reklama - zainteresowany?

Windows Server Hacks. 100 Industrial-Strength Tips & Tools - Helion

Windows Server Hacks. 100 Industrial-Strength Tips & Tools
ebook
Autor: Mitch Tulloch
ISBN: 978-14-493-5824-2
stron: 386, Format: ebook
Data wydania: 2004-03-24
Księgarnia: Helion

Cena książki: 101,15 zł (poprzednio: 117,62 zł)
Oszczędzasz: 14% (-16,47 zł)

Dodaj do koszyka Windows Server Hacks. 100 Industrial-Strength Tips & Tools

Tagi: Windows Server

One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script!But what about the other ten percent of the time? While it's true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server.Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs.The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery.No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.

Dodaj do koszyka Windows Server Hacks. 100 Industrial-Strength Tips & Tools

 

Osoby które kupowały "Windows Server Hacks. 100 Industrial-Strength Tips & Tools", wybierały także:

  • Mastering Windows Server 2019
  • Mastering Active Directory
  • Microsoft Exchange Server 2016 PowerShell Cookbook - Fourth Edition
  • Mastering Active Directory
  • Mastering Windows Presentation Foundation

Dodaj do koszyka Windows Server Hacks. 100 Industrial-Strength Tips & Tools

Spis treści

Windows Server Hacks. 100 Industrial-Strength Tips & Tools eBook -- spis treści

  • Windows Server Hacks
  • A Note Regarding Supplemental Files
  • Credits
    • About the Author
    • Contributors
    • Acknowledgments
  • Foreword: Im a Sci-Fi freak
  • Preface
    • Why Windows Server Hacks?
    • Getting and Using the Scripts
    • How to Use This Book
    • How This Book Is Organized
    • Conventions Used in This Book
    • Using Code Examples
    • How to Contact Us
    • Got a Hack?
  • 1. General Administration
    • Hacks #1-16
    • Use Run As to Perform Administrative Tasks
      • How Run As Works
      • Limitations of Run As
        • Running programs without an executable
        • Running programs from network shares
      • Run As Shortcuts
    • Drag and Drop to the Run Menu
    • Find and Replace Registry Keys from a Command Line
      • The Code
      • Running the Hack
    • Automatically Log On After Booting
      • Manual Configuration
      • Script Method
      • Sysinternals Tool
    • Wait for and Optionally Terminate a Process
      • The Code
        • Main routine
        • Check if process is running
        • Terminate the process
        • Wait for process to terminate
      • Running the Hack
    • Shut Down a Remote Computer
      • The Code
      • Running the Hack
    • Rename Mapped Drives
      • The Code
      • Running the Hack
    • Execute a Command on Each Computer in a Domain
      • The Code
      • Running the Hack
    • Add, Remove, or Retrieve Environment Variables
      • The Code
      • Running the Hack
    • Extend Group Policy
      • ADM Files
      • Hacking ADM Files
    • Disable EFS
      • The Problem
      • The Solution
        • Disabling EFS for a file
        • Disabling EFS for a folder
        • Disabling EFS for a system
    • Get Event Log Information
      • The Code
      • Running the Hack
    • Shortcut to Remote Assistance
    • Desktop Checker
      • The Code
      • Running the Hack
    • Top Five Tools
      • Server Monitor Lite
      • Lost Password Recovery
      • Data Replicator
      • Virtual Network Computing (VNC)
      • Network View
    • myITforum.com
      • History
      • Scope
  • 2. Active Directory
    • Hacks #17-24
    • Retrieve the List of Old Domain Computer Accounts
      • The Code
      • Running the Hack
    • Automate Creation of OU Structure
      • The Code
      • Running the Hack
    • Modify All Objects in the OU
      • The Code
      • Running the Hack
    • Delegate Control of an OU to a User
      • The Code
      • Running the Hack
    • Send OU Information in Active Directory to an HTML Page
      • The Code
      • Running the Hack
    • Display Active Directory Information
      • List All Computers in the Domain
      • Get a List of All Domains
      • Get AD Site
      • Find a DC in a Site
      • List Trust Relationships
    • Store and Display Contact Information in Active Directory
      • The Code
      • Running the Hack
    • Restore the Active Directory Icon in Windows XP
      • The Easy Way
      • The Hard Way
  • 3. User Management
    • Hacks #25-35
    • Search for Domain Users
      • The Code
      • Running the Hack
    • Manage User Accounts in Active Directory
      • Changing a Users Domain Password
      • Changing User Account Names in Active Directory
      • Unlocking a Windows 2000 Domain Account
      • Disabling a Domain Account
      • Setting the Account to Not Expire
    • Get a List of Disabled Accounts
      • The Code
      • Running the Hack
    • Get User Account Information
      • The Code
      • Running the Hack
      • Hacking the Hack
    • Check for Passwords that Never Expire
      • The Code
      • Running the Hack
    • Enumerate Group Membership to a CSV File
      • The Code
      • Running the Hack
    • Modify User Properties for All Users in a Particular OU
      • The Code
      • Hacking the Hack
    • Check Group Membership and Map Drives in a Logon Script
      • The Code
      • Running the Hack
    • Script Creation of a Users Home Directory and Permissions
      • The Code
      • Running the Hack
    • Prevent Ordinary Users from Creating Local Accounts
    • Put a Logoff Icon on the Desktop
      • The Code
  • 4. Networking Services
    • Hacks #36-47
    • Manage Services on Remote Machines
      • Getting Remote Computer Service Information
        • The code
        • Running the hack
      • Changing the Start Mode for a Service
        • The code
        • Running the hack
      • Changing a Service Password
        • The code
        • Running the hack
    • Simplify DNS Aging and Scavenging
      • Why Scavenge?
        • DHCP process
        • DDS process
      • How to Use Scavenging
      • For the Advanced Pack Rat
      • See Also
    • Troubleshoot DNS
      • DNS Troubleshooting Tools
      • Troubleshooting Common DNS Issues
      • DNS Newsgroups
      • DNS Books
    • Manually Recreate a Damaged WINS Database
      • Windows NT 4.0
      • Windows Server 2000/2003
    • Change WINS for All Enabled Adapters
      • The Code
      • Running the Hack
    • Ensure DHCP Server Availability
      • Installing Redundant DHCP Servers
      • Backing Up the DHCP Database
      • Recovering the Database
    • Change a Network Adapters IP Info
      • The Code
      • Running the Hack
    • Change from Static IP to DHCP
      • The Code
      • Running the Hack
    • Release and Renew IP Addresses
      • The Code
      • Running the Hack
    • Use netsh to Change Configuration Settings
      • Using netsh
    • Remove Orphaned Network Cards
    • Implement Windows 2000 Network Load Balancing
      • Two NIC Environment
      • Sample Environment
  • 5. File and Print
    • Hacks #48-53
    • Map Network Drives
      • The Code
      • Running the Hack
    • Determine Who Has A Particular File Open on the Network
    • Display a Directory Tree
      • The Code
      • Running the Hack
    • Automate Printer Management
      • CON2PRT
      • RUNDLL32
    • Set the Default Printer Based on Location
      • The Code
      • Running the Hack
    • Add Printers Based on Name of Computer
      • The Code
        • Perform initial tasks
        • Determining workstation settings
        • Adding mappings based on group membership
        • Setting the IE home page and final message
        • Connecting to a shared network printer
        • Mapping a drive to a shared folder
        • Gathering local group memberships
        • Gathering global group memberships
        • Determining if user belongs to a specified group
        • Gathering basic information about the local system
        • Determining if the script is running in a terminal server session
        • Setting up IE for use as a status message window
        • Using IE as a status message window
      • Running the Hack
  • 6. IIS
    • Hacks #54-61
    • Back Up the Metabase
      • Why Back Up the Metabase?
      • Advanced Backup Settings
      • Quick Backups
        • IIS 5
        • IIS 6
        • GUI differences between IIS 5 and IIS 6
    • Restore the Metabase
      • Manually Restoring a Backup in IIS 5
        • Restoring without metabase backups
        • Restoring without a backup on tape
        • Reinstalling IIS
      • Manually Restoring a Backup in IIS 6
      • See Also
    • Map the Metabase
      • Logical Structure
        • Location map for IIS 5
        • Location map for IIS 6
      • Physical Structure
        • XML map for IIS 6
    • Metabase Hacks
      • ServerListenBacklog
      • MaxEndPointConnections
      • AspThreadGateEnabled
      • AspProcessorThreadMax
      • AspAllowSessionState
      • AspBufferingOn
      • AspQueueConnectionTestTime
      • AspScriptFileCacheSize
      • CacheISAPI
      • ID 36907
    • Hide the Metabase
    • IIS Administration Scripts
      • IIS 5 Scripts
        • AdminScripts
      • IIS 6 Scripts
        • Creating and managing web sites
        • Managing the metabase
        • Managing web applications
        • Running scripts remotely
      • Custom Scripts
      • Where to Find More Scripts
    • Run Other Web Servers
      • Disabling Socket Pooling in IIS 5
      • Disabling Socket Pooling in IIS 6
      • Other Reasons to Disable Socket Pooling
    • IISFAQ
      • My Favorites
  • 7. Deployment
    • Hacks #62-68
    • Get Started with RIS
      • Requirements for RIS
        • Hardware requirements
        • Services associated with RIS
      • Installing RIS
    • Customize RIS
      • Configuring RIS
      • Predefining computer accounts in RIS
      • Client Installation Wizard
      • RIS Custom Installation Wizard
      • Deploying Windows Images
    • Tune RIS
    • Customize SysPrep
      • Getting Started
      • Understanding the SysPrep.inf
        • SysPrepMassStorage
        • Unattended
        • GuiUnattended
        • UserData
        • Display
        • Identification
        • Networking
        • GuiRunOnce
    • Remove Windows Components from the Command Line
      • Running the Hack
    • Unattended Installation of Windows Components
      • Running the Hack
    • Easily Create a Network Boot Disk
  • 8. Security
    • Hacks #69-78
    • Fundamentals of a Virus-Free Network
      • Awareness
      • Antivirus Software
      • Interception
      • Interception Redux
    • Antivirus FAQ
      • Is It Real or a Hoax?
      • Disabling Antivirus Programs Is Not Enough
      • Kernel32.exe Has Encountered a Problem
      • Stinger Tool
    • Rename the Administrator and Guest Accounts
      • Some Considerations
    • Get a List of Local Administrators
      • The Code
      • Running the Hack
      • Hacking the Hack
    • Find All Computers that Are Running a Service
      • The Code
      • Running the Hack
    • Grant Administrative Access to a Domain Controller
    • Secure Backups
      • Using Backup Operators
      • Restricting Access to Backups
    • Find Computers with Automatic logon Enabled
      • Hacking the Hack
    • Security FAQ
      • Steps to Computer Security
        • Consumers
        • Businesses
      • Vulnerability Types
      • Strong Password Policy
      • How Microsoft Handles Security
      • Reporting Security Incidents to Microsoft
      • Reporting Security Incidents to Government Authorities
      • Getting Government Security Clearance
    • Microsoft Security Tools
      • Assessment, Patch Management, and Software Update Services and Tools
      • Automatic Scan and Update Tools for Windows and Office
      • Lockdown, Auditing, and Intrusion Detection Tools
      • Virus Protection and Cleaner Tools
      • Top Security RFCs
  • 9. Patch Management
    • Hacks #79-89
    • Best Practices for Patch Management
      • Patch Flavors
        • Hotfixes
        • Roll-ups
        • Service packs
        • MSRC Ratings System
      • Strategies for Patch Management
        • Policy
        • Process
        • Persistence
      • Patch-Management Tools
        • Windows Update
        • Automatic Updates
        • Software Update Services (SUS)
        • SMS Software Update Services Feature Pack
        • Third-party tools
    • Beginners Guide to Enterprise Patch Management
      • Identifying Vulnerable Systems
      • Assessing the Business Impact of Patching
      • Packaging Patches for Distribution
      • Testing Patches
      • Evaluating Successes and Failures
      • Finishing Up
      • See Also
    • Patch-Management FAQ
      • Downloadable Security Updates
      • Article and Bulletin Search
      • Email Notification
      • Old Updates
      • Updates for Older Operating Systems
      • MBSA Support
    • Enumerate Installed Hotfixes
      • The Code
      • Running the Hack
    • Apply Patches in the Correct Order
    • Windows Update FAQ
      • Windows Update Information Collection
      • Personalizing Critical Updates
      • Clearing the Secure Sockets Layer
      • Removing Items from Your Windows Update List
      • Changing Windows Update Schedule
      • Manually Installing the Windows Update Controls
    • Obtain Updates via the Windows Update Catalog
      • Adding the Windows Update Catalog to Windows Update
      • Downloading Windows Updates from the Windows Update Catalog
      • Downloading Driver Updates from the Windows Update Catalog
    • Use Automatic Updates Effectively
      • Using Automatic Updates
      • Hacking Automatic Updates
    • Use Group Policy to Configure Automatic Updates
      • Some Recommendations
      • Digging Deeper
    • Automatic Updates FAQ
      • Service Still Running After Disabling AutoUpdate
      • Disabling Critical Update Notification
      • AU Overrides WU
    • Software Update Services FAQ
      • Operating System Support
      • Active Directory Support
      • Separating Workstations and Servers
      • Control Panel Icon
      • Approving Updates After First Synchronization
      • Downloading and Testing Updates
      • Order of Updates
      • Detecting Connection
      • Knowing When the Server Is Synching
      • Cleaning the Updates Directory
      • Modifying SUS IIS Rights
      • Analyzing the SUS Log Files
      • TimeExpire
      • SUS and Name-Resolution Issues
      • SUS Feedback
  • 10. Backup and Recovery
    • Hacks #90-100
    • Collect Disaster Recovery Files
      • The Code
        • Disaster.bat
        • ReadList.bat
        • PassList.bat
        • ServerList.txt
      • Running the Hack
        • Disaster.bat
        • ReadList.bat
        • PassList.bat
        • ServerList.txt
      • Conclusion
    • Back Up Individual Files from the Command Line
      • Creating a .bks file
      • Hacking the .bks file
    • Back Up System State on Remote Machines
      • Configuring Backup on the Remote Machine
      • Configuring Backup on the Local Machine
      • Evaluating This Approach
    • Back Up and Restore a Certificate Authority
      • Backing Up a CA
      • Certification Authority Backup Wizard
      • Restoring a CA to a Working Server
      • Restoring a CA to a Different Server
      • Decommissioning the Old CA
    • Back Up EFS
      • Backing Up Encrypted Data and EFS Keys
      • Restoring EFS Keys
      • Backing Up Recovery Agent Keys
    • Work with Shadow Copies
      • Implementing Shadow Copies
      • Using Shadow Copies
      • Traps
    • Back Up and Clear the Event Logs
      • The Code
      • Running the Hack
    • Back Up the DFS Namespace
      • DFScmd
      • DFSUtil
    • Recover with Automated System Recovery
      • ASR Backup
      • ASR Restore
        • Using ASR restore
        • Hacking the restore
      • Using ASR
    • Recovery Roadmap
      • Windows 2000
        • Last Known Good Configuration
        • Safe Mode
        • Recovery Console
        • Windows Startup Disk
        • Emergency Repair Process
      • Windows Server 2003
      • Right Tool for the Job
    • Data Recovery of Last Resort
  • Index
  • About the Author
  • Colophon
  • Copyright

Dodaj do koszyka Windows Server Hacks. 100 Industrial-Strength Tips & Tools

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.