[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Z]
/s switch (RDISK)
/s- switch (RDISK)
SACLs (system ACLs)
SAM key
encrypting with SKS
encrypting with SYSKEY
restoring from ERDs
Save method (Perl)
Save Password option
saving captured Registry data (NTREGMON)
logon credentials
Registry keys
2nd
Registry keys in files
Registry keys with reg.exe
SchedulerThreadPriority key
scheduling regular backups
Schulman, Andrew
2nd
screen saver during logon
Scripts key
SDs (security descriptors)
searching (for) keys and values
2nd
3rd
SearchList key
SecurePipeServers key
security
ACLs
[See ACLs] API routines for
auditing Registry access
auditing Registry activity
2nd
bug fixes
cryptography
customizing
DACs (discretionary access controls)
editing Registry, warning about
2nd
emergency repair disks
[See ERDs] encrypting SECURITY\\\\SAM
HKLM\\\\SECURITY key
key ownership
2nd
limiting remote Windows NT access
LSA (Local Security Authority)
password expiration warnings
Registry and
Registry backups
[See backups of Registry] Registry key permissions
removing crash evidence
restriction (winreg) key
safeguarding data
SKS (System Key Security)
SYSKEY protection
Trojan horses
Win32 API data types for
Windows NT model
Security Account Manager (SAM)
encrypting key for
encrypting Registry data on
SECURITY_ATTRIBUTES data type
SECURITY_DESCRIPTOR data type
security descriptors (SDs)
security IDs (SIDs) for HKU subkeys
SECURITY_INFORMATION data type
SECURITY key
2nd
Security key
2nd
3rd
Select key
2nd
SendAlert key
Server service
servers, hiding from network computers
service packs (SPs)
services configuration settings
Services for Macintosh (SFM) package
Services key
2nd
adapter\\\\Parameters\\\\Tcpip subkey
Session Manager key
Set Value permission
2nd
SetDiskWarningThreshold utility (example)
settings system policy, applying
2nd
Settings key
Setup key
2nd
setup program, WinNT
SetupType key
SFM (Services for Macintosh) package
sharing favorites folder on network
mounted disks, preventing
SHCopyKey
SHDeleteEmptyKey
SHDeleteKey
SHDeleteValue
Shell key of application identifier keys
of CurrentVersion\\\\Winlogon
of HKCR
shell operations, list of possible
shellex subkeys
ShellNew key
SHEnumKeyEx
SHEnumValue
SHGetValue
ShowConnectStatus key
ShowLights key
SHQueryInfoKey
SHQueryValueEx
SHRegCloseUSKey
2nd
SHRegCreateUSKey
SHRegDeleteEmptyUSKey
SHRegDeleteUSValue
SHRegDuplicateHKey
SHRegEnumUSKey
SHRegEnumUSValue
SHRegGetBoolUSValue
SHRegGetUSValue
SHRegOpenUSKey
SHRegQueryInfoUSKey
SHRegSetPath
SHRegSetUSValue
SHRegWriteUSValue
SHSetValue
shutdown clearing system pagefile at
powering off at
speed up
of tasks after time limit
Shutdown key
ShutdownWithoutLogon key
SID hive (HKU)
sid key
SIDs (user account IDs)
SIDs for HKU subkeys
size, Registry
SkipConnectComplete key
SKS (System Key Security)
SlowLinkDetectEnabled key
SlowLinkTimeOut key
2nd
snapping to buttons
SnapToDefaultButton key
software for backups, checking
settings for
2nd
3rd
Software key (HKCC)
Software key (HKCU)
2nd
Microsoft subkey
SOFTWARE key (HKLM)
2nd
3rd
Classes\\\\CLSID subkey
ERDs and
Microsoft subkey
Microsoft\\\\Windows NT subkey
sounds, mapping system events to
2nd
SourcePath key
Sources key
SpoolDirectory key
SPs (service packs)
stack-based Registry key classes (example)
Start key
StKey class (example)
2nd
storing system policies
2nd
string terminator
strings data types for
modifying in Registry
2nd
modifying multiple-strings in Registry
subkeys
2nd
hives
[See hives] placeholder for program-specific
2nd
SubnetMask key
Suffixes key
suppressing error messages
symbolic links
[See links, Registry] SYSKEY protection
SYSKEY utility
activating
ERDs and
preparing to install
restoring protected Registry
system buses
events, mapping sounds to
2nd
system ACLs (SACLs)
System key
SYSTEM key (HKLM)
2nd
CurrentControlSet\\\\Control subkey
CurrentControlSet\\\\Hardware Profiles subkey
CurrentControlSet\\\\Services subkey
restoring from ERD
system key (SYSKEY)
2nd
System Key Security (SKS)
system partitions
system policies
applying
2nd
categories of
choosing appropriately
creating
default policy
definition of
distributing
editing with POLEDIT
managing with POLEDIT
parts of
2nd
policy downloaders
storing/loading
2nd
templates for
attaching
creating
editing
standard templates, contents of
2nd
troubleshooting
updating automatically
2nd
user vs. machine policies
System Policy Editor (POLEDIT)
applying policies
2nd
creating policies
creating policy templates
distributing policies
editing policies
interface of
managing policies with
saving/loading policies
2nd
system resources, allocating
system-defined variables REG_EXPAND_SZ data type for
storage locations for
2nd
SystemPartition key
SystemRoot key
SystemSetupInProgress key
|