Description of how Windows optimizes the virtual memory to minimize the need for hard pagefaults.
Description of how the Push Flag in the TCP Header can optimize network buffer usage, but can increase latency.
Applications optimized to run on single CPU systems, will perform worse on multi CPU systems.
For security measures then one should consider disabling the ability to launch the 16 bit subsystem.
How to solve access denied error when trying to map network printer to LPT1
When the media is filled with bad sectors, then one can still try to recover the good bits.
How to use the shell keyword to quickly access special folders like the Send To folder.
How to make a DOS bootdisk on a USB pen drive.
Windows can activate NDIS 5 network hardware features for offloading the system processor.
Computer cannot start if no proper boot device exists, or if the active boot device fails.
Mount a file folder as a drive-letter, like a shortcut to make it easier to access the folder.
Use Windows Explorer to browse a remote internet server by adding it as a network place.
Utilities for mounting a FTP folder as a mapped netwok drive.
How to use a different font in the command prompt than Lucida Console and Raster Fonts.
Access Linux Ext2 / Ext3 partitions inside Microsoft Windows.
The hard disk performance is very dependent on the configuration of the disk cache.
It is possible to open a command prompt during the GUI part of the Windows install.
Description of the Graweg worm and how to protect against its SMB attacks.
Microsoft security update MS05-026 blocks for viewing compressed HTML (CHM) files placed on a network drive.
The disk defragmenter will fail to load if it not registered properly, or if the services it depends on are disabled.
Control in what order the drive letter and label should be shown in My Computer.
Memory manager should only mark a continuous memory block as free when the block has reached a certain size.
Microsoft Windbg makes it possible to diagnose what caused a BSOD, so one can replace the device that caused it.
Windows NT will fail to boot if it cannot find the files used to load the boot manager.
How the kernel memory area is divided into the different page pools.
Allow user interaction in command prompt scripts using environment variables.
Unlocker displays the open file handles, when trying to delete or move a file which is used by another application.
The Microsoft Installer (MSI) Package file is a compressed archive, which can be decompressed.
When deleting a partition then only the boot sector is modified, so by restoring the boot sector, then one will restore the partition.
Utility that can generate a wallpaper, which includes the computer system details.
Utility for creating group policy ADM files from registry files.
Details of how the Automatic Private IP Addressing (APIPA) takes over if no DHCP server is found.
Windows Professional / Home edition includes limitation for not handling more than 10 SMB connections.
USB makes it easy to attach a storage device and steal valuable data from a computer.
Create a cd-rom-, dvd- or usb-drive which Windows can boot from.
Driver Verifier can be used to stress device drivers and can detect if the drivers performs illegal operations.
MSN Messenger is an application by Microsoft that allows one to chat with friends and family.
The lookup cache for network files makes it faster to reopen a file placed on a remote share.
Opportunistic locking delivers good network performance but older implementations can lead to data loss.
Sharing violations on files placed on network shares are retried while they block immediately with local files.
Configure the perfect Windows installation before actually installing.
Microsoft Java Virtual Machine (JVM) contains security flaws and should be uninstalled and replaced with the Sun Java Runtime.
Scriptomatic makes it easy to extract system information through WMI using scripting.
Changing printer drivers in Windows NT can cause problems, and can require that the old drivers are remove manually first.
Configure the priority of how it should lookup the physical network address of a computer.
Description of the different ways Windows can convert a logical network name to a physical address.
Extension for the Windows Explorer so zip files can be opened like a normal directory.
Thumbnail View uses a cache to allow quicker viewing of folders with pictures, and one can change the quality of these thumbnails.
How to configure the location and size of the task scheduler log with all its events.
Different solutions for recovering a broken Windows installation.
The Last Known Good Configuration makes it possible to rollback to the previous good state of the system registry hive.
The Recovery Console allows one to restore the registry as part of system recovery.
Sticky keys is an accessibility features, that can be activated with a shortcut key (often by accident when inside a game).
Description of the Sasser worm and how to protect against its SMB attacks.
NetMeeting is an inter-message (IM) application by Microsoft which can create a virtual conference room for several users to chat and exchange documents.
Configure whether the num-lock, caps-lock or scroll-lock keys should be turned on or off at startup.
How to increase the allowed amount of concurrent I/O request for a disk controller.
Windows is configured by default to handle 1000 to 2000 concurrent tcpip connections.
Description of where and in what order programs are loaded at startup.
The command prompt can be used to configure almost anything, and be used to create advanced batch jobs for trivial tasks.
How to use the registry editor to configure the state of the Windows services.
Change which network protocol to use first when looking for a resource on the network.
Change which network redirector to use first when looking for a resource on the network.
Assign specific drive letters for removable drives.
How to change the size of the NTFS transaction log to handle peak loads.
Tweakomatic will take over where group policies cannot handle it any longer.
Windows Explorer will automatically request extended file information when trying to open a file on a network share.
Windows Explorer sends a Change Notification request to the remote server when mapping a network share.
Description of different causes and solutions to network problems.
Description of how Windows services are hosted within the same process.
Description of the nagle algorithm effects on the network throughput, and how to configure the delayed ACK.
How to configure the password encryption level for better security.
The different password encryption algorithms available in the Microsoft Network.
How the security features in SMB signing can protect the network.
Hibernation requires a file as big as the size of the physical memory, which it dumps the contents of the memory to hibernate.
System Properties can be modified to display company name or company pictures.
Active Desktop enables customization of folders like they were web pages.
CPU core temperature monitoring utilities, that can give alerts if things gets too hot.
Description of the different situations where Windows NT can fail to boot because it no longer can find the boot device.
Description of the Blaster worm and how to protect the operating system from its RPC attacks.
How to use the services snapin to configure the state of the Windows services.
Utility for analyzing the computer configuration and alerts if any security issues are detected.
Changing the behavior and visual appearance of the task bar.
How to manually uninstall an application and remove it from the Add/Remove list.
Disable the beep from the PC speaker when Windows performs an alert.
Description and recommended settings for the Netmeeting Remote Desktop Sharing service.
Description and recommended settings for the Human Interface Device Access service.
How to configure which port number to use for Netbios communcations.
Enhance the file copy abilities of Windows Explorer
By not caching negative DNS lookups then one will quickly recover in case a domain is unregistered and registered again.
Advanced desktop enhancement engine that can gather all sorts of system details along with feeds from the Internet and place it all together on the desktop.
How the IPC$ share makes it possible for clients to access shares on the server.
Modify the Recovery Console installation so it will load 3rd party drivers for your disk controller.
Before making changes to the registry database, then it can be a very good idea to make a backup first.
Execute commands when opening the command prompt to configure the command prompt or the environment.
Description of how to extend the default command prompt to include more information than just the current directory.
Where to find the cd-key for the current Windows install.
Description of the different types of environment variables in the Windows NT system.
Using Adaptec Easy CD Creator 5.02d to make a bootable install cd for Windows 2000.
Using Nero Burning Rom to make a bootable install cd for Windows 2000.
Using CDRWIN to make a bootable install cd for Windows 2000.
When creating a bootable cd then one must provide a boot sector, which can be extracted from the original cd.
The registry editor is capable of editing an offline registry hive.
Enabling automatic login so one doesn't have to type username and password at every boot.
The use of the master browser in the microsoft network, and how it is elected.
System Policies are useful when wanting to enforce a certain configuration or restriction on all computer and users in the domain.
Utilities to recover lost passwords, which are only shown as asterisks.
Recover deleted or damaged files (and partitions) with undelete / unerase utilities.
How to configure autorun for the different drive types.
Running an application as a service allows the application to run without a user needing to login.
Description of the different issues that can arise when converting from FAT16 and FAT32 partitions to NTFS.
Utilities for extracting the the cd-key from the registry database.
IIS Lockdown is an utility by Microsoft for setting up Internet Information Server in a secure way.
How to create different profiles for cleaning up the hard disk.
Shortcuts to network shares visited will automatically be added to My Network Places.
How to change the name and company registered as owner of the Windows installation.
Mouse is accelerated when moved in a single movement to make the Windows nagivation easier.
Things to be aware of when using a hard disk larger than 137 gigabyte.
The system event log can contain information, which can be used compromise the security.
Description of ghost devices and how they can be removed in safemode.
Most Windows applications uses Winsock to perform TCPIP communication, and many of these applications uses the default send- and receive-buffer size, which by default isn't adapted to the available network connection.
How to increase the security of the Microsoft network by enabling SMB signing.
Certain applications cannot detect the installed cdrom drives when using the Adaptec ASPI layer.
Description of different alternative ways for recovering from a bad BIOS flash.
Steps for fixing a computer which cannot perform BIOS POST.
Steps for finding what hardware devices that is causing problems.
Control how much of the bandwidth the Background Intelligent Transfer Service (BITS) is allowed to use.
Description and recommended settings for the Background Intelligent Transfer service.
Control how and when Automatic Updates (AU) should contact the Windows Update services.
Description and recommended settings for the Automatic Updates service.
Describes the benefits and the costs of using multiple partitions.
Increase the speed of the network connection by changing the TCP/IP settings.
How to configure Internet Connection Sharing to configure a gateway to the Internet for other computers.
By changing the license on the install cd, then one don't have to supply a cd-key during install.
Avoid having to use a floppy disk when installing Windows NT on a machine with unsupported disk controller.
Setting up a computer network, and steps for troubleshooting errors in the computer network.
NetDiag is a command line utility created by Microsoft that can be used diagnose network problems between two computers.
Schtasks.exe from Windows XP that have been modified so it can be used in Windows 2000.
Using PING to test the network connection and calculating the best TCP/IP receive window.
Remote Desktop Client can take control of a remote computer running Microsoft Windows.
Windows Media Video (WMV) and Windows Media Audio (WMA) codecs for Media Player 6.4 and 7.1
Media Player 8 was included with Windows XP and never released as a standalone package.
Windows creates by default a network shares for each drive letter, which is used for administrative tasks.
Utilities that can change the configuration of a Windows installation so it becomes a server edition.
Display the My Computer security zone along with the other security zones for configuration.
Increase the size of the buffers used by NtBackup to perform faster backup and restore.
Different Microsoft articles telling how to setup a mail-server, news-server, ftp-server or web-server.
How to change the codepage for the command prompt.
NetBrute by Raw Logic Software can scan the network and display computers which announce themselves on the network.
Example of how to list shares and user accounts with anonymous access.
How to prevent access for anonymous to see available shares and user accounts.
Manage what accounts that have remote access to the registry.
Protect against DLL injections to avoid performing malicous code.
Network connection status can be extended to also show errors besides bytes/packets received and sent.
Description of how router metric works, and how to use it to prioritise gateways and perform simple load balancing.
Change how long time to wait before a service is considered not responding and should be shut down.
The command prompt allows one to use shortcut keys for easier navigation.
The ability to store favorite locations in the registry can be quite useful.
Windows XP boot manager is faster and can be used on Windows 2000.
Description of the different things that can be customized in Windows, and links to resources that can provide even more customization.
Virtual Desktop Manager utilities can give even more room on the Windows desktop.
Alternative window shells that to change the desktop experience.
Utility that can enhance any window with the transparent glass effect.
Description of different causes and solutions to hard disk performance problems.
Virtual Private Network makes it possible to make a secure connection to another network through an insecure network.
Configure whether the registry editor should show the last registry location when started.
Show the "Compatibility"-tab when selecting Properties for a shortcut.
How to configure the way Microsoft Windows participates in the master browser election.
Open zip and cab files in Windows Explorer like they were normal directory with files.
Dual booting several versions of Windows can be useful if running software which is locked to certain version of Windows.
Bootpart makes it easy to create the perfect multi-boot setup using the Windows NT boot manager.
Using a special keyboard shortcut to create a blue screen of death with memory dump.
Protecting the Administrator account from unauthorized access.
Activating the insecure guest account for easy file sharing.
Windows NT will perform a chkdsk at boot time after an improper shutdown.
Utility to see what applications are configured to load at Windows startup.
Recovery Console can be useful when performing system recovery.
DOS box extensions for Windows NT to play the old DOS games one love so dearly.
Possible steps for repairing Windows Update
How to use the scancode map to modify the keyboard layout and disable the Windows-key.
How the HOSTS file can be used to customize the host name resolution.
Windows does not by default display all items that can be uninstalled in the Add / Remove applet.
How to configure the location of WMI logs and how verbose the logs should be.
How to use the dialup modem when turning it on after Windows startup.
Faster boot times by not spending time on detecting non-existing IDE devices.
Extend the level of informational messages during Windows startup and shutdown.
How to activate performance counters for the different performance objects in Windows NT.
Decide the CPU priority when starting an application.
Prevent that all Windows Explorer instances crashes just because one gets a fatal error.
Configure how the process scheduler should split up the processor slots.
A boot manager can help with running multiple operating systems on the same machine.
How to use the group policy editor for easy editing of registry settings.
System File Checker is able to verify that system files are intact.
When BETA testing Windows versions then it can be rather useful to easily see the build version on the desktop.
Windows File Protection is able to keep the system files intact when overwritten.
Windows NT hardware abstraction layer can be changed if the motherboard doesn't support the one chosen by default.
How to configure the computer not to announce itself on the Microsoft Network.
When printing a document, then the document is spooled into a temporary directory and then sent to the printer.
Audit policies can be created to record unsuccessful logon attempts in the event log.
Configure the Page Size Extension feature of the processor which is used to for activate large pages support.
How to assign keyboard shortcut to file and directory completion in command prompt.
Prepare the file servers to handle a higher loads and allow the clients to make more requests.
Configure whether to automatically launch application when inserting a CD or DVD disk.
Active Desktop makes it posssible to customize folders, and so the Windows folder is customized to avoid messing with the Windows system files.
Make dialup modem faster at etablishing a connection and with better connection speed.
Changing the maximum port speed to get a faster dialup connection.
Increasing the request buffer size can improve file sharing performance on high latency networks.
Description of the registry keys used for configuring the TCP/IP stack in Windows NT.
Changing the color of the desktop shown before a user has logged in.
Utility to verify the system hardware and firmware (BIOS) compliance with the ACPI specification.
Change the treshold of when to report that a disk is near its capacity.
Uptime is a command line utility by Microsoft for displaying the time since the last reboot.
Qfecheck is a command line utility by Microsoft to list installed hotfixes.
How one can reload the HKEY_CURRENT_USER registry hive without needing a restart.
There are several security issues one should take care of when having a network connection.
How to change the text color and background color in the command prompt.
Using PING to test the network connection and finding the best TCP/IP max transfer unit (MTU).
How to configure the MS-DOS subsystem using Autoexec.nt and Config.nt.
Improve the precision and smoothness of your ps/2 device by increasing the sample rate.
Hiding a file-share by changing the name.
How to see the registry changes of a certain action by using the file compare utility.
How to add and remove registry entries from the Windows registry using .reg files
How to configure a keyboard shortcut as a hotkey to quickly start an application.
Troubleshooting what is causing Windows not to install properly.
Microsoft Office graphic filters allows programs like Mspaint to work with formats like jpeg and gif.
How to use the keyboard key "Print Screen" to make a screen dump.
Registry cleaner to remove entries from the registry.
Apply the service pack before making the install for a faster and more secure install.
Description of how to configure a computer network without a DHCP server.
Using access control lists to improve the security for NTFS partitions.
Holding down the SHIFT key during Windows startup will stop applications from loading.
When accessing the shares of a Win9x machine, then time is spend on checking for scheduled tasks.
Changing the Max Transfer Unit (MTU) to avoid packet fragmentation and loss of VPN connection.
Microsoft powertoy for changing hidden settings in Microsoft Windows.
Shortcuts can be created to most of the special folders available in Windows Explorer.
Description and recommended settings for the Portable Media Serial Number service.
Description and recommended settings for the Wireless Zero Configuration service.
Description and recommended settings for the Windows Management Instrumentation Driver Extensions service.
Description of how to repair the Windows Management Instrumentation (WMI) repository.
Description and recommended settings for the Windows Management Instrumentation service.
Description and recommended settings for the Windows Installer service.
Description and recommended settings for the Utility Manager service.
Description and recommended settings for the Internet Connection Sharing (ICS) service.
Description and recommended settings for the Terminal Services Licensing service.
Description and recommended settings for the Terminal Services service.
Description and recommended settings for the Telnet service.
Description and recommended settings for the Smart Card Helper service.
Description and recommended settings for the Smart Card service.
Description and recommended settings for the Remote Access Connection Manager service.
Description and recommended settings for the Remote Access Auto Connection Manager service.
Description and recommended settings for the QoS RSVP service.
How to use the Secondary Logon service to start an application with different user credentials.
Description and recommended settings for the Secondary Logon service.
Description and recommended settings for the Routing and Remote Access service.
Description and recommended settings for the Performance Logs and Alerts service.
Description and recommended settings for the Removable Storage Manager service.
Description and recommended settings for the Network Connections service.
Description and recommended settings for the Remote Registry service.
Description and recommended settings for the Logical Disk Manager Administrative service.
Description and recommended settings for the Logical Disk Manager service.
Description and recommended settings for the Keberos Key Distribution Center service.
Description and recommended settings for the IPSEC services.
Description and recommended settings for the Intersite Messaging service.
Description and recommended settings for the Indexing service.
Description and recommended settings for the Application Management service.
Description and recommended settings for the DNS Client service.
How to reset the transaction log for the Distributed Transaction Coordinator (MSDTC) and reinstall MSDTC.
Description and recommended settings for the Distributed Transaction Coordinator service.
Description and recommended settings for the Distributed File System service.
Description and recommended settings for the DHCP Client service.
How to repair a broken COM+ catalog and reinstall COM+ services.
Description and recommended settings for the COM+ Event System service.
Description and recommended settings for the Windows Time service.
How to configure Windows to use DMA for IDE ATA hard drives.
Description and recommended settings for the Uninterruptible Power Supply service.
Description and recommended settings for the Telephony service.
Description and recommended settings for the TCP/IP NetBIOS Helper service.
Description and recommended settings for the System Event Notification service (SENS).
Description and recommended settings for the Server service.
Description and recommended settings for the Security Accounts Manager service.
Description and recommended settings for the Remote Procedure Call service.
Description and recommended settings for the Task Scheduler service.
Description and recommended settings for the Protected Storage service.
How to configure the priority and logging level of the Printer Spooler service.
Description and recommended settings for the Print Spooler service.
Description and recommended settings for the Plug and Play service.
Description and recommended settings for the NT LM Security Support Provider service.
Description and recommended settings for the Network DDE DSDM service.
Description and recommended settings for the Network DDE service.
Description and recommended settings for the NET Logon service.
Description and recommended settings for the Remote Procedure Call Locator service.
Description and recommended settings for the Messenger service.
Description and recommended settings for the License Logging service.
Description and recommended settings for the Event Log service.
Description and recommended settings for the File Replication service.
Description and recommended settings for the Alerter service.
Description and recommended settings for the Computer Browser service.
Description and recommended settings for the Workstation service.
Description and recommended settings for the Clipbook service.
Description and recommended settings for the FAX service.
Configure how the TCP/IP should respond when multiple network adapters are installed.
List of steps to perform before starting a file defragmentation on a hard disk partition.
How to use the utility Netsh to reset or change the network configuration.
Windows Explorer allows one to specify what folder to display when launched.
Extend the login dialog with the option to shutdown the computer without having given credentials.
Disable legacy subsystems to prevent attackers from using these subsystems as base of attack.
Adjust the memory usage of the server service according to the server role.
Prevent the Windows kernel core from being paged to disk.
Different utilities available to keep file fragmentation at a low level, and maintain good hard disk performance.
How to configure memory size of the file cache for faster file operations.
Microsoft have created many utilities for management of the Windows NT operating system.
Lower the disk activity by disabling the updating of when a file was last accessed.
Speed up the creation of new files by not creating a 8.3 filename for backward compatibility.
How temporary files cause file fragmentation and different RAM disk options.
Finding the the optimal size and location for the Windows swap file.
Update the DirectX runtime after installing new drivers to prevent conflicts.
Uninstall unneeded fonts to speed up boot times and free memory.
How to change the color of the BSOD to make it easier to read or just for fun.
Utilities for offline editing of the password files to change the password, or perform recovery of the lost password.
Speed up the Windows experience by disabling unneeded visual effects.
Deleting the password storage files to reset the Administrator password to recover system access.
Change when an application is considered as deadlocked and should be terminated.
Description of how the drivers and firmware for the computer hardware should be updated to get the best performance.
Boot.ini is used by the Boot Manager to determine the installed operating systems and what startup settings to use.
The Master File Table is the index for all files and directories placed on a ntfs partition and critical for ntfs performance.
Description of how Microsoft Windows requires constant updating to get the best performance.
Configure the path to the location of the install files whether on CD-ROM or HDD.
How to change the cluster size of a partition with description of the different filesystems and their limitations.