Description of how Windows optimizes the virtual memory to minimize the need for hard pagefaults.
Description of how the Push Flag in the TCP Header can optimize network buffer usage, but can increase latency.
Applications optimized to run on single CPU systems, will perform worse on multi CPU systems.
For security measures then one should consider disabling the ability to launch the 16 bit subsystem.
Computer cannot start if no proper boot device exists, or if the active boot device fails.
Mount a file folder as a drive-letter, like a shortcut to make it easier to access the folder.
Use Windows Explorer to browse a remote internet server by adding it as a network place.
Utilities for mounting a FTP folder as a mapped netwok drive.
How to use a different font in the command prompt than Lucida Console and Raster Fonts.
Access Linux Ext2 / Ext3 partitions inside Microsoft Windows.
The hard disk performance is very dependent on the configuration of the disk cache.
It is possible to open a command prompt during the GUI part of the Windows install.
Microsoft Windbg makes it possible to diagnose what caused a BSOD, so one can replace the device that caused it.
Windows NT will fail to boot if it cannot find the files used to load the boot manager.
How the kernel memory area is divided into the different page pools.
Open access to USB devices in Windows NT4 by installing these USB drivers.
Allow user interaction in command prompt scripts using environment variables.
The Microsoft Installer (MSI) Package file is a compressed archive, which can be decompressed.
When deleting a partition then only the boot sector is modified, so by restoring the boot sector, then one will restore the partition.
Utility that can generate a wallpaper, which includes the computer system details.
Windows Professional / Home edition includes limitation for not handling more than 10 SMB connections.
Create a cd-rom-, dvd- or usb-drive which Windows can boot from.
Opportunistic locking delivers good network performance but older implementations can lead to data loss.
Sharing violations on files placed on network shares are retried while they block immediately with local files.
Microsoft Java Virtual Machine (JVM) contains security flaws and should be uninstalled and replaced with the Sun Java Runtime.
Scriptomatic makes it easy to extract system information through WMI using scripting.
Windows NT4 does not support slip streaming, but it is possible to make a few changes.
Changing printer drivers in Windows NT can cause problems, and can require that the old drivers are remove manually first.
Configure the priority of how it should lookup the physical network address of a computer.
Description of the different ways Windows can convert a logical network name to a physical address.
How to configure the location and size of the task scheduler log with all its events.
The Last Known Good Configuration makes it possible to rollback to the previous good state of the system registry hive.
Configure whether the num-lock, caps-lock or scroll-lock keys should be turned on or off at startup.
How to increase the allowed amount of concurrent I/O request for a disk controller.
Windows is configured by default to handle 1000 to 2000 concurrent tcpip connections.
Description of where and in what order programs are loaded at startup.
The command prompt can be used to configure almost anything, and be used to create advanced batch jobs for trivial tasks.
How to use the registry editor to configure the state of the Windows services.
Change which network protocol to use first when looking for a resource on the network.
Change which network redirector to use first when looking for a resource on the network.
Assign specific drive letters for removable drives.
How to change the size of the NTFS transaction log to handle peak loads.
Description of different causes and solutions to network problems.
Description of how Windows services are hosted within the same process.
Description of the nagle algorithm effects on the network throughput, and how to configure the delayed ACK.
How to configure the password encryption level for better security.
The different password encryption algorithms available in the Microsoft Network.
How the security features in SMB signing can protect the network.
System Properties can be modified to display company name or company pictures.
Description of the different situations where Windows NT can fail to boot because it no longer can find the boot device.
Utility for analyzing the computer configuration and alerts if any security issues are detected.
VPN client to create a secure network connection to any server supporting L2TP/IPsec connections.
Changing the behavior and visual appearance of the task bar.
How to manually uninstall an application and remove it from the Add/Remove list.
Disable the beep from the PC speaker when Windows performs an alert.
How to configure which port number to use for Netbios communcations.
Enhance the file copy abilities of Windows Explorer
Installing Active Desktop without needing to install Internet Explorer 4 first.
How the IPC$ share makes it possible for clients to access shares on the server.
Execute commands when opening the command prompt to configure the command prompt or the environment.
Description of how to extend the default command prompt to include more information than just the current directory.
Where to find the cd-key for the current Windows install.
Description of the different types of environment variables in the Windows NT system.
The registry editor is capable of editing an offline registry hive.
Enabling automatic login so one doesn't have to type username and password at every boot.
The use of the master browser in the microsoft network, and how it is elected.
System Policies are useful when wanting to enforce a certain configuration or restriction on all computer and users in the domain.
Utilities to recover lost passwords, which are only shown as asterisks.
Recover deleted or damaged files (and partitions) with undelete / unerase utilities.
How to configure autorun for the different drive types.
Running an application as a service allows the application to run without a user needing to login.
Description of the different issues that can arise when converting from FAT16 and FAT32 partitions to NTFS.
Utilities for extracting the the cd-key from the registry database.
IIS Lockdown is an utility by Microsoft for setting up Internet Information Server in a secure way.
How to change the name and company registered as owner of the Windows installation.
Mouse is accelerated when moved in a single movement to make the Windows nagivation easier.
The system event log can contain information, which can be used compromise the security.
Most Windows applications uses Winsock to perform TCPIP communication, and many of these applications uses the default send- and receive-buffer size, which by default isn't adapted to the available network connection.
How to increase the security of the Microsoft network by enabling SMB signing.
Description of different alternative ways for recovering from a bad BIOS flash.
Steps for fixing a computer which cannot perform BIOS POST.
Steps for finding what hardware devices that is causing problems.
Describes the benefits and the costs of using multiple partitions.
Increase the speed of the network connection by changing the TCP/IP settings.
How to configure Internet Connection Sharing to configure a gateway to the Internet for other computers.
Avoid having to use a floppy disk when installing Windows NT on a machine with unsupported disk controller.
Setting up a computer network, and steps for troubleshooting errors in the computer network.
Using PING to test the network connection and calculating the best TCP/IP receive window.
Remote Desktop Client can take control of a remote computer running Microsoft Windows.
Windows Media Video (WMV) and Windows Media Audio (WMA) codecs for Media Player 6.4 and 7.1
Windows creates by default a network shares for each drive letter, which is used for administrative tasks.
Configuring how the wallpaper should be displayed using registry settings.
Change the default wallpaper folder used when changing the wallpaper in Windows.
Utilities that can change the configuration of a Windows installation so it becomes a server edition.
Display the My Computer security zone along with the other security zones for configuration.
How to change the codepage for the command prompt.
NetBrute by Raw Logic Software can scan the network and display computers which announce themselves on the network.
Example of how to list shares and user accounts with anonymous access.
How to prevent access for anonymous to see available shares and user accounts.
Manage what accounts that have remote access to the registry.
Protect against DLL injections to avoid performing malicous code.
Description of how router metric works, and how to use it to prioritise gateways and perform simple load balancing.
Change how long time to wait before a service is considered not responding and should be shut down.
The command prompt allows one to use shortcut keys for easier navigation.
Windows XP boot manager is faster and can be used on Windows 2000.
Description of the different things that can be customized in Windows, and links to resources that can provide even more customization.
Virtual Desktop Manager utilities can give even more room on the Windows desktop.
Alternative window shells that to change the desktop experience.
Description of different causes and solutions to hard disk performance problems.
How to configure the way Microsoft Windows participates in the master browser election.
Open zip and cab files in Windows Explorer like they were normal directory with files.
Dual booting several versions of Windows can be useful if running software which is locked to certain version of Windows.
Bootpart makes it easy to create the perfect multi-boot setup using the Windows NT boot manager.
Protecting the Administrator account from unauthorized access.
Windows NT will perform a chkdsk at boot time after an improper shutdown.
DOS box extensions for Windows NT to play the old DOS games one love so dearly.
Possible steps for repairing Windows Update
How to use the scancode map to modify the keyboard layout and disable the Windows-key.
How the HOSTS file can be used to customize the host name resolution.
Decide the CPU priority when starting an application.
Prevent that all Windows Explorer instances crashes just because one gets a fatal error.
Configure how the process scheduler should split up the processor slots.
A boot manager can help with running multiple operating systems on the same machine.
When BETA testing Windows versions then it can be rather useful to easily see the build version on the desktop.
How to configure the computer not to announce itself on the Microsoft Network.
When printing a document, then the document is spooled into a temporary directory and then sent to the printer.
How to assign keyboard shortcut to file and directory completion in command prompt.
Prepare the file servers to handle a higher loads and allow the clients to make more requests.
Configure whether to automatically launch application when inserting a CD or DVD disk.
Increasing the request buffer size can improve file sharing performance on high latency networks.
Description of the registry keys used for configuring the TCP/IP stack in Windows NT.
Changing the color of the desktop shown before a user has logged in.
Change the treshold of when to report that a disk is near its capacity.
Uptime is a command line utility by Microsoft for displaying the time since the last reboot.
QChain is created by Microsoft and allows several hotfixes to be chained together in a single install.
How one can reload the HKEY_CURRENT_USER registry hive without needing a restart.
There are several security issues one should take care of when having a network connection.
How to change the text color and background color in the command prompt.
Using PING to test the network connection and finding the best TCP/IP max transfer unit (MTU).
How to configure the MS-DOS subsystem using Autoexec.nt and Config.nt.
Improve the precision and smoothness of your ps/2 device by increasing the sample rate.
Hiding a file-share by changing the name.
How to see the registry changes of a certain action by using the file compare utility.
How to add and remove registry entries from the Windows registry using .reg files
How to configure a keyboard shortcut as a hotkey to quickly start an application.
Troubleshooting what is causing Windows not to install properly.
Microsoft Office graphic filters allows programs like Mspaint to work with formats like jpeg and gif.
How to use the keyboard key "Print Screen" to make a screen dump.
Registry cleaner to remove entries from the registry.
Description of how to configure a computer network without a DHCP server.
Using access control lists to improve the security for NTFS partitions.
Holding down the SHIFT key during Windows startup will stop applications from loading.
Changing the Max Transfer Unit (MTU) to avoid packet fragmentation and loss of VPN connection.
Microsoft powertoy for changing hidden settings in Microsoft Windows.
Shortcuts can be created to most of the special folders available in Windows Explorer.
Description and recommended settings for the Windows Time service.
Description and recommended settings for the Uninterruptible Power Supply service.
Description and recommended settings for the Telephony service.
Description and recommended settings for the TCP/IP NetBIOS Helper service.
Description and recommended settings for the System Event Notification service (SENS).
Description and recommended settings for the Server service.
Description and recommended settings for the Remote Procedure Call service.
Description and recommended settings for the Task Scheduler service.
Description and recommended settings for the Protected Storage service.
How to configure the priority and logging level of the Printer Spooler service.
Description and recommended settings for the Print Spooler service.
Description and recommended settings for the Plug and Play service.
Description and recommended settings for the NT LM Security Support Provider service.
Description and recommended settings for the Network DDE DSDM service.
Description and recommended settings for the Network DDE service.
Description and recommended settings for the NET Logon service.
Description and recommended settings for the Remote Procedure Call Locator service.
Description and recommended settings for the Messenger service.
Description and recommended settings for the License Logging service.
Description and recommended settings for the Event Log service.
Description and recommended settings for the File Replication service.
Description and recommended settings for the Alerter service.
Description and recommended settings for the Computer Browser service.
Description and recommended settings for the Workstation service.
Description and recommended settings for the Clipbook service.
Description and recommended settings for the FAX service.
Configure how the TCP/IP should respond when multiple network adapters are installed.
List of steps to perform before starting a file defragmentation on a hard disk partition.
Windows NT4 supports by default not plug and play devices, but Microsoft have created an unsupported driver.
Windows Explorer allows one to specify what folder to display when launched.
Extend the login dialog with the option to shutdown the computer without having given credentials.
Disable legacy subsystems to prevent attackers from using these subsystems as base of attack.
Adjust the memory usage of the server service according to the server role.
Prevent the Windows kernel core from being paged to disk.
How to configure Windows NT4 to use DMA for IDE ATA hard drives.
Different utilities available to keep file fragmentation at a low level, and maintain good hard disk performance.
How to configure memory size of the file cache for faster file operations.
Microsoft have created many utilities for management of the Windows NT operating system.
Improve the performance of high speed I/O devices by allowing them to lock more memory for data transfers.
Windows has trouble with determining the size of the second level cache for older CPU's.
SysInternals has created a FAT32 driver that allow one to mount and access FAT32 partitions.
Lower the disk activity by disabling the updating of when a file was last accessed.
Speed up the creation of new files by not creating a 8.3 filename for backward compatibility.
How to enable the 3rd mouse button, so it can be used in applications and games.
How temporary files cause file fragmentation and different RAM disk options.
Finding the the optimal size and location for the Windows swap file.
Update the DirectX runtime after installing new drivers to prevent conflicts.
Uninstall unneeded fonts to speed up boot times and free memory.
How to change the color of the BSOD to make it easier to read or just for fun.
Utilities for offline editing of the password files to change the password, or perform recovery of the lost password.
Speed up the Windows experience by disabling unneeded visual effects.
Deleting the password storage files to reset the Administrator password to recover system access.
Change when an application is considered as deadlocked and should be terminated.
Power Toys are small utilities created by Microsoft to make life easier.
Description of how the drivers and firmware for the computer hardware should be updated to get the best performance.
Boot.ini is used by the Boot Manager to determine the installed operating systems and what startup settings to use.
The Master File Table is the index for all files and directories placed on a ntfs partition and critical for ntfs performance.
Description of how Microsoft Windows requires constant updating to get the best performance.
Configure the path to the location of the install files whether on CD-ROM or HDD.
How to change the cluster size of a partition with description of the different filesystems and their limitations.