Winternals defragmentation, recovery, and administration field guide
Provides information on Winternals tools that are used in many Microsoft networks worldwide. This book begins with a chapter describing the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. It also introduces a suite of Wint...
Άλλοι συγγραφείς: | Kleiman, Dave. |
---|---|
Μορφή: | Ηλεκτρονική πηγή |
Γλώσσα: | English |
Στοιχεία έκδοσης: |
Rockland, MA :
Syngress Pub.,
c2006.
|
Θέματα: | |
Διαθέσιμο Online: |
http://www.sciencedirect.com/science/book/9781597490795 |
Ετικέτες: |
Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
|
Πίνακας περιεχομένων:
- Cover
- Contents
- Foreword
- Chapter 1: Recovering Your Computer with ERD Commander 2005
- Introduction
- Utilizing ERD Commander 2005
- Booting a Dead System
- Being the Locksmith
- Accessing Restore Points
- Removing Hotfixes
- Summary
- Frequently Asked Questions
- Chapter 2: Examining Your Computer
- Introduction
- Exploring Process Activity with Process Explorer
- Viewing and Controlling Process Activity Using Process Explorer
- The Dynamic Duo: Using Autoruns and Process Explorer Together to Troubleshoot Startups and Combat Malware
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 3: Checking the Security of Your Computer
- Introduction
- Viewing the Security Settings of Your Resources (AccessEnum)
- Listing the Users with Access to Encrypted Files (EFSDump)
- Moving/Deleting Files in Use on Reboot (PendMoves, MoveFile)
- Viewing Shared Resources and Their Access Permissions (ShareEnum)
- Investigating Suspicious Local Files (Sigcheck)
- Searching for Installed Rootkits (RootkitRevealer)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 4: Computer Monitoring
- Introduction
- Viewing Users Who Are Logged On and What They're Doing
- Finding Open Resources and the Processes That Are Accessing Them
- Viewing All File Activity with Filemon
- Viewing All Registry Activity with Regmon
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 5: Disk Management
- Introduction
- Managing Disk Fragmentation (Defrag Manager, PageDefrag, Contig, DiskView)
- Getting Extended File/Disk Information (DiskExt, DiskView, NTFSInfo, LDMDump)
- Disk Volume Management (NTFSInfo, VolumeID, LDMDump)
- Managing Disk Utilization (Du, DiskView)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 6: Recovering Lost Data
- Introduction
- Recovering Data Across a Network (Remote Recover)
- Recovering Files (FileRestore)
- Advanced Data Recovery and Centralized Recovery (Recovery Manager)
- Restoring Lost Active Directory Data (AdRestore)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 7: System Troubleshooting
- Introduction
- Making Sense of a Windows Crash (Crash Analyzer Wizard)
- Identifying Errant Drivers (LoadOrder)
- Detecting Problematic File and Registry Accesses (FileMon, Regmon)
- Analyzing Running Processes (PsTools)
- Putting It All Together (FileMon, RegMon, PsTools)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 8: Network Troubleshooting
- Introduction
- Monitoring Active Network Connections (TCPView, Tcpvcon, TCPView Pro)
- Performing DNS and Reverse DNS Lookups (Hostname)
- Getting Public Domain Information (Whois)
- Identifying Problematic Network Applications (TDIMon, TCPView Pro)
- Summary
- Solutions Fast Track
- Frequently Asked Questions
- Chapter 9: Tools for Programmers
- Introduction
- Implementing a Trace Feature (Deb.