123

 

[转]119 Tips for Passing the Microsoft Windows

1. The minimum installation requirement for processors is a Pentium 233MHz or higher.

2. Installation requires 1500MB free disk space on a 2000MB Partition.

3. Dual-booting is supported for Windows 95, Windows 98, Windows NT 4.0 (Service Pack 4.0 or greater is required), Windows NT 3.51, Windows for Workgroups 3.11, Windows 3.1, MS-DOS, OS/2, Windows 2000 Server, Windows 2003 Server and other installations of Windows 2000.

4. Two executable setup files exist: Winnt.exe (for command-prompt and 16-bit environment) and Winnt32.exe (for 32-bit operating systems such 98,2000,…)

5.Windows XP works with NTFS V 5, FAT, and FAT32 file systems. FAT is needed for MS-DOS, the Windows 3.x operating systems, and the first release of Windows 95.

6. Unattended installations allow you to configure the operating system with little or no human intervention. There are three primary methods of unattended installations: RIS (Remote Installation Service) is a service that runs on a Windows 2003 Server. The System Preparation Tool (Sysprep.exe) is used to prepare an ideal Windows XP Professional workstation to have an image made of it. Setup Manager is used to create answer files (known as Uniqueness Database Files, or UDFs) for automatically providing computer or user information during

7.When using an answer file on a diskette it must be named Winnt.sif, not Unattend.txt.

8. Upgrades can be done from Windows 98, Windows NT Workstation 4.0, and Windows NT Workstation 3.51.

9. Winnt32.exe initiates the upgrade from most other operating systems.

10.You cannot upgrade if start setup by Boot From CD-ROM

11. A service pack is a self-running program that modifies your operating system. Upgrades to Windows XP come in the form of service packs. Each service pack contains patches and fixes to operating systems components that need such, as well as additional features.

12.The /duprepare switch prepares the downloaded update files to be used during an installation with the /dushare switch.

13.We should use the "/SOS switch in the boot.ini startup file. This switch causes the names of drivers to be displayed as they load during boot.

14.The /fastdetect switch is used by default. It makes the early boot process, NTDETECT, skip the detection of parallel and serial devices (Plug and Play will find them). This makes booting faster. You cannot configure the /fastdetect switch to log information on device drivers.

15.To use RIS the computer must be configured to boot from the network.

16.RIS does not need to run on a domain controller. A RIS server must be authorized in Active Directory before it is running.

17. The CONVERT.EXE utility allows you to convert a FAT or FAT32 file system to NTFS without losing data.

18.Windows XP includes an uninstall feature which allows us to uninstall Windows XP after upgrade and return to the previous operating system.

19.The bootcfg command is a Microsoft Windows XP Recovery Console command that manipulates the Boot.ini file.

20.Windows XP doesn’t have a driver for the SCSI-controller and so can’t find a hard disk to install onto. Therefore, you must install SCSI driver during setup.

21.Each account has a different Security Identifier (SID). The permissions on the files are specific to the SID of the user account.

22.The minimum recommended setting of the page file is 1.5 times the physical memory.

23.The Fixboot command writes a new partition boot sector to the system partition.

24.Using the system volume for the paging file will slow the performance.

25.If the system is unable to start after installing a troublesome driver, the first step in troubleshooting is to start the computer with the Last Known Good Configuration.

26.The fax service is not able to receive faxes by default.

27.The scanstate and loadstate tools are part of the User State Migration Tool. These tools can be used to collect user data and settings from one machine and load them on to another machine.

28.only one web site is supported on Windows XP/2000 Professional IIS.

29.To create a striped volume, the disks must be converted to dynamic disks.

30.The backup operators group has permission to access storage devices and to bypass file permissions to backup files.

31. The permissions, attributes, and characteristics of files and folders depend greatly on the file system on which Windows XP is install.

32. Share permissions apply only when a user is accessing a file or folder through the network.

33. Local permissions and attributes are used to protect the file when users are local.

34. The NTFS permissions for a folder are located on the Security tab of its Properties dialog box.

35. With NTFS, permissions can be individually allowed or denied on a per-folder basis. You can assign any combination of these values: Full Control, Modify, Read & Execute, List Folder Contents, Read, and write

36. The Advanced command button enables you to configure auditing and ownership properties.

37. NTFS file permissions are: Full Control, Modify, Read+Execute, Read, and Write.

38. The Deny permission overrides all other permissions. In the absence of Deny, rights accumulate through individual and group assignments, as well as through folder and file assignments. (In the case of a conflict, file permissions override folder permissions.)

39. Moving or copying a file to a new directory could change the permissions on an NTFS file.

40. Using the NTFS file system, it is possible to configure files and folders for file-level compression if you have Write permissions. Compression conserves disk space but does not reduce the estimation of how much space the user is utilizing when computing disk quotas.

42. Encryption and compression settings appear in the same frame on the dialog box. The two features are mutually exclusive: You cannot compress encrypted files or encrypt compressed files.

43. Share permissions differ significantly from NTFS permissions: 1) They apply to users accessing the resource remotely and not locally. 2) They work with Windows and DOSbased file systems (NTFS, FAT, or FAT32). 3) They work in conjunction with other permissions.

44. Folder share permissions are: Full Control, Change, Read.

45. A folder can be shared under an unlimited number of names after it has been shared the first time. This is used to set another permission for one resource.

46. NET SHARE enables you to create shares from the command prompt.

47. You can "hide" a share (prevent it from appearing in My Network Places) by adding a dollar sign ($) to the end of the share name.

48. For every Windows XP computer, three hidden shares are created automatically: 1) C$ is the root of the computer's drive. A similar share (such as D$, E$, and so on) will be created for each hard drive partition on a system. 2) ADMIN$ is the root of the partition on which Windows 2000 has been installed. 3) IPC$ is the remote IPC (InterProcess Connect) share used for networking.

49. To reach the Print Server Properties dialog box, open the Printers folder, and then choose File, Server Properties.

50. For the Internet printer option, you must specify an URL within the Setup Wizard to go on to the next dialog box.

51.Internet printing require IIS .

52.By default, anyone with Allow-Print permission can manage their own print jobs.

53.Unreadable text usually indicates an incorrect printer driver. We need to install the correct driver.

54. Bi-directional support allows the printer to send unsolicited messages (such as "Out of Paper" or "Low on Toner") to the workstation. The Printer Priority defaults to 1, but it can be any number between 1 and 99

55. When more than one printer is printing to the same printing device, it is useful to change priorities (to allow the one with the highest priority to print first).

56. Separator Page lets you choose one of three predefined separator pages or create one of your own. By default, Windows XP does not separate print jobs or use a separator page.

57. A printer pool is a single logical printer that prints to more than one printing device. It prints jobs sent to it to the first available printing device and provides the throughput of multiple printing devices with the simplicity of a single printer definition.

58. The Computer Management utility offers a storage component that provides the basis for working with disk devices.

59. The heart of most disk operations resides in the Disk Management tool. You must be a member of Administrators to access this tool.

60. The System volume holds the files needed to boot the system (the boot files); the Boot volume holds the files needed by Windows 2000 Professional (the system files).

61. Formatting the drive deletes all data on it. Converting the drive to NTFS (using the Convert.exe utility) does not delete the data.

62. The disadvantages and limitations of converting to dynamic disks are: 1) Cannot contain partitions or logical drives; 2) Cannot be accessed by operating systems other than Windows XP; 3) Dynamic disks are not supported on portable computers.

63. Windows XP Professional, like Windows 98, supports the use of more than one monitor for creating the output display. Up to 10 monitors can be combined, with the desktop display divided between them—each capable of having different resolution and color depth.

64. Windows XP uses ACPI for all power management, from shutdown when low on battery to startup at the touch of a keyboard key. The options that can be configured from the Power Options applet in Control Panel are: Power Schemes (allows you to choose the role of the machine), Advanced (choose whether power-related icons should appear in the taskbar), Hibernate (choose whether this stage is available).

65.Hibernation is an ACPI feature.

66.. System Information is useful for obtaining a quick snapshot of the system. Beneath Hardware Resources are six subcomponents that offer the system resource overview: Conflicts/Sharing, DMA, Forced Hardware, I/O, IRQs, and Memory.

67. If Microsoft can verify that executable files do not behave erratically or cause system problems or identifiable failures, Microsoft signs the file digitally.

68. When an administrator or user attempts to install a new component, the system automatically looks for the signature. By default, a system always looks for a driver signature; this feature is known as System File Protection.

69. SIGVERIF.EXE looks for files that are not digitally signed.

70. The System File Checker utility keeps the operating system alive and well. SFC.EXE automatically verifies system files after a reboot to see whether they were changed to unprotected copies. Storing system files in two locations consumes a large amount of disk space.

71. Task Scheduler allows you to configure jobs to run automatically. For a job to run in unattended mode, a username and associated password with proper permissions to run the application must be provided.

72. When you select the Make Available Offline choice, the Offline File Wizard starts. You can have reminders pop up regularly when you are working offline to tell you that you are not connected to the network.

73.Enabling offline files is a two step process. First, it must be enabled on the shared files by allowing the caching of the files.

74. The Synchronization Manager offers three tabs: Logon/Logoff (allows you to configure whether synchronization should occur when you log on and/or log off or whether you should always be prompted before you take any action), On Idle (allows you to configure the items to be updated when the system is idle), and Scheduled (allows you to define synchronization jobs).

75.A baseline is a history of performance over time and is used to compare against current activity.

76. Within the System Monitor, the workstation is divided into a number of different objects. The following objects are normally found in System Monitor: Browser, Cache, IP, LogicalDisk, Memory, Network Interface, Objects, Paging File, PhysicalDisk, Process, Processor, Redirector, Server, Server Work Queues, System, TCP, Telephony, Thread, and UDP.

77. For each object, System Monitor has one or more counters (subsets of the overall object). There are two types of counters: actual (a true number or an average) and percentage (from 0 to 100).

78. Performance Logs and Alerts fall into three sections: Counter logs, trace logs, alerts.

79. The five common areas of bottlenecks include: memory, processor, disk, network, and applications.

80. If the amount of RAM you want to allot to the OS is less than what is installed in your system, you must use the /MAXMEM switch in the BOOT.INI file.

81.DiskPart is a Windows XP Professional tool which allows the administrator to handle disk administrative tasks from a command prompt. Diskpart enhances the Disk Administrator graphical user interface (GUI).

82. Most desktop computers should have only one hardware profile because the hardware will not deviate greatly. The hardware connected to a laptop/mobile computer can differ from day to day, based on where it is being used.

83. If a system has multiple hardware profiles, a menu of the choices will appear during the boot process.

84. The User Profile is the portion of the Registry that is customizable for every user and is stored in NTUSER.DAT. Whenever a user logs in to a system, he or she automatically creates a local profile on that system, by default.

85. The profile will be found in {root drive}:\Documents and Settings\{username}. Profiles can contain the following desktop-related items: Application information, Cookies, Favorites, Files saved on the desktop, Local settings, My documents, My pictures, Nethood, Printhood, Recent, Send to, Shortcuts, Start Menu, and Template items.

86. To configure a user account to use a roaming profile, set the profile path in the Properties dialog box for that account. A roaming profile enables a user to have the same desktop regardless of the machine he or she uses. You can copy or delete profiles and change their type from the System applet.

87. A mandatory profile is a deviation on a roaming profile. It's configured like a roaming profile, but the file is renamed from NTUSER.DAT to NTUSER.MAN.

88. Multiple Language Support allows you to create documents that can be read in different languages and to change the information text presented in Windows XP Pro. To enable multiple languages, you must be a member of the Administrators group; open the Regional Options applet in Control Panel.

89. Windows Installer is divided into two components: an installer service for the client (MSIEXEC.EXE) and package files (which have the extension .MSI). .MSI files are the applications themselves and most often come from software vendors, but can be created internally by developers.

90.Always wait for the network at computer startup and logon policy. This would force the Windows XP clients to process the GPOs synchronously which guarantee that they are all applied.

91. MSI files contain relational databases (multiple tables) of instructions that need to be carried out. Windows Installer is a component of IntelliMirror and is tightly integrated with Group Policy. IntelliMirror also includes the ability to administer user settings, perform remote installation, and mirror data between the network and local machines.

92. The Accessibility Options applet allows you to configure the system for use by individuals with physical disabilities. Configuration can be done in areas related to the keyboard, mouse, display, or sound. Accessibility features automatically turn off after a set time. (Five minutes is the default.)

93. Name resolution is the process of translating user-friendly computer names to IP addresses. On a very small network, a static file named HOSTS can be used to translate host names to IP addresses in place of DNS.

94.The /flushdns switch of the Ipconfig command flushes the list of locally cached DNS names.

95. On a very small network, a static file named LMHOSTS can be used to translate NetBIOS names to IP addresses in place of WINS. The Import LMHOSTS button allows WINS to convert your static file to the WINS service.

96. DHCP automatically centralizes and manages the allocation of the TCP/IP settings required for proper network functionality for computers that have been configured as DHCP clients.

97.The ping command sends a series of ICMP echo requests to the specified computer.

98.The Alternative configuration feature enables mobile computers to have two different IP configurations, for example one at the office and one at home.

99. To determine the network settings a DHCP server has leased to your computer, type IPCONFIG /all at a command prompt.

100. Windows XP offers new parameters for IPCONFIG: /DISPLAYDNS (shows the contents of the DNS cache), /FLUSHDNS (flushes the contents of the DNS cache), /REGISTERDNS (renews all leases and DNS configuration), /SETCLASSID (changes the DHCP class ID), and /SHOWCLASSID (shows the DHCP class ID for all adapters).

101. If systems are on different subnets and cannot communicate, remember that TCP/IP requires routing to communicate between subnets.

102. NBTSTAT is a command-line utility that enables you to check the resolution of NetBIOS names to TCP/IP addresses. NETSTAT is a command-line utility that enables you to check the status of current IP connections. Executing NETSTAT without switches displays protocol statistics and current TCP/IP connections.

103. The Universal Naming Convention (UNC) is a standardized way of specifying a share name on a specific computer. Share names can refer to folders or printers. The UNC path takes the form of \\computer_name\share_name. Share names commonly are limited to 15 characters.

104. Many 16-bit applications do not work with UNC paths. If you need to work with a 16-bit application that doesn't work with UNC paths, you must map a drive letter to the shared folder or connect a port to the network printer.

105. You can view the currently shared resources from the command prompt by typing NET VIEW. You can assign network resources to drive letters from the command prompt by using the Net Use command and the UNC path of the resource.

106. The following authentication protocols are supported to make your connections as secure as possible: CHAP, EAP, MS-CHAP, MS-CHAPv2, PAP, SPAP, and smart cards.

107. CHAP is the Challenge Handshake Authentication Protocol, while MS-CHAP is the Microsoft Challenge Handshake Authentication Protocol (requires the communication to be between a Microsoft client and a Microsoft server). MS-CHAPv2 also requires the communication to be between a Microsoft client and a Microsoft server.

108. EAP is the Extensible Authentication Protocol; PAP is the Password Authentication Protocol (uses clear-text authentication).

109. Smart cards provide a certificate-based authentication.

110. The Encrypting File System (EFS) encrypts and protects file or folder contents. To use EFS, the file system must be NTFS, and the files must not be compressed. Some files (system files in particular) cannot be compressed. If you move/copy an encrypted file to one of these partitions, it becomes unencrypted.

111. Settings that are configured under Computer Configuration apply to the computer, regardless of who is using it. Settings configured under User Configuration apply only if the specified user is logged on.

112. In Windows XP, a user can be granted rights and permissions to resources in two ways: Individually (she is explicitly assigned a right or permission through her account), or as a group (she is a member of a group that has a right or permission).

113. The Profile Path designates a specific location on a specified server where the user's profile is going to be stored. The user profile contains the user portion of the Registry in the file NTUSER.DAT.

114. The most common path entered for the user profile is
\\{SERVER}\{PROFILESHARE}\%USERNAME%, where {SERVER} is replaced by the name of your server, and {PROFILESHARE} by the name of a folder for that user's profile. The %USERNAME% variable will expand to the name of the user, which makes it ideal for use in a template.

115. The logon script allows an administrator to configure common drive mappings, run central batch files, and configure the system.

116. Account policies are divided into two subsections: Password Policy and Account Lockout Policy.

117. Password Policy settings apply to all users on the system. It is not possible to have separate settings by group, user, and so on. Account Lockout Policies are settings that can be used to automatically lock the account should suspicious activity occur.

118. Auditing can be configured on nine pre-defined system events through the Local Security Policy shortcut within the Administrative Tools folder of the Control Panel: Audit Account Logon Events, Audit Account Management, Audit Directory Service Access, Audit Logon Events, Audit Object Access, Audit Policy Change, Audit Privilege
Use, Audit Process Tracking, and Audit System Events.

119. When auditing is configured, entries are written to the Security log, which can be viewed with the Event Viewer.

posted on 2009-05-17 15:32  Hiu  阅读(249)  评论(0编辑  收藏  举报

导航