Cover image for Windows XP Cookbook

Book Description

Each year, Windows XP is pre-installed on 30 million PCs sold inthe U.S.--and 90 million worldwide--making it the world's mostpopular operating system, and proving to frustrated userseverywhere that preponderance does not equate to ease of use. Thereare literally thousands of programs, tools, commands, screens,scripts, buttons, tabs, applets, menus, and settings containedwithin Windows XP. And it has only been in the last couple of yearsthat Microsoft's documentation has actually been more of a helpthan a hindrance. But it still isn't enough.

Windows XP users and administrators need a quick and easy way tofind answers. Plenty of books go into detail about the theorybehind a particular technology or application, but few go straightto the essentials for getting the job done. Windows XPCookbook does just that, tackling the most common tasks neededto install, manage, and support Windows XP.

Featuring a new twist to O'Reilly's proven Cookbook formula,this problem-solving guide offers multiple solutions for each ofits 300-plus recipes. Solve dilemmas with the graphical userinterface, the command line, through the Registry, or by usingscripts. Each step-by-step recipe includes a discussion thatexplains how and why it works. The book is also among the first tocover Microsoft's XP Service Pack 2. With these practical,on-the-job solutions, Windows XP Cookbook will save youhours of time searching for answers.

Windows XP Cookbook will be useful to anyone that has touse, deploy, administer, or automate Windows XP. But this isn't atypical end-user book; it covers the spectrum of topics involvedwith running Windows XP in both small and large environments. As aresult, IT professionals and system administrators will find it agreat day-to-day reference. And power users will find Windows XPCookbook a great source for information on tweaking XP andgetting the most out of their systems. The bottom line is thatWindows XP Cookbook will make just about anyone who uses XPmore productive.

Table of Contents

  1. Special Upgrade Offer
  2. Preface
    1. Who Should Read This Book
    2. What’s in This Book
    3. Using Code Examples
    4. Safari® Enabled
    5. Conventions in This Book
    6. We’d Like Your Feedback!
    7. Acknowledgments
  3. 1. Introduction
    1. 1.1. Approach to the Book
    2. 1.2. At Least Three Ways to Do It
    3. 1.3. Where to Find the Tools
    4. 1.4. Running Tools with Alternate Credentials
    5. 1.5. A Brief Word on Windows Scripting
    6. 1.6. Where to Find More Information
  4. 2. Operating System Installation and Maintenance
    1. Introduction
    2. 2.1. Preparing to Install Windows XP
    3. 2.2. Installing from a CD or DVD
    4. 2.3. Installing from a Network Share
    5. 2.4. Installing from an Unattended Installation
    6. 2.5. Cloning Windows XP Installations
    7. 2.6. Installing from Remote Installation Services (RIS)
    8. 2.7. Troubleshooting Installation Problems
    9. 2.8. Upgrading to Windows XP
    10. 2.9. Creating a Multiboot Installation
    11. 2.10. Troubleshooting Multiboot Problems
    12. 2.11. Activating Windows XP
    13. 2.12. Viewing the Installed Service Pack and Hotfixes
    14. 2.13. Installing a Hotfix
    15. 2.14. Installing a Service Pack
    16. 2.15. Slipstreaming a Service Pack or Hotfix into a Build
    17. 2.16. Configuring Automatic Updates
    18. 2.17. Disabling the Windows Firewall After Installation
    19. 2.18. Keeping an Installation Process Worm- and Virus-Free
  5. 3. Managing Hardware and Devices
    1. Introduction
    2. 3.1. Adding Hardware
    3. 3.2. Resolving Unknown Devices
    4. 3.3. Repairing a Missing Modem
    5. 3.4. Recovering from a Bad Device Driver Update
    6. 3.5. Using the Last Known Good Configuration to Resolve Hardware Problems
    7. 3.6. Running Windows in Safe Mode
    8. 3.7. Using System Restore to Recover from a Hardware-Induced Problem
    9. 3.8. Resolving Device Conflicts
    10. 3.9. Resolving USB Bandwidth Problems
    11. 3.10. Resolving Hung USB Devices
    12. 3.11. Keeping USB Devices from Disappearing
    13. 3.12. Curing Stubborn USB Devices
    14. 3.13. Revealing Hidden Devices
    15. 3.14. Checking Drivers with the Driver Verifier Tool
    16. 3.15. Resolving Printer Timed-Out and Not Ready Problems
    17. 3.16. Troubleshooting Local Printing Problems
    18. 3.17. Printing to a USB Printer from DOS
    19. 3.18. Resolving Failed Network Printing with Internet Connection Sharing
    20. 3.19. Interpreting Device Manager Error Codes
    21. 3.20. Troubleshooting Sound Problems
    22. 3.21. Troubleshooting Video Problems
    23. 3.22. Troubleshooting Video Monitor Problems
    24. 3.23. Stopping LCD Monitor Resolution Messages
    25. 3.24. Interpreting Windows INF Files
    26. 3.25. Figuring out AUTORUN.INF Files
    27. 3.26. Correcting Parameters in BIOS
    28. 3.27. Troubleshooting CD Autorun Software Installation Problems
    29. 3.28. Troubleshooting CD-ROM and DVD-ROM Reading Problems
    30. 3.29. Resolving DVD Reading and DVD Movie Problems
    31. 3.30. Restoring Access to CD-ROMs
  6. 4. Installing, Uninstalling, and Working with Applications
    1. Introduction
    2. 4.1. Uninstalling “Unremovable” Components
    3. 4.2. Removing Unruly Applications
    4. 4.3. Removing Stubborn Uninstall Entries from Already Uninstalled Programs
    5. 4.4. Changing the Default Location for Installing Applications
    6. 4.5. Launching Applications with Keyboard Shortcuts
    7. 4.6. Customizing the Way Applications Open Using Switches and Parameters
    8. 4.7. Running Older Applications
    9. 4.8. Using the Application Compatibility Toolkit to Solve Compatibility Problems
    10. 4.9. Troubleshooting Application Compatibility
    11. 4.10. Running DOS Programs in Their Own Optimized Environments
    12. 4.11. Forcing Older Programs to Use Windows XP Common Controls
    13. 4.12. Using Keyboard Application Shortcuts
    14. 4.13. Moving a New Microsoft Application to Another Windows XP System
    15. 4.14. Remotely Installing a Microsoft Application Using Group Policy
    16. 4.15. Remotely Redeploying a Microsoft Application Using Group Policy
    17. 4.16. Remotely Uninstalling a Microsoft Application Using Group Policy
  7. 5. Customizing the Interface
    1. Introduction
    2. 5.1. Getting Rid of Undeletable Desktop Icons
    3. 5.2. Changing “Unchangeable” Desktop Icons and System Objects
    4. 5.3. Showing Your XP Version on Your Desktop
    5. 5.4. Turning Off Balloon Tips
    6. 5.5. Cleaning Your Desktop Automatically
    7. 5.6. Adding an Address Bar to the Taskbar
    8. 5.7. Adding a Shortcut to a Disk, Folder, or Internet Address to the Taskbar
    9. 5.8. Hiding Specific Icons in the Notification Area
    10. 5.9. Hiding All Icons in the Notification Area
    11. 5.10. Controlling the Start Menu’s Frequently Used Programs List
    12. 5.11. Customizing the Start Menu’s Pinned Programs List
    13. 5.12. Displaying Control Panel Applets in a Cascading Menu
    14. 5.13. Hiding and Recategorizing Control Panel Applets
    15. 5.14. Customizing Right-Click Menu Choices in Windows Explorer
    16. 5.15. Changing the Resolution of Thumbnails in Windows Explorer
    17. 5.16. Improving Laptop and LCD Resolution with ClearType
    18. 5.17. Converting to the Classic Windows Interface
    19. 5.18. Using TweakUI
    20. 5.19. Using Group Policy Editor to Alter the Interface
    21. 5.20. Saving Your Desktop Settings
    22. 5.21. Fixing the Start Shortcut Menu
    23. 5.22. Troubleshooting My Recent Documents
  8. 6. System Properties, Startup, and Shutdown
    1. Introduction
    2. 6.1. Automatically Setting the Time on a Domain-Connected PC
    3. 6.2. Automatically Setting the Time on a PC Not Connected to a Domain
    4. 6.3. Changing the System Name
    5. 6.4. Create a Multiboot Menu
    6. 6.5. Using Virtual PC to Run Multiple Operating Systems Simultaneously
    7. 6.6. Performing a Clean Boot
    8. 6.7. Shutting Down Unnecessary Programs and Services that Run on Startup
    9. 6.8. Speeding Up Shutdown Time
    10. 6.9. Changing Your Boot Screen
    11. 6.10. Personalizing Your PC’s Sounds
    12. 6.11. Creating Power Schemes
    13. 6.12. Extending Battery Life on a Laptop
    14. 6.13. Changing the Location of Your Startup Folders
    15. 6.14. Disabling Error Reporting
    16. 6.15. Creating Environment Variables
    17. 6.16. Creating a Reboot or Shutdown Shortcut
    18. 6.17. Scheduling a Reboot
    19. 6.18. Speeding Up System Startup
  9. 7. Disks, Drives, and Volumes
    1. Introduction
    2. 7.1. Viewing the Disk, Drive, and Volume Layout
    3. 7.2. Converting a Basic Disk to Dynamic
    4. 7.3. Enabling Disk Performance Statistics
    5. 7.4. Formatting a Volume
    6. 7.5. Setting the Drive Letter of a Volume
    7. 7.6. Setting the Label of a Volume
    8. 7.7. Cleaning Up a Volume
    9. 7.8. Defragmenting a Volume
    10. 7.9. Compressing a Volume
    11. 7.10. Checking a Volume for Errors
    12. 7.11. Making a Disk or Volume Read-Only
    13. 7.12. Mapping a Network Drive
    14. 7.13. Creating a Virtual Drive to Another Drive or Folder
    15. 7.14. Finding Large Files and Folders on a Volume
    16. 7.15. Enabling Disk Quotas
    17. 7.16. Limiting a User to a Specified Disk Quota
    18. 7.17. Viewing Disk Quota Usage
  10. 8. Files, Folders, and Shares
    1. Introduction
    2. 8.1. Creating and Deleting a File
    3. 8.2. Creating and Deleting a Folder
    4. 8.3. Undeleting a File
    5. 8.4. Securely Deleting a File
    6. 8.5. Viewing the Properties of a File or Folder
    7. 8.6. Creating a Shortcut
    8. 8.7. Creating a Link or Junction Point
    9. 8.8. Creating a Program Alias
    10. 8.9. Searching for Files or Folders
    11. 8.10. Copying, Moving, or Renaming a File or Folder
    12. 8.11. Comparing Files or Folders
    13. 8.12. Hiding a File or Folder
    14. 8.13. Making a File or Folder Read-Only
    15. 8.14. Compressing a File or Folder
    16. 8.15. Encrypting a File or Folder
    17. 8.16. Replacing a File That Is in Use
    18. 8.17. Taking Ownership of a File or Folder
    19. 8.18. Finding Out Who Opened or Modified a File Last
    20. 8.19. Finding Open Files
    21. 8.20. Finding the Process That Has a File Open
    22. 8.21. Viewing File Activity
    23. 8.22. Performing an Action on Several Files at Once
    24. 8.23. Creating and Deleting Shares
    25. 8.24. Viewing Shares
    26. 8.25. Restricting Access to a Share
    27. 8.26. Enabling Web Sharing
    28. 8.27. Publishing a Share in Active Directory
  11. 9. The Registry
    1. Introduction
    2. 9.1. Creating and Deleting a Key
    3. 9.2. Setting a Value
    4. 9.3. Setting Keys or Values Using Group Policy
    5. 9.4. Exporting Registry Files
    6. 9.5. Importing Registry Files
    7. 9.6. Searching the Registry
    8. 9.7. Comparing the Registry
    9. 9.8. Restricting Access to the Registry
    10. 9.9. Backing Up and Restoring the Registry
    11. 9.10. Creating a Registry Link
    12. 9.11. Monitoring Registry Activity
    13. 9.12. Viewing Processes That Have a Registry Key Open
  12. 10. Processes, Tasks, and Services
    1. Introduction
    2. 10.1. Viewing the Running Processes
    3. 10.2. Viewing the Properties of a Process
    4. 10.3. Viewing the Resources a Process Is Using
    5. 10.4. Suspending a Process
    6. 10.5. Killing a Process
    7. 10.6. Running a Task with Alternate Credentials
    8. 10.7. Running a Task on a Remote System
    9. 10.8. Running a Task Automatically via the Registry
    10. 10.9. Running a Task Automatically via Login Scripts
    11. 10.10. Running a Task via Group Policy
    12. 10.11. Viewing All Automatic Tasks
    13. 10.12. Scheduling a Task
    14. 10.13. Viewing Scheduled Tasks
    15. 10.14. Deleting a Scheduled Task
    16. 10.15. Troubleshooting Scheduled Tasks
    17. 10.16. Starting and Stopping a Service
    18. 10.17. Running Any Program or Script as a Service
    19. 10.18. Setting the Startup Type of a Service
    20. 10.19. Setting the Account and Password of a Service
    21. 10.20. Performing an Action Automatically When a Service Fails
    22. 10.21. Viewing the Antecedent and Dependent Services for a Service
    23. 10.22. Viewing the Service Load Order
    24. 10.23. Viewing the Startup History of a Service
    25. 10.24. Granting Permissions to Manage One or More Services
  13. 11. Digital Media
    1. Introduction
    2. 11.1. Ripping Digital Music
    3. 11.2. Creating a Playlist
    4. 11.3. Burning a CD
    5. 11.4. Troubleshooting CD Burning
    6. 11.5. Playing Internet Radio Stations
    7. 11.6. Protecting Your Privacy in Windows Media Player
    8. 11.7. Searching Through Digital Media Collections Using Metadata
    9. 11.8. Capturing Video to Your PC
    10. 11.9. Making Your Own DVDs
    11. 11.10. Converting Images Easily Between Graphics Formats
    12. 11.11. Processing Images for Email and the Web
  14. 12. Network Configuration
    1. Introduction
    2. 12.1. Viewing the Network Configuration
    3. 12.2. Disabling a Connection
    4. 12.3. Configuring an IP Address
    5. 12.4. Renewing or Releasing a DHCP IP Address
    6. 12.5. Configuring DNS Settings
    7. 12.6. Registering DNS Records or Flushing the DN Cache
    8. 12.7. Finding a Computer’s Active Directory Site
    9. 12.8. Managing Routes
    10. 12.9. Viewing the Open Ports and Connections
    11. 12.10. Troubleshooting Network Connectivity Problems
    12. 12.11. Configuring TCP/IP Filtering
    13. 12.12. Measuring Link Speed and Latency Between Two Hosts
    14. 12.13. Installing the IPv6 Stack
  15. 13. The Internet
    1. Introduction
    2. 13.1. Using a HOSTS File to Speed Up Web Access
    3. 13.2. Troubleshooting DNS Problems
    4. 13.3. Installing Internet Information Services (IIS)
    5. 13.4. Using the IIS MMC Snap-in to Manage Your Internet Servers
    6. 13.5. Setting Up and Configuring a Telnet Server
    7. 13.6. Use the Telnet Administrator to Manage a Telnet Server
    8. 13.7. Customizing Internet Explorer’s Logo and Titlebar
    9. 13.8. Blocking Pop Ups
    10. 13.9. Protecting Your Privacy by Handling Cookies Properly
    11. 13.10. Protecting Yourself Against Spyware
    12. 13.11. Customizing Internet Explorer Security Settings
    13. 13.12. Allowing Programs to Bypass the Windows Firewall
    14. 13.13. Tracking Firewall Activity with a Windows Firewall Log
    15. 13.14. Protecting Yourself with the ZoneAlarm Firewall
    16. 13.15. Surfing the Web Anonymously
    17. 13.16. Finding and Reading RSS Feeds
  16. 14. Wireless Networking
    1. Introduction
    2. 14.1. Installing a Wireless Adapter
    3. 14.2. Installing a Wireless Router
    4. 14.3. Connecting to Your Wireless Network
    5. 14.4. Troubleshooting WiFi Network Connections
    6. 14.5. Speeding Up a WiFi Network
    7. 14.6. Keeping Your WiFi Network Secure
    8. 14.7. Setting Up WiFi Encryption
    9. 14.8. Mixing 802.11b and 802.11g Devices
    10. 14.9. Setting Up an Ad Hoc Wireless Network
    11. 14.10. Connecting to a Hotspot
    12. 14.11. Sending Email from a Hotspot
    13. 14.12. Stopping Hotspot “Stuttering”
    14. 14.13. Protecting Yourself at Hotspots
  17. 15. User, Group, and Computer Accounts
    1. Introduction
    2. 15.1. Creating a User Account
    3. 15.2. Unlocking a User
    4. 15.3. Troubleshooting Account Lockout Problems
    5. 15.4. Viewing and Modifying the Account Lockout and Password Policies
    6. 15.5. Enabling and Disabling a User Account
    7. 15.6. Setting a User’s Password
    8. 15.7. Setting a Domain User’s Account Options
    9. 15.8. Setting a Domain User’s Profile Attributes
    10. 15.9. Finding a Domain User’s Last Logon Time
    11. 15.10. Creating a Group Account
    12. 15.11. Viewing the Members of a Group
    13. 15.12. Viewing a User’s Group Membership
    14. 15.13. Adding and Removing Members of a Group
    15. 15.14. Creating a Computer Account
    16. 15.15. Joining a Computer to a Domain
    17. 15.16. Renaming a Computer
    18. 15.17. Resetting a Computer Account
  18. 16. Event Logs and Log Files
    1. Introduction
    2. 16.1. Creating an Event
    3. 16.2. Viewing Events
    4. 16.3. Creating a New Event Log
    5. 16.4. Viewing the Size of an Event Log
    6. 16.5. Setting the Maximum Size of an Event Log
    7. 16.6. Setting the Event Log Retention Policy
    8. 16.7. Clearing the Events in an Event Log
    9. 16.8. Restricting Access to an Event Log
    10. 16.9. Searching an Event Log
    11. 16.10. Searching the Event Logs on Multiple Systems
    12. 16.11. Archiving an Event Log
    13. 16.12. Finding More Information about an Event
    14. 16.13. Triggering an Action When an Event Occurs
    15. 16.14. Troubleshooting a Corrupt Event Log
    16. 16.15. Enabling Boot Logging
    17. 16.16. Enabling User Environment Logging
    18. 16.17. Enabling NetLogon Logging
    19. 16.18. Enabling Windows Installer Logging
    20. 16.19. Enabling Windows Time Service Logging
    21. 16.20. Enabling Outlook Logging
    22. 16.21. Troubleshooting Application Failures with the Dr. Watson Logs
  19. 17. Security and Auditing
    1. Introduction
    2. 17.1. Analyzing Your Security Configuration
    3. 17.2. Enabling Auditing
    4. 17.3. Renaming the Administrator and Guest Accounts
    5. 17.4. Disabling or Removing Unused Accounts, Services, and Software
    6. 17.5. Enabling Screen Saver Locking
    7. 17.6. Disabling Storage of the LM Password Hash
    8. 17.7. Requiring Strong Passwords
    9. 17.8. Getting Notified of New Security Vulnerabilities
  20. 18. Performance Tuning
    1. Introduction
    2. 18.1. Speeding Up System Performance with the Task Manager
    3. 18.2. Tracking System Performance with the Performance Console
    4. 18.3. Using Memory More Efficiently
    5. 18.4. Balancing System Performance and Visual Effects
    6. 18.5. Optimizing Page File Size
    7. 18.6. Cleaning Up Your Hard Disk
    8. 18.7. Converting Your Hard Disk to NTFS
    9. 18.8. Disabling Startup Services and Programs
    10. 18.9. Removing Unnecessary Items from the Notification Area
    11. 18.10. Improving Startup Performance
  21. 19. Backup and Recovery
    1. Introduction
    2. 19.1. Performing a Backup
    3. 19.2. Restoring from Backup
    4. 19.3. Using Automated System Recovery
    5. 19.4. Creating an ASR Disk “After the Fact”
    6. 19.5. Using System Restore to Revive a Broken Machine
    7. 19.6. Disabling System Restore Remotely
    8. 19.7. Retrieving a Shadow Copy of a Corrupted or Deleted File
    9. 19.8. Using XCOPY for Interim Backups
    10. 19.9. Using the Recovery Console During Boot Failures
    11. 19.10. Creating a Password Reset Disk
    12. 19.11. Recovering and Decrypting an Encrypted File or Folder
    13. 19.12. Backing up and Restoring Activation Data
    14. 19.13. Auditing Backup and Restore Actions
    15. 19.14. Caring for Backup Media
  22. 20. Crashes and Errors
    1. Introduction
    2. 20.1. Using Safe Mode
    3. 20.2. Using Last Known Good Configuration
    4. 20.3. Using Boot Log to Trace Problems
    5. 20.4. Using VGA Mode to Solve Video Problems
    6. 20.5. Using Recovery Console
    7. 20.6. Repairing AUTOEXEC.NT or CONFIG.NT Errors
    8. 20.7. Fixing Cryptographic Services Error
    9. 20.8. Fixing NTOSKRNL Errors
    10. 20.9. Fixing a HAL Error
    11. 20.10. Fixing Corrupted or Missing \WINDOWS\SYSTEM32\CONFIG Errors
    12. 20.11. Fixing NTLDR or NTDETECT Not Found Errors
    13. 20.12. Configuring Error Reporting
    14. 20.13. Troubleshooting Blue Screen Error Messages
    15. 20.14. Setting Up and Using Dr. Watson to Troubleshoot Errors
  23. A. Summary of Windows XP Versions and Service Packs
    1. A.1. Introduction
  24. Index
  25. About the Authors
  26. Colophon
  27. Special Upgrade Offer
  28. Copyright