(Publisher: Macmillan Computer Publishing)
Author(s): Peter Norton
ISBN: 0672312182
Introduction
About the Authors
Part I—Preparing to Run Windows 98
Chapter 1—Reviewing Basic Installation
Preparing for Setup
Checking the Disk
Removing Policy Restrictions
Preparing Your Third-Party Network Clients
Getting Ready for Operating System Differences
Preparing for Software and Hardware Differences
Surviving the Stages of Setup
Preparing to Run Windows 98 Setup: Stage 1
Collecting Information About Your Computer: Stage 2
Copying Windows 98 Files to Your Computer: Stage 3
Restarting Your Computer: Stage 4
Setting Up Hardware and Finalizing Settings: Stage 5
Building the Emergency Startup Disk
Dealing with the New Version Conflict Manager
Dealing With the Setup Log Files
Planning for Zero Administration
Planning for Multiple Boot Getting Back Your Former Configuration
Installing from Scratch
Installing on a Formatted Hard Disk
Installing on a Blank Hard Disk
Installing New Hardware
Installing New Software
Summary
On Your Own
Chapter 2—Preparing for a Rollout
Developing a Rollout Plan
Planning for Zero Administration
Attending to Practical Issues
Summary
On Your Own
Chapter 3—Reviewing Basic User Interaction
Working with the Shell
Living with New Features
Working with Folders, Files, and Other Objects
Using the New My Documents Folder
Finding New Things
Exploring the Network
Exploring the Web
Working with Printers
Installing Printers
Using Image Color Matching
Using Imaging by Eastman Kodak
Working with Microsoft Fax and Exchange
Working with the Control Panel
Using TweakUI to Control the Interface
Using QuickRes
Adjusting the Refresh Rate
Using Hardware Panning
Using the Multiple Display Settings
Watching TV
Accessing Online Services
Working with ActiveX
Summary
Chapter 4—Choosing the Active or Classic Desktop
Choosing the Better Desktop
Selecting Classic or Active
Building the Active Desktop
Understanding the Security Risks of the Active Desktop
Understanding the Advantages of Active Desktop
Working with Internet Explorer Zones
Summary
On Your Own
Part II—Understanding the Windows 98 Architecture
Chapter 5—Looking at the Core of the Operating System
Presenting the Core Services
Examining New Hardware Support
Choosing the FAT32 File System
Supporting Multimedia
Using the New Driver Model
Working with PCMCIA Cards
Using Infrared Data Association
Implementing Power Management
Examining New Software Support
Summary
On Your Own
Chapter 6—Understanding the LAN Connection
Understanding the Basic Network Architecture
The OSI Model
The Windows 98 Version of OSI
Using Windows Sockets
Using NDIS and ATM
Implementing the Distributed Common Object Model
Controlling Networked Configurations
Summary
On Your Own
Chapter 7—Working with the WAN Connection
Reviewing Basic WAN Architecture
Examining the Windows 98 WAN Architecture
Looking at WAN Hardware
Choosing Your WAN Protocols
Exploiting a WAN Connection
Using Dial-Up Networks
Using Remote Access Services Provided by Dial-Up Networking
Using Broadcast Services
Supporting Mobile Computing
Working with an Integrated Internet Shell
Examining the Tools Suite
Using WBEM
Summary
On Your Own
Part III—Configuring Windows 98 Clients
Chapter 8—Setting Up a Microsoft Client
Understanding Microsoft Networks
Installing the Client for Microsoft Networks
Configuring the Client for Microsoft Networks
Using Microsoft Family Logon
Using Older Clients to Access Microsoft Networks
Communicating with the Apple World
Summary
On Your Own
Chapter 9—Setting Up a NetWare Client
Installing the Microsoft NetWare Client
Choosing the Best Client for Novell
Using the Client for NetWare
Using Microsoft’s Service for NetWare Directory Services
Installing the Novell NetWare Client
Configuring the Novell NetWare Client
Using Older NetWare Clients
Summary
On Your Own
Chapter 10—Dealing with Multiple-Client Hosts
Choosing to Use Multiple Clients
Dealing with Overhead
Dealing with Performance
Choosing and Binding Protocols
Understanding Your Multiple Client Architecture
Ordering the Clients for Best Security
Summary
On Your Own
Part IV—Tuning Windows 98
Chapter 11—Implementing Basic Performance Tips
Planning Hardware Acquisitions
Keeping Your Hardware in Shape
Keeping Your Operating System in Shape
Keeping Your Applications in Shape
Summary
On Your Own
Chapter 12—Learning to Use the System Monitor
Explaining the System Monitor
Installing the System Monitor
Conducting a Monitoring Session
Deciding What to Monitor
Summary
On Your Own
Chapter 13—Monitoring System Performance
Building a Monitoring Plan
Establishing a Baseline
Establishing a Routine
Applying Statistics
Monitoring an Individual System
Monitoring a Small LAN
Monitoring a Large LAN
Monitoring on a WAN
Summary
On Your Own
Chapter 14—Monitoring Network Performance
Choosing a Network Monitor
Installing the Microsoft Network Monitor
Using the Microsoft Network Monitor
Network Monitoring Strategies
Controlling User Behavior: An Example of Managing Network Traffic
Summary
On Your Own
Chapter 15—Configuring for Ease of Use
Using the New Features
Being Accessible
Using Multiple Displays
Accessing the Internet
Configuring for Accessibility
Configuring to Avoid Injury
Building an Interface for Productivity
Planning for Productivity
Building the Interface
Configuring for Ease of Administration
Summary
On Your Own
Chapter 16—Using the Scripting Host
Choosing Your Scripting Opportunities
The New World of Windows Scripting
Running Scripts
Selecting a Scripting Language
Mastering Some Preliminary Concepts
Sample Scripts
Objects
Events
Methods
Subroutines and Functions
Flow Control
Variables
Operators
WScript
WScript.Shell Object
WScript.Network
Scripting in Visual Basic
Scripting in Java
Summary
On Your Own
Part V—Securing Windows 98
Chapter 17—Securing the Desktop
Permitting the Wide Open Desktop
Securing the Desktop by Editing the Registry
Control Panel Restrictions
Shell Restrictions
System Restrictions
Additional Policy Editor Settings
Remaining Local User Settings
The Local System Settings
Securing the Desktop with System Policies
Summary
On Your Own
Chapter 18—Securing the System
Keeping Physical Security
Locking Resources
Disabling Resources
Vaccinating Against Viruses
Securing Against Errant Network Sessions
Promoting System Security
Ordering Your Network Clients
Forcing Validation by a Server
Placing Storage on Servers
Using Encryption
Summary
On Your Own
Chapter 19—Securing Shared Resources
How to Select a Security Scheme
Using Share-Level Security
Using User-Level Security
Managing Shared Resources and Servers
Managing the Browser
Managing Shares and Users
Summary
On Your Own
Chapter 20—Protecting Data
Defining a General Strategy
Defining a Backup Strategy
Using Disk Drives
Using Tapes
Backing Up to the Internet
Backing Up to an Intranet
Backing Up Your System
Using Windows Backup
Using Alternative Backup Software
Using CFGBACK, ERU, and LFNBACK
Restoring Your System
Restoring from Windows Backup
Restoring from Alternative Backup Software
Running ERD
Summary
On Your Own
Part VI—Participating on Intranets and Internets
Chapter 21—Creating a Web Server
Choosing a Web Server
Using the Personal Web Server
Using the Peer Web Server on a Windows NT Workstation
Using IIS on an NT Server
Using NetWare
Using UNIX
Setting Up an Intranet Page with Personal Web Server
Installing the Personal Web Server
Creating the Index Page
Building Links to Other Pages
Using a Web Browser as a Client
Setting Up Your Page on Another Server
Creating the Index Page with FrontPage Express
Building Links to Other Pages
Hosting Your Pages on the Personal Web Server
Summary
On Your Own
Chapter 22—Creating Web Pages and Extended Desktops
Building the Desktop Concept
Creating the Basic Page
Elaborating Your Page
Placing the Page on the Desktop
Building Excellent Desktops and Web Pages
Modifying the Built-in Files That Control the Web View of Folders
Summary
On Your Own
Chapter 23—Using VBScript and JavaScript
Where to Begin
Using VBScript and JavaScript
Creating a Simple Script
Working in Java
Elaborating Your Scripts
Elaborating in VB by Adding Flow Control
Using ActiveX Controls to Elaborate a Page
Elaborating in Java by Adding Flow Control
Using Java Applications to Elaborate a Page
Summary
On Your Own
Chapter 24—Implementing Special Web Security
Trusting the Universe
Using Protocol Isolation
Replicating from Web Server to LAN Server
Using a Firewall
Transferring Information via Sneakernet
Isolating a Web Server
Summary
On Your Own
Part VII—Troubleshooting Windows 98
Chapter 25—General Trouble-shooting Strategies
Working Through Questions from Users
Working with the Troubleshooters
Working with the Knowledge Base
Searching Other Resources
Building a Database of Solutions
Summary
On Your Own
Chapter 26—Troubleshooting the Operating System
Dealing with the Most Common Problems
Keeping the System Up to Date
Using Windows Update
Using the System File Checker
Using Windows Maintenance
Using the Performance Tab
Doing General Troubleshooting
Dealing with Registry Conflicts
Using CD-Based Tools
Using the Troubleshooting Tools
Using the System Logs
Using the Automatic Skip Driver Agent
Using System Information and Dr. Watson
Using Remote Administration Tools to Troubleshoot Windows
Working Through the Thinking Process
Summary
On Your Own
Chapter 27—Troubleshooting Applications
Using the Available Resources
Using NetMeeting for Troubleshooting Applications
Isolating Critical Problems
Fighting DLL Conflicts
Using Third-Party Tools
Working Through an Application Problem
Working Through the Thinking Process
Summary
On Your Own
Chapter 28—Troubleshooting Hardware
Working with Plug and Play
Working with Legacy Hardware
Using Microsoft System Information and Dr. Watson
Using Third-Party Tools
Working Through the Thinking Process
Summary
On Your Own
Chapter 29—Troubleshooting Network Connections
Troubleshooting the Physical Layer
Cables
Network Interface Cards
Hubs and Repeaters
Routers and Beyond
Dealing with the Data Link Layer
Working with the Transport and Network Layers
Working with the Session, Presentation, and Application Layers
Working Through a Scenario
Summary
On Your Own
Chapter 30—Investigating the Registry
Understanding the Registry Structure
Using Registry Checker and Backing Up
Editing the Registry Entries
Registering Software in the Database
Registering Hardware in the Database
Solving Problems in the Absence of Documentation
Working Through the Thinking Process
Summary
On Your Own
Appendix A
Appendix B
Appendix C
Index
No comments:
Post a Comment