O'Reilly logo

Windows Vista Security: Praxisorientierte Sicherheit für Profis by Marcus Nasarek

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

916 | Index
user accounts (continued)
managing other people’s, 637
password
changing, 635
changing for other people, 642
controlling how used, 644
creating, 633
creating for other people, 640
recovery, 636
recovery for other people, 643
storing for recovery, 636
storing for recovery for other
people, 643
user environment variables, 702
user experience levels, 67–68
user interface, 19–56
appearance settings, 19
desktop settings, 20–38
saving files and folders to desktop, 21
show/hide desktop, 32
Start menu, 23–30
switch between windows, 32
system icons, 21
taskbar, 31–38
gadgets, 38–48
personal folder, 26
user profile settings, 19
user profiles, 699–702
settings, 19
User Rights Assignment policies, 796–799
Access Credential Manager as a trusted
caller, 797
Allow log on locally, 797
Change the time zone, 797
Create symbolic links, 797
Increase a process working set, 797
Modify an object label, 798
Windows XP versus Windows Vista, 798
users, switching, 16
User-specific Local Group Policy, 853
UTF-8, 870, 871
V
versions and features, 773–775
video cards, 147
Windows Media Center, 810–814
video codecs, 147
video drivers, 147
video DVDs (see DVD Maker)
video filter, 768
Videos folder, 353
View Magnifier icon, 221
Virtual Computer Based Rootkit
(VMBR), 513
virtual memory, 93–95
managing manually, 94
Virtual Private Network (VPN), 484, 503,
594
connections, creating, 610–612
proxy setting, 613
Routing and Remote Access Service
(RRAS), 503
Secure VPN, 503
Trusted VPN, 503
Virtual Private Network (VPN)
connection, 849
virtualized rootkits, 513
viruses, 515–520
antivirus programs, 518
detection techniques, 518
email, 516
embedded in video, audio, document, and
image files, 517
heuristic analysis and, 519
metamorphic, 519
polymorphic, 519
sandboxes and, 520
stealth boot, 516
Trojans, 517
worms, 516
Visual, 832
visual effects, 90–91
Volume control, 156
volumes
changing drive letters, 679
changing labels, 680
converting to NTFS, 681
deleting, 682
formatting, 678
recovering, 682
shrinking or extending, 676–678
VPN (see Virtual Private Network (VPN))
W
WAV audio, 260, 282, 334, 357
Weather gadget, 43
Welcome Center, 8
Add new users, 9
Connect to the Internet, 9
dial-up modem or ISDN, 10
DSL or cable modem that requires
username and password, 9

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required