Unzip To Folder: e:\Dell\Drivers\0A03R" -> Unzip -> OK follow prompts to install Softex ("Install Now" -> Open -> Accept -> "Click this button to install Softex..." -> "I Understand" -> OK -> "Restart Now") (Softex Diagnostics runs) -> Next -> Next -> Finish -> reboots automatically Insert Ethernet card "Install system provided driver for this card" -> OK -> Continue Adapter: [2] 3Com Megahertz 10/100 LAN CardBus PC Card (Ethernet) Specify an IP address: 10.1.1.1/8 -> OK -> Reboot Now Delete loopback adapter change IP to 192.168.1.3/24 Reboot (can now ping 192.168.1.1) 25 insert Modem card -> OK Settings -> Control Panel -> PC Card (PCMCIA) shows red X over icon of Ethernet adapter, but "Softex PC Card Controller" says both adapters are available for use. cd e:\temp c:\images\3ccm156.exe put formatted diskette in floppy drive install.bat (to create modem driver diskette) "My Computer" -> Dial-Up Networking -> Install "Files Needed" -> h:\i386 -> OK "Do you want RAS setup to invoke the modem installer to enable you to add a modem?" -> Yes -> "Don't detect my modem; I will select it from a list." -> Next -> "Have Disk..." -> OK -> Next -> COM2 -> Finish -> "Add RAS Device" (COM2) -> OK -> "Remote Access Setup" -> Continue -> Restart 5.1.3 Miscellaneous Notes HAL = Hardware Abstract Layer rdisk = creates emergency repair disk (?) "route -p add 165.19.0.0 mask 255.255.0.0 167.146.24.1" net stop dhcp net start dhcp ipconfig /all ipconfig /renew boot.ini contains NT Boot Mgr entries explorer.exe -> View -> Options -> Show All Files attrib -r -h -s c:\boot.ini Dell contacts NTWS support: 888-596-3355 x69222 NT server support: 800-967-1068 5.2 Filesystems and Disks 5.2.1 fdisk-like program Start->Programs->Administrative Tools (Common)->Disk Administrator 26 5.2.2 Mapping a drive from the command prompt net use j: \\computer-name ... 5.2.3 Unmapping a drive from the command prompt net use /del j: 5.3 Networking 5.3.1 Browsing If NT network is setup as a workgroup, instead of keeping a master browse list for the WAN by a domain master browser it needs to get a list from each subnet. 5.3.2 Find NetBIOS name of a device C:\usr\data\technote>nbtstat -A 167.146.24.59 NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------WAL_DGREI00 <00> UNIQUE Registered SAFEWAY01 <00> GROUP Registered WAL_DGREI00 <20> UNIQUE Registered WAL_DGREI00 <03> UNIQUE Registered SAFEWAY01 <1E> GROUP Registered WAL_DGREI00 <6A> UNIQUE Registered WAL_DGREI00 <87> UNIQUE Registered MAC Address = 00-08-C7-2B-C3-A8 Also try "net view \\computer-name" or "net view ip.addr" 5.3.3 IP Forwarding Control Panel->Networking->TCP/IP->Properties->Routing->IP Forwarding 5.3.4 Sending Messages net send computer-name message - creates a popup on other Windows machines 27 5.4 Printing to add a network printer: - Network Neighborhood - 2x click on server and login - right click on printer name and Install 5.5 Programming 5.5.1 Running an autoexec.bat Right click on MSDOS icon -> Properties -> Shortcut -> add "/k autoexec.bat" after cmd.exe in the Target field 5.5.2 Running a command in the background Use "start /b" or "start /min" 5.5.3 grep-like command findstr /i STRING FILENAME(S) 5.5.4 Scripting (VBScript and JScript) http://msdn.microsoft.com/scripting/ 5.5.5 How to execute a command every time you start a cmd shell Properties -> Shortcut -> Target, specify '/k string' Also works in Win98. 5.5.6 DOSKEY macro definitions in order to say "wc somefile": 28 “doskey wc=perl \usr\bin\wc.p $L $*” 5.6 System 5.6.1 Boot Manager c:\boot.ini contains NT Boot Mgr entries; read-only; modify boot delay via Start->Settings->Control Panel->System->Startup/Shutdown attrib c:\boot.ini -r -s edit c:\boot.ini attrib c:\boot.ini +r +s 5.6.2 Diagnostics winmsd - equivalent to msd in DOS Right click on Network Neighborhood -> System Information 5.6.3 Environment Variables Control Panel -> System -> Environment tab 5.6.4 How increase the number of lines in the DOS window Properties -> Layout -> Window Size -> Height, specify '40' 5.6.5 Password Encryption Different algorithm than used on Win95/98. 5.6.6 Programs auto-started at boot C:\WINNT\Profiles\All Users|Administrator|...\Start Menu\Programs\Startup Start->Programs->Startup (show "All Users", programs started in tray) 29 5.6.7 Registry regedit What is the Registry? http://www.windows2000faq.com/Articles/Index.cfm?ArticleID=14734 A. A. Originally there were .ini files in Windows, however the problem with .ini files are many, e.g. size limitations, no standard layout, slow access, no network support etc. Windows 3.1 (yes Windows not Windows NT) had a registry which was stored in reg.dat and could be viewed using regedit.exe and was used for DDE, OLE and File Manager integration. In Windows NT the Registry is at the heart of NT and is where nearly all information is stored, and is split into a number of subtrees, each starting with HKEY_ to indicate that it is a handle that can be used by a program. HKEY_LOCAL_MACHINE This contains information about the hardware configuration and installed software. HKEY_CLASSES_ROOT This is just a link to HKEY_LOCAL_MACHINE\SOFTWARE\Classes and contains links between applications and file types as well as information about OLE. HKEY_CURRENT_CONFIG Again this is a link to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Hardware Profiles\Current and contains information about the current configuration. HKEY_CURRENT_USER This is a link to HKEY_USERS\<SID of User> and contains information about the currently logged on users such as environment, network connections, printers etc. HKEY_USERS Contains information about actively loaded user profiles, including .default which is the default user profile. Each of the subtrees has a number of keys, which in turn have a number of subkeys. Each key/subkey can have a number of values which has 3 parts The name of the value, e.g. Wallpaper The type of the value, e.g. REG_SZ (which is a text string) The actual value of the value, e.g. "c:\winnt\savilltech.bmp" To edit the registry there are two tools available, regedt32.exe and regedit.exe.Regedit.exe has better search facilities, but does not support all of the Windows NT registry value types. If you want to just have a look around the Registry: Start a registry editor (regedit.exe or regedt32.exe) In Regedt32.exe you can set the registry to read only mode which means you won't corrupt anything :-) (Options - Read Only Mode) Select the HKEY_USERS subkey Move to the .default - Control Panel - Desktop and you will see a number of values in the right hand pane. One of them is wallpaper and this is the background that is displayed before you logon. 30 5.6.8 Setting Application to open a file type Explorer -> View -> Options... -> File Types tab 5.6.9 Services Control Panel->Services “net start” lists running services “net start <service_name>” starts a service “net stop <service_name>” stops a service 5.6.10 Service Packs (where to get) support.microsoft.com/support/ntserver/Content/ServicePacks/Default.asp 5.6.11 Sounds Control Panel->Sounds C:\winnt\media contains the default sounds used (e.g. “The Microsoft Sound.wav”) 5.6.12 User Profiles C:\WINNT\Profiles\<username>\Personal 5.6.13 Version C:\> winver 5.7 Resource Kit Another possibility is a utility in the Windows NT resource kit called sc.exe. You can use this utility to do many things such as configure, start, stop, and delete services (there are several additional options available). Hyena will let you stop the service and change the startup to manual but if you want to delete the service(s) entirely you might consider using the "sc" command-line utility as I described below: Syntax for changing/deleting the SNMP service: 31 sc <hostname> [command] [service name] <option1> <option2>... (Note: We might need to consider using sc \\machinename stop snmptrap to first stop a service. Although this is probably not required since the following command simply deletes the service from the registry, it may still be prudent to make sure the service is stopped until the machine is rebooted. Otherwise, the service might actually remain active until the next reboot. Further testing is required.) sc \\machinename delete snmptrap This could be configured in a batch file and modified as necessary using replaceable parameters for the hostname. Hyena can be used to create this batch file using it's macro builder facility. Since most things you might try rely on the systems to be active on your network, you will probably have to continue your clean-up process over and over again until you are sure you got every system. Hyena has some logging capability so that might prove useful. If you have access to the netsvc command-line utility from your workstations you could modify the login script to have any remaining systems report the existence of the SNMP service to you using the following: Look for SNMP service netsvc \\machinename snmp /query | find "Service is running" && net send machinname SNMP Service found! Note: The netsvc utility is found in the Windows NT resource kit! Good luck! 6 Windows XP Home Edition 6.1 Desktop 6.1.1 Screen Saver Slideshow Q: I use Windows XP, and I'd like to use a few of my digital pictures for the screensaver--is there an easy way to do this? 32 --Submitted by: Nancy S. of Santa Fe, New Mexico A: To run your pictures as a slide show in XP, this is what you have to do: First, select the pictures you want to use and set up a special folder with those pictures in it and make a note where you saved that folder (in what directory, on what drive, and so on). You will need this info later. Next, go to your Desktop, right-click on the Desktop. Scroll down to Properties, Click the Screensaver tab. Toward the middle of this dialog box there is a drop-down box with the words "Screen Saver." Scroll down that box until you see My Pictures Slideshow and click it; to the right of this drop-down box is a button that says Settings; click it. You should see the words "Use pictures in this folder" and a Browse button; click the button. This is where you look for that file you created earlier with all your pictures that you want to use for the screensaver. After you have found the file folder with the pictures, click OK. You can now adjust how fast you want the pictures to change and so on, then click OK again. This brings you back to the Display Properties dialog box, and you can see your screensaver pictures. Click OK, and you are finished. --Submitted by: Nedda H. of Palm Harbor, Florida 6.2 Files 6.2.1 Icon (.ico) Files An icon is the graphic displayed next to a file name in Windows Explorer. The .ico file for SomeApplication generally resides under C:\Program Files\SomeApplication. 6.2.2 Properties To change the program that opens a file: 1. Right-click the file you want to open in a different program, and then click Properties. 2. On the General tab, click Change. 3. Click the name of the program in which you want the file to open. Note: This change affects all files that have the same file name extension as the file you selected. For example, if you change the program that opens a .jpg file, all .jpg files will open in this program. Creating Windows XP Icons http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwxp/html/winxpicons.asp 33 6.2.3 Shortnames and UNCs In the days before Windows, filenames under MS-DOS could only be 11 characters long. For compatibility with old programs that relied on that, for every file with a name longer than that, Windows creates a unique "shortname". For example, if your file is named "thisisalongfilename.isntit", a DIR /X in a command shell may show the shortname as "THISIS~1.ISN". Note the Short Filenames are the shortened version of Long Filenames that are created to fit the 8.3 format. That is, the name is only 8 characters and the extension is only 3 characters. The system maintains both in its directory structure. UNC is an acronym for Universal Naming Convention. By example, the FileName "C:\temp\test.doc" would be represented by "\\?\C:\temp\test.doc". 6.3 Languages Control Panel -> Date, Time, Language, and Regional Options -> Regional and Language Options -> Languages tab -> Details -> Add changes are user specific 6.4 Networking 6.4.1 File Sharing Once you have run the Network Setup Wizard, (or if you had decided to skip it), the checkbox to share become active : I share my drive, define the name to be displayed on other systems as the Sharename and I allow other network users to change my files. Note: this is different to NT4 and Windows2000, where I can assign permissions based on usergroups and even single users, but similar to the security settings on Windows95/98/ME. If you need to have User-level security, you need to use Windows XP Professional. Unlike Windows95/98/ME, I could not find a possibility to protect a network share with a password : once you have shared a disk or folder, everyone has access to your data. 34 http://www.jimthompson.net/xphome/File_Sharing.htm http://www.practicallynetworked.com/sharing/xp/filesharing.htm Q: I am still unable to map a share on the XP computer to the 98 computer. When I try, I get the message: "\\$XPcomputer is not accessible. No permission to access resource." The funny thing is, I originally mapped a share on the XP box, and it had continued to connect at each bootup, so somehow the 98 box did have some permission. However, I disconnected it trying to see if I could reconnect, and now I can't. A: Peter, did you try un-sharing and re-sharing the inaccessible folder on Windows XP, as I suggested in my reply to your previous message? Since (according to that message) your computer runs XP Home Edition, you're on the right track by looking at the Guest account. Home Edition always validates access requests via the Guest account, regardless of the user's actual credentials. Make sure that the Guest account is enabled for network access by entering this command on XP: net user guest /active:yes Make sure that there's no network password for the Guest account: 1. Click Start | Run. 2. Type "control userpasswords2" in the box and click OK: 3. Click Guest. 4. Click Reset Password. 5. Click OK without entering a new password. Have you ever started XP Home Edition in Safe mode and set file access permissions? If so, that opens up another set of possible problems and solutions. -Best Wishes, Steve Winograd, MS-MVP (Windows Networking) 35 6.4.2 Workgroup Start -> Control Panel -> Performance and Maintenance -> System -> Computer Name (changing this doesn’t seem to take) Use “Network Setup Wizard” (Control Panel -> Network and Internet Connections -> Set up or change your home or small office network) to define workgroup and enable sharing Beware that the Network Setup Wizard automatically and silently enables Internet Connection Firewall. 6.4.3 Windows Domain (XP Pro) To join a domain, Control Panel -> System -> Computer Name -> Network ID 6.5 Security 5 Steps To Secure Windows XP Home http://netsecurity.about.com/cs/windowsxp/a/aa042204_2.htm Microsoft Windows Security 101 http://netsecurity.about.com/cs/windowsxp/a/aa100903.htm 6.6 System 6.6.1 Automatically Run Programs Registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKEY_USER\<SID>\Software\Microsoft\Windows\CurrentVersion\Run 6.6.2 Schedule a Task http://support.microsoft.com/kb/308569 6.6.3 System Restore Use this dialog to control how much disk space Windows uses to store checkpoints. 36 6.7 Users 6.7.1 Administrator To login as Administrator, boot computer press F8 after the BIOS check (on Compaq, press the F8 key repeatedly when the first screen appears, about once every second, until a menu appears). Administrator account only visible when no other users (except Guest) exist or booted in safe mode. 6.7.2 Default vaio, Administrator, Guest (disabled by default) 6.7.3 Fast User Switching In Microsoft Windows XP, if you enable the Fast User Switching feature, multiple user accounts can log on to a computer simultaneously. This article describes how to enable and use this feature. With Fast User Switching, users can switch sessions without closing Windows, programs, and so forth. For example, User A is logged on and is browsing the Internet, User B wants to log on to their user account and check their e-mail account. User A can leave their programs running while User B logs on and checks their e-mail account. User A can then return to their session where their programs would still be running. Fast User Switching is enabled by default in Windows XP Home Edition and Professional on computers with more than 64 megabytes (MB) of RAM. However, Fast User Switching is not available on Windows XP Professional-based computers that are part of a domain network. 37 6.7.3.1 Enable or Disable Fast User Switching To enable Fast User Switching, you must also enable the “Use the Welcome screen” option. This feature cannot be used if your computer is a member of a domain. To enable Fast User Switching: 1. 2. 3. 4. Log on to the computer as an administrator. Click Start, click Control Panel, and then click User Accounts. Click Change the way users log on or off. If it is not already selected, click to select the Use the Welcome screen check box. NOTE: The Use Fast User Switching check box is unavailable until you click to select the Use the Welcome screen check box. 5. Click to select the Use Fast User Switching check box, and then click Apply Options. Quit the User Accounts tool. 6.7.3.2 To Switch Users When a user initiates the Switch User option, the computer returns to the Welcome screen. The current user's session remains active and another user can now log on and use the computer. You can initiate the Switch User command in any of the following ways: Click Start, click Log off, and then click Switch User. Open Task Manager (CTRL+ALT+DELETE), and then click Switch User on the Shut Down menu. Hold down the Windows key, and then press the L key). 6.7.4 Guest Setting Guest User Password Once you have the black command prompt window open you will type the following: net user guest <password> 7 Windows XP Pro 7.1 Remote Desktop (RDP) http://ask-leo.com/how_can_i_access_my_windows_xp_machine_remotely.html You can happily use remote desktop across the internet as long as the server is not protected by a firewall such as a broadband router. If it is and your firewall or router supports it you can open port 3389 on the firewall and forward that to the machine you want to connect to. Note that if there is more than one machine behind the firewall then only one can be connected to across the firewall this way. 38 8 Windows 2000 8.1 Commands The TLIST and KILL commands can be power tools when fighting a frozen Windows computer, process, or application. 8.2 Files 8.2.1 Searching: find vs findstr (grep-like) From: Smith, Christopher D. Sent: Thursday, October 27, 2005 10:38 AM To: Enterprise Management Tools.NS.ATIS Subject: FYI: UNIX grep like functionality within Windows: using find / findstr For those who require a grep-like utility in the Windows environment, there are 2 string searching programs included with Windows. "find.exe" is the less powerful utility that allows simple string searching. The syntax is very much like Unix "grep". ex: find "failed" upgrade.log will return all lines in the file upgrade.log containing the pattern "failed". "findstr.exe" provides more capability, including matching patterns at the beginning/end of a line, searching files in directories and subdirectories, regular expressions, etc. Please see the syntax of both commands below for more info: find /? Searches for a text string in a file or files. FIND [/V] [/C] [/N] [/I] [/OFF[LINE]] "string" [[drive:][path]filename[ ...]] /V Displays all lines NOT containing the specified string. /C Displays only the count of lines containing the string. /N Displays line numbers with the displayed lines. /I Ignores the case of characters when searching for the string. /OFF[LINE] Do not skip files with offline attribute set. "string" Specifies the text string to find. [drive:][path]filename Specifies a file or files to search. 39 If a path is not specified, FIND searches the text typed at the prompt or piped from another command. findstr /? Searches for strings in files. FINDSTR [/B] [/E] [/L] [/R] [/S] [/I] [/X] [/V] [/N] [/M] [/O] [/P] [/F:file] [/C:string] [/G:file] [/D:dir list] [/A:color attributes] [/OFF[LINE]] strings [[drive:][path]filename[ ...]] /B /E /L /R /S Matches pattern if at the beginning of a line. Matches pattern if at the end of a line. Uses search strings literally. Uses search strings as regular expressions. Searches for matching files in the current directory and all subdirectories. /I Specifies that the search is not to be case-sensitive. /X Prints lines that match exactly. /V Prints only lines that do not contain a match. /N Prints the line number before each line that matches. /M Prints only the filename if a file contains a match. /O Prints character offset before each matching line. /P Skip files with non-printable characters. /OFF[LINE] Do not skip files with offline attribute set. /A:attr Specifies color attribute with two hex digits. See "color /?" /F:file Reads file list from the specified file(/ stands for console). /C:string Uses specified string as a literal search string. /G:file Gets search strings from the specified file(/ stands for console). /D:dir Search a semicolon delimited list of directories strings Text to be searched for. [drive:][path]filename Specifies a file or files to search. Use spaces to separate multiple search strings unless the argument is prefixed with /C. For example, 'FINDSTR "hello there" x.y' searches for "hello" or "there" in file x.y. 'FINDSTR /C:"hello there" x.y' searches for "hello there" in file x.y. Regular expression quick reference: . Wildcard: any character * Repeat: zero or more occurrences of previous character or class ^ Line position: beginning of line $ Line position: end of line [class] Character class: any one character in set [^class] Inverse class: any one character not in set [x-y] Range: any characters within the specified range 40 \x Escape: literal use of metacharacter x \<xyz Word position: beginning of word xyz\> Word position: end of word For full information on FINDSTR regular expressions refer to the online Command Reference. 8.3 Filesystems and Disks 8.3.1 Encryption Win2kPro EFS (Encrypted File System) 8.3.2 Linking Files I am installing 20 Netcool clients on Windows 2000 and would like to configure the system to have all of the clients look at a one particular file for the client configuration. In the Unix world I simply create a soft link pointing to the one file. However, I am not quite sure how to do it in the Gates world. The goal is to have all of the clients looking at this one file so that if a configuration change needs to be done it only has to take place in one location. Thanks, Ric Chura Ric, Depending on how the app is configured you may be able to just us a UNC to the file. Example: \\servername\sharename\filename If the customer is using Active Directory you can push an application and any desktop or security policy settings to the desktop with Group Policy. There is thousands of setting that you can use in group policy that allow you to control and secure the desktop. Group policy can control anything from icons on the desktop, redirecting files, renaming local admin account or IPSEC requirements when accessing specific servers. So instead of running around installing the netcool client on all the desktops you could create a group policy object that is applied to the workstations that you want with the setting that you want. AD will apply the changes when the desktop boots or a user logs on. Don Happe. 41 8.3.3 Synchronzing/Offline Files “Any shared files or folders on a Microsoft network can be made available offline. You can make files available offline from any computer that supports Server Message Block-based (SMB) File and Printer Sharing, including Windows 95, Windows 98, and Windows NT 4.0. Offline Files is not available on Novell NetWare networks.” 1. Enable use of offline files: 2x click “My Computer” -> Tools -> Folder Options -> “Offline Files” tab -> “Enable Offline Files” 2. Specify files/folders to be available offline: 2x click “My Computer”, select file/folder desired, File-> “Make Available Offline”. This (launches a wizard the first time and) copies the network files to a special folder called “Offline files”. To undo making a file or folder available offline: 1. Close all Explorer windows and open files in the folder to be undone. 2. In “My Computer”, right-click the item and click “Make Available Offline” again to remove the check mark. Win2k shows a computer icon in the status area of the Start menu bar. Click on it to reconnect after disconnecting. If you disconnect from the network, you can still access files/folders by the original drive letter and path. “By default, Offline Files stores shared network files in the root directory of your hard disk. You can use Offline Files Cache Mover (cachemov.exe), available in the Windows 2000 Professional Resource Kit, to change the cache location.” Can’t verify this statement from Windows Help. Offline files are stored in c:\winnt\CSC (a hidden directory) 8.3.4 Offline Files Tests “Server” is the network file server (in this case Win98). “Laptop” is the Win2k machine. 1. On Laptop, create a folder and file in an offline folder while disconnected. Win2k automatically creates it on Server when access to Server is re-established. 2. On Laptop, modify a file in an offline folder while disconnected. Win2k updates the file on Server when access re-established. 3. On Server, modify a file in an offline folder while Laptop is disconnected. Win2k updates the file on Laptop when access re-established. 4. On both Server and Laptop, modify same file in offline folder while disconnected. When access re-established, Win2k prompts for direction: (1) keep both, renaming Laptop’s copy (2) keep overwrite Server’s copy with Laptop’s copy (3) overwrite Laptop’s copy with Server’s copy. 5. On Laptop, try to delete offline folder from Explorer while disconnected. Explorer gives error message: must be connected to server. 42 6. On Laptop, try to rename an offline file from all caps to all lower case while disconnected. Explorer changes it back to upper case. 7. On Server, delete an offline folder while Laptop is disconnected. When access reestablished, knowledge of folder on Laptop is retained through several syncs but eventually goes away. 8.3.5 Sharing a Directory To share a directory on a Win2K machine in a workgroup: 1. Enable sharing on a directory 2. Create a group (e.g. “team”) Control Panel -> Administrative Tools -> Computer Management -> Local Users and Groups -> Groups -> Action -> New Group... 3. Create users 4. Add users to group 5. In Windows Explorer, right click on directory and select Sharing... Note that the root directory of a disk (the default share) cannot be shared on the network. 6. Select “Share this folder” 7. Specify a share name 8. Click “Permissions” 9. Click “Add” and add the group (e.g. “team”) Note: You can also add individual users. If you get an error message saying “This location contains more than 10000 objects. Only the first 10000 objects will be shown”, the user you want may not appear in the list. Specify the user manually in the lower pane, e.g. “visa\jsommerv”. To map the newly shared directory to another Windows machine: 1. In Windows Explorer, selects Tools -> Map Network Drive 2. In the “Folder:” field, specify the full path to the new share, e.g. \\teamserver\docs 3. When prompted, enter the user name and password of a user created above 8.4 IIS 8.4.1 Documentation http://www.microsoft.com/windows2000/en/server/iis 8.4.2 Requirements Server must have static IP address. 43 8.4.3 Configuring IIS Server Start -> Programs -> Administrative Tools -> Internet Services Manager -> right click the computer name -> Properties 8.4.4 Configuring the Default Web Site Start -> Programs -> Administrative Tools -> Internet Services Manager -> expand the computer name (left pane) -> right click Default Web Site -> Properties Create a C:\Inetpub\wwwroot\default.htm so that user’s won’t get “Under construction” message. 8.5 Networking The “File and Printer Sharing for Microsoft Networks” component is the equivalent of the Server service in Windows NT 4.0. The “Client for Microsoft Networks” component is the equivalent of the Workstation service in Windows NT 4.0. 8.5.1 DHCP Features: multicast address allocation rogue DHCP server detection – Active Directory maintains a list of all authorized DHCP servers. So, Win2K DHCP servers can’t provide service if they aren’t authorized. But, other DHCP servers (e.g. WinNT) can. enhanced monitoring and statistics – warns when running out of addresses; stats include: number of available addresses, number of messages processed, number of requests/acknowledgements/declines. support for new vendor-specific and class ID options Windows clustering – enables administration of a number of DHCP servers as a single system; uses a central database; clustering is available in the Win2K Advanced Server and DataCenter products. Default lease time is 8 days. Client renews lease when lease period has elapsed 50%. If no response from server, client keeps lease until 87.5% of lease elapsed. Then, it broadcasts for a new address. When restarted, client attempts to renew old IP address. If no response, contacts old default gateway and continues if gateway responds. If no response from gateway, client assumes an address in the reserved range (169.254.0.1 to 169.254.255.254) and broadcasts for a new address every 5 minutes. ipconfig [ /release | /renew ] 44 8.5.2 DNS 8.5.2.1 Suffix search list Control Panel -> Network and Dial-up Connections -> Right click on “Local Area Connection” and select Properties -> Double click on “Internet Protocol (TCP/IP)” -> Advanced -> DNS tab > Select “Append these DNS suffixes (in order)” -> Add suffixes 8.5.3 Config files \winnt\system32\drivers\etc\hosts \winnt\system32\drivers\etc\services 8.5.4 Troubleshooting commands ping tracert pathping - pinpoints where end-to-end packet loss is occuring 8.5.5 Workgroup Settings->Control Panel->Administrative Tools->Computer Management-> right click on Computer Management (Local) and select Properties 8.6 Performance 8.6.1 Disk Defragmentation My Computer -> right click -> Manage -> Disk Defragmenter (same path for WinXP) 8.6.2 Swap File (pagefile) www.petri.co.il/pagefile_optimization.htm My Computer -> right click -> Properties -> Advanced -> Performance Options Initial size should be at least 1.5X physical memory Max size should be 3X physical memory Make the initial size the same as the max size (avoids pagefile fragmentation) 45 8.7 Printing 8.7.1 Adding a printer by network name Start -> Run -> \\servername\printername 8.7.2 Defining a printer by its IP address Find the IP address of an HP LaserJet using: Test -> PCL Config Page -> Select Add Printer -> Next -> Local printer (deselect "Automatically detect and install my Plug and Play printer) -> Next -> Create a new port: Standard TCP/IP Port -> Next -> Next -> Printer Name or IP Address: 172.32.57.27 -> Next -> Finish Manufacturers: HP, Printers: HP LaserJet 4000 Series PCL -> Printer name: JPMC LJ 4000 PCL -> Next -> Do not share this printer -> Do you want to print a test page? Yes -> Next -> Finish May need "route add -p 172.32.0.0 mask 255.255.0.0 172.32.57.250" if default route is out the dial-up interface. 8.8 System 8.8.1 Boot Manager modify boot delay via Start -> Settings -> Control Panel -> System -> Advanced -> Startup and Recovery 8.8.2 Desktop 8.8.2.1 Quick Launch Toolbar You don't have to go to C:\Windows\Application Data\Microsoft\Internet Explorer\Quick Launch to add or remove icons on the Quick Launch Toolbar. You can drag and drop shortcuts directly on to the toolbar. Many times people want shortcuts to programs. You can drag and drop them from anywhere in the Start Menu or the desktop. I even was able to drag and drop the Recycle Bin and My Computer onto the toolbar. 46 If you want to remove an icon from the toolbar, right-click it and choose Delete from the pop-up menu. Karl calls the right mouse button the "do it to it" action. He says that this term helps people remember that clicking the right mouse button gives them a list of actions that apply to whatever item they happen to be clicking on (desktop icon, toolbar, file and so on). 8.8.3 Environment Variables To view, Control Panel -> Administrative Tools -> Computer Management -> System Tools -> System Information -> Software Environment -> Environment Variables Right click on “My Computer” -> Properties -> Advanced tab -> Environment Variables 8.8.4 Keyboard Shortcuts Press CTRL+C CTRL+X CTRL+V CTRL+Z DELETE SHIFT+DELETE CTRL while dragging an item CTRL+SHIFT while dragging an item F2 CTRL+RIGHT ARROW CTRL+LEFT ARROW CTRL+DOWN ARROW CTRL+UP ARROW CTRL+SHIFT SHIFT CTRL+A F3 CTRL+O ALT+ENTER ALT+F4 CTRL+F4 ALT+TAB To Copy. Cut. Paste. Undo. Delete. Delete selected item permanently without placing the item in the Recycle Bin. Copy selected item. Create shortcut to selected item. Rename selected item. Move the insertion point to the beginning of the next word. Move the insertion point to the beginning of the previous word. Move the insertion point to the beginning of the next paragraph. Move the insertion point to the beginning of the previous paragraph. with any of the arrow keys Highlight a block of text. with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document. Select all. Search for a file or folder. Open an item. View properties for the selected item. Close the active item, or quit the active program. Close the active document in programs that allow you to have multiple documents open simultaneously. Switch between open items. 47 ALT+ESC F6 F4 SHIFT+F10 ALT+SPACEBAR CTRL+ESC ALT+Underlined letter in a menu name Underlined letter in a command name on an open menu F10 RIGHT ARROW LEFT ARROW F5 BACKSPACE ESC SHIFT Cycle through items in the order they were opened. Cycle through screen elements in a window or on the desktop. Display the Address bar list in My Computer or Windows Explorer. Display the shortcut menu for the selected item. Display the System menu for the active window. Display the Start menu. Display the corresponding menu. Carry out the corresponding command. Activate the menu bar in the active program. Open the next menu to the right, or open a submenu. Open the next menu to the left, or close a submenu. Refresh the active window. View the folder one level up in My Computer or Windows Explorer. Cancel the current task. when you insert a CD into the CD-ROM drive 8.8.5 Log files (Dr. Watson) Documents and Settings\All Users\Documents\DrWatson\drwtsn32.log and user.dmp 8.8.6 Programs auto-started at boot C:\Documents and Settings\All Users|Administrator|...\Start Menu\Programs\Startup Start->Programs->Startup (show "All Users", programs started in tray) 8.8.7 Registry regedit – Win 95/98; can only read 2000 db regedt32 – NT/2000 8.8.8 Screen Capture Pressing the PrtSc key copies a picture of the entire desktop onto the clipboard which you can paste into MS Word. Pressing Alt-PrtSc copies a picture of the active window onto the clipboard. 48 8.8.9 Services Control Panel->Administrative Tools->Services 8.8.10 Start Menu Turn off “show recently used commands”: Start -> Settings -> Taskbar & Start Menu… -> Use Personalized Menus 8.8.11 User Profiles C:\Documents and Settings\<username> 8.8.12 Wallpaper Wallpaper is the background color or image on the screen. There are three different possible settings for wallpaper. Login screen “Computer Locked” screen Desktop (logged in) HKEY_USERS\.DEFAULT\Control Panel\Desktop\wallpaper (full path to image) and TileWallpaper (0=no, 1=yes) HKEY_CURRENT_USER\Control Panel\Desktop\Wallpaper and WallpaperStyle (0=Centered - the default, 1=Tiled, 2=Stretched). Changing this value overrides the Desktop wallpaper setting. HKEY_CURRENT_USER\Control Panel\Desktop\Wallpaper and WallpaperStyle (0=Centered - the default, 1=Tiled, 2=Stretched) Alternatively, select: Control Panel -> Display -> Background or Right click on Desktop and select Properties. Requires “Active Desktop” to be enabled. Must be set after the “Computer Locked” registry key. When changing the registry, you must log off and back on, or reboot, in order to see the updated wallpaper. Default image files are C:\WINNT\*.bmp. The images for the login and “computer locked” screens must be bitmaps. The desktop wallpaper may be a JPEG. HTML Wallpaper You can put any text-based document onto your desktop as part of your wallpaper. Just open Notepad and type whatever you want to appear on your desktop, then save the file with an .HTM 49 extension. Right-click on the desktop, select Properties and select the "Web" tab. Select the "New" button, select "Web site" and click OK. Use the browse button to find your new file. Click OK, then OK again. Note that this is a real HTML document because you gave it an .HTM extension. If you know how to create HTML documents by typing commands or using an authoring tool, you can spice it up with colors, sound, graphics, video, live links, ActiveX, Java or anything you choose. 8.8.13 WMI (Windows Management Instrumentation) Tool for viewing and changing system properties on a remote or local computer Must be a member of the Administrators group to modify administrative properties 8.9 Terminal Services two modes: application server – requires Terminal Services Licensing server remote administrator Control Panel -> Add/Remove Programs -> Add/Remove Windows Components requires reboot Client install image in c:\winnt\system32\clients\tsclient folder. The net sub-folder contains software for a network install. The other sub-folders contain floppy disk images. 9 Windows 2003 9.1 Active Directory AD first introduced in Win2000. Forest can contain multiple Windows domains. Forest defines schema (user, groups, OUs, applications such as Exchange) for the domains. Domain is a security boundary and has a separate name space. Peer domains (discontinguous name space), child domain. Trust in NT 4.0: 1-way (domain X trusts domain Y, but Y doesn’t trust X; domain Y users/groups can access domain X resources, X still must explicitly grant access specific users/groups in Y); and 2-way trust (bi-directional). Trust in AD Forest: automatically establishes trust between member domains. Still have to explicitly grant access to specific users/groups AD also provides “transitive trust”: if A trusts B, and B trusts C, then A trusts C 50 10 Windows Vista 10.1 Backup and Restore Windows Complete PC Restore – Restores the contents of your hard disk from a backup. For more information, search Help and Support for "complete PC restore." Windows Complete PC Backup and Restore is not included with Windows Vista Starter, Windows Vista Home Basic, or Windows Vista Home Premium. (http://windowshelp.microsoft.com/Windows/en-US/Help/2b3724d1-f4ad-5b26-16dc3e9e66f4be5e1033.mspx) 10.2 Languages Control Panel > Regional and Language Options > Keyboards and Languages tab > Change Keyboards 10.2.1 Install / Uninstall Font Windows comes with a variety of fonts already installed. If you want to install additional fonts, you must first download them. You can download fonts from a software program, the Internet, or your organization's network. Note Before you download a font, make sure you trust the source. To install a font 1.Open Fonts by clicking the Start button , clicking Control Panel, clicking Appearance and Personalization, and then clicking Fonts. 2.Click File, and then click Install New Font. If you don’t see the File menu, press ALT. 3.In the Add Fonts dialog box, under Drives, click the drive where the font that you want to install is located. 4.Under Folders, double-click the folder containing the fonts that you want to add. 5.Under List of fonts, click the font that you want to add, and then click Install. 51 To uninstall a font 1.Open Fonts by clicking the Start button , clicking Control Panel, clicking Appearance and Personalization, and then clicking Fonts. 2.Click the font that you want to uninstall. To select more than one font at a time, press and hold down CTRL while you click each font. 3.On the File menu, click Delete. If you don’t see the File menu, press ALT. 10.2.2 Unicode – 3 ways to enter in Windows http://www.johndcook.com/blog/2008/08/17/three-ways-to-enter-unicode-characters-inwindows/ (1) In Microsoft Word you can insert Unicode characters by typing the hex value of the character then typing Alt-x. You can also see the Unicode value of a character by placing the cursor immediately after the character and pressing Alt-x. This also works in applications that use the Windows rich edit control such as WordPad and Outlook. Pros: Nothing to install or configure. You can see the numeric value before you turn it into a symbol. It’s handy to be able to go the opposite direction, looking up Unicode values for characters. Cons: Does not work with many applications. (2) Another approach which works with more applications is as follows. First create a registry key under HKEY_CURRENT_USER of type REG_SZ called EnableHexNumpad, set its value to 1, and reboot. Then you can enter Unicode symbols by holding down the Alt key and typing the plus sign on the numeric keypad followed by the character value. When you release the Alt key, the symbol will appear. This approach worked with most applications I tried, including Firefox and Safari, but did not with Internet Explorer. Pros: Works with many applications. No software to install. Cons: Requires a registry edit and a reboot. It’s awkward to hold down the Alt key while typing several other keys. You cannot see the numbers you’re typing. Doesn’t work with every application. (3) Another option is to install the UnicodeInput utility. This worked with every application I tried, including Internet Explorer. Once installed, the window below pops up whenever you hold down the Alt key and type the plus sign on the numeric keypad. Type the numeric value of the character in the box, click the Send button, and the character will be inserted into the window that had focus when you clicked Alt-plus. 52 Pros: Works everywhere (as far as I’ve tried). The software is free. Easy to use. Cons: Requires installing software. [8/1/10 – didn’t work for me on Vista. DD] 10.3 Virtual Store \Users\<username>\AppData\Local\VirtualStore\Program Files \Users\<username>\AppData\Roaming\<application name> 10.4 Volume Shadow Copy Service Volume Snapshot Service (VSS) Start > command > right click > Run as administrator c:\> vssadmin list shadows [shows number of shadow copies] c:\> vssadmin list volumes [lists volumes that are eligible for shadow copies] c:\> vssadmin list shadowstorage [shows how much disk space is currently used for shadow storage] Space reserved for shadow storage defaults to 15% of total disk size or 30% of available space. Vista stores up to 64 shadow copies on a single volume at one time. 53 Must enter maxsize as a number followed by a units abbreviation: If no maxsize is specified, Vista sets the limit to “unbounded”. Max size must be at least 300MB to 1GB. Reboot after running cmd. 11 .Net Server 11.1 What is it? NETWORK WORLD NEWSLETTER: CURRID & COMPANY's TECHNOLOGY EXECUTIVE 11/11/02 Today's focus: What is .Net Server 2003? By Linda Musthaler Although Microsoft has been talking about its sweeping .Net strategy for at least a year now, many companies are still trying to determine what .Net means to them. In fact, many IT professionals have trouble articulating what .Net even is. That's because it's less of a specific product or tool than it is a "set of technology architectures and products, and a renewed developer and partner initiative," according to Aberdeen Group. "Simply put," says Aberdeen in its report 'Microsoft .Net: A Foundation for Connected Business,' ".Net is software that connects information, people, systems and devices." Uh, well, OK, that's clear as mud. No wonder customers are confused about it. 54 A few weeks ago I had the opportunity to listen to the voice of reason when it comes to Microsoft products and strategy. That voice belongs to Mark Minasi, a technology writer and speaker. Minasi was addressing several hundred technical-types at HP Enterprise Technical Symposium, and his mission was to help these folks determine the value of .Net Server to their own organizations. His status as "independent consultant" frees him from the binds of recommending a product for the sake of sales. He has written 19 books on topics such as Windows NT, 2000 and XP; Linux; LANs; and PC upgrades and maintenance. He's also a Certified MCSE 2000 and A7 Level Computer Expert. In short, he knows his stuff, and he knows how to explain it to others. The talk I heard was primarily about Windows .Net Server 2003, although he did give passing mention to the .Net strategy as a whole. He likened it to IBM's old Systems Network Architecture, which was a way of tying together a bunch of disparate IBM products to make it look like they were developed as a coherent set of tools. In a sense, that's what Microsoft is doing with .Net - taking products that were developed in silos and adding features and extensions that allow them to function together as "Web services." Minasi says the .Net strategy is "good overall," but it's hard to point to many "must have" features. There are "many very likable things" about it, though. At the heart of the .Net strategy is .Net Server 2003, which comes in various versions. Minasi describes .Net Server 2003 Standard Edition as "Windows 2000 Server, Version 1.1." He calls the product name change "a double-em-double-you," or a Microsoft Marketing Word. Don't be fooled by the fancy new name, he says, as this is basically an upgrade that is small scale, relative to the introduction of Windows 2000 a few years ago. That doesn't mean it's an upgrade to be ignored, though. He identified several major .Net Server selling points that network managers should be interested in: * The wireless support found in Windows XP, including security that uses .Net's RADIUS server in combination with certificates and Active Directory to authenticate your device. * Messenger Server Support, which allows you to communicate via instant messaging with people in the Passport directory or via Exchange 2000. * XP networking features, for setting up good basic network services. * Improvements in Active Directory (although to get the most benefit, you need to upgrade all your servers). * New security features as well as better reliability (the main reason to upgrade from Windows NT). * Improved desktop and remote support. 55 * Whole new services, in the form of a complete e-mail server with a POP3 component and a stripped-down version of SQL Server. All told, the improvements in this update of Windows 2000 are significant enough to warrant a look at .Net Server 203. However, he's not urging wholesale upgrades of all of your Windows 2000 servers. (If you're still using Windows NT, however, you should make this upgrade when it becomes available, he says.) Minasi says .Net Server works fine with clients running Windows 2000, NT 4, and even W9x systems, so you aren't forced to upgrade your desktops. For more of Mark's sage advice on the topic, visit his web site at http://www.minasi.com/. Take the time to subscribe to his free newsletter, in which he shares his experience and helpful suggestions from readers. With technology getting more complex every day, and the marketing hype growing exponentially, it's nice to be counseled by a voice of reason. Linda Musthaler is vice president of Currid & Company. You can write to her at [email protected]. ______________________________________________________________ About Currid & Company: Currid & Company (http://www.currid.com) researches information technology and how it can change the rules of business. Analysts focus on emerging technologies and methods by which organizations can obtain the best results from these innovations. Currid & Company offers consulting services to computer industry and corporate clients to help define and fulfill the potential of these exciting technologies. To learn more about emerging technologies that affect your business and your life, visit http://www.YourDigitalMinute.com, brought to you by Currid & Company. 56