A note on the digital index A link in an index entry is displayed as the section title in which that entry appears. Because some sections have multiple index markers, it is not unusual for an entry to have several links to the same section. Clicking on any link will take you directly to the place in the text in which the marker appears.
A Ad-Aware (spyware
detector), Protect Yourself Against Spyware ad-free
surfing, Surf the Internet Ad-Free skyscraper
ads, Use Ad-Blocking Software Adult Content
Senders list (Outlook), Handling Spam in Outlook Advanced RISC Computing (ARC)
path, Editing Files Advanced Startup
Manager, creating multiple profiles, Create Multiple Startup Profiles with Advanced Startup Manager AirSnare, Stop Moochers from Stealing Your WiFi Bandwidth alerts,
performance, Performance Alerts America Online icon,
removing from desktop, Remove “Nonremovable” Desktop Icons analog CD,
writing, What to Do If Your Burned Music CDs Skip video,
converting to digital, Capture the Video Properly Animated Bitmap
Creator, Change the Internet Explorer Logo animated effects
(GUI), controlling, Customize the GUI with Tweak UI Anonymizer.com
web service, Web-Based Anonymizer anonymous
email web site, See Also anonymous proxy server list web
site, Use Internet Explorer for Anonymous Surfing anonymous web
surfing, Surf Anonymously Without a Trace ANSI codes, Slam Spam Before It Starts antennas for
wireless networks building your own for war
driving, Building a Homemade Wireless Cantenna for War-Driving external and booster
antennas, use of, Extend the Range of Your Wireless Network tips for improving
performance, Extend the Range of Your Wireless Network Anti-Phishing Working
Group, Don’t Get Reeled In by Phishers antitrust case
against Microsoft, Remove Access to Certain Microsoft Programs appearance,
customizing, Roll Your Own Themes applets Control
Panel displaying in cascading
menu, Display Control Panel Applets in a Cascading Menu hiding from
newbies, Build Customized Control Panels hiding unused, Control the Control Panel hiding with the
Registry, Hide Unused Applets with the Registry hiding with XP Pro Group Policy
Editor, Hide Unused Applets with XP Pro’s Group Policy Editor recategorizing, Recategorize Control Panel Applets running hidden
applets, Hide Unused Applets with XP Pro’s Group Policy Editor applications, Hacks 88-98 background,
reducing for better RAM use, General Advice for Making Better Use of RAM command-line
shortcuts for
launching, Launch Applications with Command-Line Shortcuts customizing
shortcuts, Customizing Shortcuts with Switches and Parameters using with keyboard
shortcuts for
running, Create Keyboard Shortcuts for Running Applications forcing older
programs to use XP common
controls, Force Older Programs to Use XP Common Controls hidden fields in
Word, security
risks, Stop Hidden Fields in Word from Stealing Your Files and Information memory-hogging,
identifying with Task Manager, Make Better Use of Your Memory with the Task Manager opening and
creating Microsoft documents without
Office, Open and Create Microsoft Documents Without Microsoft Office OpenOffice.org
office
suite, See Also programs, Hacks 88-98 sharing
with Messenger, Share Applications with Messenger uninstalling, Remove Unruly Applications and Uninstall Entries cleaning
up after, Remove Unruly Applications and Uninstall Entries removing
access to certain Microsoft
programs, Remove Access to Certain Microsoft Programs removing
uninstall entries from uninstalled
programs, Remove Stubborn Uninstall Entries from Already Uninstalled Programs XP-incompatible,
forcing to
run, Force XP-Incompatible Applications to Run Application Compatibility
Toolkit,
using, Use the Application Compatibility Toolkit Compatibility Wizard,
using, Use the Compatibility Wizard ARC (Advanced RISC
Computing) path, Editing Files archive
files, Map Out a Backup Plan Web, single file
(.mht), Reading Web Pages Offline Using IE arrays of
strings, Using Keys and Values Ask Jeeves
toolbar, Google Toolbar ASR
(Automated System
Recovery), The Backup Utilities in Windows XP Attachment Options add-in
(Outlook), Force Outlook to Let You Open Blocked File Attachments attachments to
email (blocked), opening in Outlook/Outlook
Express, Open Blocked File Attachments in Outlook and Outlook Express forcing Outlook Express to open blocked
file attachments, Force Outlook Express to Let You Open Blocked File Attachments forcing Outlook to open blocked file
attachments, Force Outlook to Let You Open Blocked File Attachments AutoEndTasks key
(Registry), Automatically Close Programs at Shutdown autologon,
enabling, Create a Speedy, Stripped-Down Interface with Tweak UI Automated
System Recovery (ASR), The Backup Utilities in Windows XP NTBackup installed on XP Home
machine, XP Home, NTBackup, and ASR Axialis AX-Cursors
program, Make Your Own Cursors and Icons B Back Orifice Trojan,
use of
ports, Close Down Open Ports and Block Protocols background
images, customizing in VDM, Extend Your Screen Real Estate with Virtual Desktops background
services and applications,
reducing, General Advice for Making Better Use of RAM Backup and Restore
utility, The Backup Utilities in Windows XP ASR, XP Home
and, The Backup Utilities in Windows XP Backup Plus
program, Get a Better Backup Program Backup Utility,
installing manually in XP Home, The Backup Utilities in Windows XP backups building
better strategy for, Build a Better Backup Strategy backup utilities in Windows
XP, The Backup Utilities in Windows XP getting a better backup
program, Get a Better Backup Program mapping out backup
plan, Map Out a Backup Plan system organization that
aids backup process, System Organization Aids the Backup Process cookies
(from IE), Export, Import, or Back Up Your Cookies Outlook
and Outlook Express data files, Back Up and Restore Outlook and Outlook Express Datafiles add-in software,
using, Backing Up Outlook and Outlook Express Using Add-In Software manually backing up
Outlook, Backing Up Outlook Manually manually backing up Outlook
Express, Backing Up Outlook Express Manually Registry, Safely Edit the Registry Using .reg Files , Better Registry Backups using
Backup utility, Better Registry Backups restoring, Restoring a backup balloon tips, changing for system
objects, Rename and Change “Unchangeable” Desktop Icons and System Objects batch conversions of image
formats, IrfanView batch file,
creating, Generate Folder and File Listings for Printing or Editing beeps (system),
turning off, Turn Off System Beeps beggarware, Stop Moochers from Stealing Your WiFi Bandwidth binary NOT operator
(&!), Searching Using Operators and Expressions binary values (Registry), Using Keys and Values , Adding and Deleting Keys and Values Blocked Senders List (Outlook
Express), Handling Spam in Outlook Express Bluejacking and Bluesnarfing
security issues, Securing Your Bluetooth Connection Bluetooth (see wireless,
Bluetooth) Boolean
operators in Indexing Service
queries, Searching Using Operators and Expressions booster antennas for
wireless networks, Extend the Range of Your Wireless Network boot BootXP
program, Build a Startup Screen from Any Graphic creating a boot
menu, Create a Startup Menu Even If You Have Only One Operating System defragmenting, Perform a Boot Defragment editing
boot.ini, Editing Files files,
defragmenting, Defragment Boot Files fixing, Fixing the MBR, Boot Sector, or Boot Menu multiboot
startup options, Customize Multiboot Startup Options Safe
Mode, Customize Multiboot Startup Options screen,
changing, Change the Picture That Appears on the XP Startup Screen boot menu,
fixing, Fixing the MBR, Boot Sector, or Boot Menu boot screen,
changing, Change the Picture That Appears on the XP Startup Screen building startup screen from
graphics, Build a Startup Screen from Any Graphic choosing from multiple
screens, Choose from Multiple Splash Screens on Startup boot sector, fixing, Fixing the MBR, Boot Sector, or Boot Menu boot.ini
file, Customize Multiboot Startup Options editing, Editing Files [boot loader]
section, Editing Files Briefcase, Use the Briefcase for Mobile File Transfers files, information
about, A Closer Look at the Briefcase mobile
file transfers
with, Use the Briefcase for Mobile File Transfers browsers Firefox (see Firefox) Internet
Explorer, Examine and Delete Cookies Manually Mozilla (see Mozilla
browser) Navigator
and Mozilla, deleting
cookies, Examine and Delete Cookies Manually Opera, Opera Brushed Panther web
site, Changing the Appearance of Windows and Menus buffers (mouse and
keyboard), changing size of, Change the Size of Your Mouse and Keyboard Buffer Bugnosis
program, Watch Out for Web Bugs buttons customizing
appearance of, Roll Your Own Themes user
interfaces, Extend Your Screen Real Estate with Virtual Desktops C cable modems, resetting to repair TCP/IP
connection, Repair a Broken TCP/IP Connection cables and
connectors for direct network
connections, Remember the Boy Scout Creed: “Be Prepared” cache
memory, removing DLLs from, General Advice for Making Better Use of RAM CacheRight
program, Use Caching for Better Performance caching DNS
cache settings on XP, adjusting, Adjust XP’s DNS Cache Settings improving
web site performance
with, Use Caching for Better Performance calendar
backup file (Outlook), Backing Up Outlook Manually cantenna (wireless), building, online
directions, Building a Homemade Wireless Cantenna for War-Driving Caps Lock,
automatically turning on at
startup, Automatically Turn On Num Lock, Scroll Lock,
and Caps Lock cd command to list all files
and subfolders on all folders on all local
disks, Hacking the Hack CDs burning, Problem-Free CD Burning digital
music files that skip and pop, What to Do If Your Digital Music Files Skip and Pop skipping
in burned music CDs, What to Do If Your Burned Music CDs Skip storing backups
on, I want my CDs! cipher
command, Encrypting and Decrypting from the Command Line class definitions of
unique
objects, The Five Logical Registry Hives class ID (CLSID)
for desktop objects, The Registry to the Rescue removing icons
with, Remove “Nonremovable” Desktop Icons Classic Internet Search
Companion, Mastering the Search Companion CleanUp! disk-cleanup
tool, Download a Better Disk-Cleanup Tool clear GIFs (web
bugs), Kill Spyware and Web Bugs ClearType, Use ClearType for Better Laptop and LCD Resolution fonts displayed
before logon, Hacking the Hack clients FTP, Empower Windows Explorer with PowerDesk Pro remote, Control Another PC with Remote Access IP
addresses and domain
names, Configuring the Windows XP Remote Server setting
up, Setting Up the Remote Client collaboration with
a whiteboard, Collaborate Long-Distance with the Whiteboard colors background,
customizing for
desktop, Roll Your Own Themes changing
settings for Java
applets, Change Your Display Settings reducing
for better RAM use, General Advice for Making Better Use of RAM comma-separated
(.cvs) log file, viewing in
spreadsheet, Viewing Performance Logs command
line 4NT
program, Put a Command-Line Prompt on Your Desktop Command
Prompt Explorer Bar, See Also disk defragmenter, running
from, Run the Disk Defragmenter from the Command Line shortcuts for customized Windows Explorer
views, Control Windows Explorer with Command-Line Shortcuts desktop
shortcuts, Create Desktop Shortcuts for Explorer shortcuts for launching
applications, Launch Applications with Command-Line Shortcuts customizing with switches and
parameters, Customizing Shortcuts with Switches and Parameters command prompt,
opening from Explorer context menu, Open the Command Prompt from the Right-Click Menu comments, adding to HOSTS
file, Speed Up Web Access with a HOSTS File Commit Charge
higher than Physical Memory
available, Make Better Use of Your Memory with the Task Manager company name
registered as system owner, changing, Change the Names of the Registered User and Company Compare Folders feature
(PowerDesk), Empower Windows Explorer with PowerDesk Pro compatibility problems
with earlier Windows programs, Force XP-Incompatible Applications to Run Application Compatibility Toolkit,
using, Use the Application Compatibility Toolkit Compatibility Wizard,
using, Use the Compatibility Wizard components
(XP) hiding to
prevent removal, Hide Components You Don’t Want to Be Uninstalled removing, Remove “Uninstallable” XP Utilities compression,
file NTFS, Get More Hard-Disk Space by Using NTFS Compression converting other
filesystems to
NTFS, Convert Your Hard Disk to NTFS converting
previous filesystems
to, Convert Your Hard Disk to NTFS disk space saved
by, Checking How Much Disk Space NTFS Compression Saves system or .log
files, performance
and, Get More Hard-Disk Space by Using NTFS Compression ZIP files
versus, When to Use Zip Files and When to Use NTFS Compression Connect on
Demand setting (residential
gateways), Optimize Your Home Router connecting to web
sites, problems with, Fix DNS Problems connection
settings for IE, customizing, Connection connectors, for
wireless antenna, Building a Homemade Wireless Cantenna for War-Driving contacts Outlook
Express, in Windows Address Book, Backing Up Outlook Express Manually Outlook,
backup files for, Backing Up Outlook Manually CONTAINS
operator (Indexing
Service), Searching Using Operators and Expressions content ratings,
customizing for IE, Security context
menus shortcut
menus, A Power User’s Hidden Weapon: Improve the Context Menu Windows Explorer,
improving command prompt,
opening, Open the Command Prompt from the Right-Click Menu copy/move to folder
options, Add Copy To Folder and Move To Folder Context Menu Options Open With
option, Clean Up the Open With Option Send To
option, Add and Remove Destinations for the Send To Option Control
Panel building
customized, Build Customized Control Panels hidden applets,
running, Hide Unused Applets with XP Pro’s Group Policy Editor Cookie Manager, Opt Out of Cookie-Based Ad Networks Cookie Pal
utility, Get a Third-Party Cookie Manager cookies, Take a Bite Out of Cookies examining and
deleting manually, Examine and Delete Cookies Manually exporting, importing
or backing up, Export, Import, or Back Up Your Cookies IE cookie handling,
customizing, Customizing IE Cookie-Handling IE privacy settings,
effects of, Take a Bite Out of Cookies opting out of
cookie-based ad
networks, Opt Out of Cookie-Based Ad Networks related
terminology, understanding, Take a Bite Out of Cookies session, Customizing IE Cookie-Handling third-party cookie
managers, Get a Third-Party Cookie Manager Windows
Media Player, privacy problems
with, Fix Windows Media Player’s Privacy Problems Copernic Agent
Basic, See Also Copy To Folder
option (Explorer context
menu), Add Copy To Folder and Move To Folder Context Menu Options copying files from local
drives to removable media in Recovery
Console, Hacking the Hack copyright laws, themes
and, Get XP Themes Online cordless phones,
interference with wireless
equipment, Extend the Range of Your Wireless Network CPU, monitoring
use, Monitor CPU Use crackers, Protect Your Computer with the New Windows Firewall Create Shortcut
Wizard, Create One-Click
Shutdown and Reboot Shortcuts credential
agencies, designating as
trustworthy, Security cryptography Encrypting
File System, Hide Folders and Files with the Encrypting File System PowerDesk
utility, Empower Windows Explorer with PowerDesk Pro WEP
encryption, Go War-Driving for WiFi Access cursors creating your
own, Make Your Own Cursors and Icons Axialix AX-Cursors program (creating
from scratch), Make Your Own Cursors and Icons CursorXP Free
program, Make Your Own Cursors and Icons CursorXP Plus
program, Make Your Own Cursors and Icons Microangelo
program, Make Your Own Cursors and Icons free, download
site, See Also D data files (current), backing
up, Map Out a Backup Plan data types,
Registry, Using Keys and Values dates and
times expressions in Indexing Service
queries, Searching Using Operators and Expressions Maximum Idle
Time setting (residential
gateways), Optimize Your Home Router NTFS date and time stamps, updates
of, Hacking the Hack timeouts for programs,
changing, Change the Amount of Time Before Programs Time Out .dbx file extensions
(mail messages in Outlook Express), Backing Up Outlook Express Manually decrypting files
and folders with EFS, Decrypting Files and Folders defragmenting, Speed Up Your Hard Disk by Improving Defragging boot, Perform a Boot Defragment Diskeeper, Get a Better Disk Defragmenter Desktop.ini
files, Customize Folder Icons and Balloon Text desktops command-line
prompt on, Put a Command-Line Prompt on Your Desktop control
for current users by Registry
hive, The Five Logical Registry Hives customizing
background, color and system
icons, Roll Your Own Themes deleting unnecessary
icons, Create a Speedy, Stripped-Down Interface with Tweak UI hiding icons that
can’t be
deleted, Customize the GUI with Tweak UI reducing
icon numbers to conserve RAM, General Advice for Making Better Use of RAM shortcuts,
Explorer custom views, Create Desktop Shortcuts for Explorer , Using Globally Unique Identifiers with Command-Line Switches showing
Windows version
on, Customize the GUI with Tweak UI Virtual
Desktop Manager, Extend Your Screen Real Estate with Virtual Desktops activating the
toolbar, Extend Your Screen Real Estate with Virtual Desktops customizing, Extend Your Screen Real Estate with Virtual Desktops switching between
desktops, Extend Your Screen Real Estate with Virtual Desktops Destroy File feature
(PowerDesk), Empower Windows Explorer with PowerDesk Pro Device
Manager, Troubleshoot Hardware by Decoding Device Manager Error Messages error messages,
decoding, Troubleshoot Hardware by Decoding Device Manager Error Messages error codes, messages, and
potential
solutions, Troubleshoot Hardware by Decoding Device Manager Error Messages hidden hardware,
discovering, Uncover Hidden Hardware with the Device Manager DHCP (Dynamic Host Configuration
Protocol), Enable Specific Internet Services: Port Forwarding IP address assigned
by,
renewing, Renew Your DHCP-Assigned IP Address diagnostic
services, bypassing ICF
firewall, Allow Diagnostic Services to Bypass the Firewall dictionary
attacks, Slam That Spam digital rights management
(DRM), Convert from Apple iTunes Format digital video
cameras, Capturing Video with a Digital Video Camera direct cable
connections for networking, Networking on the Cheap: Set Up a Direct Cable Connection Ethernet cable,
using, Cheap Networking with an Ethernet Cable serial or parallel
cable, using, Cheap Networking with a Serial or Parallel Cable directories files, Alternative Method for Users of Outlook XP printing
file listings in Outlook
XP, Alternative Method for Users of Outlook XP Disconnect Network
Drive option (Explorer Tools
menu), Remove Context Menu Items from Explorer Disk Cleanup
tool, Create Separate Hard-Disk Cleanup Profiles disk
defragmentation, improving failure of disk
defragmenter, What to Do If the Disk Defragmenter Won’t Defragment Your Drive getting a better disk
defragmenter, Get a Better Disk Defragmenter running disk
defragmenter from command
line, Run the Disk Defragmenter from the Command Line disk
space Disk Cleanup
warning,
disabling, Disable the Disk Cleanup Warning DVD burning,
requirements for, Tips for Making Your Own DVDs saved by NTFS
compression, Checking How Much Disk Space NTFS Compression Saves Display Properties dialog
box, Roll Your Own Themes display settings,
changing to run applets, Change Your Display Settings DLLs, removing
from cache memory, General Advice for Making Better Use of RAM DNS getting
IP address of server with
netsh, Use netsh to Troubleshoot Network and Internet Connections settings,
customizing for faster Internet access HOSTS
file, Speed Up Web Access with a HOSTS File domain names for
remote
clients, Configuring the Windows XP Remote Server DOS applications,
memory use and, General Advice for Making Better Use of RAM executing commands with
MCL command prompt, Put a Command-Line Prompt on Your Desktop double-clicking
on .reg files, Protect the Registry by Changing the Default Action for Double-Clicking a .reg File DoubleClick online advertising
network, opting out of, Opt Out of Cookie-Based Ad Networks DoubleClickSpeed
value
(Registry), Using Keys and Values Download Accelerator Plus (DAP)
program, Speed Up File Downloads , Speed Up File Downloads drawings,
sharing with
whiteboard, Collaborate Long-Distance with the Whiteboard drive-by
downloads, Protect Yourself Against Spyware DSL Internet
access, hub/router settings for, Special Hub/Router Settings for DSL Access resetting
modems to repair TCP/IP connection, Repair a Broken TCP/IP Connection DVDs making
your own, Tips for Making Your Own DVDs storing
backups on, I want my CDs! DWORD values (Registry), Using Keys and Values , Adding and Deleting Keys and Values examples in subkey section
listing, Safely Edit the Registry Using .reg Files dynamic DNS
service, Configuring the Windows XP Remote Server dynamic IP
addresses DHCP, Safely Edit the Registry Using .reg Files mapping to hostnames for
servers, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address E EarthLink, anti-phishing
toolbar, What You Can Do About It editing the
Registry .reg files, using for
safety, Safely Edit the Registry Using .reg Files Registry Editor,
using, Launching the Registry Editor tracking changes with
RegSpy, Track and Restore Registry Changes with RegSpy EFS, Hide Folders and Files with the Encrypting File System email, Secrets of Web Site Hosting with Internet Information Services (IIS) , Hacks 59-64 , Hacks 59-64 alternatives to
Outlook/Outlook Express, Fire Outlook and Outlook Express Eudora, Check Your Mood with Eudora Pegasus, Move Forward to the Past with Pegasus anonymous, See Also backing up and
restoring Outlook/Outlook Express data
files, Back Up and Restore Outlook and Outlook Express Datafiles add-in software,
using, Backing Up Outlook Express Manually , Backing Up Outlook and Outlook Express Using Add-In Software manually backing up
Outlook, Backing Up Outlook Manually blocked attachments,
opening in Outlook/Outlook
Express, Open Blocked File Attachments in Outlook and Outlook Express forcing
Outlook Express to open blocked file
attachments, Force Outlook Express to Let You Open Blocked File Attachments forcing
Outlook to open blocked file
attachments, Force Outlook to Let You Open Blocked File Attachments getting
IP address of mail server with netsh, Use netsh to Troubleshoot Network and Internet Connections Gmail (see Gmail) phishing
attacks, Don’t Get Reeled In by Phishers SMTP
service
for, Secrets of Web Site Hosting with Internet Information Services (IIS) spam (see spam) Thunderbird, Use Open Source Thunderbird web-based, retrieving
with your email
software, Retrieve Web-Based Email with Your Email Software Hotmail mail, getting
with Hotmail
Popper, Getting Hotmail Mail with Hotmail Popper Yahoo! mail, getting
with YahooPOPs!, Getting Yahoo! Mail with YahooPOPs! email addresses,
obfuscating for harvesting bots, Slam Spam Before It Starts EMS Free Surfer
Companion, Download Software to Stop Pop Ups in IE EMS Free
Surfer mk II, Download Software to Stop Pop Ups in IE Encrypt/Decrypt
feature
(PowerDesk), Empower Windows Explorer with PowerDesk Pro Encrypting File System
(EFS), Hide Folders and Files with the Encrypting File System encrypted files,
sharing, Letting Others Use Your Encrypted Files encrypting files and
folders, Encrypting Files and Folders decrypting files and
folders, Decrypting Files and Folders encrypting/decrypting from command
line, Encrypting and Decrypting from the Command Line Entbloess 2 web
site, Switching between windows and applications environment
variables (system), Uncover Hidden Hardware with the Device Manager EQUALS operator
(Indexing Service), Searching Using Operators and Expressions error
messages Device Manager,
decoding codes, messages, and potential
solutions, Troubleshoot Hardware by Decoding Device Manager Error Messages disabling display at
startup, Stop Error Messages from Displaying on Startup ESP
(Eudora Sharing
Protocol), Check Your Mood with Eudora Ethernet cards
for direct cable connection networks, Cheap Networking with an Ethernet Cable null
Ethernet cables, Remember the Boy Scout Creed: “Be Prepared” , Remember the Boy Scout Creed: “Be Prepared” cheap networking
with, Cheap Networking with an Ethernet Cable PPPoE (Point-to-Point Protocol over Ethernet), Special Hub/Router Settings for DSL Access Eudora, Check Your Mood with Eudora file
sharing through ESP, Check Your Mood with Eudora free, ad-supported
version, Check Your Mood with Eudora HTML display,
turning off in emails, Slam That Spam MoodWatch
feature, Check Your Mood with Eudora sending voice messages
via email, Check Your Mood with Eudora Exact Audio Copy
program, What to Do If Long Selections Are Interrupted by Skips Exchange Server (Outlook
on), backing up messages, contacts, and
calendar, Backing Up Outlook Manually expanded string value
(Registry), Using Keys and Values , Adding and Deleting Keys and Values explicit
consent versus implicit consent (for use of personal
information), Take a Bite Out of Cookies expressions in Indexing Service
queries, Searching Using Operators and Expressions external
antennas for wireless
PCs, Extend the Range of Your Wireless Network F fades (XP
GUI), controlling, Customize the GUI with Tweak UI Fast User Switching, offline files
and, Take Your Work on the Go with Offline Files and the Briefcase fastdetect switch
(boot.ini), Editing Files FAT32 filesystem converting to
NTFS, Convert Your Hard Disk to NTFS NTFS
compression and, Get More Hard-Disk Space by Using NTFS Compression Favorites, saving
offline with links, Reading Web Pages Offline Using IE FBI’s Internet Fraud
Complaint Center, Hacking the Hack Federal Trade
Commission, Hacking the Hack file
attachments (blocked) in Outlook/Outlook
Express, Open Blocked File Attachments in Outlook and Outlook Express file extensions blocked by
Outlook, Force Outlook to Let You Open Blocked File Attachments file downloads,
speeding
up, Speed Up File Downloads file encryption key
(FEK), Hide Folders and Files with the Encrypting File System File Finder feature
(PowerDesk), Empower Windows Explorer with PowerDesk Pro file
sharing enabling through ICF
firewall, Fix the Windows Firewall’s Disabling of File Sharing Eudora Sharing Protocol
(ESP), Check Your Mood with Eudora files backing
up, Map Out a Backup Plan encrypting
with
EFS, Hide Folders and Files with the Encrypting File System generating
listings with Windows
Explorer, Generate Folder and File Listings for Printing or Editing left
behind by uninstalled
applications, Remove Unruly Applications and Uninstall Entries listing
all on local
disk, Hacking the Hack mobile
file transfers with Briefcase, Use the Briefcase for Mobile File Transfers offline,
synchronizing to/from LAN and your laptop, Take Your Work on the Go with Offline Files and the Briefcase Open
With option (Windows
Explorer), Clean Up the Open With Option printing
listings in Outlook
XP, Alternative Method for Users of Outlook XP Registry information
about, The Five Logical Registry Hives viewing with
IrfanView, IrfanView filesystems converting
others to NTFS, Convert Your Hard Disk to NTFS Encrypting
File System, Hide Folders and Files with the Encrypting File System NTFS, Letting Others Use Your Encrypted Files filtering Eudora
capabilities for, Check Your Mood with Eudora in
Outlook spam
handling, Handling Spam in Outlook noise
filter for Indexing Service searches, Editing the Indexing Service’s “Noise” Filter Firefox anti-phishing
add-in, What You Can Do About It download, Firefox firewalls allowing
programs to bypass, Allow Programs to Bypass the Firewall crackers, Protect Your Computer with the New Windows Firewall email
problems
with, Watch Out for Problems with Email and the Windows Firewall Internet Connection
Firewall (ICF), Protect Your Computer with the New Windows Firewall logging
activity, Track Firewall Activity with a Windows Firewall Log no-IP.com client,
problems connecting, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address remote access
connections
and, Configuring the Windows XP Remote Server script
kiddies, Protect Your Computer with the New Windows Firewall Trojans, Protect Your Computer with the New Windows Firewall unsolicited
inbound traffic, allowing through, Punch an Escape Hole Through Your Firewall Windows
XP SP2, Protect Your Computer with the New Windows Firewall ZoneAlarm, Protect Yourself Against Spyware , ZoneAlarm: The World’s Best Free Firewall configuring
to block Trojans, Configuring ZoneAlarm to Block Trojans versions
of, ZoneAlarm: The World’s Best Free Firewall FireWire ports, importing
video, Capture the Video Properly first-party
cookies customizing IE handling
of, Customizing IE Cookie-Handling flushing your DNS
cache, Adjust XP’s DNS Cache Settings , Fix DNS Problems folders, Alternative Method for Users of Outlook XP Compare
Folders feature
(PowerDesk), Empower Windows Explorer with PowerDesk Pro Copy
to Folder and Move to Folder (Explorer context
menu), Add Copy To Folder and Move To Folder Context Menu Options encrypting
with
EFS, Hide Folders and Files with the Encrypting File System generating
listings with Windows
Explorer, Generate Folder and File Listings for Printing or Editing hiding
with EFS behavior of encrypted
folders, Hide Folders and Files with the Encrypting File System decrypting
folders, Decrypting Files and Folders encrypting
folders, Encrypting Files and Folders encrypting/decrypting from command
line, Encrypting and Decrypting from the Command Line sharing encrypted
files, Letting Others Use Your Encrypted Files left
behind by uninstalled applications, Remove Unruly Applications and Uninstall Entries listing
all on local disk, Hacking the Hack offline files,
synchronizing to/from LAN to your
laptop, Take Your Work on the Go with Offline Files and the Briefcase frames per
second, Best Settings for Recording Video Free Networks.org
web site, Go War-Driving for WiFi Access FreeNets, Go War-Driving for WiFi Access freetext expression
search (Indexing Service), Using the Indexing Service’s Query Language Fresh Diagnose
diagnostic tool, See Also FTP client
(PowerDesk), Empower Windows Explorer with PowerDesk Pro FTP site, hosting with
IIS, Secrets of Web Site Hosting with Internet Information Services (IIS) G G5 boot skin web site, Get a Mac-Like Boot Screen Gaim instant messenger
program, See Also GAPIS program
(Google searches from your desktop), Google Toolbar gateways,
residential, Optimize Your Home Router Genie-Soft, for
backups of Outlook/Outlook Express, Backing Up Outlook and Outlook Express Using Add-In Software ghosted
hardware devices, Uncover Hidden Hardware with the Device Manager displaying with Device
Manager, Uncover Hidden Hardware with the Device Manager Gibson Research
Corporation, Test Your Security with Shields UP! web page listing known
spyware, Protect Yourself Against Spyware Globally Unique Identifiers
(GUIDs) for Windows Media
Player, Fix Windows Media Player’s Privacy Problems Gmail, Gmail Hacks Google, Better Internet Searching from Your Desktop image
search, Make Your Own Cursors and Icons searches directly from
your desktop (not your
browser), Google Toolbar Google
Toolbar searching current site instead of entire
Web, Google Toolbar targeted searches of a particular
site, Google Toolbar graphical user
interfaces (GUIs), Hacks 8-20 graphics, Hacks 99-107 converting
to startup
screen, Build a Startup Screen from Any Graphic cursor, importing
with AX-Cursors, Make Your Own Cursors and Icons Google image
search, Make Your Own Cursors and Icons image
conversion, Image Conversion in a Pinch ImageConverter.EXE, Image Converter .EXE IrfanView
program, IrfanView Paint Shop
Pro, See Also Group Policy
Editor, Hide Unused Applets with XP Pro’s Group Policy Editor customizing IE
with connection
settings, Connection IE settings you can
modify, Hack Internet Explorer with the Group Policy Editor IE user
interface, Browser User Interface programs
setting, Programs security
settings, Security URLs, URLs Start Menu and Taskbar,
customizing, Hack the Start Menu and Taskbar guest
computer, Cheap Networking with a Serial or Parallel Cable configuring, Cheap Networking with a Serial or Parallel Cable GUIDs, Using Globally Unique Identifiers with Command-Line Switches GUIs
(graphical user interfaces), Hacks 8-20 H hard disk
defragmentation, Speed Up Your Hard Disk by Improving Defragging hardware, Hacks 115-120 hidden,
discovering with Device
Manager, Uncover Hidden Hardware with the Device Manager ghosted or
nonpresent devices, Uncover Hidden Hardware with the Device Manager hidden devices, forcing
display
of, Uncover Hidden Hardware with the Device Manager occasional showing of
ghosted devices, Hacking the Hack network,
rated speed versus actual performance, Check WiFi Network Performance with Qcheck to Help Improve Throughput networking
with direct cable
connection, Networking on the Cheap: Set Up a Direct Cable Connection cables and
connectors, Remember the Boy Scout Creed: “Be Prepared” Ethernet
cable, Cheap Networking with an Ethernet Cable serial or parallel
cable, Cheap Networking with a Serial or Parallel Cable Registry
information about, The Five Logical Registry Hives remapping the
keyboard, Remap Your Keyboard screen resolution,
improving, Use ClearType for Better Laptop and LCD Resolution troubleshooting
with Device Manager error
messages, Troubleshoot Hardware by Decoding Device Manager Error Messages codes,
messages, and potential
solutions, Troubleshoot Hardware by Decoding Device Manager Error Messages header information
for email, viewing in Outlook/Outlook Express, Viewing Mail Header Information in Outlook and Outlook Express hibernation
file, defragmenting, Defragment Boot Files hidden fields in
Word, security risks of, Stop Hidden Fields in Word from Stealing Your Files and Information Hidden File Detector
utility, Stop Hidden Fields in Word from Stealing Your Files and Information hives,
Registry, The Five Logical Registry Hives defragmenting, Defragment Boot Files HKEY_CLASSES_ROOT, The Five Logical Registry Hives HKEY_CURRENT_CONFIG, The Five Logical Registry Hives HKEY_CURRENT_USER, The Five Logical Registry Hives , The Five Logical Registry Hives HKEY_LOCAL_MACHINE, The Five Logical Registry Hives , The Five Logical Registry Hives HKEY_USERS, The Five Logical Registry Hives Hollywood
DV-Bridge, Capture the Video Properly home
networks, Extend the Range of Your Wireless Network router, resetting to repair TCP/IP
connection, Repair a Broken TCP/IP Connection wireless, setting
up, Extend the Range of Your Wireless Network host
computer, Cheap Networking with a Serial or Parallel Cable hosting
web site with IIS caching, improving performance
with, Use Caching for Better Performance installing
IIS, Secrets of Web Site Hosting with Internet Information Services (IIS) MMC snap-in for site
administration, Secrets of Web Site Hosting with Internet Information Services (IIS) redirecting incoming incorrect
URLs, Redirect Incorrect Incoming URLs redirecting your site to a
URL, Change the Directory and Do a Redirect hostnames, mapping
to dynamic IP
address, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address hosts, Cheap Networking with a Serial or Parallel Cable network name
of, Cheap Networking with a Serial or Parallel Cable user
permissions, Cheap Networking with a Serial or Parallel Cable HOSTS
file, Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use a HOSTS File to Kill Ads , Use Ad-Blocking Software comments,
adding, Speed Up Web Access with a HOSTS File editing, Use a HOSTS File to Kill Ads , Speed Up Web Access with a HOSTS File incorrect or outdated
listings, Fix DNS Problems updating to
prevent loss of access to sites, Speed Up Web Access with a HOSTS File web
site, Use a HOSTS File to Kill Ads hotspot
fixes, Solve Hotspot Woes HTML email
addresses, writing in HTML characters, Slam Spam Before It Starts special characters,
online listing of, Slam Spam Before It Starts turning
off display in emails to prevent spam
attacks, Slam That Spam hubs/routers for
home
networks, Optimize Your Home Router hung programs,
changing time for XP reporting, Change the Amount of Time Before Programs Time Out I ICMP
(Internet Control Message Protocol), allowing traffic through ICF
firewall, Allow Diagnostic Services to Bypass the Firewall icons creating
your own Microangelo
program, Make Your Own Cursors and Icons deleting
from desktop, Create a Speedy, Stripped-Down Interface with Tweak UI free, download
site, See Also Notification
Area, hiding all
in, Hide All Icons in the Notification Area system
objects, changing on desktop, Change the Desktop Icons of System Objects identity theft, See Also IIS, Secrets of Web Site Hosting with Internet Information Services (IIS) IISFAQ web site, See Also images converting, Image Conversion in a Pinch ImageConverter.EXE,
using, Image Converter .EXE PowerDesk,
using, Empower Windows Explorer with PowerDesk Pro Google
searches for, Make Your Own Cursors and Icons sharing
with
whiteboard, Collaborate Long-Distance with the Whiteboard implicit consent versus explicit consent (for use
of personal
information), Take a Bite Out of Cookies importing
cookies from Internet Explorer, Export, Import, or Back Up Your Cookies Index of Known Spyware (web
page), Protect Yourself Against Spyware Indexing Service
utility, Find Files Faster by Mastering the Indexing Service’s Query Language noise filter,
editing, Editing the Indexing Service’s “Noise” Filter query
language, Using the Indexing Service’s Query Language searching using
properties, Searching Using Properties searching with operators and
expressions, Searching Using Operators and Expressions ranking search
results, Ranking the Order of Search Results installing
programs, changing default location for, Change the Default Location for Installing Programs instant
messaging, Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ interference with
WiFi equipment, avoiding, Extend the Range of Your Wireless Network Internet Connection Firewall
(ICF) spyware and, Protect Yourself Against Spyware Trojan horses,
inability to protect
against, ZoneAlarm: The World’s Best Free Firewall unsolicited inbound traffic, allowing
through, Punch an Escape Hole Through Your Firewall customizing default
service settings, Punch an Escape Hole Through Your Firewall file sharing,
allowing, Fix the Windows Firewall’s Disabling of File Sharing ICMP, Allow Diagnostic Services to Bypass the Firewall services that can be
allowed to bypass ICF, Punch an Escape Hole Through Your Firewall Internet
connections, Optimize Your Home Router with a Bluetooth
phone, Connect to the Internet with a Bluetooth Phone Internet
Explorer, Take a Bite Out of Cookies anonymous
surfing, Use Internet Explorer for Anonymous Surfing changing appearance
of, Give Internet Explorer a Face-Lift adding a background to the
toolbar, Add a Background to the Internet Explorer Toolbar changing text of
Titlebar, Change the Text of Internet Explorer’s Titlebar changing the static and animated
logos, Change the Internet Explorer Logo cookie
handling customizing, Customizing IE Cookie-Handling exporting or backing up
cookies, Export, Import, or Back Up Your Cookies privacy settings, effects
of, Take a Bite Out of Cookies cookie
settings,
customizing, Take a Bite Out of Cookies cookie-based advertising networks,
opting out of, Opt Out of Cookie-Based Ad Networks customizing with Group Policy
Editor, Hack Internet Explorer with the Group Policy Editor Internet Explorer settings you can
modify, Hack Internet Explorer with the Group Policy Editor programs
setting, Programs security
settings, Security URLs, URLs hiding desktop
icon, Customize the GUI with Tweak UI proxy server, configuring to
use, Use a Proxy Server to Protect Your PC reading web pages
offline, Read Web Pages Offline Search
Companion,
improving, Mastering the Search Companion searches, Better Internet Searching from Your Desktop with
Google
Toolbar, Google Toolbar web bugs,
blocking, Watch Out for Web Bugs web bugs, program to alert you
about, Watch Out for Web Bugs Internet
Information Services
(IIS), Secrets of Web Site Hosting with Internet Information Services (IIS) caching, Use Caching for Better Performance installing, Secrets of Web Site Hosting with Internet Information Services (IIS) MMC snap-in for site
administration, Secrets of Web Site Hosting with Internet Information Services (IIS) redirecting incoming
incorrect URLs, Redirect Incorrect Incoming URLs redirecting your site to a
URL, Change the Directory and Do a Redirect Internet
searches, Better Internet Searching from Your Desktop Google Toolbar,
using, Google Toolbar metasearch
software, See Also Internet
services port addresses
for, Enable Specific Internet Services: Port Forwarding port forwarding, enabling on residential
gateways, Enable Specific Internet Services: Port Forwarding using
separate proxy servers
for, Use a Proxy Server to Protect Your PC IP
addresses DHCP-assigned,
renewing, Renew Your DHCP-Assigned IP Address for remote clients connecting through
dial-up, DSL, or
cable, Configuring the Windows XP Remote Server hostname resolution
to HOSTS file, using
for, Speed Up Web Access with a HOSTS File of DNS and mail
servers, getting with
netsh, Use netsh to Troubleshoot Network and Internet Connections on residential gateway
networks, Enable Specific Internet Services: Port Forwarding IP
protocols, Close Down Open Ports and Block Protocols ipconfig
utility releasing and renewing DHCP-assigned IP
addresses, Renew Your DHCP-Assigned IP Address troubleshooting TCP/IP
problems command-line switches, listing
of, Use ipconfig to Troubleshoot TCP/IP IPSec protocol, use by
VPNs, Settings for Using a VPN IrfanView
program, IrfanView J Java
applets, running without
problems, Run Java Applets Without Crashes or Problems changing display
settings, Change Your Display Settings Java Virtual Machine
(JVM) uninstalling older
versions, Uninstall Older JVM Versions verfiying, Make Sure You Have a Java Virtual Machine (JVM) Installed JavaScript, using to confuse
email address
harvesters, Slam Spam Before It Starts JVMs
(Java Virtual
Machines), Make Sure You Have a Java Virtual Machine (JVM) Installed Microsoft
version, Make Sure You Have a Java Virtual Machine (JVM) Installed Sun
version, Make Sure You Have a Java Virtual Machine (JVM) Installed uninstalling older
versions, Uninstall Older JVM Versions K K Desktop
Environment (see Knoppix) KDE (see Knoppix) kernel, placing in RAM
for better
performance, Place Windows Kernel into RAM keyboard
shortcuts, Create Keyboard Shortcuts for Running Applications for running
applications, Create Keyboard Shortcuts for Running Applications switching VDM
desktops, Extend Your Screen Real Estate with Virtual Desktops keys,
Registry, Using Keys and Values editing, creating, or deleting with
Registry Editor, Launching the Registry Editor renaming with
Registry Editor, Launching the Registry Editor subkeys, Using Keys and Values values, Using Keys and Values Knoppix, Instant Linux boot
prompt, The Knoppix Boot Prompt booting from a
CD, Boot Knoppix from a CD booting from a
floppy, Boot Knoppix from a Floppy burning ISO to a
CD, Download Knoppix cheat
codes, The Knoppix Boot Prompt download
mirrors, Download Knoppix K
Menu, The K Menu KDE, The desktop MD5sum
checksum, Download Knoppix naming
scheme, Download Knoppix panel, The panel running on a PC
from a CD, Instant Linux third-party
vendors web site, Download Knoppix Konfabulator web
site, Konfabulator L LAN MAC
address, Cloning a MAC Address for Your Router laptops entering
into power-saving state, Allow Laptops to Enter Power-Saving State (Increase the USB Polling Interval) offline
files, Take Your Work on the Go with Offline Files and the Briefcase LCD screens,
improving resolution on, Use ClearType for Better Laptop and LCD Resolution Link Logger, Check Your Router Logs and Traffic links in Word documents to files, security
and, Stop Hidden Fields in Word from Stealing Your Files and Information Linksys routers,
permanent logs for, Optimize Your Home Router Linksys wireless networks,
improving signal
strength, Extend the Range of Your Wireless Network Linux, running easily on a
PC, Instant Linux locking a
whiteboard, Collaborate Long-Distance with the Whiteboard logging system
performance logs, setting up, Setting Up Your Logs what to
watch, What to Watch system
performance logs, viewing, Viewing Performance Logs logins autologon,
enabling, Create a Speedy, Stripped-Down Interface with Tweak UI controlling
with Registry, Control User Logins by Hacking the Registry LogonStudio web
site, Changing the Appearance of Windows and Menus logos,
static and animated, Change the Internet Explorer Logo LPs
(music recorded from), problems with, Cleaning up .wav files lyrics importing
into iTunes and iPod, Import Lyrics into iTunes and iPod Canto
Pod, Canto Pod EvilLyrics, EvilLyrics M Mac changing XP to a
Panther-like Logon screen, Changing the Logon Screen changing
XP windows and menus to a Mac appearance, Changing the Appearance of Windows and Menus Dock functionality in
XP, The Dock Entbloess 2 application
and window
switching, Switching between windows and applications give PV a Mac-like
boot screen, Get a Mac-Like Boot Screen giving XP
Mac-like features, Give Your PC Mac-Like Features Konfabulator, Konfabulator Panther X Future
extension pack, The Dock Striped Mac extension
pack, The Dock widgets, Konfabulator Mac, making PC work like
a, Make Your PC Work Like a Mac mail rules Outlook Express,
stored in Registry
keys, Backing Up Outlook Express Manually Outlook, backing
up
files, Backing Up Outlook Manually Pegasus,
sophistication of, Move Forward to the Past with Pegasus MailWasher
program, Slam That Spam manifest file,
creating for older programs, Force Older Programs to Use XP Common Controls Map Network Drive
option (Explorer Tools
menu), Remove Context Menu Items from Explorer mapping wireless
networks, Mapping Wireless Networks Maximum Idle Time
setting (residential gateways), Optimize Your Home Router MBR,
fixing, Fixing the MBR, Boot Sector, or Boot Menu MCL program, Put a Command-Line Prompt on Your Desktop command
prompt, features of, Put a Command-Line Prompt on Your Desktop MD5sum checksum web
site, Download Knoppix Media Access Control
address, Cloning a MAC Address for Your Router Media Player CD burning, Problem-Free CD Burning adjusting
speed, What to Do If Your Burned Music CDs Skip pauses
between tracks, What to Do If Long Selections Are Interrupted by Skips Customer Experience Improvement Program
option, Fix Windows Media Player’s Privacy Problems Enhanced
Content Provider
option, Fix Windows Media Player’s Privacy Problems running on
VDM, Extend Your Screen Real Estate with Virtual Desktops memory
use, Get the Most Out of Your RAM menus context
menus, Add Global Shortcut Menu Items to All File Types folder
or files listings in Windows Explorer,
creating, Generate Folder and File Listings for Printing or Editing Windows
Explorer context menu,
improving, A Power User’s Hidden Weapon: Improve the Context Menu messaging, Go Beyond Messaging with Windows Messenger Windows
Messenger, Go Beyond Messaging with Windows Messenger Messenger, Using .NET Alerts with Messenger Messenger Service
(XP) versus Windows Messenger, Go Beyond Messaging with Windows Messenger Messenger service pop
ups, Stop Messenger Service Pop Ups metasearch
software, See Also Microangelo
program, Change the Internet Explorer Logo creating cursors and
icons, Make Your Own Cursors and Icons Microsoft
applications, Customizing Shortcuts with Switches and Parameters Microsoft Management
Console, Secrets of Web Site Hosting with Internet Information Services (IIS) Microsoft
Management Console
(MMC), Secrets of Web Site Hosting with Internet Information Services (IIS) caching, improving web site
performance with, Use Caching for Better Performance changing your web site
directory, Change the Directory and Do a Redirect performance alerts,
creating, Performance Alerts redirecting your web
site to a
URL, Change the Directory and Do a Redirect system performance logs,
viewing, Viewing Performance Logs URLSpellCheck, Redirect Incorrect Incoming URLs Microsoft
Outlook, Remove “Nonremovable” Desktop Icons Microsoft Plus! for Windows
XP, Create Your Own XP Themes and Find Thousands Online Microsoft VM,
uninstallimg, Uninstalling the Microsoft VM Microsoft,
federal antitrust case against, Remove Access to Certain Microsoft Programs microwave ovens,
interference with wireless
equipment, Extend the Range of Your Wireless Network monitoring CPU
use, Monitor CPU Use MoodWatch feature
(Eudora), Check Your Mood with Eudora Most
Frequently Used Programs List banning programs
with TweakUI, Ban programs from the Most Frequently Used Programs List with Tweak UI killing with Registry
hack, Make Room for the Pinned Programs List mouse actions, speeding
up, Create a Speedy, Stripped-Down Interface with Tweak UI customizing
pointer, Roll Your Own Themes DoubleClickSpeed
(Registry value), Using Keys and Values Move To Folder option
(Explorer context
menu), Add Copy To Folder and Move To Folder Context Menu Options Movie Maker DVDs,
making, Tips for Making Your Own DVDs recording video,
best settings for preset
profiles, Best Settings for Recording Video Mozilla
browser, Mozilla cookie
management, Take a Bite Out of Cookies , Examine and Delete Cookies Manually cookie management, privacy
settings, Take a Bite Out of Cookies Googlebar
for Netscape
7/Mozilla, Google Toolbar MP3 format, saving streaming audio
to, Save Streaming Music to Your PC MSN Desktop
Search, Out-Google Google with MSN Desktop Search Google Desktop Search
versus, Out-Google Google with MSN Desktop Search installing, Installing MSN Desktop Search MSN Search Bar, Searching Your PC multiple copies of Outlook .pst
file, Searching Your PC syntax, MSN Desktop Search Syntax multimedia, Hacks 99-107 Absolute Lyric web
site, Import Lyrics into iTunes and iPod CD
burning, Problem-Free CD Burning digital music files, skipping and
popping, What to Do If Your Digital Music Files Skip and Pop skipping in burned music
CDs, What to Do If Your Burned Music CDs Skip converting
from Apple iTunes format, Convert from Apple iTunes Format digital rights management
(DRM), Convert from Apple iTunes Format hymn command-line
tool, Convert from Apple iTunes Format iOpener, Convert from Apple iTunes Format Quintessential
Player, Convert from Apple iTunes Format importing
lyrics into iTunes and iPod, Import Lyrics into iTunes and iPod Canto
Pod, Canto Pod EvilLyrics, EvilLyrics Ogg
Vorbis music format, Use Ogg Vorbis for Digital Music Quintessential
Player, The, See Also RipCast Streaming
Audio Ripper, See Also ripping, Problem-Free CD Burning streaming music,
saving to your
PC, Save Streaming Music to Your PC capturing in MP3
format, Save Streaming Music to Your PC Super Mp3
Recorder, Save Streaming Music to Your PC TweakMP, Hack Windows Media Player with TweakMP Ulead video
software, See Also videos, making
with Windows Movie
Maker, Make Videos with Windows Movie Maker capturing video
properly, Capture the Video Properly digital video camera,
using, Capturing Video with a Digital Video Camera recording video, best
settings for, Best Settings for Recording Video Windows Media
Player, privacy problems
with, Fix Windows Media Player’s Privacy Problems music, Other advice for reducing skips and pops My Alerts page,
managing .NET alerts, Using .NET Alerts with Messenger My Network
Places closing
down ports
manually, Close Down Open Ports and Block Protocols hiding desktop
icon, Customize the GUI with Tweak UI N naming
convention (8.3), disabling in NTFS, Disable 8.3 Name Creation in NTFS NAT, Enable Specific Internet Services: Port Forwarding National
Television Standards Committee (NTSC), Best Settings for Recording Video negative and positive
entries (resolve
cache), Adjust XP’s DNS Cache Settings Nelson Email Organizer (for
Outlook), See Also .NET alerts (with Windows
Messenger) delivery of
alerts, Using .NET Alerts with Messenger .NET alerts (with
Windows Messenger), Using .NET Alerts with Messenger managing alerts from My Alerts
Page, Using .NET Alerts with Messenger signing up for
alerts, Using .NET Alerts with Messenger NetLimiter, Manage Your Network’s Bandwidth Netscape 7
browser, Google Toolbar for, Google Toolbar Netscape Navigator cookie-based ad networks, opting out
of, Opt Out of Cookie-Based Ad Networks cookies,
handling of, Examine and Delete Cookies Manually netsh
tool, Use netsh to Troubleshoot Network and Internet Connections netsh diag
commands, listing of, Use netsh to Troubleshoot Network and Internet Connections using directly from command line for from
netsh console, Use netsh to Troubleshoot Network and Internet Connections NetShell
utility, resetting TCP/IP to original
configuration, Repair a Broken TCP/IP Connection netstat
command, Use netstat to Get Information About Open Network Connections network
adapters MACaddress, Cloning a MAC Address for Your Router cloning
for residential gateway, Cloning a MAC Address for Your Router Network Address
Translation
(NAT), Enable Specific Internet Services: Port Forwarding automatic mapping of hostname
to dynamic IP address, problems
with, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address VPN connections
and, Set Up a Virtual Private Network network and multiuser
policies and rights, Hide Unused Applets with XP Pro’s Group Policy Editor Network
Connections folder, closing down ports
manually, Close Down Open Ports and Block Protocols Network Stumbler
program, Go War-Driving for WiFi Access detecting nearby wireless
networks networks not part of
FreeNets, Go War-Driving for WiFi Access wireless network cards it works
with, Go War-Driving for WiFi Access networking, Hacks 49-58 , Extend the Range of Your Wireless Network closing
down ports and blocking
protocols, Close Down Open Ports and Block Protocols connections,
management by HKEY_CURRENT_USER (Registry
hive), The Five Logical Registry Hives controlling
another PC with remote
access, Control Another PC with Remote Access configuring XP
remote server, Configuring the Windows XP Remote Server firewalls, remote
access connections
and, Configuring the Windows XP Remote Server setting up remote
client, Setting Up the Remote Client DNS
settings, customizing for faster Internet
access, Tweak DNS Settings for Faster Internet Access cache
settings, Adjust XP’s DNS Cache Settings fixing
DNS
problems, Fix DNS Problems HOSTS
file, Speed Up Web Access with a HOSTS File extending
range of wireless
network, Extend the Range of Your Wireless Network antennas (access point
or PCs), avoiding placement near large metal
objects, Extend the Range of Your Wireless Network avoid putting access
point next to outside wall, Extend the Range of Your Wireless Network avoid putting access
point or PCs near microwavs or cordless
phones, Extend the Range of Your Wireless Network centrally locate
access point, Extend the Range of Your Wireless Network external and booster
antennas, use of, Extend the Range of Your Wireless Network vertical orientation
of access point
antennas, Extend the Range of Your Wireless Network wireless PC antennas,
pointing toward access point, Extend the Range of Your Wireless Network firewalls allowing
programs to bypass, Allow Programs to Bypass the Firewall email
problems with, Watch Out for Problems with Email and the Windows Firewall logging
activity, Track Firewall Activity with a Windows Firewall Log unsolicited
inbound traffic, allowing
through, Punch an Escape Hole Through Your Firewall Windows
XP SP2, Protect Your Computer with the New Windows Firewall ZoneAlarm, ZoneAlarm: The World’s Best Free Firewall limiting
number of IP addresses on
network, Limit the Number of IP Addresses on Your Network making server
always available by mapping hostname to dynamic IP
address, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address protecting
home WiFi, Protect Your Home WiFi Network proxy
servers, protecting your PC with, Use a Proxy Server to Protect Your PC configuring
Internet Explorer to use
proxies, Use a Proxy Server to Protect Your PC finding free,
public proxies, Use a Proxy Server to Protect Your PC limiting
connections to certain web sites, Hacking the Hack renewing
DHCP-assigned IP address, Renew Your DHCP-Assigned IP Address repairing
broken TCP/IP connection, Repair a Broken TCP/IP Connection residential
gateways,
optimizing, Optimize Your Home Router hub/router settings for DSL
access, Special Hub/Router Settings for DSL Access VPN, settings for
using, Settings for Using a VPN security, testing
with Shields Up, Test Your Security with Shields UP! speeding up
network
browsing, Speed Up Network Browsing troubleshooting
network
connections, Troubleshoot Network Connections with ping, tracert, and pathping ipconfig, Use ipconfig to Troubleshoot TCP/IP ipconfig utility, analyzing
TCP/IP problems, Use ipconfig to Troubleshoot TCP/IP netsh
tool, Use netsh to Troubleshoot Network and Internet Connections , Use netsh to Troubleshoot Network and Internet Connections netstat, getting information
on open connections, Use netstat to Get Information About Open Network Connections pathping command,
using, Troubleshoot Network Problems with pathping ping, diagnosing TCP/IP
problems, Troubleshoot TCP/IP Problems with ping tracing network and internat
data path with
tracert, Trace Your Network and Internet Data Path with tracert VoIP, VoIP Hacks VPN,
setting up, Set Up a Virtual Private Network Windows
Media Player, privacy problems
with, Fix Windows Media Player’s Privacy Problems wireless
networks checking WiFi performance with
QCheck, Check WiFi Network Performance with Qcheck to Help Improve Throughput war driving for WiFi
access, Go War-Driving for WiFi Access NetworkSetup Wizard,
correcting TCP/IP configuration, Repair a Broken TCP/IP Connection New document
menu, cleaning up, Create a Speedy, Stripped-Down Interface with Tweak UI New ESP Share
Group Wizard (Eudora), Check Your Mood with Eudora No-IP.com, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address noise filter for
Indexing Service searches,
editing, Editing the Indexing Service’s “Noise” Filter non-plug-and-play
devices, forcing display by Device
Manager, Uncover Hidden Hardware with the Device Manager nonpresent or
ghosted devices forcing display with Device
Manager, Uncover Hidden Hardware with the Device Manager NOT operators (unary and
binary), Searching Using Operators and Expressions Notepad, creating batch
file, Generate Folder and File Listings for Printing or Editing Notification
Area hiding all icons
in, Hide All Icons in the Notification Area network
icon, Go War-Driving for WiFi Access wireless network connections, information
about, Check WiFi Network Performance with Qcheck to Help Improve Throughput NTBackup, The Backup Utilities in Windows XP inability to back up
directly to CDs, The Backup Utilities in Windows XP installed
on XP Home, ASR and, XP Home, NTBackup, and ASR restoring
a backup, Restoring a backup NTFS (NT
File System) naming convention (8.3),
disabling, Disable 8.3 Name Creation in NTFS NTFS (NT File System)
compression folder compression, effects on
files, How Compressing Folders Affects Underlying Files improving NTFS
performance, Hacking the Hack ZIP files
versus, When to Use Zip Files and When to Use NTFS Compression NTI Deluxe Backup Plus!
Now, Get a Better Backup Program ntoskrnl.exe
file, Change the Picture That Appears on the XP Startup Screen NTSC (National Television Standards
Committee), Best Settings for Recording Video null Ethernet
cables, Remember the Boy Scout Creed: “Be Prepared” , Remember the Boy Scout Creed: “Be Prepared” cheap networking
with, Cheap Networking with an Ethernet Cable TCP/IP settings
for, Cheap Networking with an Ethernet Cable null serial
cables, Remember the Boy Scout Creed: “Be Prepared” , Remember the Boy Scout Creed: “Be Prepared” Num Lock,
automatically turning on at
startup, Automatically Turn On Num Lock, Scroll Lock,
and Caps Lock numbers in
Indexing Service queries, Searching Using Operators and Expressions representing DWORD data type in Registryvalues, Using Keys and Values O ObjectDock web
site, The Dock Office, opening and
creating Microsoft documents without, Open and Create Microsoft Documents Without Microsoft Office offline
files, Take Your Work on the Go with Offline Files and the Briefcase synchronizing to/from LAN and your
laptop, Take Your Work on the Go with Offline Files and the Briefcase on-demand and
scheduled
synchronization, On-Demand and Scheduled Synchronizations , On-Demand and Scheduled Synchronizations offline
reading of web
pages, Read Web Pages Offline Offline Favorite Wizard, saving pages with
links, Reading Web Pages Offline Using IE with Internet
Explorer, Reading Web Pages Offline Using IE Ogg
Vorbis music format, Use Ogg Vorbis for Digital Music converting audio files
to, Converting Existing Audio Files to Ogg Vorbis dMC
CD Audio Input and, Ripping CD Audio to Ogg Vorbis lossy formats, Converting Existing Audio Files to Ogg Vorbis playback choices, Playback Choices for Ogg Vorbis Quintessential Player
and, Ripping CD Audio to Ogg Vorbis ripping CD audio
to, Ripping CD Audio to Ogg Vorbis web site, Playback Choices for Ogg Vorbis Winamp and, Ripping CD Audio to Ogg Vorbis Open Command Window
Here
PowerToy, Open the Command Prompt from the Right-Click Menu Open dialog
box, adding folders to, Add Specific Folders to the Open Dialog Box Open With dialog
box, Another use for HKEY_CLASSES_ROOTApplications Open With option
(Windows Explorer
files), Clean Up the Open With Option OpenOffice.org
office suite, See Also Opera
browser, Opera operating systems boot.ini file, editing in, Editing Files Registry information about
(HKEY_LOCAL_MACHINE), The Five Logical Registry Hives single, customizing startup
menu, Create a Startup Menu Even If You Have Only One Operating System operators in
Indexing Service queries, Searching Using Operators and Expressions Boolean
operators, Searching Using Operators and Expressions EQUALS and CONTAINS
operators, Searching Using Operators and Expressions relational
operators, Searching Using Operators and Expressions opting out of
online advertising networks, Opt Out of Cookie-Based Ad Networks Orinoco card (wireless
networking), Building a Homemade Wireless Cantenna for War-Driving outbound traffic
from your PC, monitoring/blocking with
ZoneAlarm, ZoneAlarm: The World’s Best Free Firewall Outlook backing up and
restoring data files files and extensions,
listed, Backing Up Outlook Manually backing
up data files manual
backups, Backing Up Outlook Manually Outlook 2000/XP Backup software,
using, Backing Up Outlook and Outlook Express Using Add-In Software deleting icon from
desktop, Remove “Nonremovable” Desktop Icons hiding
desktop icon, Customize the GUI with Tweak UI Hotmail Popper,
configuring to work with, Getting Hotmail Mail with Hotmail Popper mail header
information, viewing, Viewing Mail Header Information in Outlook and Outlook Express Nelson’s
Email Organizer program, See Also spam
handling normal filters,
using, Handling Spam in Outlook spam senders filters,
using, Handling Spam in Outlook SpamNet (add-in) spam
killer, Peer-to-Peer Technology Fights Spam turning off HTML
display in emails, Slam That Spam XP, printing
directory
listings, Alternative Method for Users of Outlook XP YahooPOPs!,
configuring to work with, Getting Yahoo! Mail with YahooPOPs! Outlook
Express backing up data
files manually, Backing Up Outlook Express Manually Outlook Express Backup software,
using, Backing Up Outlook and Outlook Express Using Add-In Software forcing to open blocked file
attachments, Force Outlook Express to Let You Open Blocked File Attachments HTML display, turning off in
email, Slam That Spam mail
header information, viewing, Viewing Mail Header Information in Outlook and Outlook Express spam, handling
in, Handling Spam in Outlook Express P PageRank feature (Google
Toolbar), Google Toolbar disabling for
privacy, Google Toolbar Paging
Executive, disabling for
performance, Place Windows Kernel into RAM paging
file defragmenting, Defragment Boot Files memory use
reporting in Task Manager, Make Better Use of Your Memory with the Task Manager Paint Shop
Pro, Add a Background to the Internet Explorer Toolbar Panther X
Future extension pack, The Dock parallel data
cables, Remember the Boy Scout Creed: “Be Prepared” , Remember the Boy Scout Creed: “Be Prepared” pathping
command, Troubleshoot Network Problems with pathping peer-to-peer
computing fighting
spam, Peer-to-Peer Technology Fights Spam add-in spam killer for Outlook
(SpamNet), Peer-to-Peer Technology Fights Spam file sharing in
Eudora, Check Your Mood with Eudora Pegasus, Move Forward to the Past with Pegasus message-viewing
capabilities, Move Forward to the Past with Pegasus Per
Site Privacy Actions dialog
box, Customizing IE Cookie-Handling performance file compression
and, Get More Hard-Disk Space by Using NTFS Compression hard
disk defragging for PC,
improving, Speed Up Your Hard Disk by Improving Defragging improving
for NTFS (NT File
System), Hacking the Hack loading
resources for uninstalled
programs, Remove Unruly Applications and Uninstall Entries system, Hacks 108-114 checking
and tweaking, Check Your PC’s Pulse and Tweak It for Better Performance cleaning
the hard disk, Hack Your Way to a Cleaner Hard Disk fixing
SP2 upgrade problems, Fix SP2 Upgrade Woes Fresh
Diagnose diagnostic
tool, See Also getting
the most out of RAM, Get the Most Out of Your RAM RAM, Get the Most Out of Your RAM Registry
hacks to speed up XP, More Power: Registry Hacks to Speed Up XP repair
and recovery with Recovery Console, Repair and Recover with the Recovery Console speeding
up with Task manager, Speed Up System Performance with the Task Manager tracking
with Performance
Console, Track System Performance with the Performance Console Windows
XP visual effects and, Track System Performance with the Performance Console XPlite, See Also web
site, improving with caching, Use Caching for Better Performance wireless
networks, Extend the Range of Your Wireless Network checking with
QCheck, Check WiFi Network Performance with Qcheck to Help Improve Throughput Performance Tune-Up
Wizard, Check Your PC’s Pulse and Tweak It for Better Performance permanent
redirection for web resources, Change the Directory and Do a Redirect personal information,
protecting, Surf Anonymously Without a Trace phishing
attacks, Don’t Get Reeled In by Phishers preventing, What You Can Do About It zombie networks
and, Don’t Get Reeled In by Phishers phones (cordless),
interference with wireless
equipment, Extend the Range of Your Wireless Network phrase search (Indexing
Service), Using the Indexing Service’s Query Language Physical Memory
available, Commit Charge higher than, Make Better Use of Your Memory with the Task Manager ping allowing
to bypass ICF firewall, Allow Diagnostic Services to Bypass the Firewall troubleshooting
TCP/IP problems, Troubleshoot TCP/IP Problems with ping useful
switches, Troubleshoot TCP/IP Problems with ping Pinned Programs
List, Make Room for the Pinned Programs List Point-to-Point
Tunneling Protocol (PPTP), Set Up a Virtual Private Network use by
VPNs, Settings for Using a VPN policies
(network and multiuser), setting, Hide Unused Applets with XP Pro’s Group Policy Editor policy statement for cookie use on a site, Take a Bite Out of Cookies pop ups allowing, Use SP2’s Built-In Pop-Up Blocker Firefox, Firefox Messenger
service, Stop Messenger Service Pop Ups Mozilla, Mozilla Opera, Opera spyware and, Protect Yourself Against Spyware stopping
with SP2, Stop Pop Ups with SP2—and Without It Pop-Up
No-No!, Download Software to Stop Pop Ups in IE popping
sounds in music CDs, Other advice for reducing skips and pops port addresses
for common Internet
services, Enable Specific Internet Services: Port Forwarding , Punch an Escape Hole Through Your Firewall port
forwarding home networks
using NAT, to enable VPN
connections, Set Up a Virtual Private Network residential gateways using
NAT, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address port forwarding
on, Enable Specific Internet Services: Port Forwarding ports closing
down manually, Close Down Open Ports and Block Protocols use
by Trojan horses, Close Down Open Ports and Block Protocols positive and negative
entries (resolve
cache), Adjust XP’s DNS Cache Settings power-saving state,
allowing laptops to
enter, Allow Laptops to Enter Power-Saving State (Increase the USB Polling Interval) PowerDesk
utility, Empower Windows Explorer with PowerDesk Pro archive
management with, Empower Windows Explorer with PowerDesk Pro Compare Folders
feature, Empower Windows Explorer with PowerDesk Pro Destroy File
feature, Empower Windows Explorer with PowerDesk Pro different Windows versions, using
with, Empower Windows Explorer with PowerDesk Pro Encrypt/Decrypt
feature, Empower Windows Explorer with PowerDesk Pro File Finder
feature, Empower Windows Explorer with PowerDesk Pro finding and
renaming files, Empower Windows Explorer with PowerDesk Pro FTP
client, Empower Windows Explorer with PowerDesk Pro moving and
copying files, Empower Windows Explorer with PowerDesk Pro toolbars,
customizing, Empower Windows Explorer with PowerDesk Pro PowerPoint, launching with command-line
switches, Customizing Shortcuts with Switches and Parameters PowerToys Open
Command Window Here, Open the Command Prompt from the Right-Click Menu TweakUI
utility, Customize the GUI with Tweak UI Virtual
Desktop Manager (VDM), Extend Your Screen Real Estate with Virtual Desktops prefetch
parameters, tweaking for
performance, Alter Prefetch Parameters privacy anonymous
proxy servers for Web
surfing, Surf Anonymously Without a Trace cookies, protecting against customizing IE cookie
handling, Customizing IE Cookie-Handling IE privacy
settings, Take a Bite Out of Cookies policy statements for cookie use, Take a Bite Out of Cookies Google PageRank
feature and, Google Toolbar implicit
versus explicit consent for use of personal
information, Take a Bite Out of Cookies personal
information left behind in Web
surfing, Surf Anonymously Without a Trace Windows
Media Player, fixing problems
with, Fix Windows Media Player’s Privacy Problems Windows Media Player,
privacy preferences at installation, Fix Windows Media Player’s Privacy Problems programs applications, Hacks 88-98 changing
IE settings, Programs closing
automatically at shutdown, Automatically Close Programs at Shutdown connections to
Internet, controlling with ZoneAlert, Configuring ZoneAlarm to Block Trojans location for
installing, changing
default, Change the Default Location for Installing Programs Most
Frequently Used List, Clean Up the Most Frequently Used Programs List banning programs with
Registry, Banning Programs from the List Open
With option for Explorer files, Clean Up the Open With Option running
at
startup disabling with
Registry, Using the Registry to halt programs
running on startup disabling with System
Configuration, Using the System
Configuration Utility eliminating, Eliminating Programs That Run at
Startup properties for searching (Indexing
Service), Searching Using Properties protocols, listings
under individual protocol
names, The Five Logical Registry Hives proxy
servers anonymous web surfing
with, Surf Anonymously Without a Trace protecting your PC
with, Use a Proxy Server to Protect Your PC configuring IE to use
proxies, Use a Proxy Server to Protect Your PC configuring Internet Explorer to
use, Use a Proxy Server to Protect Your PC finding free, public
proxies, Use a Proxy Server to Protect Your PC , Use a Proxy Server to Protect Your PC limiting connections to certain web
sites, Hacking the Hack .pst file extension
(Outlook), Backing Up Outlook Manually R RAM,
making the most of, Get the Most Out of Your RAM better use of memory with Task
Manager, Make Better Use of Your Memory with the Task Manager identifying memory-hogging
applications, Make Better Use of Your Memory with the Task Manager tips
for, General Advice for Making Better Use of RAM desktop icons,
reducing, General Advice for Making Better Use of RAM DOS
applications,
avoiding, General Advice for Making Better Use of RAM reduce
background applications and
services, General Advice for Making Better Use of RAM reducing number
of
colors, General Advice for Making Better Use of RAM remove DLLs from
cache memory, General Advice for Making Better Use of RAM ranking Indexing
Service search results, Ranking the Order of Search Results RAS (Remote Access
Server), Control Another PC with Remote Access reading web pages
offline with Internet
Explorer, Reading Web Pages Offline Using IE rebooting,
shortcuts
for, Create One-Click
Shutdown and Reboot Shortcuts Recovery
Console, Repair and Recover with the Recovery Console allowing floppy copy and access to all
drives and folders, Hacking the Hack commands for examining the
system, Looking Around fixing MBR, boot sector, or boot
menu, Fixing the MBR, Boot Sector, or Boot Menu starting, Starting the Recovery Console Recycle
Bin disk defragmentation
and, What to Do If the Disk Defragmenter Won’t Defragment Your Drive hiding desktop icon, Customize the GUI with Tweak UI removing icon
from desktop, Remove “Nonremovable” Desktop Icons redirections incoming
misspelled URLs, Redirect Incorrect Incoming URLs permanent
redirection for web
resources, Change the Directory and Do a Redirect web site parent
directory to child directory, Change the Directory and Do a Redirect web
site to a URL, Change the Directory and Do a Redirect .reg files double-clicking
on, changing default action to protect
Registry, Protect the Registry by Changing the Default Action for Double-Clicking a .reg File .reg files importing back into Registry double-clicking on, Safely Edit the Registry Using .reg Files Registry, Hacks 83-87 backups, Better Registry Backups using
Backup
utility, Better Registry Backups using
Registry Editor, Better Registry Backups using
System Restore, Better Registry Backups boot
defragment option, checking, Defragment Boot Files context
menu items, removing from
Explorer, Remove Context Menu Items from Explorer Control
Panel category values, Recategorize Control Panel Applets Copy to
Folder/Move to Folder, Explorer context menu
options, Add Copy To Folder and Move To Folder Context Menu Options customizing
user interface, Add Specific Folders to the Open Dialog Box DLLs, removing
unneeded from cache memory, General Advice for Making Better Use of RAM editing safely with
.reg files, Delete Registry Keys and Values Using .reg Files editing
with Registry
Editor, Launching the Registry Editor entries for
uninstalled programs, deleting, Remove Unruly Applications and Uninstall Entries entries left behind
by uninstalled
programs, Remove Unruly Applications and Uninstall Entries finding and
deleting, Remove Unruly Applications and Uninstall Entries Explorer context
menu, improving opening command
prompt, Open the Command Prompt from the Right-Click Menu fine
tuning for faster startups, Fine-Tune Your Registry for Faster Startups hacks that
use allowing laptops to enter power-saving
state, Allow Laptops to Enter Power-Saving State (Increase the USB Polling Interval) changing names of registered user and
company, Change the Names of the Registered User and Company closing programs automatically at
shutdown, Automatically Close Programs at Shutdown disabling XP
shutdown, Disable XP Shutdown Disk Cleanup warning,
disabling, Disable the Disk Cleanup Warning mouse and keyboard buffer, changing size
of, Change the Size of Your Mouse and Keyboard Buffer program installation location, changing
default, Change the Default Location for Installing Programs timeouts for programs,
changing, Change the Amount of Time Before Programs Time Out hacks to speed up
XP, More Power: Registry Hacks to Speed Up XP , Disable 8.3 Name Creation in NTFS halting programs
running at
startup, Using the Registry to halt programs
running on startup hives, The Five Logical Registry Hives defragmenting, Defragment Boot Files HKEY_CLASSES_ROOT, The Five Logical Registry Hives HKEY_CURRENT_CONFIG, The Five Logical Registry Hives HKEY_CURRENT_USER, The Five Logical Registry Hives HKEY_LOCAL_MACHINE, The Five Logical Registry Hives HKEY_USERS, The Five Logical Registry Hives introduction
to, Don’t Fear the Registry keys,
forcing automatic on/off, Automatically Turn On Num Lock, Scroll Lock,
and Caps Lock keys, subkeys, and
values, Using Keys and Values primary data types of
values, Using Keys and Values Most
Frequently Used Programs List banning programs
from, Banning Programs from the List killing, Make Room for the Pinned Programs List network
browsing, speeding
up, Speed Up Network Browsing NTFS,
disabling automatic updates
on, Hacking the Hack Outlook
Express mail rules stored
in, Backing Up Outlook Express Manually mail settings, accounts and
preferences, Backing Up Outlook Express Manually Outlook,
opening blocked file attachments, Force Outlook to Let You Open Blocked File Attachments RegCleaner, See Also Registry
Commander, See Also Registry First
Aid, See Also Resplendent
Registrar, See Also system
objects changing desktop icons
for, Change the Desktop Icons of System Objects changing text and balloon
tips, The Registry to the Rescue tracking changes
with RegSpy, Track and Restore Registry Changes with RegSpy rolling back install/run
changes for uninstalled programs, Remove Unruly Applications and Uninstall Entries uninstall
entries for uninstalled programs,
removing, Remove Stubborn Uninstall Entries from Already Uninstalled Programs user logins,
controlling, Control User Logins by Hacking the Registry Windows
Media Player, GUID (supercookie), Fix Windows Media Player’s Privacy Problems Registry
Editor, Don’t Fear the Registry adding and
deleting keys and
values, Adding and Deleting Keys and Values backing up the
Registry, Better Registry Backups editing, creating, or deleting keys and
values, Launching the Registry Editor launching, Launching the Registry Editor navigation, Launching the Registry Editor .reg files, using for
safety, Safely Edit the Registry Using .reg Files RegSpy
program, Track and Restore Registry Changes with RegSpy rolling back install/run changes for
uninstalled
programs, Remove Unruly Applications and Uninstall Entries SnapShots
feature, Track and Restore Registry Changes with RegSpy regular expression
queries (Indexing Service), Searching Using Properties REG_BINARY data type
(Registry), Adding and Deleting Keys and Values REG_DWORD data type
(Registry), Adding and Deleting Keys and Values REG_EXPAND_SZ
data type (Registry), Adding and Deleting Keys and Values REG_MULTI_SZ data type
(Registry), Using Keys and Values , Adding and Deleting Keys and Values REG_SZ data type
(Registry), Using Keys and Values , Adding and Deleting Keys and Values relational operators in
Indexing Service
queries, Searching Using Operators and Expressions date and time expressions, using
with, Searching Using Operators and Expressions releasing and renewing DHCP-assigned IP
addresses, Renew Your DHCP-Assigned IP Address remapping the
keyboard, Remap Your Keyboard Remote Access Server
(RAS), Control Another PC with Remote Access Remote Access
utility (Windows Server 2003), Control Another PC with Remote Access remote access,
controlling another PC with, Control Another PC with Remote Access configuring
XP remote server, Configuring the Windows XP Remote Server firewalls, getting
through, Configuring the Windows XP Remote Server remote
client, Control Another PC with Remote Access remote procedure call
(RPC), Watch Out for Problems with Email and the Windows Firewall remote
server, Control Another PC with Remote Access removing DLLs from cache
memory, General Advice for Making Better Use of RAM renaming
files (Better File Rename utility), Better File Rename residential
gateways, Extend the Range of Your Wireless Network automatic hostname mapping to dynamic IP
address, problems
with, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address optimizing, Optimize Your Home Router hub/router
settings for DSL
access, Special Hub/Router Settings for DSL Access settings
for VPN
use, Settings for Using a VPN port forwarding for specific Internet
services, Enable Specific Internet Services: Port Forwarding resetting router to repair TCP/IP
connection, Repair a Broken TCP/IP Connection Resource Tuner
utility, Customize Folder Icons and Balloon Text restore CDs supplied by PC
manufacturers, The Backup Utilities in Windows XP Restore
point, Change the Picture That Appears on the XP Startup Screen creating before
deleting spyware, Protect Yourself Against Spyware creating before removal of XP
components, Remove “Uninstallable” XP Utilities restoring
backups, Restoring a backup restoring
files backups (NTBackup), Restoring a backup right-click
context menus, A Power User’s Hidden Weapon: Improve the Context Menu right-click ÒNewÓ menu,
cleaning up, Create a Speedy, Stripped-Down Interface with Tweak UI routers for
home networks, Optimize Your Home Router troubleshooting
with tracert, Trace Your Network and Internet Data Path with tracert Routing and Remote
Access utility (on Windows Server
2003), Control Another PC with Remote Access S Safe
Mode, Customize Multiboot Startup Options SafetyBar, Peer-to-Peer Technology Fights Spam Sandra
(hardware analysis/tuneup program), Check Your PC’s Pulse and Tweak It for Better Performance saving web pages
for offline reading in offline
database, using
SurfSaver, Save Web Pages in an Offline Database with Add-Ins with Internet
Explorer, Reading Web Pages Offline Using IE scheduled
tasks, Speed Up Network Browsing screen
resolution (laptop or LCD),
improving, Use ClearType for Better Laptop and LCD Resolution screen savers, choosing and
customizing, Roll Your Own Themes script
kiddies, Protect Your Computer with the New Windows Firewall Scroll Lock,
automatically turning on at
startup, Automatically Turn On Num Lock, Scroll Lock,
and Caps Lock search
capabilities
(Eudora), Check Your Mood with Eudora Search Companion
(IE), improving, Mastering the Search Companion search engines,
Internet Ask Jeeves
toolbar, Google Toolbar Google searches directly from your
desktop, Google Toolbar Google
Toolbar, Google Toolbar searching current site instead of entire
Web, Google Toolbar metasearch
software, See Also MSN
search engine, replacing for IE, Mastering the Search Companion security, Hacks 75-82 closing
open ports and blocking
protocols, Close Down Open Ports and Block Protocols dictionary
attacks through spam email, Slam That Spam email-borne
worms and viruses, Open Blocked File Attachments in Outlook and Outlook Express firewalls,
ZoneAlarm, ZoneAlarm: The World’s Best Free Firewall IE
security settings, changing with Group Policy
Editor, Security logging on residential gateways, Optimize Your Home Router protecting
your PC with proxy servers configuring IE to use
proxy, Use a Proxy Server to Protect Your PC finding free, public
proxies, Use a Proxy Server to Protect Your PC limiting connections
to certain web
sites, Hacking the Hack Security Identifiers
(SIDs), The Five Logical Registry Hives security zones for IE,
customizing, Security Send To option
(Explorer context menu), customizing, Add and Remove Destinations for the Send To Option server message
block (SMB) communications, ICF
and, Fix the Windows Firewall’s Disabling of File Sharing servers DNS, Use a Proxy Server to Protect Your PC mapping
hostname to dynamic IP address for constant
availability, Make Servers Always Available by Mapping a Hostname to a Dynamic IP Address proxy, Use a Proxy Server to Protect Your PC remote, Control Another PC with Remote Access Service Pack
2 (see SP2) Service Packs, blocking opening of email file
attachments, Force Outlook Express to Let You Open Blocked File Attachments services disabling at
startup, Disabling Services That Run
at Startup listing of services to turn
off, Disabling Services That Run
at Startup running in the
background, General Advice for Making Better Use of RAM Services Computer Management
Console, Disabling Services That Run
at Startup session
cookies, Customizing IE Cookie-Handling Setup Information file, editing for Windows
component removal, Remove “Uninstallable” XP Utilities shadowing
(XP GUI), controlling, Customize the GUI with Tweak UI Shareaza, Protect Yourself Against Spyware Shields Up
program, testing your PC for online security, Test Your Security with Shields UP! shortcut
menus, Add Global Shortcut Menu Items to All File Types context menus, Add Global Shortcut Menu Items to All File Types Windows Explorer, customizing
for, Force Windows Explorer into True Usefulness adding global menu items to all file
types, Add Global Shortcut Menu Items to All File Types adding menu items to specific file
types, Add Shortcut Menu Items to Specific File Types All Programs menu, Organize the All Programs Menu with Explorer file association actions,
editing, Edit File Association Actions shortcuts command
line, Create Keyboard Shortcuts for Running Applications for
shutdown and reboot, Create One-Click
Shutdown and Reboot Shortcuts startup automatically
turning on Num Lock, Scroll Lock, and Caps
Lock, Automatically Turn On Num Lock, Scroll Lock,
and Caps Lock shutdown, Create One-Click
Shutdown and Reboot Shortcuts command,
switches for, Create One-Click
Shutdown and Reboot Shortcuts disabling
with Registry hack, Disable XP Shutdown one-click
shortcuts, Create One-Click
Shutdown and Reboot Shortcuts process closing
time, increasing, Give More Time for Processes to Close at Shutdown speeding
up, Speed Up Shutdown Times halting startup programs and
services, Halt Startup Programs and Services signal strength for
wireless networks, improving, Extend the Range of Your Wireless Network signatures
(Outlook), backup files
for, Backing Up Outlook Manually Simple
Mail Transfer Protocol (SMTP) service for sending
email, Secrets of Web Site Hosting with Internet Information Services (IIS) skins (user
interface), Give XP a Makeover with WindowBlinds creating for
WindowBlinds, Creating Your Own WindowBlinds Skins downloading from the
Internet, Downloading Skins from the Internet Trillian (instant messaging
program), Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ SkinStudio
program, Creating Your Own WindowBlinds Skins skipping
problems in music
CDs, Other advice for reducing skips and pops Skype, Make Skype Calls at Work skyscraper
ads, Use Ad-Blocking Software SMB (server message
block) communications, ICF and, Fix the Windows Firewall’s Disabling of File Sharing software
publishers, designating as
trustworthy, Security sounds
(system) choosing for
theme, Roll Your Own Themes SP2, Change the Picture That Appears on the XP Startup Screen , Stop Pop Ups with SP2—and Without It built-in
pop-up blocker, Use SP2’s Built-In Pop-Up Blocker fixing antivirus alert
problems, Fix Antivirus Alert Problems fixing problems with
Windows Firewall, Fix Problems with the Windows Firewall support web
site, See Also uninstalling, Uninstall SP2 upgrade
problems, fixing, Fix SP2 Upgrade Woes spam, Slam That Spam blocking with
software, Slam That Spam MailWasher
program, Slam That Spam Center for Democracy
& Technology, Slam Spam Before It Starts fighting
with peer-to-peer
technology, Peer-to-Peer Technology Fights Spam add-in spam killer
for Outlook (SpamNet), Peer-to-Peer Technology Fights Spam handling in Outlook
Express, Handling Spam in Outlook Express handling
in Outlook with filters, Handling Spam in Outlook mail header information,
viewing in Outlook/Outlook
Express, Viewing Mail Header Information in Outlook and Outlook Express preventing dictionary
attacks by turning off HTML display in
emails, Slam That Spam stopping before it
starts, Slam Spam Before It Starts HTML characters, using for your
address, Slam Spam Before It Starts registrations at web sites, examining
fine print, Slam Spam Before It Starts spelling out your email address
fully, Slam Spam Before It Starts using inline JavaScript to
generate address at page load time, Slam Spam Before It Starts SpamPal, See Also SpeedBit, Download
Accelerator Plus (DAP)
program, Speed Up File Downloads spell check
(URLSpellCheck for
IIS), Redirect Incorrect Incoming URLs splash screen,
changing for startup, Change the Picture That Appears on the XP Startup Screen building startup screen from
graphics, Build a Startup Screen from Any Graphic choosing from multiple
screens, Choose from Multiple Splash Screens on Startup spoofed sites, Knowledge
Base article, See Also SpoofStick (anti-phishing
add-in), What You Can Do About It Spybot Search &
Destroy, Protect Yourself Against Spyware spyware, Kill Spyware and Web Bugs blocking
with firewalls, Protect Yourself Against Spyware detector
and eradicator program, Protect Yourself Against Spyware drive-by-downloads, Protect Yourself Against Spyware pop ups
and, Protect Yourself Against Spyware SSID (network
name), Go War-Driving for WiFi Access Stardock BootSkin web
site, Get a Mac-Like Boot Screen Stardock, WindowBlinds
utility, Give XP a Makeover with WindowBlinds Start
Menu adjusting speed for
performance, Menu Speed All Programs menu,
modifying with
Explorer, Organize the All Programs Menu with Explorer customizing with XP Professional Group
Policy
Editor, Hack the Start Menu and Taskbar user account graphic,
changing, Use Your Own Graphic for Your User Account startup, Create One-Click
Shutdown and Reboot Shortcuts boot screen,
changing, Change the Picture That Appears on the XP Startup Screen building startup screen from
graphics, Build a Startup Screen from Any Graphic choosing from multiple
screens, Choose from Multiple Splash Screens on Startup creating
multiple profiles with Advanced Startup
Manager, Create Multiple Startup Profiles with Advanced Startup Manager error
message display, disabling, Stop Error Messages from Displaying on Startup fine
tuning
Registry, Fine-Tune Your Registry for Faster Startups halting
unnecessary programs and
services, Halt Startup Programs and Services eliminating
programs, Eliminating Programs That Run at
Startup services,
disabling, Disabling Services That Run
at Startup System Configuration,
using, Using the System
Configuration Utility single operating
system,
customizing, Create a Startup Menu Even If You Have Only One Operating System user
logins, controlling with Registry, Control User Logins by Hacking the Registry Startup folder,
cleaning out, Cleaning out the Startup
folder stationery (Outlook),
backup files for, Backing Up Outlook Manually statistics (usage),
in Eudora, Check Your Mood with Eudora Stay
Invisible web site (free, public proxy
servers), Use a Proxy Server to Protect Your PC Steganos Internet
Anonym 5 software, Get Software for Anonymous Surfing storage of
backups, Map Out a Backup Plan streaming music, saving
to your PC, Save Streaming Music to Your PC capturing in MP3
format, Save Streaming Music to Your PC string array
values (Registry), Using Keys and Values , Adding and Deleting Keys and Values string values
(Registry), Using Keys and Values , Adding and Deleting Keys and Values editing, Using Keys and Values examples in subkey section
listing, Safely Edit the Registry Using .reg Files Striped Mac extension
pack, The Dock Style-XP program, See Also subkeys,
Registry, Using Keys and Values full section of
(example), Safely Edit the Registry Using .reg Files values, Using Keys and Values Sun
JVMs checking
for, Make Sure You Have a Java Virtual Machine (JVM) Installed uninstalling
older, Uninstalling an old Sun JVM Super MP3 Recorder
program, Save Streaming Music to Your PC surfing the Web
anonymously, Surf Anonymously Without a Trace software
for, Get Software for Anonymous Surfing Web-based
anonymizer, Web-Based Anonymizer SurfSaver
program, Save Web Pages in an Offline Database with Add-Ins SurfSecret Privacy
Protector, See Also switches
(boot.ini file), Editing Files synchronization files
between two
computers, Use the Briefcase for Mobile File Transfers offline
files, Take Your Work on the Go with Offline Files and the Briefcase , Take Your Work on the Go with Offline Files and the Briefcase on-demand and
scheduled, On-Demand and Scheduled Synchronizations Outlook files
between laptop and PC, Backing Up Outlook Manually web pages
saved to hard disk, Reading Web Pages Offline Using IE whiteboard
sessions, Collaborate Long-Distance with the Whiteboard sysoc.inf
file, entries for uninstallable programs, Remove “Uninstallable” XP Utilities system applets,
categorizing, Build Customized Control Panels System
Configuration Utility, disabling startup
programs, Using the System
Configuration Utility system
files compressing, effects on
performance, Get More Hard-Disk Space by Using NTFS Compression Windows File
Protection, Change the Picture That Appears on the XP Startup Screen system folders,
GUIDs
for, Using Globally Unique Identifiers with Command-Line Switches System Mechanic disk-cleanup
tool, Download a Better Disk-Cleanup Tool system objects,
changing, Rename and Change “Unchangeable” Desktop Icons and System Objects desktop
icons, Roll Your Own Themes text and balloon tips, using the
Registry, The Registry to the Rescue system
organization to aid backups, System Organization Aids the Backup Process system
performance, Hacks 108-114 RAM, making the most
of, Get the Most Out of Your RAM better memory use with Task
Manager, Make Better Use of Your Memory with the Task Manager general advice for, General Advice for Making Better Use of RAM Registry hacks to speed up
XP, More Power: Registry Hacks to Speed Up XP disabling 8.3 name creation
in
NTFS, Disable 8.3 Name Creation in NTFS menu
speed, Menu Speed place kernel into
RAM, Place Windows Kernel into RAM prefetch parameters,
altering, Alter Prefetch Parameters repair and
recovery with Recovery Console commands for
examining the
system, Looking Around fixing MBR, boot sector, or boot
menu, Fixing the MBR, Boot Sector, or Boot Menu fixing
Windows, Fixing Windows floppy copy and
access to all drives and
folders, Hacking the Hack starting Recovery
Console, Starting the Recovery Console tracking with Performance
Console, Track System Performance with the Performance Console logs, setting
up, Setting Up Your Logs performance
alerts, Performance Alerts viewing performance
logs, Viewing Performance Logs Windows XP visual effects
and, Track System Performance with the Performance Console System Restore
point, Change the Picture That Appears on the XP Startup Screen backing up the
Registry, Better Registry Backups creating before removal of XP
components, Remove “Uninstallable” XP Utilities system sounds, choosing for
theme, Roll Your Own Themes System
Tray, Go War-Driving for WiFi Access T Task
Manager Applications tab, Applications Tab better memory use
with, Make Better Use of Your Memory with the Task Manager identifying memory-hogging applications
with Process
Tab, Make Better Use of Your Memory with the Task Manager Performance
tab, Performance Tab prioritizing programs and
processes, Give Program and Processes More of Your CPU’s Attention Processes
tab, Processes Tab Taskbar customizing
with XP Professional Group Policy
Editor, Hack the Start Menu and Taskbar cutomizing
with TweakUI, Hack the Taskbar with Tweak UI hiding
icons in Notification Area, Hide All Icons in the Notification Area TCP/IP closing
down TCP ports, Close Down Open Ports and Block Protocols closing
ports and blocking
protocols, Close Down Open Ports and Block Protocols DHCP-assigned IP
addresses, Renew Your DHCP-Assigned IP Address repairing broken
connections, Repair a Broken TCP/IP Connection resetting TCP/IP stack to original
configuration, Repair a Broken TCP/IP Connection troubleshooting
with
ipconfig, Use ipconfig to Troubleshoot TCP/IP Telnet, security risks of open
port, Close Down Open Ports and Block Protocols templates (Outlook),
backup files for, Backing Up Outlook Manually text balloon
tips for folders, customizing, Customize Folder Icons and Balloon Text balloon
tips for system objects,
changing, Rename and Change “Unchangeable” Desktop Icons and System Objects sharing
with whiteboard, Collaborate Long-Distance with the Whiteboard text editors, editing
.reg files, Change the Default Editor for .reg Files Tgtsoft web
site, Change the Picture That Appears on the XP Startup Screen themes
(XP), Create Your Own XP Themes and Find Thousands Online applying new, Create Your Own XP Themes and Find Thousands Online copyright laws
and, Get XP Themes Online creating your
own, Roll Your Own Themes online sources
for, Get XP Themes Online third-party
cookies customizing IE handling
of, Customizing IE Cookie-Handling managers
for, Get a Third-Party Cookie Manager thumbnails
(Windows Explorer), decreasing image
quality, Create a Speedy, Stripped-Down Interface with Tweak UI Thunderbird (open
source), Use Open Source Thunderbird Time To Live (TTL), reported by
ping, Troubleshoot TCP/IP Problems with ping times and
dates, Searching Using Operators and Expressions toolbars customizing
appearance
of, Roll Your Own Themes Google and Ask
Jeeves, for Internet
searches, Google Toolbar Outlook
settings, backup files
for, Backing Up Outlook Manually Tools menu
(Windows Explorer), removing items
from, Remove Context Menu Items from Explorer tracert, Trace Your Network and Internet Data Path with tracert useful
switches, Trace Your Network and Internet Data Path with tracert TradeKeys
utility, Remap Your Keyboard transparency Trillian
messaging program, use of, Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ Trillian (instant
messaging program), Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ Pro version, Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ skins, choosing
for, Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ Trojan
horses, Protect Your Computer with the New Windows Firewall blocking
with ZoneAlarm
firewall, Configuring ZoneAlarm to Block Trojans ports used
by, Close Down Open Ports and Block Protocols troubleshooting
network connections, Troubleshoot Network Connections with ping, tracert, and pathping ipconfig, Use ipconfig to Troubleshoot TCP/IP netsh
tool, Use netsh to Troubleshoot Network and Internet Connections troubleshooting
services, bypassing ICF
firewall, Allow Diagnostic Services to Bypass the Firewall trustworthy
credential agencies and software
publishers, Security TTL (Time to Live),
reported by ping, Troubleshoot TCP/IP Problems with ping TweakMP, Hack Windows Media Player with TweakMP TweakUI
utility, Customize the GUI with Tweak UI controlling animated effects, fades, and
shadowing, Customize the GUI with Tweak UI creating
customized XP
interfaces, Create a Speedy, Stripped-Down Interface with Tweak UI customizing
Taskbar, Hack the Taskbar with Tweak UI customizing XP
interface, Customize the GUI with Tweak UI exact XP version and build, showing on
desktop, Customize the GUI with Tweak UI hiding undeletable desktop
icons, Customize the GUI with Tweak UI Windows
Explorer, Customize the GUI with Tweak UI Most Frequently Used Programs List,
banning programs from, Ban programs from the Most Frequently Used Programs List with Tweak UI U UDP,
closing ports for, Close Down Open Ports and Block Protocols Ulead DVD
Movie
Factory, See Also DVD
Workshop, See Also VideoStudio, See Also unary NOT operator
(!), Searching Using Operators and Expressions uninstallable
programs, entries in sysoc.inf
file, Remove “Uninstallable” XP Utilities uninstalling
applications, Remove Unruly Applications and Uninstall Entries cleaning up
after, Remove Unruly Applications and Uninstall Entries removing access to certain Microsoft
programs, Remove Access to Certain Microsoft Programs removing uninstall entries from
uninstalled
programs, Remove Stubborn Uninstall Entries from Already Uninstalled Programs uninstalling XP components and
utilities, Remove “Uninstallable” XP Utilities updates, NTFS date and
time stamps, Hacking the Hack URLs customizing
for Internet Explorer, URLs redirecting
misspelled, Redirect Incorrect Incoming URLs redirecting
your web site to, Change the Directory and Do a Redirect URLSpellCheck for
IIS, Redirect Incorrect Incoming URLs usage statistics
(Eudora), Check Your Mood with Eudora USB devices,
hidden, Uncover Hidden Hardware with the Device Manager importing analog
video, Capture the Video Properly polling,
increasing interval so laptops can enter power-saving
state, Allow Laptops to Enter Power-Saving State (Increase the USB Polling Interval) user accounts,
changing graphic for, Use Your Own Graphic for Your User Account user interfaces, Hacks 8-20 components, hiding to prevent
accidental removal, Hide Components You Don’t Want to Be Uninstalled Control
Panel building
customized, Build Customized Control Panels displaying applets in cascading
menu, Display Control Panel Applets in a Cascading Menu hidden applets,
running, Hide Unused Applets with XP Pro’s Group Policy Editor hiding applets with
Registry, Hide Unused Applets with the Registry hiding applets with XP Pro Group Policy
Editor, Hide Unused Applets with XP Pro’s Group Policy Editor hiding unused
applets, Control the Control Panel recategorizing
applets, Recategorize Control Panel Applets creating customized with
TweakUI, Create a Speedy, Stripped-Down Interface with Tweak UI Taskbar, Hack the Taskbar with Tweak UI cursors and icons, creating your
own, Make Your Own Cursors and Icons customizing
with the Registry, Hack Your Way Through the Interface adding folders to Open
dialog, Add Specific Folders to the Open Dialog Box hiding all icons in
Notification
Area, Hide All Icons in the Notification Area hiding certain icons in
Notification Area, Hide Only Certain Icons in the Notification Area turning off system
beeps, Turn Off System Beeps customizing
with
WindowBlinds, Give XP a Makeover with WindowBlinds creating your own
skins, Creating Your Own WindowBlinds Skins downloading skins from the
Internet, Downloading Skins from the Internet desktop icons
and system objects,
renaming/changing, Rename and Change “Unchangeable” Desktop Icons and System Objects graphic for
your user account,
changing, Use Your Own Graphic for Your User Account IE, customizing with Group Policy
Editor, Browser User Interface Most
Frequently Used Programs
List, Clean Up the Most Frequently Used Programs List banning programs from with the
Registry, Banning Programs from the List banning programs
from with TweakUI, Ban programs from the Most Frequently Used Programs List with Tweak UI banning programs
with
Registry, Banning Programs from the List changing number of
programs in, Change the Number of Programs That Appear on the List killing with Registry
hack, Make Room for the Pinned Programs List older Windows programs, forcing to use
XP common
controls, Force Older Programs to Use XP Common Controls Pegasus email software, eccentricities
of, Move Forward to the Past with Pegasus Pinned Programs
List, Make Room for the Pinned Programs List Start Menu
and Taskbar, customizing with Group Policy
Editor, Hack the Start Menu and Taskbar themes, Create Your Own XP Themes and Find Thousands Online applying
new, Create Your Own XP Themes and Find Thousands Online creating
your own, Roll Your Own Themes online
sources for, Get XP Themes Online user
logins autologon,
enabling, Create a Speedy, Stripped-Down Interface with Tweak UI controlling with
Registry, Control User Logins by Hacking the Registry users changing
name of registered user with Registry
hack, Change the Names of the Registered User and Company HKEY_CURRENT_USER
Registry hive, The Five Logical Registry Hives HKEY_USERS
Registry
hive, The Five Logical Registry Hives host
computer, permissions for, Cheap Networking with a Serial or Parallel Cable Security
Identifiers (SIDs), The Five Logical Registry Hives utilities (XP basic), improving
on backups, Build a Better Backup Strategy getting a better
backup
program, Get a Better Backup Program mapping out
backup
plan, Map Out a Backup Plan system
organization that aids backup
process, System Organization Aids the Backup Process Windows XP backup
utilities, The Backup Utilities in Windows XP disk
defragmentation, Speed Up Your Hard Disk by Improving Defragging boot
files,
defragmenting, Defragment Boot Files failure of disk
defragmenter, What to Do If the Disk Defragmenter Won’t Defragment Your Drive getting a better disk
defragmenter, Get a Better Disk Defragmenter running disk defragmenter from
command line, Run the Disk Defragmenter from the Command Line universal messaging with
Trillian, Universal Messaging: Trillian Unites AIM, MSN, Yahoo!, and ICQ virtual
desktops, Extend Your Screen Real Estate with Virtual Desktops Windows Messenger, going beyond
messaging, Go Beyond Messaging with Windows Messenger collaborating with
whiteboard, Collaborate Long-Distance with the Whiteboard sharing
applications, Share Applications with Messenger using .NET alerts
with, Using .NET Alerts with Messenger V values,
Registry adding and
deleting, Adding and Deleting Keys and Values creating new, Adding and Deleting Keys and Values deleting for uninstalled
programs, Remove Unruly Applications and Uninstall Entries DoubleClickSpeed value for the
mouse, Using Keys and Values editing, creating, or deleting with
Registry Editor, Launching the Registry Editor primary data
types, Using Keys and Values VDM, Extend Your Screen Real Estate with Virtual Desktops video bit
rate, Best Settings for Recording Video videos, making with
Windows Movie Maker, Make Videos with Windows Movie Maker capturing video
properly, Capture the Video Properly digital video camera,
using, Capturing Video with a Digital Video Camera recording video, best
settings for, Best Settings for Recording Video preset
profiles, Best Settings for Recording Video viewer for files
(IrfanView), IrfanView Virtual Desktop
Manager
(VDM), Extend Your Screen Real Estate with Virtual Desktops activating, Extend Your Screen Real Estate with Virtual Desktops customizing, Extend Your Screen Real Estate with Virtual Desktops background
images, changing, Extend Your Screen Real Estate with Virtual Desktops keyboard
shortucts for switching
desktops, Extend Your Screen Real Estate with Virtual Desktops removing
program name from toolbar, Extend Your Screen Real Estate with Virtual Desktops taskbar
buttons for programs
running, Extend Your Screen Real Estate with Virtual Desktops switching between
desktops, Extend Your Screen Real Estate with Virtual Desktops virtual
machines JVMs, Make Sure You Have a Java Virtual Machine (JVM) Installed Microsoft
VM, Make Sure You Have a Java Virtual Machine (JVM) Installed Virtual Private
Network (VPN) residential gateways
and, Settings for Using a VPN setting
up, Set Up a Virtual Private Network virus masquerading as WindowBlinds
installer, Give XP a Makeover with WindowBlinds visual effects
(XP), system performance
and, Track System Performance with the Performance Console voice messages
vial email (in
Eudora), Check Your Mood with Eudora Voice over Internet
Protocol (see VoIP) VoIP, VoIP Hacks caller ID service
and, Troubleshoot VoIP Phone/Home Router Problems home routers
and, Troubleshoot VoIP Phone/Home Router Problems overview, VoIP Hacks Skype, VoIP Hacks Skype
calls and work
firewalls, Make Skype Calls at Work telephone versus
internet service, Get Your Vonage IP Phone to Work with DSL Vonage, VoIP Hacks Vonage and
DSL, Get Your Vonage IP Phone to Work with DSL Vonage, VoIP Hacks , Cut Your DSL Costs with VoIP W WAN MAC
address, Cloning a MAC Address for Your Router WAN requests, blocking from
network, Settings for Using a VPN war chalking
symbols, Go War-Driving for WiFi Access war driving for WiFi
access, Go War-Driving for WiFi Access building wireless
cantenna, Building a Homemade Wireless Cantenna for War-Driving definition
of, Go War-Driving for WiFi Access Network Stumbler
program, Go War-Driving for WiFi Access networks not part of
FreeNet, Go War-Driving for WiFi Access WAVClean
program, Cleaning up .wav files WaveCorrector
program, Cleaning up .wav files Web, Hacks 32-48 changing
appearance of Internet Explorer, Give Internet Explorer a Face-Lift cookies, Take a Bite Out of Cookies file downloads, speeding
up, Speed Up File Downloads Group Policy
Editor, customizing IE
with, Hack Internet Explorer with the Group Policy Editor Group
Policy Editory, customizing IE with, Speed Up File Downloads Java
applets, running without problems, Run Java Applets Without Crashes or Problems MSN Desktop
Search, Out-Google Google with MSN Desktop Search phishing
attacks, Don’t Get Reeled In by Phishers reading web
pages offline, Read Web Pages Offline saving web pages in
offline database, Save Web Pages in an Offline Database with Add-Ins searching the
Internet, Better Internet Searching from Your Desktop Google Toolbar,
using, Google Toolbar speeding
up access by changing DNS settings, Tweak DNS Settings for Faster Internet Access fixing DNS
problems, Fix DNS Problems HOSTS
file, Speed Up Web Access with a HOSTS File spyware, Kill Spyware and Web Bugs stopping pop
ups with SP2, Stop Pop Ups with SP2—and Without It surfing
anonymously, Surf Anonymously Without a Trace software
for, Get Software for Anonymous Surfing Web-based
anonymizer, Web-Based Anonymizer surfing the
Web anonymously, Surf Anonymously Without a Trace web
bugs, Watch Out for Web Bugs web site
hosting with IIS, Secrets of Web Site Hosting with Internet Information Services (IIS) web
bugs, Kill Spyware and Web Bugs , Kill Spyware and Web Bugs , Watch Out for Web Bugs web bugs, information transmitted
by, Watch Out for Web Bugs web-based email,
retrieving with your email software, Retrieve Web-Based Email with Your Email Software Hotmail mail,
getting with Hotmail Popper, Getting Hotmail Mail with Hotmail Popper Yahoo!
mail, getting with
YahooPOPs!, Getting Yahoo! Mail with YahooPOPs! WebFerret, See Also Webroot
Spy Sweeper, Protect Yourself Against Spyware Welty, Eudora, Check Your Mood with Eudora WEP
encryption, Go War-Driving for WiFi Access whiteboard, Collaborate Long-Distance with the Whiteboard closing
and saving sessions, Collaborate Long-Distance with the Whiteboard Select
Area button, Collaborate Long-Distance with the Whiteboard starting
with a
contact, Collaborate Long-Distance with the Whiteboard widgets, Konfabulator WiFi
encryption, Enable WiFi Encryption WEP, Setting Up WEP Encryption WPA, Setting Up WPA Encryption Advanced
Encryption System (AES), Setting Up WPA Encryption SP2
requirement, Setting Up WPA Encryption WiFi
networks, Go War-Driving for WiFi Access WiFi Protected Access (see WiFi
encryption, WPA) WiFi
standard, Go War-Driving for WiFi Access equipment compatibility for different
802.11x versions, Extend the Range of Your Wireless Network WiFi, ad hoc network
setup, Set Up an Ad Hoc WiFi Network wildcards (*
and ?) in Indexing Service
queries, Searching Using Properties ** (double
asterisk), Searching Using Operators and Expressions Recovery
Console commands, use with, Hacking the Hack WinCustomize web
site, Downloading Skins from the Internet WindowBlinds
utility, Give XP a Makeover with WindowBlinds creating skins
for, Creating Your Own WindowBlinds Skins virus masquerading as
installer, Give XP a Makeover with WindowBlinds Windows modifying
or replacing problematic files, Fixing Windows older
programs, forcing to use XP
controls, Force Older Programs to Use XP Common Controls PowerDesk,
using with different versions, Empower Windows Explorer with PowerDesk Pro version, showing on
desktop, Customize the GUI with Tweak UI windows customizing
appearance
of, Roll Your Own Themes whiteboard
sessions, selecting for, Collaborate Long-Distance with the Whiteboard Windows Address
Book contact information for Outlook
Express, Backing Up Outlook Express Manually contact information
in, Backing Up Outlook Manually Windows
Component Wizard, Remove “Uninstallable” XP Utilities Windows
Explorer, Hacks 21-31 All Programs menu,
reorganizing, Organize the All Programs Menu with Explorer Better File
Rename utility, Better File Rename Briefcase, Use the Briefcase for Mobile File Transfers files,
information about, A Closer Look at the Briefcase mobile
file transfers
with, Use the Briefcase for Mobile File Transfers command-line
prompt on
desktop, Put a Command-Line Prompt on Your Desktop command-line
shortcuts for customized
views, Control Windows Explorer with Command-Line Shortcuts desktop
shortcuts, Create Desktop Shortcuts for Explorer GUIDs, using
with, Using Globally Unique Identifiers with Command-Line Switches context
menu,
improving, A Power User’s Hidden Weapon: Improve the Context Menu command prompt,
opening, Open the Command Prompt from the Right-Click Menu copy/move to folder
options, Add Copy To Folder and Move To Folder Context Menu Options Open With
option, Clean Up the Open With Option Send To
option, Add and Remove Destinations for the Send To Option customizing with
TweakUI, Customize the GUI with Tweak UI Encrypting File System
(EFS), Hide Folders and Files with the Encrypting File System behavior of encrypted
files/folders, Hide Folders and Files with the Encrypting File System decrypting
files/folders, Decrypting Files and Folders encrypting
files/folders, Encrypting Files and Folders encrypting/decrypting from command
line, Encrypting and Decrypting from the Command Line sharing encrypted
files, Letting Others Use Your Encrypted Files file
compression,
NTFS, Get More Hard-Disk Space by Using NTFS Compression converting previous
filesystems to, Convert Your Hard Disk to NTFS disk space saved
by, Checking How Much Disk Space NTFS Compression Saves folder compression, effects on
files, How Compressing Folders Affects Underlying Files improving NTFS
performance, Hacking the Hack ZIP files
versus, When to Use Zip Files and When to Use NTFS Compression folder icons
and balloon text,
customizing, Customize Folder Icons and Balloon Text generating
folder and file
listings, Generate Folder and File Listings for Printing or Editing Indexing Service
utility, Find Files Faster by Mastering the Indexing Service’s Query Language using the query
language, Using the Indexing Service’s Query Language offline
files synchronizations, on-demand and
scheduled, On-Demand and Scheduled Synchronizations synchronizing to/from LAN and your
laptop, Take Your Work on the Go with Offline Files and the Briefcase PowerDesk,
using, Empower Windows Explorer with PowerDesk Pro customizing
toolbars, Empower Windows Explorer with PowerDesk Pro shortcut
menu, customizing, Force Windows Explorer into True Usefulness adding menu items to specific file
types, Add Shortcut Menu Items to Specific File Types adding shortcut menu items to
all file types, Add Global Shortcut Menu Items to All File Types All Programs
menu, Organize the All Programs Menu with Explorer editing file association
actions, Edit File Association Actions removing menu
items, Remove Context Menu Items from Explorer thumbnail
image quality,
decreasing, Create a Speedy, Stripped-Down Interface with Tweak UI Windows File
Protection, Change the Picture That Appears on the XP Startup Screen Windows Media
Player, Fix Windows Media Player’s Privacy Problems Windows Media
Player and TweakMP, Hack Windows Media Player with TweakMP Windows
Messenger, Go Beyond Messaging with Windows Messenger .NET alerts, using
with, Using .NET Alerts with Messenger delivery of
alerts, Using .NET Alerts with Messenger editing/managing
alerts, Using .NET Alerts with Messenger signing up for
alerts, Using .NET Alerts with Messenger collaborating long-distance with
whiteboard closing and saving
sessions, Collaborate Long-Distance with the Whiteboard Lock Contents
button, Collaborate Long-Distance with the Whiteboard Select Area
button, Collaborate Long-Distance with the Whiteboard Select Window
button, Collaborate Long-Distance with the Whiteboard starting a
whiteboard, Collaborate Long-Distance with the Whiteboard Unsynchronize
button, Collaborate Long-Distance with the Whiteboard XP
Messenger Service
versus, Go Beyond Messaging with Windows Messenger Windows
Movie Maker, Make Videos with Windows Movie Maker Windows Server 2003,
Routing and Remote Access
utility, Control Another PC with Remote Access Windows Update web
site, Solve Windows Update Problems WinPcap, Stop Moochers from Stealing Your WiFi Bandwidth WinZip program, When to Use Zip Files and When to Use NTFS Compression wireless, Hacks 65-74 Address Resolution
Protocol (ARP), Hacking the Hack AirSnare
program, Stop Moochers from Stealing Your WiFi Bandwidth Bluetooth, Set Up Bluetooth on XP Bluejacking
and Bluesnarfing security issues, Securing Your Bluetooth Connection file
transfers on ad hoc networks, Bluetooth File Transfers installing, Installing Bluetooth Internet
connection with Bluetooth phone, Connect to the Internet with a Bluetooth Phone securing
connection, Securing Your Bluetooth Connection USB
adapter, Connect to the Internet with a Bluetooth Phone WiFi
versus, Networking with Bluetooth determining
if your network is hacked, Hacking the Hack extending
range of
networks, Extend the Range of Your Wireless Network Free Networks.org
web site, Go War-Driving for WiFi Access hotspot
fixes, Solve Hotspot Woes hotspots connection
stuttering, Solve Hotspot Woes , Stop Hotspot Stuttering sending
mail from, Sending Mail from Hotspots SMTP
relay services, Sending Mail from Hotspots SMTP
servers for popular hotspot providers, Sending Mail from Hotspots Windows
Zero Configuration (WZC) applet, Stop Hotspot Stuttering limiting
number of IP addresses on network, Limit the Number of IP Addresses on Your Network MAC
addresses and security, Check and Filter MAC Addresses protecting
home WiFi, Protect Your Home WiFi Network router logs
and traffic, Check Your Router Logs and Traffic SSID
security, Stop Broadcasting Your Network’s SSID stopping
bandwidth moochers, Stop Moochers from Stealing Your WiFi Bandwidth tracking an
attacker, Get Back at the Attacker war
driving, Go War-Driving for WiFi Access WiFi
encryption (see WiFi encryption) Wireless Equivalent Protocol (see WiFi
encryption, WEP) Wireless Network
Connection Status screen, Go War-Driving for WiFi Access , Check WiFi Network Performance with Qcheck to Help Improve Throughput wireless
networks extending range
of antennas (access point or PCs), avoiding
placing near large metal
objects, Extend the Range of Your Wireless Network avoid putting access point next to outside
wall, Extend the Range of Your Wireless Network avoid putting access point or PCs near
microwaves or cordless
phones, Extend the Range of Your Wireless Network centrally locate access
point, Extend the Range of Your Wireless Network equipment incompatibility for different
versions of 802.11x standard, Extend the Range of Your Wireless Network external and booster antennas, use
of, Extend the Range of Your Wireless Network placement for access point and wireless PCs,
experimenting with, Extend the Range of Your Wireless Network vertical orientation of access point
antennas, Extend the Range of Your Wireless Network wireless PC antennas, pointing toward access
point, Extend the Range of Your Wireless Network war driving for WiFi
access building wireless
cantenna, Building a Homemade Wireless Cantenna for War-Driving grassroots community networking
(FreeNets), Go War-Driving for WiFi Access mapping wireless
networks, Mapping Wireless Networks Network Stumbler
program, Go War-Driving for WiFi Access word processors, editing .reg
files, Change the Default Editor for .reg Files Word, launching
with command-line shortcuts, Customizing Shortcuts with Switches and Parameters Z ZIP file
compression Backup Plus program
files, Get a Better Backup Program email
attachments, sending as .zip files, Force Outlook to Let You Open Blocked File Attachments managing files with
PowerDesk, Empower Windows Explorer with PowerDesk Pro NTFS
versus, When to Use Zip Files and When to Use NTFS Compression previewng contents of compressed
files before downloading, Speed Up File Downloads zombie
networks, Don’t Get Reeled In by Phishers ZoneAlarm
firewall, Protect Yourself Against Spyware , ZoneAlarm: The World’s Best Free Firewall allowing specific unsolicited inbound
traffic through, Punch a Hole Through ZoneAlarm configuring to block
Trojans, Configuring ZoneAlarm to Block Trojans versions, ZoneAlarm: The World’s Best Free Firewall
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.