Reviews

Card Recovery Professional Review

Card Recovery Professional Review

Registry Easy Registry Cleaner Review

Registry Easy Registry Cleaner Review

Articles

How To Analyze Boot Logs

Boot logging lists the files that successfully and unsuccessfully processed during startup . You use boot logging to log the Windows features that are processed when you start your computer in safe mode and also in normal mode. By comparing the differences between the two logs, you can determine which features are not required to start . Windows records the name and path of each file that runs during startup in a log, WinDir Ntbtlog.txt. The log marks each file as successful Loaded Driver or...

Restart Sleep Hibernate Lock Log Off and Shut Down

After you press the computer's power button to power up the machine and start the Windows 7 operating system, the Windows Start menu contains all the other controls you need in order to switch between users, reboot the system, and, at the end of the day, power down and shut off the machine. To the immediate right of the Search Programs and Files text box at the bottom of the Start menu, you find the Windows Power button (labeled Shut Down by default). Clicking the Windows' Power button on the...

Configuring printer Driver Isolation Mode

Windows Print Management Console

Administrators can use Print Management to configure the Driver Isolation mode for each printer driver installed on a print server There are several scenarios in which doing this might be useful to increase print server reliability. For example, if a print queue associated with a particular driver keeps crashing, the administrator can change the Driver Isolation mode for the driver to Isolated so that the driver runs within its own separate process. That way, other print queues on the server...

Do Not Forcefully Unload The User Registry At User Logoff

Background Upload Of A Roaming User Profile's Registry File While User Is Logged On Applies only to Windows 7 and Windows Server 2008 R2 Sets the schedule for background uploading of a roaming user profile's registry file Ntuser. dat . This setting will upload only the user profile's registry file other user data will not be uploaded and will upload it only if the user is logged on. Only the registry file of a roaming user profile will be uploaded regular profiles will not be affected. This...

Where Does the Operating System Store Device Drivers

Windows 7 has an extensive library of device drivers, which are maintained in the driver store. On 32-bit computers, you'll find the 32-bit driver store in the SystemRoot System32 DriverStore folder. On 64-bit computers, you'll find the 64-bit driver store in the SystemRoot System32 DriverStore folder and the 32-bit driver store in the SystemRoot SysWOW64 DriverStore folder. Within the driver store, you'll find subfolders with localized driver information for each language component configured...

In the Windows Update window click Install updates

Troubleshooting Some software program updates require that you agree to the licensing terms and conditions of the program before you can install the update. A progress bar reports on the update activities as Windows downloads the selected update(s), creates a restore point, and then installs each update . Windows Update downloads and installs the selected update. Windows Update downloads and installs the selected update. 5. If Windows 7 prompts you to restart your computer, close any open...

Scanning for Viruses Without an Antivirus Program

On the second Tuesday of each month, as part of its normal security releases, Microsoft releases an updated version of a utility called the Malicious Software Removal Tool MSRT . This utility is not designed to block new viruses from entering a computer rather, its function is to clean up systems that have been infected with well-known and widespread viruses and other forms of malware. The MSRT is delivered by Windows Update, and on most computers, this tool runs silently and then deletes...

Configuring a Router or Wireless Access Point

You begin setting up your wireless network by configuring the wireless access point or a router that includes a wireless access point , which is the hub of your Wi-Fi network The process is simple if you use a device that supports Wi-Fi Protected Setup WPS most routers sold since 2008 do, although it's not always clear from the product literature. Older routers and other noncompliant devices offer a variety of third-party solutions or ask you to perform configuration manually. If you're not...

The Srs Wow effects control

You can use the SRS WOW effects control, shown in Figure 8-21, to optimize bass, stereo, and other audio effects. SRS audio is a sound-enhancing technology, created by SRS Labs, Inc., to create high-quality immersive audio. You can turn on SRS WOW effects by completing the following steps 1. Click the Turn on link. 2. Optimize the sound output for your speakers by clicking the Speakers link until it lists the appropriate type of speakers. The options are Normal speakers, Large speakers, and...

Understanding Windows Service Hardening

Windows Service Hardening WSH is a feature of Windows Vista and later versions that is designed to protect critical network services running on a system If a service is compromised, WSH reduces the potential damage that can occur by reducing the attack surface that could be potentially exploited by some forms of malicious code . Because network services both those built into the operating system and those installed by third-party applications are by their nature exposed to the network which...

Working With Files And Folders

Microsoft Windows File Folders Views

All the data for documents and programs on your computer is stored in electronic files. These files are then arranged into a series of folders and subfold-ers just as you'd arrange paper files in a series of file folders in a filing cabinet. In Windows 7, you use Windows Explorer to view and manage the folders and files on your system. You open Windows Explorer by clicking the Windows Explorer button on the Windows taskbar. CHANGING THE WAY FILES ARE DISPLAYED You can choose to view the...

How to Manage Backup Using Group Policy Settings

You can use Group Policy to manage Windows Backup options in an enterprise environment . The policy settings for Windows Backup are both user and computer settings. The user-specific settings are client-only settings and are found in the following location User Configuration Policies Administrative Templates Windows Components Backup Client The computer settings are for both the client and the server and are found in the following locations Computer Configuration Policies Administrative...

Using Reg Files to Automate Registry Changes

The . reg files created by the Export command in Registry Editor are plain text, suitable for reading and editing in Notepad or any similar editor. Therefore, they provide an alternative method for editing your registry. You can export a section of the registry, change it offline, and then merge it back into the registry. Or you can add new keys, values, and data to the registry by creating a .reg file from scratch and merging it. A .reg file is particularly useful if you need to make the same...

Understanding the Structure of the Registry

Before you begin browsing or editing the registry, it's good to know a bit about how this database is built. Figure 22-19 shows a portion of a system's registry, as seen through Registry Editor, the registry editor supplied with Windows 7 . As shown in the figure, the registry consists of the following five root keys HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_ LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. For simplicity's sake and typographical convenience, this book, like many others,...

Registry Redirection and Reflection

The 64-bit versions of Windows support running 32-bit Windows applications. This presents a problem because many Windows subcomponents are present in both 32- and 64-bit versions, and information about them (such as program filenames) is stored in the Registry under keys whose names were determined before Microsoft considered the need to distinguish between the two flavors. To manage this, Windows stores information for 32-bit components in an alternate location and feeds the stored information...

Decoding Hardware Errors

When Windows encounters a problem with a device or its driver, it changes the icon in Device Manager and displays an error code on the General tab of the device's properties dialog box. Each code is identified by a number and a brief text description . Table 24-1 contains a partial list of error codes and suggested actions you should take to try to resolve them Table 24-1 Common Device Manager Error Codes This device is not configured correctly. Code 1 After downloading a compatible driver for...

The Virtual Store Folder

Many legacy applications write data such as configuration information to areas that are ordinarily inaccessible to standard accounts . This behavior presented few problems in Windows XP because most users ran with administrative privileges. In Windows 7 as in Windows Vista , the User Account Control UAC feature means that all users, even those with administrator accounts, run with a standard user token in ordinary operation . To prevent That's because in all of these junctions, the Everyone...

Diagnosing Problems Using Network

Network mapping, a feature that was new in Windows Vista, uses the Link Layer Topology Discovery LLTD protocol to find the other computers and devices on your network, and then displays them in a schematic representation . To display the map, in Network And Sharing Center click See Full Map . Figure 19-2 shows an example . Computers with more than one network adapter create a separate map for each one Computers with more than one network adapter create a separate map for each one Figure 19-2...

Click the Start button click All Programs and then click Windows Update

Windows Update displays information about your computer's current update status, when it most recently checked for updates, when it most recently installed updates, and the scope of updates your computer receives from Microsoft Update. If your computer is up to date or only optional updates are available, a green bar and security shield appear at the left end of the update status pane . If Important or Recommended updates are available, the bar and shield are yellow or red. The color of the bar...