Winternals defragmentation, recovery, and administration field guide

Provides information on Winternals tools that are used in many Microsoft networks worldwide. This book begins with a chapter describing the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. It also introduces a suite of Wint...

Πλήρης περιγραφή

Άλλοι συγγραφείς: Kleiman, Dave.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Rockland, MA : Syngress Pub., c2006.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781597490795
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 04688nam a2200337 a 4500
001 1/45430
008 140828s2006 us 001 0 eng
020 |a 0080489877 
020 |a 9780080489872 
020 |a 9781597490795 
020 |a 1597490792 
020 |a 1423775481 (electronic bk.) 
020 |a 9781423775485 (electronic bk.) 
035 |l 48390 
040 |a MEAUC  |b eng  |c MEAUC  |d OCLCQ  |d YDXCP  |d UMI  |d CEF  |d MERUC  |d DKDLA  |d CCO  |d E7B  |d OCLCQ  |d MHW  |d IDEBK  |d DEBSZ  |d OCLCO  |d N$T  |d TUU  |d OPELS  |d FVL  |d OCLCQ  |d OCLCF  |d OCLCQ  |d GR-PeUP 
245 0 0 |a Winternals defragmentation, recovery, and administration field guide  |h [electronic resource] /  |c Technical editor, Dave Kleiman. 
260 |a Rockland, MA :  |b Syngress Pub.,  |c c2006. 
300 |a 1 online resource (xxiv, 479 p.) :  |b ill. 
500 |a Includes index. 
505 0 |a Cover -- Contents -- Foreword -- Chapter 1: Recovering Your Computer with ERD Commander 2005 -- Introduction -- Utilizing ERD Commander 2005 -- Booting a Dead System -- Being the Locksmith -- Accessing Restore Points -- Removing Hotfixes -- Summary -- Frequently Asked Questions -- Chapter 2: Examining Your Computer -- Introduction -- Exploring Process Activity with Process Explorer -- Viewing and Controlling Process Activity Using Process Explorer -- The Dynamic Duo: Using Autoruns and Process Explorer Together to Troubleshoot Startups and Combat Malware -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 3: Checking the Security of Your Computer -- Introduction -- Viewing the Security Settings of Your Resources (AccessEnum) -- Listing the Users with Access to Encrypted Files (EFSDump) -- Moving/Deleting Files in Use on Reboot (PendMoves, MoveFile) -- Viewing Shared Resources and Their Access Permissions (ShareEnum) -- Investigating Suspicious Local Files (Sigcheck) -- Searching for Installed Rootkits (RootkitRevealer) -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 4: Computer Monitoring -- Introduction -- Viewing Users Who Are Logged On and What They're Doing -- Finding Open Resources and the Processes That Are Accessing Them -- Viewing All File Activity with Filemon -- Viewing All Registry Activity with Regmon -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 5: Disk Management -- Introduction -- Managing Disk Fragmentation (Defrag Manager, PageDefrag, Contig, DiskView) -- Getting Extended File/Disk Information (DiskExt, DiskView, NTFSInfo, LDMDump) -- Disk Volume Management (NTFSInfo, VolumeID, LDMDump) -- Managing Disk Utilization (Du, DiskView) -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 6: Recovering Lost Data -- Introduction -- Recovering Data Across a Network (Remote Recover) -- Recovering Files (FileRestore) -- Advanced Data Recovery and Centralized Recovery (Recovery Manager) -- Restoring Lost Active Directory Data (AdRestore) -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 7: System Troubleshooting -- Introduction -- Making Sense of a Windows Crash (Crash Analyzer Wizard) -- Identifying Errant Drivers (LoadOrder) -- Detecting Problematic File and Registry Accesses (FileMon, Regmon) -- Analyzing Running Processes (PsTools) -- Putting It All Together (FileMon, RegMon, PsTools) -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 8: Network Troubleshooting -- Introduction -- Monitoring Active Network Connections (TCPView, Tcpvcon, TCPView Pro) -- Performing DNS and Reverse DNS Lookups (Hostname) -- Getting Public Domain Information (Whois) -- Identifying Problematic Network Applications (TDIMon, TCPView Pro) -- Summary -- Solutions Fast Track -- Frequently Asked Questions -- Chapter 9: Tools for Programmers -- Introduction -- Implementing a Trace Feature (Deb. 
520 |a Provides information on Winternals tools that are used in many Microsoft networks worldwide. This book begins with a chapter describing the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. It also introduces a suite of Winternals solutions, including Recovery Manager. 
650 4 |a Client/server computing. 
650 4 |a Operating systems (Computers). 
655 4 |a Electronic books. 
700 1 |a Kleiman, Dave. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20140828  |p 00b48390  |q 00b48390  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781597490795 
856 4 |d /webopac/covers/03/48390_0080489877.jpg 
856 4 |d /webopac/covers/03/48390_9780080489872.jpg 
856 4 |d /webopac/covers/03/48390_9781597490795.jpg 
856 4 |d /webopac/covers/03/48390_1597490792.jpg