rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780596006471

Windows Server Hacks

by
  • ISBN13:

    9780596006471

  • ISBN10:

    0596006470

  • Format: Paperback
  • Copyright: 2004-03-01
  • Publisher: Oreilly & Associates Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $29.99 Save up to $0.03
  • Buy New
    $29.96

    THIS IS A HARD-TO-FIND TITLE. WE ARE MAKING EVERY EFFORT TO OBTAIN THIS ITEM, BUT DO NOT GUARANTEE STOCK.

Summary

System administrators looking for quick ways to solve a wide range of problems, and the means to tune their Windows server for better performance, are going to love this book. No matter which Windows server they use-NT, IIS, 2000 or 2003-Windows Server Hacks lets them go beyond standard administration policy and traditional techniques (found in most Windows Server handbooks) by offering the knowledge and experience of veteran system administrators and hackers who learned practical methods through trial and error. The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security.

Author Biography

Mitch Tulloch is a trainer, consultant, and author living in Winnipeg, Canada. In addition to his Nutshell books for O'Reilly listed below, Mitch is also the author of the Microsoft Encyclopedia of Networking and Microsoft Encyclopedia of Security, both from Microsoft Press, and a string of best-selling books on IIS from Osborne/McGraw-Hill. If you're interested you can find out more about Mitch on his website www.mtit.com. In addition to his O'Reilly weblog, Mitch also maintains a "techblog" at mitchtulloch.blogspot.com containing random thoughts, ideas, suggestions, tips, and resources for network and system administrators.

Table of Contents

Credits vii
Foreword xvii
Preface xix
General Administration
1(61)
Use Run As to Perform Administrative Tasks
1(6)
Drag and Drop to the Run Menu
7(2)
Find and Replace Registry Keys from a Command line
9(1)
Automatically Log On After Booting
10(3)
Wait for and Optionally Terminate a Process
13(8)
Shut Down a Remote Computer
21(5)
Rename Mapped Drives
26(1)
Execute a Command on Each Computer in a Domain
27(4)
Add, Remove, or Retrieve Environment Variables
31(3)
Extend Group Policy
34(3)
Disable EFS
37(2)
Get Event Log Information
39(3)
Shortcut to Remote Assistance
42(1)
Desktop Checker
43(13)
Top Five Tools
56(2)
myITforum.com
58(4)
Active Directory
62(26)
Retrieve the List of Old Domain Computer Accounts
62(3)
Automate Creation of OU Structure
65(4)
Modify All Objects in the OU
69(1)
Delegate Control of an OU to a User
70(2)
Send OU Information in Active Directory to an HTML Page
72(3)
Display Active Directory Information
75(2)
Store and Display Contact Information in Active Directory
77(8)
Restore the Active Directory Icon in Windows XP
85(3)
User Management
88(23)
Search for Domain Users
88(3)
Manage User Accounts in Active Directory
91(2)
Get a List of Disabled Accounts
93(2)
Get User Account Information
95(2)
Check for Passwords that Never Expire
97(2)
Enumerate Group Membership to a CSV File
99(3)
Modify User Properties for All Users in a Particular OU
102(1)
Check Group Membership and Map Drives in a Logon Script
103(3)
Script Creation of a User's Home Directory and Permissions
106(2)
Prevent Ordinary Users from Creating Local Accounts
108(1)
Put a Logoff Icon on the Desktop
109(2)
Networking Services
111(27)
Manage Services on Remote Machines
111(4)
Simplify DNS Aging and Scavenging
115(5)
Troubleshoot DNS
120(3)
Manually Recreate a Damaged WINS Database
123(1)
Change WINS for All Enabled Adapters
124(2)
Ensure DHCP Server Availability
126(2)
Change a Network Adapter's IP Info
128(1)
Change from Static IP to DHCP
129(2)
Release and Renew IP Addresses
131(1)
Use netsh to Change Configuration Settings
132(1)
Remove Orphaned Network Cards
133(2)
Implement Windows 2000 Network Load Balancing
135(3)
File and Print
138(26)
Map Network Drives
138(2)
Determine Who Has A Particular File Open on the Network
140(2)
Display a Directory Tree
142(2)
Automate Printer Management
144(2)
Set the Default Printer Based on Location
146(1)
Add Printers Based on Name of Computer
147(17)
IIS
164(39)
Back Up the Metabase
164(7)
Restore the Metabase
171(2)
Map the Metabase
173(7)
Metabase Hacks
180(7)
Hide the Metabase
187(2)
IIS Administration Scripts
189(10)
Run Other Web Servers
199(2)
IISFAQ
201(2)
Deployment
203(24)
Get Started with RIS
203(5)
Customize RIS
208(6)
Tune RIS
214(2)
Customize SysPrep
216(6)
Remove Windows Components from the Command Line
222(2)
Unattended Installation of Windows Components
224(1)
Easily Create a Network Boot Disk
225(2)
Security
227(37)
Fundamentals of a Virus-Free Network
227(10)
Antivirus FAQ
237(2)
Rename the Administrator and Guest Accounts
239(2)
Get a List of Local Administrators
241(1)
Find All Computers that Are Running a Service
242(7)
Grant Administrative Access to a Domain Controller
249(2)
Secure Backups
251(5)
Find Computers with Automatic Iogon Enabled
256(1)
Security FAQ
257(3)
Microsoft Security Tools
260(4)
Patch Management
264(35)
Best Practices for Patch Management
264(7)
Beginners Guide to Enterprise Patch Management
271(4)
Patch-Management FAQ
275(2)
Enumerate Installed Hotfixes
277(2)
Apply Patches in the Correct Order
279(1)
Windows Update FAQ
279(3)
Obtain Updates via the Windows Update Catalog
282(2)
Use Automatic Updates Effectively
284(6)
Use Group Policy to Configure Automatic Updates
290(3)
Automatic Updates FAQ
293(1)
Software Update Services FAQ
294(5)
Backup and Recovery
299(50)
Collect Disaster Recovery Files
299(4)
Back Up Individual Files from the Command Line
303(3)
Back Up System State on Remote Machines
306(3)
Back Up and Restore a Certificate Authority
309(7)
Back Up EFS
316(6)
Work with Shadow Copies
322(9)
Back Up and Clear the Event Logs
331(3)
Back Up the DFS Namespace
334(2)
Recover with Automated System Recovery
336(6)
Recovery Roadmap
342(6)
Data Recovery of Last Resort
348(1)
Index 349

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program