Wednesday, January 23, 2013

Peter Norton's Maximizing Windows 98 Administration

(Publisher: Macmillan Computer Publishing)
Author(s): Peter Norton
ISBN: 0672312182

Introduction
About the Authors

Part I—Preparing to Run Windows 98

Chapter 1—Reviewing Basic Installation

Preparing for Setup

Checking the Disk
Removing Policy Restrictions
Preparing Your Third-Party Network Clients
Getting Ready for Operating System Differences
Preparing for Software and Hardware Differences

Surviving the Stages of Setup

Preparing to Run Windows 98 Setup: Stage 1
Collecting Information About Your Computer: Stage 2
Copying Windows 98 Files to Your Computer: Stage 3
Restarting Your Computer: Stage 4
Setting Up Hardware and Finalizing Settings: Stage 5
Building the Emergency Startup Disk
Dealing with the New Version Conflict Manager
Dealing With the Setup Log Files

Planning for Zero Administration
Planning for Multiple Boot Getting Back Your Former Configuration
Installing from Scratch

Installing on a Formatted Hard Disk
Installing on a Blank Hard Disk

Installing New Hardware
Installing New Software
Summary
On Your Own

Chapter 2—Preparing for a Rollout

Developing a Rollout Plan

Planning for Zero Administration
Attending to Practical Issues

Summary
On Your Own

Chapter 3—Reviewing Basic User Interaction

Working with the Shell

Living with New Features

Working with Folders, Files, and Other Objects

Using the New My Documents Folder
Finding New Things
Exploring the Network
Exploring the Web

Working with Printers

Installing Printers
Using Image Color Matching
Using Imaging by Eastman Kodak
Working with Microsoft Fax and Exchange

Working with the Control Panel

Using TweakUI to Control the Interface
Using QuickRes
Adjusting the Refresh Rate
Using Hardware Panning
Using the Multiple Display Settings

Watching TV
Accessing Online Services
Working with ActiveX
Summary
Chapter 4—Choosing the Active or Classic Desktop

Choosing the Better Desktop

Selecting Classic or Active
Building the Active Desktop
Understanding the Security Risks of the Active Desktop
Understanding the Advantages of Active Desktop

Working with Internet Explorer Zones
Summary
On Your Own


Part II—Understanding the Windows 98 Architecture

Chapter 5—Looking at the Core of the Operating System

Presenting the Core Services
Examining New Hardware Support

Choosing the FAT32 File System
Supporting Multimedia
Using the New Driver Model
Working with PCMCIA Cards
Using Infrared Data Association
Implementing Power Management

Examining New Software Support
Summary
On Your Own

Chapter 6—Understanding the LAN Connection

Understanding the Basic Network Architecture

The OSI Model
The Windows 98 Version of OSI
Using Windows Sockets
Using NDIS and ATM

Implementing the Distributed Common Object Model
Controlling Networked Configurations
Summary
On Your Own

Chapter 7—Working with the WAN Connection

Reviewing Basic WAN Architecture
Examining the Windows 98 WAN Architecture
Looking at WAN Hardware
Choosing Your WAN Protocols
Exploiting a WAN Connection

Using Dial-Up Networks
Using Remote Access Services Provided by Dial-Up Networking
Using Broadcast Services
Supporting Mobile Computing

Working with an Integrated Internet Shell

Examining the Tools Suite

Using WBEM
Summary
On Your Own


Part III—Configuring Windows 98 Clients

Chapter 8—Setting Up a Microsoft Client

Understanding Microsoft Networks
Installing the Client for Microsoft Networks
Configuring the Client for Microsoft Networks
Using Microsoft Family Logon
Using Older Clients to Access Microsoft Networks
Communicating with the Apple World
Summary
On Your Own

Chapter 9—Setting Up a NetWare Client

Installing the Microsoft NetWare Client
Choosing the Best Client for Novell

Using the Client for NetWare
Using Microsoft’s Service for NetWare Directory Services

Installing the Novell NetWare Client
Configuring the Novell NetWare Client
Using Older NetWare Clients
Summary
On Your Own

Chapter 10—Dealing with Multiple-Client Hosts

Choosing to Use Multiple Clients

Dealing with Overhead
Dealing with Performance
Choosing and Binding Protocols
Understanding Your Multiple Client Architecture

Ordering the Clients for Best Security
Summary
On Your Own


Part IV—Tuning Windows 98

Chapter 11—Implementing Basic Performance Tips

Planning Hardware Acquisitions
Keeping Your Hardware in Shape
Keeping Your Operating System in Shape
Keeping Your Applications in Shape
Summary
On Your Own

Chapter 12—Learning to Use the System Monitor

Explaining the System Monitor
Installing the System Monitor
Conducting a Monitoring Session
Deciding What to Monitor
Summary
On Your Own

Chapter 13—Monitoring System Performance

Building a Monitoring Plan

Establishing a Baseline
Establishing a Routine
Applying Statistics

Monitoring an Individual System
Monitoring a Small LAN
Monitoring a Large LAN
Monitoring on a WAN
Summary
On Your Own

Chapter 14—Monitoring Network Performance

Choosing a Network Monitor
Installing the Microsoft Network Monitor
Using the Microsoft Network Monitor
Network Monitoring Strategies
Controlling User Behavior: An Example of Managing Network Traffic
Summary
On Your Own

Chapter 15—Configuring for Ease of Use

Using the New Features

Being Accessible
Using Multiple Displays
Accessing the Internet

Configuring for Accessibility
Configuring to Avoid Injury
Building an Interface for Productivity

Planning for Productivity
Building the Interface

Configuring for Ease of Administration
Summary
On Your Own

Chapter 16—Using the Scripting Host

Choosing Your Scripting Opportunities
The New World of Windows Scripting
Running Scripts
Selecting a Scripting Language
Mastering Some Preliminary Concepts

Sample Scripts
Objects
Events
Methods
Subroutines and Functions
Flow Control
Variables
Operators
WScript
WScript.Shell Object
WScript.Network
Scripting in Visual Basic
Scripting in Java

Summary
On Your Own


Part V—Securing Windows 98

Chapter 17—Securing the Desktop

Permitting the Wide Open Desktop
Securing the Desktop by Editing the Registry

Control Panel Restrictions
Shell Restrictions
System Restrictions

Additional Policy Editor Settings

Remaining Local User Settings
The Local System Settings

Securing the Desktop with System Policies
Summary
On Your Own

Chapter 18—Securing the System

Keeping Physical Security

Locking Resources
Disabling Resources
Vaccinating Against Viruses
Securing Against Errant Network Sessions

Promoting System Security

Ordering Your Network Clients
Forcing Validation by a Server
Placing Storage on Servers
Using Encryption

Summary
On Your Own

Chapter 19—Securing Shared Resources

How to Select a Security Scheme
Using Share-Level Security
Using User-Level Security
Managing Shared Resources and Servers

Managing the Browser
Managing Shares and Users

Summary
On Your Own

Chapter 20—Protecting Data

Defining a General Strategy
Defining a Backup Strategy

Using Disk Drives
Using Tapes
Backing Up to the Internet
Backing Up to an Intranet

Backing Up Your System

Using Windows Backup
Using Alternative Backup Software
Using CFGBACK, ERU, and LFNBACK

Restoring Your System

Restoring from Windows Backup
Restoring from Alternative Backup Software
Running ERD

Summary
On Your Own


Part VI—Participating on Intranets and Internets

Chapter 21—Creating a Web Server

Choosing a Web Server

Using the Personal Web Server
Using the Peer Web Server on a Windows NT Workstation
Using IIS on an NT Server
Using NetWare
Using UNIX

Setting Up an Intranet Page with Personal Web Server

Installing the Personal Web Server
Creating the Index Page
Building Links to Other Pages
Using a Web Browser as a Client

Setting Up Your Page on Another Server

Creating the Index Page with FrontPage Express
Building Links to Other Pages
Hosting Your Pages on the Personal Web Server

Summary
On Your Own

Chapter 22—Creating Web Pages and Extended Desktops

Building the Desktop Concept
Creating the Basic Page
Elaborating Your Page
Placing the Page on the Desktop
Building Excellent Desktops and Web Pages
Modifying the Built-in Files That Control the Web View of Folders
Summary
On Your Own

Chapter 23—Using VBScript and JavaScript

Where to Begin
Using VBScript and JavaScript

Creating a Simple Script
Working in Java

Elaborating Your Scripts

Elaborating in VB by Adding Flow Control
Using ActiveX Controls to Elaborate a Page
Elaborating in Java by Adding Flow Control
Using Java Applications to Elaborate a Page

Summary
On Your Own

Chapter 24—Implementing Special Web Security

Trusting the Universe
Using Protocol Isolation
Replicating from Web Server to LAN Server
Using a Firewall
Transferring Information via Sneakernet
Isolating a Web Server
Summary
On Your Own


Part VII—Troubleshooting Windows 98

Chapter 25—General Trouble-shooting Strategies

Working Through Questions from Users
Working with the Troubleshooters
Working with the Knowledge Base
Searching Other Resources
Building a Database of Solutions
Summary
On Your Own

Chapter 26—Troubleshooting the Operating System

Dealing with the Most Common Problems
Keeping the System Up to Date

Using Windows Update
Using the System File Checker
Using Windows Maintenance
Using the Performance Tab

Doing General Troubleshooting

Dealing with Registry Conflicts
Using CD-Based Tools

Using the Troubleshooting Tools

Using the System Logs
Using the Automatic Skip Driver Agent
Using System Information and Dr. Watson
Using Remote Administration Tools to Troubleshoot Windows

Working Through the Thinking Process
Summary
On Your Own

Chapter 27—Troubleshooting Applications

Using the Available Resources

Using NetMeeting for Troubleshooting Applications

Isolating Critical Problems
Fighting DLL Conflicts
Using Third-Party Tools
Working Through an Application Problem
Working Through the Thinking Process
Summary
On Your Own

Chapter 28—Troubleshooting Hardware

Working with Plug and Play
Working with Legacy Hardware
Using Microsoft System Information and Dr. Watson
Using Third-Party Tools
Working Through the Thinking Process
Summary
On Your Own

Chapter 29—Troubleshooting Network Connections

Troubleshooting the Physical Layer

Cables
Network Interface Cards
Hubs and Repeaters
Routers and Beyond

Dealing with the Data Link Layer
Working with the Transport and Network Layers
Working with the Session, Presentation, and Application Layers
Working Through a Scenario
Summary
On Your Own

Chapter 30—Investigating the Registry

Understanding the Registry Structure
Using Registry Checker and Backing Up
Editing the Registry Entries
Registering Software in the Database
Registering Hardware in the Database
Solving Problems in the Absence of Documentation
Working Through the Thinking Process
Summary
On Your Own

Appendix A
Appendix B
Appendix C
Index

No comments:

Post a Comment