Description of how Windows optimizes the virtual memory to minimize the need for hard pagefaults.
Description of how the Push Flag in the TCP Header can optimize network buffer usage, but can increase latency.
Applications optimized to run on single CPU systems, will perform worse on multi CPU systems.
For security measures then one should consider disabling the ability to launch the 16 bit subsystem.
Diagnose what is preventing your computer from entering sleep mode, or wakes it prematurely.
How to solve access denied error when trying to map network printer to LPT1
When the media is filled with bad sectors, then one can still try to recover the good bits.
Configure Windows Search index filters to perform indexing of document and spreadsheets using IFilters.
How to install the Vista exFAT file system driver on Windows XP.
How to use the shell keyword to quickly access special folders like the Send To folder.
Use power management to throttle the processor when idle, and get a cool CPU temperature.
NTFS compression can compress / decompress files on the fly and save disk space and minimize needed hard disk I/O
How to configure the Windows Explorer to display all folders the same way.
How to make a DOS bootdisk on a USB pen drive.
Windows can activate NDIS 5 network hardware features for offloading the system processor.
Computer cannot start if no proper boot device exists, or if the active boot device fails.
By changing the workgroup of Windows XP Home, then it is possible to get access to domain shares.
Mount a file folder as a drive-letter, like a shortcut to make it easier to access the folder.
List of the available command line switches for defrag.
Use Windows Explorer to browse a remote internet server by adding it as a network place.
Mount a Web Folder as a mapped network drive with help from the Webclient service.
Utilities for mounting a FTP folder as a mapped netwok drive.
Troubleshoot and repair Automatic Updates when it fails to perform Windows Update.
How to use a different font in the command prompt than Lucida Console and Raster Fonts.
Access Linux Ext2 / Ext3 partitions inside Microsoft Windows.
Description and recommended settings for the Network Access Protection Agent service (also called Quarantine Agent).
Description and recommended settings for the Health Key and Certificate Management service.
Description and recommended settings for the Extensible Authentication Protocol service.
Description and recommended settings for the Wired AutoConfig service.
The LLTD protocol makes it easier to get an overview of the available network devices and their configuration.
How to get a non-working Windows Firewall service started with a configuration reset.
The hard disk performance is very dependent on the configuration of the disk cache.
Give your good old Windows XP a visual facelift with the transformation pack.
It is possible to open a command prompt during the GUI part of the Windows install.
Description of the Graweg worm and how to protect against its SMB attacks.
Microsoft security update MS05-026 blocks for viewing compressed HTML (CHM) files placed on a network drive.
The disk defragmenter will fail to load if it not registered properly, or if the services it depends on are disabled.
Control in what order the share name and share comment should be shown in My Network Places.
Control in what order the drive letter and label should be shown in My Computer.
Microsoft Windbg makes it possible to diagnose what caused a BSOD, so one can replace the device that caused it.
Windows NT will fail to boot if it cannot find the files used to load the boot manager.
How the kernel memory area is divided into the different page pools.
Allow user interaction in command prompt scripts using environment variables.
Unlocker displays the open file handles, when trying to delete or move a file which is used by another application.
Before activating TCP/IP Version 6 then one should make sure that the DNS server is able to handle IPv6 properly.
The Microsoft Installer (MSI) Package file is a compressed archive, which can be decompressed.
When deleting a partition then only the boot sector is modified, so by restoring the boot sector, then one will restore the partition.
Utility that can generate a wallpaper, which includes the computer system details.
Utility for creating group policy ADM files from registry files.
Details of how the Automatic Private IP Addressing (APIPA) takes over if no DHCP server is found.
Enable caching of desktop.ini can improve the speed of browsing custom folders on remote computers.
Security utility for checking if computer is infected with malware, and if so remove it.
Windows Professional / Home edition includes limitation for not handling more than 10 SMB connections.
USB makes it easy to attach a storage device and steal valuable data from a computer.
Changing the visual styles of the login and shutdown screens.
Create a cd-rom-, dvd- or usb-drive which Windows can boot from.
SyncToy is an utility by Microsoft which can make the manual task of synchronizing files a little easier.
How to increase the amount of memory the NTFS filesystem can use for file operations.
Driver Verifier can be used to stress device drivers and can detect if the drivers performs illegal operations.
MSN Messenger is an application by Microsoft that allows one to chat with friends and family.
The lookup cache for network files makes it faster to reopen a file placed on a remote share.
Opportunistic locking delivers good network performance but older implementations can lead to data loss.
Sharing violations on files placed on network shares are retried while they block immediately with local files.
Configure the perfect Windows installation before actually installing.
Microsoft Java Virtual Machine (JVM) contains security flaws and should be uninstalled and replaced with the Sun Java Runtime.
Change whether it should use the Internet to determine what application to use for opening a file of an unknown type.
Scriptomatic makes it easy to extract system information through WMI using scripting.
Changing printer drivers in Windows NT can cause problems, and can require that the old drivers are remove manually first.
Configure the priority of how it should lookup the physical network address of a computer.
Description of the different ways Windows can convert a logical network name to a physical address.
Description and recommended settings for the Windows Security Center service (WSCSVC).
Description and recommended settings for the Network Provisioning service.
Description and recommended settings for the DCOM Server Process Launcher service.
Thumbnail View uses a cache to allow quicker viewing of folders with pictures, and one can change the quality of these thumbnails.
How to configure the location and size of the task scheduler log with all its events.
The shutdown event tracker forces the user to give a reason for restarting the computer.
Different solutions for recovering a broken Windows installation.
The Last Known Good Configuration makes it possible to rollback to the previous good state of the system registry hive.
The Recovery Console allows one to restore the registry as part of system recovery.
Sticky keys is an accessibility features, that can be activated with a shortcut key (often by accident when inside a game).
Windows includes text services to handle speech and handwritting recognition that can cause conflicts with other applications.
Description of the Sasser worm and how to protect against its SMB attacks.
NetMeeting is an inter-message (IM) application by Microsoft which can create a virtual conference room for several users to chat and exchange documents.
Configure whether the num-lock, caps-lock or scroll-lock keys should be turned on or off at startup.
How to increase the allowed amount of concurrent I/O request for a disk controller.
Windows is configured by default to handle 1000 to 2000 concurrent tcpip connections.
Description of where and in what order programs are loaded at startup.
The command prompt can be used to configure almost anything, and be used to create advanced batch jobs for trivial tasks.
How to use the registry editor to configure the state of the Windows services.
Change which network protocol to use first when looking for a resource on the network.
Change which network redirector to use first when looking for a resource on the network.
Assign specific drive letters for removable drives.
How to change the size of the NTFS transaction log to handle peak loads.
Tweakomatic will take over where group policies cannot handle it any longer.
Windows Explorer will automatically request extended file information when trying to open a file on a network share.
Windows Explorer sends a Change Notification request to the remote server when mapping a network share.
Hidden Control Panel applet that includes more options for account management.
Description of different causes and solutions to network problems.
Display the security tab for controlling NTFS permissions in Windows XP Home without using safemode.
Description and recommended settings for the HTTP SSL service.
Description of how Windows services are hosted within the same process.
Description of the nagle algorithm effects on the network throughput, and how to configure the delayed ACK.
How to configure the password encryption level for better security.
The different password encryption algorithms available in the Microsoft Network.
How the security features in SMB signing can protect the network.
Hibernation requires a file as big as the size of the physical memory, which it dumps the contents of the memory to hibernate.
System Properties can be modified to display company name or company pictures.
CPU core temperature monitoring utilities, that can give alerts if things gets too hot.
Windows XP firewall log can be used to monitor those who are trying to access the computer.
Description of the different situations where Windows NT can fail to boot because it no longer can find the boot device.
Description of the Blaster worm and how to protect the operating system from its RPC attacks.
How to use the services snapin to configure the state of the Windows services.
Utility for analyzing the computer configuration and alerts if any security issues are detected.
How to manually uninstall an application and remove it from the Add/Remove list.
Disable the beep from the PC speaker when Windows performs an alert.
The network crawler will automatically create shortcuts to the network shares and printers found on the netwok in My Network Places.
Description and recommended settings for the WMI Performance Adapter service.
Description and recommended settings for the Application Layer Gateway service.
Description and recommended settings for the Windows Image Acquisition service.
Description and recommended settings for the Windows Audio service.
Description and recommended settings for the WebClient service.
Description and recommended settings for the Volume Shadow Copy service.
Description and recommended settings for the Upload Manager service.
Description and recommended settings for the Universal Plug and Play Device Host service.
Description and recommended settings for the Themes service.
Description and recommended settings for the System Restore service.
Description and recommended settings for the SSDP Discovery service.
Description and recommended settings for the Shell Hardware Detection service.
Description and recommended settings for the Remote Desktop Help Session Manager service.
Description and recommended settings for the Network Location Awareness service.
Description and recommended settings for the Netmeeting Remote Desktop Sharing service.
Description and recommended settings for the MS Software Shadow Copy Provider service.
Description and recommended settings for the Fast User Switching Compatibility service.
Description and recommended settings for the Error Reporting service.
Description and recommended settings for the IMAPI CD-Burning COM service.
Description and recommended settings for the Human Interface Device Access service.
How to reinstall the Help and Support service if it fails to function properly.
Description and recommended settings for the Help and Support service.
Description and recommended settings for the Cryptographic services.
Description and recommended settings for the COM+ System Application service.
Change whether it should extract file details for media files and display thumbnail preview.
How to configure which port number to use for Netbios communcations.
Enhance the file copy abilities of Windows Explorer
By not caching negative DNS lookups then one will quickly recover in case a domain is unregistered and registered again.
Advanced desktop enhancement engine that can gather all sorts of system details along with feeds from the Internet and place it all together on the desktop.
How the IPC$ share makes it possible for clients to access shares on the server.
Apply the service pack before making the install for a faster and more secure install.
Modify the Recovery Console installation so it will load 3rd party drivers for your disk controller.
Before making changes to the registry database, then it can be a very good idea to make a backup first.
Execute commands when opening the command prompt to configure the command prompt or the environment.
Description of how to extend the default command prompt to include more information than just the current directory.
Where to find the cd-key for the current Windows install.
Description of the different types of environment variables in the Windows NT system.
The registry editor is capable of editing an offline registry hive.
Enabling automatic login so one doesn't have to type username and password at every boot.
The use of the master browser in the microsoft network, and how it is elected.
Utilities to recover lost passwords, which are only shown as asterisks.
Recover deleted or damaged files (and partitions) with undelete / unerase utilities.
How to configure autorun for the different drive types.
Windows Explorer file sorting can be changed from logical number compare to just one digit at a time.
Change whether the file search assistant should look through only registered file types or all files.
Configure how many folder customizations Windows should remember.
Running an application as a service allows the application to run without a user needing to login.
Description of the different issues that can arise when converting from FAT16 and FAT32 partitions to NTFS.
Microsoft articles on how to offer and receive and remote assistance requests to perform remote desktop control.
Utilities for extracting the the cd-key from the registry database.
IIS Lockdown is an utility by Microsoft for setting up Internet Information Server in a secure way.
How to create different profiles for cleaning up the hard disk.
Shortcuts to network shares visited will automatically be added to My Network Places.
How to change the name and company registered as owner of the Windows installation.
The settings to configure mouse acceleration are hidden away but can still be changed.
Mouse is accelerated when moved in a single movement to make the Windows nagivation easier.
Windows Messenger is an inter-message (IM) application created by Microsoft which is integrated into Microsoft Outlook.
Things to be aware of when using a hard disk larger than 137 gigabyte.
The system event log can contain information, which can be used compromise the security.
Description of ghost devices and how they can be removed in safemode.
Most Windows applications uses Winsock to perform TCPIP communication, and many of these applications uses the default send- and receive-buffer size, which by default isn't adapted to the available network connection.
Configure what balloon tips Windows should display above the system tray.
Certain applications cannot detect the installed cdrom drives when using the Adaptec ASPI layer.
Microsoft created the tool bootvis for driver developers to see how their driver behaves during bootup.
Description of different alternative ways for recovering from a bad BIOS flash.
Steps for fixing a computer which cannot perform BIOS POST.
Steps for finding what hardware devices that is causing problems.
Control how much of the bandwidth the Background Intelligent Transfer Service (BITS) is allowed to use.
Description and recommended settings for the Background Intelligent Transfer service.
Control how and when Automatic Updates (AU) should contact the Windows Update services.
Description and recommended settings for the Automatic Updates service.
Describes the benefits and the costs of using multiple partitions.
How to enable the Welcome Screen and specify what users to display at logon.
Increase the speed of the network connection by changing the TCP/IP settings.
Disabling the page file to prevent Windows from unloading memory to the hard disk.
How to configure Internet Connection Sharing to configure a gateway to the Internet for other computers.
How to change the Windows XP license by updating the install files, so it will accept a cd-key from a different license.
By re-activating Windows XP then one gets the option to change the cd-key.
Change the install license by updating the install files for Windows XP.
Avoid having to use a floppy disk when installing Windows NT on a machine with unsupported disk controller.
Setting up a computer network, and steps for troubleshooting errors in the computer network.
Activating the insecure guest account for easy file sharing.
NetDiag is a command line utility created by Microsoft that can be used diagnose network problems between two computers.
Using PING to test the network connection and calculating the best TCP/IP receive window.
How to configure the Windows XP firewall rules for incoming connections.
ClearType font smoothing can improve how text is displayed in Windows XP.
Remote Desktop Client can take control of a remote computer running Microsoft Windows.
Microsoft have created several extensions to its Windows Media Player for Windows XP.
Windows creates by default a network shares for each drive letter, which is used for administrative tasks.
Utilities that can change the configuration of a Windows installation so it becomes a server edition.
Display the My Computer security zone along with the other security zones for configuration.
NtBackup is not installed by default in Windows XP Home.
Increase the size of the buffers used by NtBackup to perform faster backup and restore.
Control what should happen when a shortcut is detected as being broken.
How to change the codepage for the command prompt.
NetBrute by Raw Logic Software can scan the network and display computers which announce themselves on the network.
Example of how to list shares and user accounts with anonymous access.
How to prevent access for anonymous to see available shares and user accounts.
Manage what accounts that have remote access to the registry.
Protect against DLL injections to avoid performing malicous code.
Network connection status can be extended to also show errors besides bytes/packets received and sent.
Description of how router metric works, and how to use it to prioritise gateways and perform simple load balancing.
Change how long time to wait before a service is considered not responding and should be shut down.
The shared documents folder allows multiple users to exchange documents, pictures and other files on the same computer.
The command prompt allows one to use shortcut keys for easier navigation.
The ability to store favorite locations in the registry can be quite useful.
Microsoft Windows can speed up the launch of application by prefetching the data the application usually request at startup.
Description of the different things that can be customized in Windows, and links to resources that can provide even more customization.
Utilities to make even more customizations to the Windows XP user interface.
To record audio as MP3 in Windows Media Player then one needs to buy a license for the MP3 codec.
To play DVD's in Windows Media Player one needs to buy a license for the MPEG2 codec.
Virtual Desktop Manager utilities can give even more room on the Windows desktop.
Configure the bit rate of the predefined quality levels for mp3 encoding in Media Player 8.
Alternative window shells that to change the desktop experience.
Utility that can enhance any window with the transparent glass effect.
Description of different causes and solutions to hard disk performance problems.
XPInfo was developed in the proces of trying to discover how Windows Product Activation works.
How to install the NetBEUI protocol eventhough no longer a supported network protocol.
Virtual Private Network makes it possible to make a secure connection to another network through an insecure network.
Configure whether the registry editor should show the last registry location when started.
Using floppy disks to perform the install of Windows XP.
How to configure the way Microsoft Windows participates in the master browser election.
Power toys created by Microsoft to enhance Windows even more.
Changing the maximum port speed to get a faster dialup connection.
How to backup the state of having performed Windows Product Activation.
Open zip and cab files in Windows Explorer like they were normal directory with files.
Dual booting several versions of Windows can be useful if running software which is locked to certain version of Windows.
Bootpart makes it easy to create the perfect multi-boot setup using the Windows NT boot manager.
Using a special keyboard shortcut to create a blue screen of death with memory dump.
Protecting the Administrator account from unauthorized access.
Windows NT will perform a chkdsk at boot time after an improper shutdown.
Recovery Console can be useful when performing system recovery.
DOS box extensions for Windows NT to play the old DOS games one love so dearly.
Possible steps for repairing Windows Update
How to use the scancode map to modify the keyboard layout and disable the Windows-key.
How the HOSTS file can be used to customize the host name resolution.
Windows does not by default display all items that can be uninstalled in the Add / Remove applet.
How to configure the location of WMI logs and how verbose the logs should be.
Faster boot times by not spending time on detecting non-existing IDE devices.
Extend the level of informational messages during Windows startup and shutdown.
How to activate performance counters for the different performance objects in Windows NT.
Decide the CPU priority when starting an application.
Prevent that all Windows Explorer instances crashes just because one gets a fatal error.
Configure how the process scheduler should split up the processor slots.
A boot manager can help with running multiple operating systems on the same machine.
How to use the group policy editor for easy editing of registry settings.
System File Checker is able to verify that system files are intact.
When BETA testing Windows versions then it can be rather useful to easily see the build version on the desktop.
Windows File Protection is able to keep the system files intact when overwritten.
Windows NT hardware abstraction layer can be changed if the motherboard doesn't support the one chosen by default.
How to configure the computer not to announce itself on the Microsoft Network.
When printing a document, then the document is spooled into a temporary directory and then sent to the printer.
Configure the Page Size Extension feature of the processor which is used to for activate large pages support.
How to assign keyboard shortcut to file and directory completion in command prompt.
Prepare the file servers to handle a higher loads and allow the clients to make more requests.
Configure whether to automatically launch application when inserting a CD or DVD disk.
Make dialup modem faster at etablishing a connection and with better connection speed.
The Show Desktop shortcut in the quick launch bar can be restored if deleted.
Increasing the request buffer size can improve file sharing performance on high latency networks.
Description of the registry keys used for configuring the TCP/IP stack in Windows NT.
Changing the color of the desktop shown before a user has logged in.
Change the treshold of when to report that a disk is near its capacity.
QChain is created by Microsoft and allows several hotfixes to be chained together in a single install.
Qfecheck is a command line utility by Microsoft to list installed hotfixes.
How one can reload the HKEY_CURRENT_USER registry hive without needing a restart.
There are several security issues one should take care of when having a network connection.
How to change the text color and background color in the command prompt.
Using PING to test the network connection and finding the best TCP/IP max transfer unit (MTU).
How to configure the MS-DOS subsystem using Autoexec.nt and Config.nt.
Improve the precision and smoothness of your ps/2 device by increasing the sample rate.
Hiding a file-share by changing the name.
How to see the registry changes of a certain action by using the file compare utility.
How to add and remove registry entries from the Windows registry using .reg files
How to configure a keyboard shortcut as a hotkey to quickly start an application.
Troubleshooting what is causing Windows not to install properly.
Microsoft Office graphic filters allows programs like Mspaint to work with formats like jpeg and gif.
How to use the keyboard key "Print Screen" to make a screen dump.
Description of how to configure a computer network without a DHCP server.
Using access control lists to improve the security for NTFS partitions.
Holding down the SHIFT key during Windows startup will stop applications from loading.
Changing the Max Transfer Unit (MTU) to avoid packet fragmentation and loss of VPN connection.
Shortcuts can be created to most of the special folders available in Windows Explorer.
Description and recommended settings for the Portable Media Serial Number service.
Description and recommended settings for the Wireless Zero Configuration service.
Description and recommended settings for the Windows Management Instrumentation Driver Extensions service.
Description of how to repair the Windows Management Instrumentation (WMI) repository.
Description and recommended settings for the Windows Management Instrumentation service.
Description and recommended settings for the Windows Installer service.
Description and recommended settings for the Terminal Services service.
Description and recommended settings for the Telnet service.
Description and recommended settings for the Smart Card Helper service.
Description and recommended settings for the Smart Card service.
Description and recommended settings for the Remote Access Connection Manager service.
Description and recommended settings for the Remote Access Auto Connection Manager service.
Description and recommended settings for the QoS RSVP service.
How to use the Secondary Logon service to start an application with different user credentials.
Description and recommended settings for the Secondary Logon service.
Description and recommended settings for the Routing and Remote Access service.
Description and recommended settings for the Performance Logs and Alerts service.
Description and recommended settings for the Removable Storage Manager service.
Description and recommended settings for the Network Connections service.
Description and recommended settings for the Remote Registry service.
Description and recommended settings for the Logical Disk Manager Administrative service.
Description and recommended settings for the Logical Disk Manager service.
Description and recommended settings for the IPSEC services.
Description and recommended settings for the Windows Firewall/Internet Connection Sharing (ICS) service.
Description and recommended settings for the Indexing service.
Description and recommended settings for the Application Management service.
Description and recommended settings for the DNS Client service.
How to reset the transaction log for the Distributed Transaction Coordinator (MSDTC) and reinstall MSDTC.
Description and recommended settings for the Distributed Transaction Coordinator service.
Description and recommended settings for the Distributed Link Tracking Client service.
Description and recommended settings for the DHCP Client service.
How to repair a broken COM+ catalog and reinstall COM+ services.
Description and recommended settings for the COM+ Event System service.
Description and recommended settings for the Windows Time service.
How to configure Windows to use DMA for IDE ATA hard drives.
Description and recommended settings for the Uninterruptible Power Supply service.
Description and recommended settings for the Telephony service.
Description and recommended settings for the TCP/IP NetBIOS Helper service.
Description and recommended settings for the System Event Notification service (SENS).
Description and recommended settings for the Server service.
Description and recommended settings for the Security Accounts Manager service.
Description and recommended settings for the Remote Procedure Call service.
Description and recommended settings for the Task Scheduler service.
Description and recommended settings for the Protected Storage service.
How to configure the priority and logging level of the Printer Spooler service.
Description and recommended settings for the Print Spooler service.
Description and recommended settings for the Plug and Play service.
Description and recommended settings for the NT LM Security Support Provider service.
Description and recommended settings for the Network DDE DSDM service.
Description and recommended settings for the Network DDE service.
Description and recommended settings for the NET Logon service.
Description and recommended settings for the Remote Procedure Call Locator service.
Description and recommended settings for the Messenger service.
Description and recommended settings for the Event Log service.
Description and recommended settings for the Alerter service.
Description and recommended settings for the Computer Browser service.
Description and recommended settings for the Workstation service.
Description and recommended settings for the Clipbook service.
Description and recommended settings for the FAX service.
Configure how the TCP/IP should respond when multiple network adapters are installed.
List of steps to perform before starting a file defragmentation on a hard disk partition.
How to use the utility Netsh to reset or change the network configuration.
Windows Explorer allows one to specify what folder to display when launched.
Extend the login dialog with the option to shutdown the computer without having given credentials.
Prevent the Windows kernel core from being paged to disk.
Different utilities available to keep file fragmentation at a low level, and maintain good hard disk performance.
How to configure memory size of the file cache for faster file operations.
Microsoft have created many utilities for management of the Windows NT operating system.
Lower the disk activity by disabling the updating of when a file was last accessed.
Speed up the creation of new files by not creating a 8.3 filename for backward compatibility.
How temporary files cause file fragmentation and different RAM disk options.
Finding the the optimal size and location for the Windows swap file.
Update the DirectX runtime after installing new drivers to prevent conflicts.
Uninstall unneeded fonts to speed up boot times and free memory.
How to change the color of the BSOD to make it easier to read or just for fun.
Utilities for offline editing of the password files to change the password, or perform recovery of the lost password.
Speed up the Windows experience by disabling unneeded visual effects.
Deleting the password storage files to reset the Administrator password to recover system access.
Change when an application is considered as deadlocked and should be terminated.
Description of how the drivers and firmware for the computer hardware should be updated to get the best performance.
Boot.ini is used by the Boot Manager to determine the installed operating systems and what startup settings to use.
The Master File Table is the index for all files and directories placed on a ntfs partition and critical for ntfs performance.
Description of how Microsoft Windows requires constant updating to get the best performance.
Configure the path to the location of the install files whether on CD-ROM or HDD.
How to change the cluster size of a partition with description of the different filesystems and their limitations.