Description of how Windows optimizes the virtual memory to minimize the need for hard pagefaults.
Description of how the Push Flag in the TCP Header can optimize network buffer usage, but can increase latency.
Applications optimized to run on single CPU systems, will perform worse on multi CPU systems.
For security measures then one should consider disabling the ability to launch the 16 bit subsystem.
Diagnose what is preventing your computer from entering sleep mode, or wakes it prematurely.
How to solve access denied error when trying to map network printer to LPT1
Compound TCP (CTCP) can improve the throughput for high bandwidth and high latency connections, by improving TCP slow start.
When the media is filled with bad sectors, then one can still try to recover the good bits.
How to use the shell keyword to quickly access special folders like the Send To folder.
How to make a DOS bootdisk on a USB pen drive.
Windows can activate NDIS 5 network hardware features for offloading the system processor.
Windows can activate NDIS 6 network hardware features for offloading the system processor.
Computer cannot start if no proper boot device exists, or if the active boot device fails.
Mount a file folder as a drive-letter, like a shortcut to make it easier to access the folder.
List of the available command line switches for defrag.
Use Windows Explorer to browse a remote internet server by adding it as a network place.
Mount a Web Folder as a mapped network drive with help from the Webclient service.
Utilities for mounting a FTP folder as a mapped netwok drive.
Troubleshoot and repair Automatic Updates when it fails to perform Windows Update.
How to use a different font in the command prompt than Lucida Console and Raster Fonts.
Access Linux Ext2 / Ext3 partitions inside Microsoft Windows.
Description and recommended settings for the Application Experience service.
The hard disk performance is very dependent on the configuration of the disk cache.
It is possible to open a command prompt during the GUI part of the Windows install.
Description of the Graweg worm and how to protect against its SMB attacks.
Microsoft security update MS05-026 blocks for viewing compressed HTML (CHM) files placed on a network drive.
The disk defragmenter will fail to load if it not registered properly, or if the services it depends on are disabled.
Control in what order the drive letter and label should be shown in My Computer.
Memory manager should only mark a continuous memory block as free when the block has reached a certain size.
Microsoft Windbg makes it possible to diagnose what caused a BSOD, so one can replace the device that caused it.
Windows NT will fail to boot if it cannot find the files used to load the boot manager.
How the kernel memory area is divided into the different page pools.
Windows 2003 addon which hides folders within a share, that the user cannot access anyway.
Allow user interaction in command prompt scripts using environment variables.
Unlocker displays the open file handles, when trying to delete or move a file which is used by another application.
Before activating TCP/IP Version 6 then one should make sure that the DNS server is able to handle IPv6 properly.
The Microsoft Installer (MSI) Package file is a compressed archive, which can be decompressed.
When deleting a partition then only the boot sector is modified, so by restoring the boot sector, then one will restore the partition.
Utility that can generate a wallpaper, which includes the computer system details.
Utility for creating group policy ADM files from registry files.
Details of how the Automatic Private IP Addressing (APIPA) takes over if no DHCP server is found.
Security utility for checking if computer is infected with malware, and if so remove it.
USB makes it easy to attach a storage device and steal valuable data from a computer.
Create a cd-rom-, dvd- or usb-drive which Windows can boot from.
How to increase the amount of memory the NTFS filesystem can use for file operations.
Driver Verifier can be used to stress device drivers and can detect if the drivers performs illegal operations.
Network file server can ignore client file flush requests and thus increase the network file performance.
Disabling system aliasing can free resources but will disable mounting and reparse points
The lookup cache for network files makes it faster to reopen a file placed on a remote share.
Opportunistic locking delivers good network performance but older implementations can lead to data loss.
Sharing violations on files placed on network shares are retried while they block immediately with local files.
Configure the perfect Windows installation before actually installing.
Scriptomatic makes it easy to extract system information through WMI using scripting.
Changing printer drivers in Windows NT can cause problems, and can require that the old drivers are remove manually first.
Configure the priority of how it should lookup the physical network address of a computer.
Description of the different ways Windows can convert a logical network name to a physical address.
Description and recommended settings for the DCOM Server Process Launcher service.
Thumbnail View uses a cache to allow quicker viewing of folders with pictures, and one can change the quality of these thumbnails.
How to configure the location and size of the task scheduler log with all its events.
The shutdown event tracker forces the user to give a reason for restarting the computer.
The Last Known Good Configuration makes it possible to rollback to the previous good state of the system registry hive.
The Recovery Console allows one to restore the registry as part of system recovery.
Sticky keys is an accessibility features, that can be activated with a shortcut key (often by accident when inside a game).
Configure whether the num-lock, caps-lock or scroll-lock keys should be turned on or off at startup.
How to increase the allowed amount of concurrent I/O request for a disk controller.
Windows is configured by default to handle 1000 to 2000 concurrent tcpip connections.
Description of where and in what order programs are loaded at startup.
The command prompt can be used to configure almost anything, and be used to create advanced batch jobs for trivial tasks.
How to use the registry editor to configure the state of the Windows services.
Change which network protocol to use first when looking for a resource on the network.
Change which network redirector to use first when looking for a resource on the network.
Assign specific drive letters for removable drives.
How to change the size of the NTFS transaction log to handle peak loads.
Tweakomatic will take over where group policies cannot handle it any longer.
Windows Explorer will automatically request extended file information when trying to open a file on a network share.
Windows Explorer sends a Change Notification request to the remote server when mapping a network share.
Description of different causes and solutions to network problems.
Description and recommended settings for the Virtual Disk service.
Description and recommended settings for the WinHTTP Web Proxy Auto Discovery service.
Description and recommended settings for the Terminal Services Session Directory service.
Description and recommended settings for the Special Administration Console Helper service.
Description and recommended settings for the Remote Administration service.
Description and recommended settings for the Resultant Set of Policy Provider service.
Description and recommended settings for the Remote Server Manager service.
Description and recommended settings for the HTTP SSL service.
Description of how Windows services are hosted within the same process.
Description of the nagle algorithm effects on the network throughput, and how to configure the delayed ACK.
How to configure the password encryption level for better security.
The different password encryption algorithms available in the Microsoft Network.
How the security features in SMB signing can protect the network.
System Properties can be modified to display company name or company pictures.
CPU core temperature monitoring utilities, that can give alerts if things gets too hot.
Description of the different situations where Windows NT can fail to boot because it no longer can find the boot device.
Description of the Blaster worm and how to protect the operating system from its RPC attacks.
How to use the services snapin to configure the state of the Windows services.
Utility for analyzing the computer configuration and alerts if any security issues are detected.
How to manually uninstall an application and remove it from the Add/Remove list.
Disable the beep from the PC speaker when Windows performs an alert.
Description and recommended settings for the WMI Performance Adapter service.
Description and recommended settings for the Application Layer Gateway service.
Description and recommended settings for the Windows Image Acquisition service.
Description and recommended settings for the Windows Audio service.
Description and recommended settings for the WebClient service.
Description and recommended settings for the Volume Shadow Copy service.
Description and recommended settings for the Upload Manager service.
Description and recommended settings for the Themes service.
Description and recommended settings for the Shell Hardware Detection service.
Description and recommended settings for the Remote Desktop Help Session Manager service.
Description and recommended settings for the Network Location Awareness service.
Description and recommended settings for the Netmeeting Remote Desktop Sharing service.
Description and recommended settings for the MS Software Shadow Copy Provider service.
Description and recommended settings for the Error Reporting service.
Description and recommended settings for the IMAPI CD-Burning COM service.
Description and recommended settings for the Human Interface Device Access service.
How to reinstall the Help and Support service if it fails to function properly.
Description and recommended settings for the Help and Support service.
Description and recommended settings for the Cryptographic services.
Description and recommended settings for the COM+ System Application service.
How to configure which port number to use for Netbios communcations.
Enhance the file copy abilities of Windows Explorer
By not caching negative DNS lookups then one will quickly recover in case a domain is unregistered and registered again.
Advanced desktop enhancement engine that can gather all sorts of system details along with feeds from the Internet and place it all together on the desktop.
How the IPC$ share makes it possible for clients to access shares on the server.
Modify the Recovery Console installation so it will load 3rd party drivers for your disk controller.
Before making changes to the registry database, then it can be a very good idea to make a backup first.
Execute commands when opening the command prompt to configure the command prompt or the environment.
Description of how to extend the default command prompt to include more information than just the current directory.
Where to find the cd-key for the current Windows install.
Description of the different types of environment variables in the Windows NT system.
The registry editor is capable of editing an offline registry hive.
Enabling automatic login so one doesn't have to type username and password at every boot.
The use of the master browser in the microsoft network, and how it is elected.
Utilities to recover lost passwords, which are only shown as asterisks.
Recover deleted or damaged files (and partitions) with undelete / unerase utilities.
How to configure autorun for the different drive types.
Windows Explorer file sorting can be changed from logical number compare to just one digit at a time.
Change whether the file search assistant should look through only registered file types or all files.
Running an application as a service allows the application to run without a user needing to login.
Description of the different issues that can arise when converting from FAT16 and FAT32 partitions to NTFS.
Utilities for extracting the the cd-key from the registry database.
How to create different profiles for cleaning up the hard disk.
Shortcuts to network shares visited will automatically be added to My Network Places.
How to change the name and company registered as owner of the Windows installation.
Mouse is accelerated when moved in a single movement to make the Windows nagivation easier.
The system event log can contain information, which can be used compromise the security.
Description of ghost devices and how they can be removed in safemode.
Most Windows applications uses Winsock to perform TCPIP communication, and many of these applications uses the default send- and receive-buffer size, which by default isn't adapted to the available network connection.
Configure what balloon tips Windows should display above the system tray.
How to increase the security of the Microsoft network by enabling SMB signing.
Description of different alternative ways for recovering from a bad BIOS flash.
Steps for fixing a computer which cannot perform BIOS POST.
Steps for finding what hardware devices that is causing problems.
Control how much of the bandwidth the Background Intelligent Transfer Service (BITS) is allowed to use.
Description and recommended settings for the Background Intelligent Transfer service.
Control how and when Automatic Updates (AU) should contact the Windows Update services.
Description and recommended settings for the Automatic Updates service.
Describes the benefits and the costs of using multiple partitions.
Increase the speed of the network connection by changing the TCP/IP settings.
Disabling the page file to prevent Windows from unloading memory to the hard disk.
How to configure Internet Connection Sharing to configure a gateway to the Internet for other computers.
Avoid having to use a floppy disk when installing Windows NT on a machine with unsupported disk controller.
Setting up a computer network, and steps for troubleshooting errors in the computer network.
NetDiag is a command line utility created by Microsoft that can be used diagnose network problems between two computers.
Using PING to test the network connection and calculating the best TCP/IP receive window.
Remote Desktop Client can take control of a remote computer running Microsoft Windows.
Windows creates by default a network shares for each drive letter, which is used for administrative tasks.
Utilities that can change the configuration of a Windows installation so it becomes a server edition.
Display the My Computer security zone along with the other security zones for configuration.
Increase the size of the buffers used by NtBackup to perform faster backup and restore.
Control what should happen when a shortcut is detected as being broken.
How to change the codepage for the command prompt.
NetBrute by Raw Logic Software can scan the network and display computers which announce themselves on the network.
Example of how to list shares and user accounts with anonymous access.
How to prevent access for anonymous to see available shares and user accounts.
Manage what accounts that have remote access to the registry.
Protect against DLL injections to avoid performing malicous code.
Network connection status can be extended to also show errors besides bytes/packets received and sent.
Description of how router metric works, and how to use it to prioritise gateways and perform simple load balancing.
Change how long time to wait before a service is considered not responding and should be shut down.
The command prompt allows one to use shortcut keys for easier navigation.
The ability to store favorite locations in the registry can be quite useful.
Microsoft Windows can speed up the launch of application by prefetching the data the application usually request at startup.
Description of the different things that can be customized in Windows, and links to resources that can provide even more customization.
Virtual Desktop Manager utilities can give even more room on the Windows desktop.
Alternative window shells that to change the desktop experience.
Utility that can enhance any window with the transparent glass effect.
Description of different causes and solutions to hard disk performance problems.
How to install the NetBEUI protocol eventhough no longer a supported network protocol.
Virtual Private Network makes it possible to make a secure connection to another network through an insecure network.
Configure whether the registry editor should show the last registry location when started.
How to configure the way Microsoft Windows participates in the master browser election.
Open zip and cab files in Windows Explorer like they were normal directory with files.
Dual booting several versions of Windows can be useful if running software which is locked to certain version of Windows.
Bootpart makes it easy to create the perfect multi-boot setup using the Windows NT boot manager.
Using a special keyboard shortcut to create a blue screen of death with memory dump.
Protecting the Administrator account from unauthorized access.
Windows NT will perform a chkdsk at boot time after an improper shutdown.
Recovery Console can be useful when performing system recovery.
DOS box extensions for Windows NT to play the old DOS games one love so dearly.
Possible steps for repairing Windows Update
How to use the scancode map to modify the keyboard layout and disable the Windows-key.
How the HOSTS file can be used to customize the host name resolution.
Windows does not by default display all items that can be uninstalled in the Add / Remove applet.
How to configure the location of WMI logs and how verbose the logs should be.
Faster boot times by not spending time on detecting non-existing IDE devices.
Extend the level of informational messages during Windows startup and shutdown.
How to activate performance counters for the different performance objects in Windows NT.
Decide the CPU priority when starting an application.
Prevent that all Windows Explorer instances crashes just because one gets a fatal error.
Configure how the process scheduler should split up the processor slots.
A boot manager can help with running multiple operating systems on the same machine.
How to use the group policy editor for easy editing of registry settings.
System File Checker is able to verify that system files are intact.
When BETA testing Windows versions then it can be rather useful to easily see the build version on the desktop.
Windows File Protection is able to keep the system files intact when overwritten.
Windows NT hardware abstraction layer can be changed if the motherboard doesn't support the one chosen by default.
How to configure the computer not to announce itself on the Microsoft Network.
When printing a document, then the document is spooled into a temporary directory and then sent to the printer.
Configure the Page Size Extension feature of the processor which is used to for activate large pages support.
How to assign keyboard shortcut to file and directory completion in command prompt.
Prepare the file servers to handle a higher loads and allow the clients to make more requests.
Configure whether to automatically launch application when inserting a CD or DVD disk.
The Show Desktop shortcut in the quick launch bar can be restored if deleted.
Increasing the request buffer size can improve file sharing performance on high latency networks.
Description of the registry keys used for configuring the TCP/IP stack in Windows NT.
Changing the color of the desktop shown before a user has logged in.
Change the treshold of when to report that a disk is near its capacity.
QChain is created by Microsoft and allows several hotfixes to be chained together in a single install.
Qfecheck is a command line utility by Microsoft to list installed hotfixes.
How one can reload the HKEY_CURRENT_USER registry hive without needing a restart.
There are several security issues one should take care of when having a network connection.
How to change the text color and background color in the command prompt.
Using PING to test the network connection and finding the best TCP/IP max transfer unit (MTU).
How to configure the MS-DOS subsystem using Autoexec.nt and Config.nt.
Improve the precision and smoothness of your ps/2 device by increasing the sample rate.
Hiding a file-share by changing the name.
How to see the registry changes of a certain action by using the file compare utility.
How to add and remove registry entries from the Windows registry using .reg files
How to configure a keyboard shortcut as a hotkey to quickly start an application.
Troubleshooting what is causing Windows not to install properly.
Microsoft Office graphic filters allows programs like Mspaint to work with formats like jpeg and gif.
How to use the keyboard key "Print Screen" to make a screen dump.
Description of how to configure a computer network without a DHCP server.
Using access control lists to improve the security for NTFS partitions.
Holding down the SHIFT key during Windows startup will stop applications from loading.
Changing the Max Transfer Unit (MTU) to avoid packet fragmentation and loss of VPN connection.
Shortcuts can be created to most of the special folders available in Windows Explorer.
Description and recommended settings for the Portable Media Serial Number service.
Description and recommended settings for the Wireless Zero Configuration service.
Description and recommended settings for the Windows Management Instrumentation Driver Extensions service.
Description of how to repair the Windows Management Instrumentation (WMI) repository.
Description and recommended settings for the Windows Management Instrumentation service.
Description and recommended settings for the Windows Installer service.
Description and recommended settings for the Terminal Services Licensing service.
Description and recommended settings for the Terminal Services service.
Description and recommended settings for the Telnet service.
Description and recommended settings for the Smart Card service.
Description and recommended settings for the Remote Access Connection Manager service.
Description and recommended settings for the Remote Access Auto Connection Manager service.
How to use the Secondary Logon service to start an application with different user credentials.
Description and recommended settings for the Secondary Logon service.
Description and recommended settings for the Routing and Remote Access service.
Description and recommended settings for the Performance Logs and Alerts service.
Description and recommended settings for the Removable Storage Manager service.
Description and recommended settings for the Network Connections service.
Description and recommended settings for the Remote Registry service.
Description and recommended settings for the Logical Disk Manager Administrative service.
Description and recommended settings for the Logical Disk Manager service.
Description and recommended settings for the Keberos Key Distribution Center service.
Description and recommended settings for the IPSEC services.
Description and recommended settings for the Intersite Messaging service.
Description and recommended settings for the Windows Firewall/Internet Connection Sharing (ICS) service.
Description and recommended settings for the Indexing service.
Description and recommended settings for the Application Management service.
Description and recommended settings for the DNS Client service.
How to reset the transaction log for the Distributed Transaction Coordinator (MSDTC) and reinstall MSDTC.
Description and recommended settings for the Distributed Transaction Coordinator service.
Description and recommended settings for the Distributed Link Tracking Server service.
Description and recommended settings for the Distributed Link Tracking Client service.
Description and recommended settings for the Distributed File System service.
Description and recommended settings for the DHCP Client service.
How to repair a broken COM+ catalog and reinstall COM+ services.
Description and recommended settings for the COM+ Event System service.
Description and recommended settings for the Windows Time service.
How to configure Windows to use DMA for IDE ATA hard drives.
Description and recommended settings for the Uninterruptible Power Supply service.
Description and recommended settings for the Telephony service.
Description and recommended settings for the TCP/IP NetBIOS Helper service.
Description and recommended settings for the System Event Notification service (SENS).
Description and recommended settings for the Server service.
Description and recommended settings for the Security Accounts Manager service.
Description and recommended settings for the Remote Procedure Call service.
Description and recommended settings for the Task Scheduler service.
Description and recommended settings for the Protected Storage service.
How to configure the priority and logging level of the Printer Spooler service.
Description and recommended settings for the Print Spooler service.
Description and recommended settings for the Plug and Play service.
Description and recommended settings for the NT LM Security Support Provider service.
Description and recommended settings for the Network DDE DSDM service.
Description and recommended settings for the Network DDE service.
Description and recommended settings for the NET Logon service.
Description and recommended settings for the Remote Procedure Call Locator service.
Description and recommended settings for the Messenger service.
Description and recommended settings for the License Logging service.
Description and recommended settings for the Event Log service.
Description and recommended settings for the File Replication service.
Description and recommended settings for the Alerter service.
Description and recommended settings for the Computer Browser service.
Description and recommended settings for the Workstation service.
Description and recommended settings for the Clipbook service.
Description and recommended settings for the FAX service.
Configure how the TCP/IP should respond when multiple network adapters are installed.
List of steps to perform before starting a file defragmentation on a hard disk partition.
How to use the utility Netsh to reset or change the network configuration.
Windows Explorer allows one to specify what folder to display when launched.
Extend the login dialog with the option to shutdown the computer without having given credentials.
Adjust the memory usage of the server service according to the server role.
Prevent the Windows kernel core from being paged to disk.
Different utilities available to keep file fragmentation at a low level, and maintain good hard disk performance.
How to configure memory size of the file cache for faster file operations.
Microsoft have created many utilities for management of the Windows NT operating system.
Lower the disk activity by disabling the updating of when a file was last accessed.
Speed up the creation of new files by not creating a 8.3 filename for backward compatibility.
How temporary files cause file fragmentation and different RAM disk options.
Finding the the optimal size and location for the Windows swap file.
Update the DirectX runtime after installing new drivers to prevent conflicts.
Uninstall unneeded fonts to speed up boot times and free memory.
How to change the color of the BSOD to make it easier to read or just for fun.
Utilities for offline editing of the password files to change the password, or perform recovery of the lost password.
Speed up the Windows experience by disabling unneeded visual effects.
Change when an application is considered as deadlocked and should be terminated.
Description of how the drivers and firmware for the computer hardware should be updated to get the best performance.
Boot.ini is used by the Boot Manager to determine the installed operating systems and what startup settings to use.
The Master File Table is the index for all files and directories placed on a ntfs partition and critical for ntfs performance.
Description of how Microsoft Windows requires constant updating to get the best performance.
Configure the path to the location of the install files whether on CD-ROM or HDD.
How to change the cluster size of a partition with description of the different filesystems and their limitations.