Scanning for Viruses Without an Antivirus Program

On the second Tuesday of each month, as part of its normal security releases, Microsoft releases an updated version of a utility called the Malicious Software Removal Tool MSRT . This utility is not designed to block new viruses from entering a computer rather, its function is to clean up systems that have been infected with well-known and widespread viruses and other forms of malware. The MSRT is delivered by Windows Update, and on most computers, this tool runs silently and then deletes...

Configuring a Router or Wireless Access Point

You begin setting up your wireless network by configuring the wireless access point or a router that includes a wireless access point , which is the hub of your Wi-Fi network The process is simple if you use a device that supports Wi-Fi Protected Setup WPS most routers sold since 2008 do, although it's not always clear from the product literature. Older routers and other noncompliant devices offer a variety of third-party solutions or ask you to perform configuration manually. If you're not...

Using Reg Files to Automate Registry Changes

The . reg files created by the Export command in Registry Editor are plain text, suitable for reading and editing in Notepad or any similar editor. Therefore, they provide an alternative method for editing your registry. You can export a section of the registry, change it offline, and then merge it back into the registry. Or you can add new keys, values, and data to the registry by creating a .reg file from scratch and merging it. A .reg file is particularly useful if you need to make the same...

Understanding the Structure of the Registry

Before you begin browsing or editing the registry, it's good to know a bit about how this database is built. Figure 22-19 shows a portion of a system's registry, as seen through Registry Editor, the registry editor supplied with Windows 7 . As shown in the figure, the registry consists of the following five root keys HKEY_CLASSES_ROOT, HKEY_CURRENT_USER, HKEY_ LOCAL_MACHINE, HKEY_USERS, and HKEY_CURRENT_CONFIG. For simplicity's sake and typographical convenience, this book, like many others,...

Decoding Hardware Errors

When Windows encounters a problem with a device or its driver, it changes the icon in Device Manager and displays an error code on the General tab of the device's properties dialog box. Each code is identified by a number and a brief text description . Table 24-1 contains a partial list of error codes and suggested actions you should take to try to resolve them Table 24-1 Common Device Manager Error Codes This device is not configured correctly. Code 1 After downloading a compatible driver for...

The Virtual Store Folder

Many legacy applications write data such as configuration information to areas that are ordinarily inaccessible to standard accounts . This behavior presented few problems in Windows XP because most users ran with administrative privileges. In Windows 7 as in Windows Vista , the User Account Control UAC feature means that all users, even those with administrator accounts, run with a standard user token in ordinary operation . To prevent That's because in all of these junctions, the Everyone...

Diagnosing Problems Using Network

Network mapping, a feature that was new in Windows Vista, uses the Link Layer Topology Discovery LLTD protocol to find the other computers and devices on your network, and then displays them in a schematic representation . To display the map, in Network And Sharing Center click See Full Map . Figure 19-2 shows an example . Computers with more than one network adapter create a separate map for each one Computers with more than one network adapter create a separate map for each one Figure 19-2...