Team LiB   Previous Section
[A] [B] [C] [D] [E] [F] [G] [H] [I] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]

/s switch (RDISK) 
/s- switch (RDISK) 
SACLs (system ACLs) 
SAM key 
    encrypting with SKS 
    encrypting with SYSKEY 
    restoring from ERDs 
Save method (Perl) 
Save Password option 
saving
    captured Registry data (NTREGMON) 
    logon credentials 
    Registry keys  2nd 
    Registry keys in files 
    Registry keys with reg.exe 
SchedulerThreadPriority key 
scheduling regular backups 
Schulman, Andrew  2nd 
screen saver during logon 
Scripts key 
SDs (security descriptors) 
searching (for) keys and values  2nd  3rd 
SearchList key 
SecurePipeServers key 
security 
    ACLs  [See ACLs]
    API routines for 
    auditing Registry access 
    auditing Registry activity  2nd 
    bug fixes 
    cryptography 
    customizing 
    DACs (discretionary access controls) 
    editing Registry, warning about  2nd 
    emergency repair disks  [See ERDs]
    encrypting SECURITY\\\\SAM 
    HKLM\\\\SECURITY key 
    key ownership  2nd 
    limiting remote Windows NT access 
    LSA (Local Security Authority) 
    password expiration warnings 
    Registry and 
    Registry backups  [See backups of Registry]
    Registry key permissions 
    removing crash evidence 
    restriction (winreg) key 
    safeguarding data 
    SKS (System Key Security) 
    SYSKEY protection 
    Trojan horses 
    Win32 API data types for 
    Windows NT model 
Security Account Manager (SAM) 
    encrypting key for 
    encrypting Registry data on 
SECURITY_ATTRIBUTES data type 
SECURITY_DESCRIPTOR data type 
security descriptors (SDs) 
security IDs (SIDs) for HKU subkeys 
SECURITY_INFORMATION data type 
SECURITY key  2nd 
Security key  2nd  3rd 
Select key  2nd 
SendAlert key 
Server service 
servers, hiding from network computers 
service packs (SPs) 
services
    configuration settings 
Services for Macintosh (SFM) package 
Services key  2nd 
    adapter\\\\Parameters\\\\Tcpip subkey 
Session Manager key 
Set Value permission  2nd 
SetDiskWarningThreshold utility (example) 
settings
    system policy, applying  2nd 
Settings key 
Setup key  2nd 
setup program, WinNT 
SetupType key 
SFM (Services for Macintosh) package 
sharing
    favorites folder on network 
    mounted disks, preventing 
SHCopyKey 
SHDeleteEmptyKey 
SHDeleteKey 
SHDeleteValue 
Shell key
    of application identifier keys 
    of CurrentVersion\\\\Winlogon 
    of HKCR 
shell operations, list of possible 
shellex subkeys 
ShellNew key 
SHEnumKeyEx 
SHEnumValue 
SHGetValue 
ShowConnectStatus key 
ShowLights key 
SHQueryInfoKey 
SHQueryValueEx 
SHRegCloseUSKey  2nd 
SHRegCreateUSKey 
SHRegDeleteEmptyUSKey 
SHRegDeleteUSValue 
SHRegDuplicateHKey 
SHRegEnumUSKey 
SHRegEnumUSValue 
SHRegGetBoolUSValue 
SHRegGetUSValue 
SHRegOpenUSKey 
SHRegQueryInfoUSKey 
SHRegSetPath 
SHRegSetUSValue 
SHRegWriteUSValue 
SHSetValue 
shutdown
    clearing system pagefile at 
    powering off at 
    speed up 
    of tasks after time limit 
Shutdown key 
ShutdownWithoutLogon key 
SID hive (HKU) 
sid key 
SIDs (user account IDs) 
SIDs for HKU subkeys 
size, Registry 
SkipConnectComplete key 
SKS (System Key Security) 
SlowLinkDetectEnabled key 
SlowLinkTimeOut key  2nd 
snapping to buttons 
SnapToDefaultButton key 
software
    for backups, checking 
    settings for  2nd  3rd 
Software key (HKCC) 
Software key (HKCU)  2nd 
    Microsoft subkey 
SOFTWARE key (HKLM)  2nd  3rd 
    Classes\\\\CLSID subkey 
    ERDs and 
    Microsoft subkey 
    Microsoft\\\\Windows NT subkey 
sounds, mapping system events to  2nd 
SourcePath key 
Sources key 
SpoolDirectory key 
SPs (service packs) 
stack-based Registry key classes (example) 
Start key 
StKey class (example)  2nd 
storing
    system policies  2nd 
string terminator 
strings
    data types for 
    modifying in Registry  2nd 
    modifying multiple-strings in Registry 
subkeys  2nd 
    hives  [See hives]
    placeholder for program-specific  2nd 
SubnetMask key 
Suffixes key 
suppressing error messages 
symbolic links  [See links, Registry]
SYSKEY protection 
SYSKEY utility 
    activating 
    ERDs and 
    preparing to install 
    restoring protected Registry 
system
    buses 
    events, mapping sounds to  2nd 
system ACLs (SACLs) 
System key 
SYSTEM key (HKLM)  2nd 
    CurrentControlSet\\\\Control subkey 
    CurrentControlSet\\\\Hardware Profiles subkey 
    CurrentControlSet\\\\Services subkey 
    restoring from ERD 
system key (SYSKEY)  2nd 
System Key Security (SKS) 
system partitions 
system policies 
    applying  2nd 
    categories of 
    choosing appropriately 
    creating 
    default policy 
    definition of 
    distributing 
    editing with POLEDIT 
    managing with POLEDIT 
    parts of  2nd 
    policy downloaders 
    storing/loading  2nd 
    templates for 
        attaching 
        creating 
        editing 
        standard templates, contents of  2nd 
    troubleshooting 
    updating automatically  2nd 
    user vs. machine policies 
System Policy Editor (POLEDIT) 
    applying policies  2nd 
    creating policies 
    creating policy templates 
    distributing policies 
    editing policies 
    interface of 
    managing policies with 
    saving/loading policies  2nd 
system resources, allocating 
system-defined variables
    REG_EXPAND_SZ data type for 
    storage locations for  2nd 
SystemPartition key 
SystemRoot key 
SystemSetupInProgress key 

Team LiB   Previous Section