PC Magazine Windows XP (2006)
PC Magazine Windows XP (2006)
PC Magazine ®
Windows XP Solutions
Second Edition
Neil Randall
®
PC Magazine ®
Windows XP Solutions
Second Edition
Neil Randall
PC Magazine® Windows® XP Solutions, 2nd Edition
Published by
Wiley Publishing, Inc.
10475 Crosspoint Boulevard
Indianapolis, IN 46256
www.wiley.com
ISBN-13: 978-0-471-74752-9
ISBN-10: 0-471-74752-1
10 9 8 7 6 5 4 3 2 1
2B/RZ/RQ/QV/IN
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States
Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee
to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the
Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN
46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy
or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a
particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein
may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal,
accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be
sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred
to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the
information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet
Websites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department
within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Randall, Neil.
PC Magazine Windows XP solutions / Neil Randall. — 2nd ed.
p. cm.
Includes index.
ISBN-13: 978-0-471-74752-9 (pbk.)
ISBN-10: 0-471-74752-1 (pbk.)
1. Microsoft Windows (Computer file) 2. Operating systems (Computers) I. Title.
QA76.76.O63R362 2005
005.4’46--dc22
2005023677
Trademarks: Wiley and related trade dress are registered trademarks of Wiley Publishing, Inc., in the United States and other countries, and
may not be used without written permission. PC Magazine and the PC Magazine logo are registered trademarks of Ziff Davis Publishing
Holdings, Inc. Used under license. Windows XP is a registered trademark of Microsoft Corporation in the United States and /or other
countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or
vendor mentioned in this book.
Credits
EXECUTIVE EDITOR VICE PRESIDENT & EXECUTIVE GROUP
Chris Webb PUBLISHER
Richard Swadley
SENIOR DEVELOPMENT EDITOR
Jodi Jensen VICE PRESIDENT AND EXECUTIVE PUBLISHER
Joseph B. Wikert
TECHNICAL EDITOR
Mark Justice Hinton PROJECT COORDINATOR
Ryan Steffen
PRODUCTION EDITOR
Felicia Robinson GRAPHICS AND PRODUCTION SPECIALISTS
Denny Hager
COPY EDITOR Jennifer Heleine
Foxxe Editorial Services Amanda Spagnuolo
Ron Terry
EDITORIAL MANAGER
Mary Beth Wakefield QUALITY CONTROL TECHNICIANS
Leeann Harney
PRODUCTION MANAGER Jessica Kramer
Tim Tate Carl William Pierce
Charles Spencer
BOOK DESIGNER
Kathie Rickard PROOFREADING AND INDEXING
TECHBOOKS Production Services
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
vi Contents at a Glance
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Part VII Who Owns What: Setting Up Users, Permissions, and Policies
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Part IX Appendixes
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Contents
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . xvii
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xix
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Antivirus Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Anti-Spyware Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Firewall Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Testing Your Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Data Backup Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Ghost Imaging Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Alternative Browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Email Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Password Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Photo Editors/Graphics Programs . . . . . . . . . . . . . . . . . . . . . 231
Music Players and CD Creators . . . . . . . . . . . . . . . . . . . . . . . 232
DVD Players and Burners . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Shells and Interface Customizers . . . . . . . . . . . . . . . . . . . . . . 333
Virtual Desktop Managers . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Uninstallers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
System Repair Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
Windows Speed-Up Utilities . . . . . . . . . . . . . . . . . . . . . . . . . 392
Part VII Who Owns What: Setting Up Users, Permissions, and Policies
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Password and Password Recovery Utilities . . . . . . . . . . . . . . . 451
Account Utilities and Biometric Solutions . . . . . . . . . . . . . . . 452
Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
Web and FTP Server Software . . . . . . . . . . . . . . . . . . . . . . . . 489
Mail Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
xvi Contents
Part IX Appendixes
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511
Acknowledgments
Thanks again to Microsoft, obviously the sine qua non for this book, and to Chris Webb for getting it
through the hoops. And thanks to Jodi Jensen, who has shown more patience with me than I would
have.
And thanks once again to Catherine and Michelle, who have managed to grow up to become truly
fine young women despite a father who has spent enough time in his basement to make Gollum
seem like a sun worshipper.
Introduction
Welcome to the Second Edition of PC Magazine Windows XP Solutions. This time around, in response to
your suggestions, I’ve beefed up the coverage of security and data backup, and I’ve covered Windows
XP Service Pack 2 (SP2) in detail. I had finished writing the first edition just as SP2 was starting to
undergo beta testing, but between then and now it has become a mainstay of Windows XP.
As a frequent contributor to PC Magazine over the past eight years, particularly in the “Solutions”
section, I’ve had the pleasure of writing about Microsoft’s operating systems—covering features,
usability, technology, and hints and tips. Windows XP has fascinated me from the minute I down-
loaded and installed the first beta version back in late 2000. This book covers the issues I’ve been
asked about most often, as well as a number of topics I’ve long wanted to explore on my own.
Released over two years ago, Windows XP has worked — and sold — so well that only now does
Microsoft seem eager to release the next Windows version. Codenamed Longhorn, this version will
be in limited beta testing by the time this book is released and is scheduled to be available to the
public at some point in late 2006 (which means that you shouldn’t count on seeing it until mid-2007
or so). Assuming a 2007 date, this means that Windows XP will have reigned as the company’s pri-
mary desktop environment for five years by that point, and certainly longer while consumers start to
upgrade. Five-plus years in the computer world is a long, long time.
The question, even after Longhorn releases, will be whether or not people flock to it. After all,
Windows XP works very well, and Microsoft’s continual updating of Windows XP means that it has
not grown particularly long in the tooth. Furthermore, as this book emphasizes throughout, you can
customize every major element of Windows XP to suit your needs precisely. Unlike previous ver-
sions of Windows, this one never gives you the sense that you’re stuck with something no matter
how much it annoys you or hinders you over the course of daily use. If you don’t like something, just
change it — then change it again as often as you like.
This book helps you do just that. It also helps you work with the programs included in Windows
XP, build a Windows XP network, add hardware and software to your Windows XP environment,
make Windows XP the center of your Internet activity, and fix the major Windows XP problems. The
book takes as its basis the countless hours I’ve spent with this important operating system: installing,
reinstalling, configuring, networking, and just generally playing with Windows.
Over the course of two decades writing about computers, operating systems have fascinated me
most. And, to be honest, I’ve never met one I didn’t like. Okay, the Commodore 64 OS had its down-
side, and the Atari ST locked up too often, and MS-DOS 3.3 was one of the worst things to look at in
computing history. I spent months with each of them, however, figuring out how to make them work
the way I thought they should have worked in the first place. I loved my three Amigas, I tried hard to
make my first Macintosh crash, I took my chances with those extremely geeky early versions of Linux,
and I gave the underappreciated BeOS a very real chance. This fascination continued throughout the
various incarnations of Windows, beginning with Windows 2.0 back in 1987 and proceeding up the
Microsoft food chain to Windows 3.0, 3.1, 3.11, NT 3.5, NT 3.51, 95, 98, 98 Second Edition, 2000,
Millennium Edition, and finally, XP. With each release, I saw Windows getting better in different ways.
But to me, four releases stand out as landmarks: Windows 3.0, the first version that actually worked;
Windows 95, with its significant revamping of the interface; Windows 2000, the first usable network
workstation from Microsoft; and Windows XP, the culmination of the lot.
xx Introduction
What you get in Windows XP is an operating system both mature and novel. Certainly Microsoft’s
most stable operating system to date, it combines this stability with a growing degree of security (the
constant updates have helped in this regard) and draws on the years of development of such technolo-
gies as file systems, networking, and hardware recognition. You can fairly easily restrict who accesses
which files and folders in Windows XP, you can quickly connect your Windows XP machine to a net-
work, and you can plug hardware into it without wondering if it will ever work. On top of all of this,
Microsoft has placed a multilayer interface with enough new features to satisfy those who love new
ways of doing things, yet maintained a firm entrenchment in Windows interfaces of the past.
Windows XP Professional offers other unique features as well, including the capability of down-
loading multilingual interface add-ons, the capability to connect to network domains, and the capabil-
ity to take advantage of PCs with more than one processor. These features do not appear in this book,
but they demonstrate the very real sense that Microsoft has designed Windows XP Professional to be
the more capable of the two operating systems. For many users, however, the Home Edition works per-
fectly well, and given its lower price, it might well be the right choice for you.
Tip
Each Tip gives you additional information that adds to the topic under discussion. The information typically
springs from something in the immediately preceding paragraph and provides a succinct suggestion that you
might want to follow while working through the chapter. In effect, a Tip says, “You should try this as well.”
xxii Introduction
Note
A Note is just that: a note. Usually a note provides information related to the topic under discussion but not
essential to it for the purposes of working through that topic. A Note says, essentially, “Here’s an interesting
point about the topic.”
Caution
Each Caution in this book alerts you to something worth paying attention to — for example, something that
can cause you problems while working with the current topic. A Caution says, “Before going any further,
make sure that you consider this point.”
Windows XP
Service Pack 2
W hy place this chapter first? Quite simply, if you’re running Windows XP, you should also
be running Service Pack 2 (SP2). The purpose of SP2 is to render Windows XP more
secure, less vulnerable to attacks from the Internet, and more easily integrated with existing third-
party security software. SP2 was introduced to the world just after the first edition of this book was
completed, and for that reason it represents the single most important change to XP in the interven-
ing months. Even if you never bothered to install Service Pack 1 — for whatever reasons — you owe
it to yourself to get SP2 on your system as quickly as possible.
This chapter covers the features of SP2, along with details about downloading (or ordering it on
CD) and installing it. Consider this the first step in making your Windows XP machine and the data
it stores safer and more stable, a process continued in the chapters that follow.
Inform you that Service Pack 2 is available and let you download and install it
Inform you that it has downloaded Service Pack 2 and let you install it
Download and install it without your intervention
In the first two instances, you must use the resulting dialog boxes to tell Windows to put the ser-
vice pack in place. See the section “The Installation Itself” a little later for details.
There are two other ways to acquire SP2:
Order the free CD: From the Microsoft site, navigate to the Windows XP area, follow the
link to Service Pack 2, and look for the link to order it on CD. As of this writing, the URL
3
4 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
There’s a particularly strong reason to install a service pack from CD rather than from Windows Update. If your
computer is already compromised — that is, it has already contracted viruses, spyware, and so on — any sub-
sequent download can be affected, including items from Windows Update. For this reason, if you want to use
the protection features of SP2, you’re much better off ordering the CD and installing from it, simply because the
CD won’t be compromised. That said, for a completely clean PC, the best idea of all is to reinstall Windows XP
from scratch and apply SP2 from the CD after doing so. For instructions on reinstalling Windows XP, see
Appendix B. And hey, there is lots in this book to keep you busy while you wait for the CD to arrive.
1. Give yourself some time to do the installation properly: Plan on spending an evening
doing the installation, ideally longer. It might take less. While the actual installation is in
progress, don’t plan to do anything on the PC.
2. Perform a backup of the files you can’t live without: This includes programs whose
installation CDs you no longer possess, and those whose CD or registration keys you
couldn’t find if your life depended on it. See Chapters 4 and 26 for more on data backup.
3. Perform a full virus check on your system: Be sure to set your antivirus software to
include all files, including system files and program files. Include all your hard drives.
Depending on how much data you have stored on your drives, this process could take
several hours. See Chapter 2 for sites to visit to conduct online antivirus checks.
Chapter 1: Windows XP Service Pack 2 5
4. Perform a full spyware check on your system: Delete all spyware files and programs
located. If you know you have programs that include spyware, delete them from your
system thoroughly. See Chapter 3 for sites to visit that offer free online spyware scans.
5. Get rid of as many programs you can from the Startup folder, and prevent as many
programs as possible from automatically loading when Windows starts: These pro-
grams won’t likely do any harm to the installation, but your SP2-enhanced Windows will
start more quickly without them; besides, you’ve been wanting to get rid of those time-
wasters for a while anyway, right?
6. Ensure that you have adequate space: Check that you have at least 2GB of space avail-
able on your primary Windows XP hard drive.
7. If you are installing to a notebook PC, plug in the power cord: Do not run it on battery
power. If the batteries fail during installation, you can cause significant damage to
Windows itself (although SP2 is good at recovery).
8. Using the disk utility of your choice (Microsoft’s CHKDSK is fine), check your hard
drives for errors: Let the utility correct the errors, and proceed from there. See Chapter 22
for more on working with hard drives.
9. Go to Windows Update, before installing SP2, to get your PC up to date with the lat-
est files: This is particularly true of noncritical updates. However, if Windows Update lists
SP2 as an available download, this means that its scan of your PC has indicated that you
may install it without difficulty. Before doing so, however, go to step 10.
10. Download and install the latest device drivers for as many hardware devices as you
need: You can get these from the support areas of the manufacturers’ Web sites. Examples
include drivers for hard drives (particularly SATA drives and RAID systems), video cards,
sound cards, external drives, printers, and more. Again, these aren’t actually necessary, but
doing this will ensure that SP2 installs on top of a fully up-to-date system.
11. If your PC has more than one account, log off all users from your PC, and log in as an
administrator: Better yet, reboot the PC to clear out all users and log in as an Administrator.
If you do not have an Administrator account, let someone with such an account perform the
SP2 installation. If your PC has one account only, it’s almost certainly an Administrator
account anyway. However, see Chapter 24 for more on establishing and determining user
accounts.
Note
You do not have to install Service Pack 1 before installing Service Pack 2. SP2 contains all the features and
fixes of SP1, adding many of its own.
Improved Security
Analysts and critics of Windows XP have continually focused on security issues. As with previous
versions of Windows — especially since the popularization of the Internet — XP has been suscepti-
ble to hackers, crackers, intruders, and thieves, and this susceptibility has made IT-savvy businesses
and users wary of running Windows (including the XP version) on their main production PCs.
Service Pack was designed from the outset primarily as an improvement on XP’s security, and to that
end, it incorporates numerous important security features.
Primary among these security features is the Windows Firewall. To be sure, SP2 doesn’t actually
represent the first appearance of the Firewall; it appeared, in fact, with the original Windows XP.
However, SP2 improves the capabilities of the Firewall along with its default performance. Later in
this chapter you look at how to configure the firewall; for now, it’s important to note that the firewall
is turned on by default in SP2, and that — more important — it has been added to the startup and
shutdown processes of Window XP to minimize intrusions from the Internet in the time between the
loading of the networking subsystem and the appearance of the desktop. Previously, that time offered
a window of opportunity for hackers to break into system and establish control of the network.
The most visible sign of the concern for added security is the Windows Security Center, covered
(like the Firewall) in its own section later in this chapter. The purpose of the Security Center is to
provide a central interface from which you can see at a glance whether or not Automatic Updates,
the Firewall, your browser settings, and your antivirus software are in place, and from which you can
configure the features of these security tools. The Security Center loads automatically when you
install SP2, encouraging you to take advantage of its controls in order to secure your PC against all
possible threats (or at least the ones that it can manage).
Protection from downloads (IE): One of the classic methods of compromising your PC is
for Web pages to initiate procedures to store files on your hard drive. SP2 provides Internet
Explorer with an Information Bar, which appears immediately below the Address Bar and
informs you each time IE recognizes a potentially harmful download. These downloads
typically come from ActiveX controls, but they can include other recognized problem files
as well, such as .exe files (program executables). Whenever the Information Bar appears,
you can hover the mouse pointer over it to discover what is being called to your attention
8 PC Magazine — Windows XP Solutions, 2nd Edition
and to take action. Two menu items appear: Download File and What’s the Risk? Choose
the first to override the Information Bar and download the file in question; choose the sec-
ond to go to the Microsoft site where an explanation page explains what the danger is. In
the case of a download, IE causes a Security Warning window to appear, letting you Run
or Save the file; in the case of ActiveX controls, it lets you configure IE to accept or reject
all such files from specific sources or to ask you every time one appears.
Protection from downloads (OE): Microsoft email products (the full Outlook program
in particular) have suffered terribly from their susceptibility to viruses and other malicious
code sent as attachments and as images within messages. With SP2, Outlook Express is
far more watchful for such code, blocking suspicious attachments and, by default, not
displaying graphics in a message opened in a separate window or in the Preview pane. As
with IE’s Information Bar, you can view the messages by clicking the block notification and
instructing OE to download them, but some attachments are simply blocked from down-
load completely. If that happens, and you know the code is valid, you can reply to the
sender to have that person reattach and resend them. If you’re not certain, be glad that the
attachment has been blocked.
Control of IE add-ons: Numerous programs add capabilities to IE to allow you to work
with files germane to those programs from within your browser. Typical examples include
virus checkers, download utilities, and the unending stream of toolbars available from
Google, Yahoo!, MSN, and practically everywhere else. SP2 adds a Manage Add-ons win-
dow to IE, accessible via IE’s Tools menu. Figure 1-1 shows this utility, in whose viewing
pane is displayed all the add-ons currently loaded in IE. Another view, available by click-
ing the drop-down menu in the Show field, allows you to see what add-ons IE has used,
not just those currently loaded. You can click the name of each add-on and choose to
Enable or Disable it. If it is an ActiveX object, you can click the Update ActiveX button to
have IE go to the manufacturer’s site and download the latest version. The most important
element here is the capability to disable add-ons because they often result in the worst
slowdowns you’ll experience when using IE.
Protection from the resizing of IE windows: Few things are more annoying than having
your browser window resized simply because you went to a specific Web site and loaded a
specific page. Resizing is caused by scripts deliberately encoded to cause the browser window
to enlarge (they could shrink it as well, but they never do), a method unscrupulous Web
authors use to ensure that you see the pages they want you to see (by hitting you over the
eyeballs with them). SP2 gives IE the code needed to stop these scripts from running, thereby
eliminating the resizing problem. If you want larger windows, you can resize them yourself.
Blocking of popups: Unwanted resizing of browser windows might be among the most
annoying events when Web browsing, but having new windows pop up on their own is
infuriating beyond belief. Popups are designed to focus your attention and force you to
notice something (usually an ad or a survey) you wouldn’t otherwise pay attention to.
Popups are intrusive, disruptive, counterproductive, and just plain rude. Numerous
toolbars (Google, Yahoo!, MSN) prevent popups from appearing; but with SP2, Internet
Explorer can block them as well. And as with all pop-up blockers, you can choose to have
the popup appear if you want. After IE has informed you that it has blocked a popup,
hold down the Ctrl key while clicking the link, and it will appear as a separate window.
Chapter 1: Windows XP Service Pack 2 9
Other Enhancements
The original Windows XP was the first Microsoft OS that offered built-in support for wireless net-
works, but Wi-Fi (Wireless Fidelity, formally known as the IEEE 801.11 networking standard) was
relatively new at the time and the support was limited. Service Pack 1 improved the capability of XP
machines to connect to wireless LANs, but SP2 makes it easier still. SP2 allows Windows to recog-
nize Wi-Fi broadcasts more reliably, enabling instant connections to public wireless networks in
locations such as airports, schools, libraries, coffee shops, and other hotspots. Simply turn on your
notebook and wait for XP to offer a choice of connections.
Also in the networking vein, SP2 improves the interplay between XP’s networking and the
Bluetooth standard. (Bluetooth is the specification for wireless personal area networks.) Whereas it
was often previously necessary to spend considerable amounts of time configuring XP in order to
have the connection actually work, with SP2 the connections are more frequently immediate.
They’re not as reliable as Wi-Fi connections, and in fact are often compared to the Wi-Fi capabilities
of XP as of Service Pack 1. But if you own Bluetooth equipment, anything’s better than what it was
like before, so this will come as a particularly pleasant improvement. Whether or not Bluetooth con-
tinues to evolve and capture market share remains to be seen, but Bluetooth devices — ranging from
keyboards to network adapters and print servers — are certainly appealing for a wide range of rea-
sons. SP2 makes them that much more appealing.
Only one other major enhancement ships with SP2: a new version of Windows Media Player.
WMP 10 is covered in detail in Chapter 14, so here I’ll simply say that it works more capably with
10 PC Magazine — Windows XP Solutions, 2nd Edition
DVD movies and that it offers numerous music (and other media) download purchases from directly
within the program. In addition, facing obvious competition from the iPod, particularly the iPod’s
ease of building playlists, WMP 10 gives you better tools for organizing your music files.
Resources
The bar on the far left of the Security Center houses the Resources area. At first glance, this area
seems nothing more than a set of links to information screens, but in fact, it’s more valuable than
that. Each of the five links offers its own useful security details:
Get the latest security and virus information from Microsoft: This link leads to the
Security home page on the Microsoft site (www.microsoft.com/security/default.mspx). That
page, shown in Figure 1-3, provides a wealth of detail surrounding security updates, viruses
and other malicious software, and how to configure your PC for the highest possible security.
Clicking the link More Security Updates on this page, for example, leads to a list of security
bulletins and downloads. Farther down the page (not shown in the figure), the Trustworthy
Computing section provides a list of best practices and technology information.
Check for the latest updates from Windows Updates: Clicking this link leads to the
Windows Update site (covered in detail in Chapter 5). It’s useful to have the link on the
Security Center, especially as you get more and more used to checking the Security Center
for possible issues surrounding your PC.
Get support for security-related issues: This link leads directly to the Microsoft Support
home page for security issues, a compendium of information about intrusions, viruses, and
protection mechanisms. Included here are recent announcements about dealing with secu-
rity problems, including information about such matters as how to determine if a security
warning, received via email or the Web, is genuine.
Caution
When you receive an email message about security or about the need to log in to an account in order to con-
firm anything at all, DO NOT COMPLY unless you are absolutely certain the message is legitimate. To deter-
mine legitimacy, visit the Web site of the organization or company that apparently sent the information to you,
and browse their site for information surrounding fraudulent messages. The general rule of thumb is that
sites such as banks, eBay, and any other site that can get their hands on your money will never issue such
messages. Sending fraudulent messages in order to gain access to your accounts is known as phishing and
is one of the most dangerous security problems facing computer users today.
Get help about Security Center: Clicking here loads the Windows Help system for the
Security Center applet. It’s a pretty useless Help page.
Change the way Security Center alerts me: This link opens the dialog box shown
in Figure 1-4. Checking each of the options (Firewall, Automatic Updates, and Virus
Protection) tells Windows to inform you when your computer might be at risk because
of the way you have Security Center configured. Although less useful than the warnings
provided by some third-person security utilities, this is certainly a step in the right direc-
tion for Windows itself. Notice that the pictured dialog box has the Virus Protection but-
ton unchecked; you might choose to do this if your antivirus software already has its own
alert system.
Figure 1-4: The dialog box for configuring Security Center alerts.
Chapter 1: Windows XP Service Pack 2 13
Firewall
The Firewall area of the Security Center gives you a button for turning Firewall monitoring on or off,
as well as a link to a Help screen explaining why you should use only one firewall on your system.
The answer to the second point is that different firewalls work differently, to the degree that they
might very well prove incompatible with one another. That said, many users have two or even three
firewall packages running on their PCs: the Windows Firewall, a third-party firewall (such as
ZoneAlarm), and the firewall built into their network routers.
However, if you install a product such as Norton Firewall, the installation strongly recommends
that you let the product disable the Windows Firewall automatically. Users attempting to work with
both firewalls simultaneously have reported slowdowns and lockups.
The most important Security Center link to the Firewall is in the Manage Security Settings area at the
bottom of the screen. Clicking this link yields the Windows Firewall configuration dialog box with its
three tabs: General, Exceptions, and Advanced. From here, you control the workings of the Windows
Firewall; even if you change nothing, exploring its various screens lets you see what firewalls actually do.
The General tab offers only three choices: On (recommended), Off (not recommended), and Don’t
allow exceptions. By default, except on Domain installations of SP2, only the first choice is selected. If
you install a third-party firewall product that does not automatically disable the Windows Firewall,
check the Off radio button and click OK to disable it manually in favor of the newly installed product.
The check box labeled Don’t Allow Exceptions tells Windows to ignore any settings under the
Exceptions tab, which you come to next. Essentially, checking this box tells Windows to inform you of
any and all incoming data from the Internet, no matter what. This setting means that you will have to
override every single program with a connection from the Internet, even those such as email and Web
browsing that you do all the time. Check it only if you have the time to do such extensive monitoring.
The heart of the Firewall lies in the Exceptions tab. As Figure 1-5 shows, this tab displays a list of
some of the programs and services currently installed on your PC (see the following bulleted list for
adding others), along with a check mark denoting which ones you are allowing to bypass your fire-
wall. To force Windows to block a program from bypassing the firewall, uncheck its box and click
OK. To prevent Windows from even notifying you of such occurrences, uncheck the box at the bot-
tom of the dialog labeled Display a Notification When Windows Firewall Blocks a Program. With
this box checked, you have the option of overriding the Firewall each time a block occurs; with this
box unchecked, Windows Firewall blocks programs without your intervention (which essentially
means that you won’t be able to use those programs if their design is to download data).
At the bottom of the dialog box are these four buttons:
Add Program: This button opens the Add Program dialog box, which consists of a list of
everything installed on your PC, letting you manually select (or browse for) the programs
you want to control via the Firewall. This option is important for adding programs that
Windows has not initially determined to perform data downloads but that you know do
engage in such activity.
Add Port: This button allows you to declare that data using a specific port, which uses
either the TCP or the UDP protocol, will bypass the firewall automatically. The primary use
for this option lies with online games that require specific ports to work properly. When
you open a port for any purpose, however, you should always return to the Windows
Firewall dialog box after using it in order to close it again. Intruders are always looking for
open ports — to leave them open invites disaster.
14 PC Magazine — Windows XP Solutions, 2nd Edition
Edit: This button shows you the folder path for the program you’ve selected in the list and
lets you change the scope of the exclusion. Figure 1-6 shows the dialog box that appears
when you click the Change Scope button (this button is also available when you click the
Add Port button). The options are for any computer on the network to allow this program
through the firewall, for only those in this computer’s subnet (with all PCs outside that
subnet blocking the program), or for a customized list of PCs (listed by IP address) that
will allow that program to bypass the firewall. If you have only one member of your family
or your office who needs to unblock data from a specific program, use this feature to
unblock that person’s PC address.
Delete: This button gives you the option of deleting a program from the Programs and
Services list. Doing so prevents it from being monitored entirely, so before deleting it, con-
sider simply checking it and, therefore, allowing it access as an exception.
The Advanced tab of the Windows Firewall dialog box (see Figure 1-7) offers still more options.
In the Network Connection Settings area, you can specify which of the connections shown in your
Network Connections folder will use the Windows Firewall. Be aware, however, that unchecking an
option renders that connection open to unprotected intrusion. It is possible to allow one or more
connections to use the Windows Firewall while other connections use a third-party firewall. There’s
little (if any) reason to ever do that, though.
You can specify the firewalled components of each connection by clicking the Settings button.
This opens the Advanced Settings dialog box, with one list of selectable items under the Services tab
and another under the ICMP (Internet Control Message Protocol) tab. Each item you choose for
inclusion will be available through that specific network connection to anyone who uses that con-
nection. For example, you can specify whether users on that network connection are able to access
FTP or Web servers or Windows features such as Remote Desktop.
If you want to study the workings of the Windows Firewall, click the Settings button in the
Security Logging area. The resulting Log Settings dialog box lets you specify if you want to log suc-
cessful connections or dropped data packets, along with where on your system to store the log file
created by this option. You can also specify the maximum size of the file, 4MB by default, but as
small or as large as you want. With the logging feature turned on, you can open the file at any time
16 PC Magazine — Windows XP Solutions, 2nd Edition
(using any text editor, such as Notepad) to see what the firewall has been doing. The information is
highly technical and is primarily useful for troubleshooting purposes. But if you’re determined to
understand firewalls (and especially the differences among firewalls), the details can be fascinating.
Summary
Windows XP Service Pack 2 provides a level of security that no desktop version of Windows has
managed to achieve in the past. The Windows Firewall alone is worth the price of admission; how-
ever, the Security Center points to a solid future of drawing together the myriad threads of security
options that have been available to Windows users for a long time but that have always worked dis-
parately and often at odds with one another. Third-party security solutions remain not only valid
but also frequently preferred. But even out of the box — except for the crucial omission of antivirus
software — SP2 can render any PC much less vulnerable than before. Simply put, do not let anyone
in your office or your household run Windows XP without it.
Chapter 2
Protecting XP
against Viruses
I f you buy a new computer these days, it’s likely to ship with an antivirus package. This fact, more
than anything else, should convince you of how widespread viruses have become and how much
the computer industry has come to accept their inevitability. Quite simply, viruses are a fact of com-
puting life.
If your computer did not come with an antivirus package, you should install one before you do
anything else. These things aren’t luxuries; you need them. Very few viruses actually do significant
harm to your PC, but it takes only one such infection to make your life thoroughly miserable.
Furthermore, even those viruses that don’t destroy data or programs can slow down your PC or
cause it to behave unpredictably. Even worse, however, is the fact that the entire purpose of a com-
puter virus is to spread. If you don’t protect your PC, you will almost certainly start sending viruses
to other people. Safe computing isn’t just about you.
The other reason to install an antivirus package is that, increasingly, these packages deal with more
than just viruses. Other forms of malicious software, including spyware (covered in Chapter 3), can
also affect your system and even your privacy. You don’t want this stuff glued to your hard drives or
floating around in memory, but most of us have at least a small amount of it. Some PCs, especially
those that have no protective software tools, are inundated with it.
Tip
Just say no. That’s the best guideline I can possibly give you. If you get a message on your computer asking
if you want something downloaded and/or installed, click the No or Cancel button. There are reasons to
allow downloads — updated virus definition files, automatic updates from Microsoft, new Acrobat Reader
versions from Adobe, for example — but before pressing the Yes/OK/Install button, be absolutely certain you
know what you’re letting yourself in for. The primary cause of intrusion problems on personal computers,
especially Windows machines, is user ignorance; perhaps that’s a tough word to use, but unfortunately it fits.
People simply don’t realize that anything you don’t specifically ask for, no matter how nicely the request
might be phrased, is designed to do something you probably don’t want it to do. Just say no, and you’ll be
much better off.
17
18 PC Magazine — Windows XP Solutions, 2nd Edition
This chapter deals with viruses and virus protection programs. Chapter 3 deals with spyware.
Between the two of them, and especially when used in conjunction with a firewall program (see
Chapter 1), you have a decent chance of protecting your computer from the majority of intrusions
you’re likely to experience in your daily computer use.
Virus Types
The preceding explanation of viruses is actually more specific than the way we tend to use the term
virus. In fact, it is often called a program virus or a file virus in order for commentators to differenti-
ate it from other types of viruses. These viruses, which also go by the names file infectors and para-
sitic viruses, are those viruses that attach themselves to an executable file (that is, programs), and are
the most common and the most discussed. The virus typically waits in memory for the user to run
other programs, using such an event as a trigger to infect that program as well. Thus, they replicate
simply through active use of the computer. There are different types of file infectors, but the concept
is similar in all of them.
Other virus types (although not all are technically viruses) include boot sector viruses, macro
viruses, email viruses, worms, Trojan horses, and droppers. All these programs are part of a category
Chapter 2: Protecting XP against Viruses 19
of program known as malware, or malicious logic software. What they all have in common is that
they act without the user’s knowledge, committing some kind of act inside the computer that they
are intentionally designed to do.
Boot sector viruses or infectors reside in specific areas of the PC’s hard disk, those that are read by
the computer at boot time. True boot sector viruses infect only DOS’s boot sector, while a subtype
called MBR viruses infect the master boot record. Both of these areas of the hard disk are read during
the boot process, during which the virus is loaded into memory. Viruses can infect the boot sectors
or floppy disks, but typically a virus-free, write-protected boot floppy has always been a safe way to
start the system virus-free. The problem, of course, is guaranteeing that the floppy itself is unin-
fected, a task that antivirus programs attempt to do.
Macro viruses work much the same way as program viruses, which makes sense, because macros
are simply small programs. These viruses make use of the fact that many programs ship with pro-
gramming languages built in. The languages are designed to help users automate tasks through the
creation of small programs called macros. The programs in Microsoft Office, for instance, ship with
such a built-in language, and in fact provide many of their own built-in macros. A macro virus is
simply a macro for one of these programs. This type of virus became known through its infection of
Microsoft Word. When a document containing the virus macro is opened in the target application,
the virus runs and does its damage. In addition, it is often programmed to copy itself into other doc-
uments so that continual use of the program results in continual spread of the virus. Viruses for
Microsoft Office programs are so common that, by default, when you open a Microsoft Office pro-
gram, the capability to run macros is disabled. You have to tell Office to turn that feature on.
Email viruses have become a major source of malware distribution in the past few years. They
function (mostly) by automatically mailing themselves to everyone in the user’s contact list.
Microsoft Outlook has been the primary target for email viruses because of Outlook’s popularity.
A worm is a program that replicates itself but doesn’t infect other programs. It copies itself to and
from floppy disks, or across network connections, and sometimes it uses the network to run. One
type of worm, the host worm, uses the network only to copy itself onto other machines, while
another type, the network worm, spreads parts of itself across networks and relies on network con-
nections to run its various parts. Worms can also exist on a non-networked computer, in which case
they copy themselves to various locations on your hard drives.
The Trojan horse name comes from the Greek myth, best recounted in The Odyssey, in which the
Greek army gave a wooden horse as a gift to the Trojans and then hid inside the horse as it was taken
into Troy. They jumped out and captured the city, ending the long siege. The idea in computers is the
same. A Trojan horse is a program that is hidden inside a seemingly harmless program and launches
when that program is run. It is designed to perform actions that the user doesn’t want performed.
Trojan horses do not replicate themselves.
Droppers are programs designed to avoid antivirus detection, usually by encryption that prevents
antivirus software from noticing them. The typical function of droppers is to transport and install
viruses. They wait on the system for a specific event, at which point they launch themselves and
infect the system with the contained virus.
Related to these programs is the concept of the bomb. Bombs are usually built into malware as a
means of activating it. Bombs are programmed to activate when a specific event occurs. Bombs based
on time events activate at a specific time, typically using the system clock. For example, a bomb
could be programmed to erase all .doc files from your hard drive on New Year’s Eve. Other bombs
20 PC Magazine — Windows XP Solutions, 2nd Edition
use logic to activate: an example might be to wait for the twentieth instance of a program launch and
at that time erase the program’s template files. In fact, looked at this way, bombs are just malicious
scripts or scheduling programs.
Viruses can be thought of as special instances involving one or more of these malware programs.
They can be spread through droppers (although they need not be), and they use the worm idea to
replicate themselves. While viruses are not technically Trojan horses, they act like them in two ways:
first, they do things the user doesn’t want done; second, by attaching themselves to existing pro-
grams, they effectively turn the original program into a Trojan horse (they hide inside it, launch
when it launches, and commit unwanted acts).
operating system and are virtually undetectable because they intercept the operating system’s basic
processes. Detecting rootkits has become a major goal for antivirus and anti-spyware software,
although standalone tools such as Sysinternals’ rootkitrevealer (www.sysinternals.com) focus exclu-
sively on such detection.
this sophisticated software to recognize patterns in virus construction: If it detects a pattern within a
file it has scanned that comes close to matching the various virus patterns contained in its database,
it will let you know and offer to quarantine that file for you.
So, what does your antivirus program know? Very simply, any virus code that it has been pro-
grammed to look for. When your antivirus utility conducts a scan of your files, it examines the code
of any files you specify to see if those files contain code that matches one or more virus definitions
the utility contains. The virus definition file, therefore, determines the effectiveness of your antivirus
utility; it cannot detect viruses that are not contained in the definition file. Because of this, your
antivirus utility is next to useless unless you keep it continually updated.
Fortunately, all antivirus utilities contain a means of updating the definition files. Either you
download the files from the manufacturer’s Web site manually, or you configure the utility to connect
to the Web site every so often (your choice) to check for updated definition files — along with
updates to the program itself — and download and install them. If you have a broadband Internet
connection, you might as well configure your utility to check daily.
Tip
If you are responsible for other peoples’ computers — those of family members or fellow office workers, for
instance — check them occasionally to determine that (a) the antivirus utility is running, and (b) the definition
files have been updated. One of the most common mistakes PC users make is to shut off the automatic
update feature of these utilities but think they are protected because the antivirus program is indeed running.
All the utility can do in that situation is ensure that the PC remains uninfected by old viruses; it can do noth-
ing to guard against newcomers.
For the purposes of this chapter, I have decided to focus on one antivirus package, Symantec’s
Norton AntiVirus (which I abbreviate as NAV). This is not in any way meant to denigrate the other
popular antivirus packages out there: McAfee VirusScan, Trend Micro PC-cillin Internet Security,
Kapersky Antivirus, or any others. In fact, in comparative reviews, Norton AntiVirus has not typi-
cally proven better than the others in any significant way. Its choice for this book is primarily the
package’s popularity and the fact that it serves just fine as an example of what antivirus software
accomplishes.
You can successfully scan a PC that does not have the latest virus definition files installed
locally.
You are always assured of the most up-to-date virus scan possible.
Chapter 2: Protecting XP against Viruses 23
You can scan PCs on which, for whatever reason, you cannot install antivirus software.
You can get a second opinion to see if the results are different from those of your installed
antivirus program.
The next two figures show the Web pages for two of the more popular Web-based antivirus scans.
Figure 2-1 is the User Agreement page for McAfee FreeScan, accessible from the McAfee home page
(www.mcafee.com).
Figure 2-2 shows the starting page for Trend Micro’s Housecall, the online free virus scan corre-
sponding to their PC-cillin product (www.trendmicro.com).
In both cases, you need to agree to a download of an ActiveX control to have the virus-scanning
software start, and this is indeed one of two apparent strikes against this method of virus checking.
Since some of the fear surrounding malware is precisely the vulnerability of your PC to software
placed on your hard drives from outside, it seems counterintuitive from a security standpoint to
allow an ActiveX control to install itself on your PC and then allow that control to scan all the files
on your system. To be sure, there’s no way a reputable company would do anything so stupid as to
cause damage or steal data in this way, but that won’t stop everyone from being concerned.
24 PC Magazine — Windows XP Solutions, 2nd Edition
The other issue is much more functional. Web-based scans tell you what’s on your system right
now, but they do nothing to prevent additional viruses from infecting your PC from that point on. A
locally installed antivirus program continually checks your PC’s memory, the files you download
from the Internet, and much more. In other words, an installed package acts as a preventative, while
a Web-based scan acts only to determine what’s already wrong.
That said, however, these free scan sites can save you time and again, so don’t hesitate to use
them. And, while you’re at it, say thanks that they’re available at all.
Symantec has made the software available in several other packages as well. It forms one of the core
elements of Norton Internet Security (including the AntiSpyware Edition), as well as Norton
SystemWorks, a product that has been available from the company for several years. SystemWorks
incorporates the antivirus package with utilities for hard disk security and repair, disk clean-up, system
monitoring, and much more. These products made their start — and indeed the company’s start — as
Norton Utilities. When you consider the difference in price between the antivirus package on its own
($49.95) and the full utility package ($69.95), it probably makes sense to get the whole shebang.
The first step, of course, is to install the software. This is actually simpler with Windows XP than
with Windows 9.x versions, as long as you’re using the recommended NTFS file system. For the
FAT32 file system — the file system used on Windows 95, 98, and ME — NAV installs a Rescue fea-
ture that enables you to create emergency disks that are usable if your XP installation fails to start.
With Windows XP (or Windows 2000) and the NTFS file system, however, this feature not only
doesn’t work, it isn’t even installed. So, it becomes even more crucial to keep your system backed up,
using a backup program or ghosting program.
Once installed, NAV automatically launches its LiveUpdate feature. This features works very
much like any automatic update feature, informing you that updates are available from the com-
pany’s download site and giving you the opportunity to perform the update at that moment or wait-
ing until later. Immediately upon installation, you should perform the update without even thinking
about it. If you don’t, you’ll be out of date before you start.
26 PC Magazine — Windows XP Solutions, 2nd Edition
LiveUpdate is shown in Figure 2-4. In this figure, the utility is accessing the Symantec site to
determine if any of the Norton SystemWorks programs or data files (such as virus definition files) on
your PC need updating. If you own NAV on its own, the Products and Components window will
show far fewer programs, of course, but the principle remains the same. LiveUpdate tells you what’s
available for download and lets you download and install them with one click. You should launch
LiveUpdate manually on a periodic basis, but by default it monitors Symantec’s site and informs you
automatically of any updates it finds.
Figure 2-4: LiveUpdate in the process of downloading component and data file information.
The third choice on the control panel is to read the numerous reports that NAV compiles as it
goes about its business. Figure 2-7 shows the report screen, with the threat alerts highlighted. This
example shows the capacity of NAV to locate spyware (covered in Chapter 3) rather than viruses per
se, but that’s only because this particular PC had not experienced a virus threat during the range of
dates covered in the report (or NAV didn’t catch them). Note that from this dialog box you can’t
28 PC Magazine — Windows XP Solutions, 2nd Edition
actually do anything about the items caught during scanning; this is simply a report, but a highly
informative one nevertheless.
Tip
Norton AntiVirus helps you keep your system up to snuff even further by adding to the Windows interface. In
My Computer, for example, you can right-click a file or folder and choose Scan with Norton AntiVirus, to have
the program perform an immediate scan of only that component. The package also adds a toolbar to Internet
Explorer.
have it set to examine all files you upload, including email messages, all this scanning can cause the
system to slow down appreciably, at times to the extent that you swear something is not working.
This is especially true of operations it performs in the background; it’s not uncommon to be waiting
for a Web page to appear, or a large graphics file to open, only to discover that the antivirus program
has been hogging system resources performing one of its numerous functions. For this reason, NAV
(again, like all such packages) lets you turn some of those functions off if you wish, or schedule them
at the most convenient times possible.
Figure 2-8 shows the NAV Options dialog box. When using your antivirus package, take some
time to explore the various possible configurable elements; sometimes they’re not immediately
apparent. In NAV, for example, the entire left side of the Options screen consists of numerous con-
figurable elements. Figure 2-8 shows only one such grouping — the Auto-Protect options — and not
even all the ones available in this group. Clicking the Auto-Protect menu item on the left yields addi-
tional subcomponents, each of which you may configure as you see fit.
The following list highlights some of the more interesting options and what they do:
Auto-Protect: The Auto-Protect feature allows NAV to monitor your system continuously,
detecting malware as it appears on your PC. With a slow processor, this feature can take a
significant toll on your PC’s performance. That’s really the only reason you should even
consider toggling the feature off. If you do have it on, it’s also a good idea to have it load
with Windows so that it can begin its monitoring immediately. The middle of the screen
lets you choose whether you want NAV to automatically attempt to repair files in which it
30 PC Magazine — Windows XP Solutions, 2nd Edition
detects malware, attempt to repair them but quarantine them if it cannot, or deny access
to the file. If you know a user does not understand the dangers associated with viruses, the
denial option might be your best bet to ensure that no file with improper code detected
gets used on the system.
Script Blocking: This feature allows NAV to stop software scripts from being run on your
PC, thereby helping you avoid viruses that enter your system as part of the script. This
feature does not attempt to detect the virus; instead, it presents you with a dialog box let-
ting you choose whether or not you want the script to run (unless you choose the option
to have it simply block the script without telling you). As with everything else related to
security, if you don’t know what it is, don’t allow it to happen.
Manual Scan: When you suspect something bad might have made it to your PC, or if you
simply want extra peace of mind, periodically perform a manual scan. The options here are
similar to any scan except that you can include or exclude your PC’s boot records and/or
master boot records. These are low-level areas of the primary hard drive; if infected with
a virus, they launch that virus every time you boot up your PC.
Email. Given the preponderance of email-related viruses and other malware, you should
definitely consider leaving all email scanning features toggled on (their default). The two
major choices are to scan incoming messages and/or outgoing messages. If you choose the
latter, every time you send an email from one of the supporting programs (such as Outlook
Express), you see a small notification box giving you the progress of the virus scan for that
message (or those messages if you send more than one at a time). This option is important
less for your own system than for those of your recipients; so out of sheer courtesy, be sure
to leave it toggled on. However, it does slow down the sending process somewhat, espe-
cially on slow systems or systems with slow Internet connections. The only other option
in the Email section is to monitor for worms, an obvious choice to include.
Internet Worm Protection. Apart from worm blocking in email, NAV gives you the
option of monitoring your system for worms at all times, preventing access in numerous
ways. For the most part, you need not concern yourself with configuring this feature; the
default settings handle the vast majority of cases, and NAV will learn your preferences as
you use your programs. Using this dialog box, however, you can configure the feature pre-
cisely as you wish, setting the options for individual programs, incoming and outgoing
connections, and how to deal with Trojans. Figure 2-9 shows the Trojan configuration dia-
log box, which simply lists the Trojans NAV knows about and lets you block them or allow
them. Because NAV identifies Trojans by specific rules programmed into it, it sometimes
misidentifies files as containing Trojans when in fact they do not. If you know this to be
the case, toggle that particular Trojan identification off.
Instant Messenger: Because Instant Messaging software has become increasingly vulnera-
ble to malware, antivirus programs now protect IM as well as email. You have the option in
NAV of adding virus protection to the three most popular IM programs: AOL Messenger,
Yahoo Messenger, and MSN Messenger (there is no option to include others, such as ICQ).
You also have the option of automatically informing the sender when you receive a mes-
sage containing a virus.
Chapter 2: Protecting XP against Viruses 31
Figure 2-9: A list of Trojans whose rules are programmed into NAV’s database.
Threat Categories: You don’t have to allow NAV to scan your system for all possible threats.
The Threat Detection Categories dialog box (which you open by clicking the Threat
Categories item in the left pane) lets you uncheck those you don’t want it to detect, pre-
sumably because you have other programs on your PC that do so. For example, if you
have a third-party spyware package running (Chapter 3 covers spyware), you might want
to uncheck the spyware and adware boxes, letting the dedicated package do its work with-
out conflict with NAV.
Summary
Your antivirus program is the best friend you have on your computer. Ideally, you wouldn’t need it,
of course, because nobody would stoop so low as to write viruses in the first place, or they would be
caught and jailed for it. But people do write them, many of them in fact, and there’s absolutely no
reason you should be the one to suffer for it. Any major antivirus utility package will do, so if you
don’t have one already, find one that suits your price range and your needs and install it. You can’t
possibly be sorry about it.
Chapter 3
S pyware and adware make up a category of software, called malware, that takes advantage of
two facts of life with a computer in the early twenty-first century: Almost everybody is on the
Internet, and almost nobody pays attention to what they put on their PCs. In general, Spyware refers
to programs that, without the user’s knowledge, collect information from the PC and transmit it to
one or more servers over the Internet. Adware takes a different approach by sitting in memory and
occasionally displaying banners on programs that have been scripted to perform this function.
Together, these two categories of software have caused a great many users a great many prob-
lems over the past couple years — to the degree that one of the collective nicknames for this software
is scumware. The programs are difficult to spot and, in some cases, quite difficult to remove from
the PC.
This chapter briefly examines spyware and adware and demonstrates how to monitor and remove
it using dedicated utilities. It also shows the complexity, in one particular case, involved in removing
spyware/adware manually.
33
34 PC Magazine — Windows XP Solutions, 2nd Edition
section on removing KaZaA, below), the user was even unaware that the program was being (or had
been) installed. But in most cases, users installed the software without even bothering to check;
that’s how this category of programs became so widespread.
Two questions (at least) come to the fore here. First, if a user installs the software despite a warn-
ing stating that it will operate in the background and help “customize” the computing experience,
does that make it all okay? Second, what happens with other forms of data-monitoring software
placed unknowingly on the user’s hard drive, a category into which cookies fall? The answer to the
first question should be easy, in the sense that we’re all responsible for our own lack of vigilance. But
are the explanations that appear with the installation enough to guide users realistically? Given the
tendency of a great many people to click OK no matter what they see, obviously there are issues
here. Is user ignorance something software vendors should be allowed to take advantage of? The
questions increase in complexity, of course, when examined in the corporate and institutional
domains.
The second question is the subject of continual debate among software companies of all kinds, not
just those who produce anti-spyware and anti-adware products. One big question surrounds cookies.
These little bits of code are placed on your hard drive by, in fact, many Web sites, and you allow them
simply by configuring your Web browser to do so — or, more specifically, by not preventing it from
doing so. When you visit a site, the Web server software looks for cookies appropriate to that domain,
then “remembers” your settings, or your username, or what’s in your shopping cart, and so on. So, in a
sense, cookies track who you are and where you’ve been. Does that make them spyware?
According to numerous anti-spyware programs, yes. But according to other sources, no.
Microsoft’s Anti-Spyware program (covered below) does not scan for cookies by default (you can do
so manually) because to deactivate and destroy cookies renders the browsing experience slower and
in some ways less enjoyable. An argument also exists that cookies can be used to eliminate popups
that first-time visitors receive; the cookie identifies you as someone who has already seen that ad or
filled out that survey and does not bother you again. Eliminating the cookie would result in greater
annoyance, not less. A counterargument suggests that it’s easy for today’s monitoring software to dis-
tinguish between cookies that gather information in order to track user behavior and those that do
not. But the point is that there’s no consensus yet about whether even the behavior-tracking cookies
are properly categorized as spyware.
In addition to this confusion, several companies have taken exception to having their products
labeled spyware or adware in the first place. The argument here is that if consumers choose to acti-
vate the products, knowing full well what they do, they shouldn’t have a negative label attached to
them — which, unquestionably, the words “spyware” and “adware” have become. Other companies
have deliberately incorporated adware into their offerings, arguing that they provide useful informa-
tion to customers without performing objectionable actions such as monitoring keystrokes or Web
navigation patterns. Furthermore, numerous software products send information to the vendor
without anyone complaining, or at least not with the same complaints as with malware. Windows
XP itself offers to send data whenever a program (or the operating itself) crashes, which means it has
already gathered this information against such an occurrence. This would hardly be classed as spy-
ware, but it’s certainly similar to that negatively considered category.
When all is said and done, however, you’re not likely to encounter anyone who actually wants
spyware on their systems. This chapter details how you can control it and, ultimately, get rid of it.
Chapter 3: Dealing with Spyware and Adware 35
Tip
To get the best results out of anti-spyware packages, have only one running at a time. This is especially true
if your goal is to compare one program against the other, because otherwise you can’t really pick out their
individual strengths and weaknesses.
presented with a dialog box labeled “Legal Stuff,” which tells you that if you remove advertisement
robots (adware) with SS&D, you might not be able to run the host programs they came with. Just say
OK, and continue the installation. This is precisely what you want the program to do. You then get a
small utility offering to make a backup of your Windows registry, another good idea at this time.
Once this is done, a rather mysterious button appears in the installation wizard called “Immunize
this System.” The explanation is no less mysterious: “Now that you are up-to-date, it is recom-
mended that you apply some basic Immunization. Just click the button to do this.” Go ahead
and press the button, because SS&D simply wants to configure itself to block some known mal-
ware from functioning on your system. Version 1.4 blocks over 6000 such products with its simple
immunization.
As with all such products, the next step is to let SS&D perform its magic. On the main screen,
click the Check for Problems button and sit back and watch. With its default settings, SS&D uses its
built-in database of known threats to search your system and block the worst offenders as you work,
and to delete any it has found. You can click the Settings button to change this configuration so that
SS&D does even more than what its initial setup handles. For example, as Figure 3-1 shows, it lets
you select which cookies you wish to retain on your system if you configure the program to routinely
erase your usage tracks. Using the Tools menu, you can have SS&D stop programs from loading
when Windows boots, another useful service.
Essentially, though, SS&D simply sits in the background and guards your PC against the latest
spyware programs. When it locates them, it displays them in a color-coded format, with red repre-
senting the most important threats and green representing the usage tracks. It then lets you choose
which threats to delete and it provides information on how to work with the usage tracks, including
ignoring specific ones and/or dealing only with those from specific products. It then does whatever
is necessary to get rid of the threats, including changing the registry settings that the programs have
already changed. It works, and that’s all you really care about.
Figure 3-2 also shows the results of a scan for spyware, after clicking the Scan Now button on the
main interface screen. The Quick Stats area shows the number of scans that have been run on the
current system, as well as the number of spyware files detected and the number currently held in
quarantine. This should be useful information, of course, but its cumulative nature makes it less so.
In this particular example, for instance, the number of files detected includes 3–4 files detected
38 PC Magazine — Windows XP Solutions, 2nd Edition
numerous times. The more important information occurs in the Last Scan Run section; in this case,
the program has noted 95 infected registry entries. Sounds bad, until you see that there’s only one
actual spyware threat (at least, according to this utility). To deal with these results, click the View
details link, which yields the dialog box shown in Figure 3-3.
This information is precisely the same as the details on the main interface screen following a scan,
except that you can click the View Results button in order to do something about the detected
threats. Figure 3-4 shows the result of clicking this button, the Spyware Scan Results screen. Each
threat offers a drop-down menu that allows you — as the figure shows — to Ignore, Quarantine,
Remove, or Always Ignore the detected threat. On the right-hand side of the dialog box is an expla-
nation of the selected threat, along with a useful paragraph of advice. Here, the threat is low, and
ignoring it won’t hurt anything. Mind you, that’s merely the opinion of the people who created the
database of possible threats, so feel free to take it on yourself to ignore or delete as you wish.
By default, Microsoft AntiSpyware scans your system every day at 2:00 a.m. On the Schedule
screen, you can change the schedule to whatever time of the day you wish, and the frequency to
daily, weekly, or monthly. Be sure to schedule the scan for a time of day you will not be using the PC.
While not as resource-intensive as an antivirus scan, the AntiSpyware scan unquestionably slows
your system, to the degree that you’ll find it difficult (and frustrating) to carry on normal activities
while it is in progress.
One of the better elements of the AntiSpyware utility is the ability to control the tracks your PC
use leaves behind. Figure 3-5 shows the Tracks Erase screen, accessible from the Advanced Tools
button. Each of these programs or activities leaves a trail of what you did, and the idea here is to
erase those trails so that nobody knows where you’ve been, what forms you’ve filled out, what you’ve
put in the form fields, and so on.
Chapter 3: Dealing with Spyware and Adware 39
Some of the more useful tracks to erase from this dialog box include the following:
Google Toolbar History: If you use the Google toolbar to perform your searches, your
search strings are saved in the toolbar. You can erase them manually, but AntiSpyware can
do this for you. The Google Toolbar (strangely enough) does not provide an auto-erase
function.
40 PC Magazine — Windows XP Solutions, 2nd Edition
ICQ: By default, the ICQ chat program saves transactions of your chat sessions. Rarely do
you need these, and often you don’t even want them.
Internet Explorer History: If you don’t want another user of your system knowing where
you’ve been surfing, check this option to erase the history.
Internet Explorer Intelligent Forms: IE’s automatic forms completion feature is an obvi-
ous time-saver, but it’s an equally obvious information risk. Checking this option gets rid
of all saved form information, highly useful for privacy purposes.
Kazaa: If you use Kazaa as your P2P program, you might want to get rid of your search
history automatically. This option lets you do so.
Recent Documents: This option is available here for several programs, including
Windows XP itself. Checking the option clears out the information on the last files
accessed for those programs.
Temporary Files: For both IE and Windows itself, you can automatically clear out any
temporary files the system has saved.
Once you’ve made your selections, click the Erase Tracks button. If you want AntiSpyware to
retain your selections, check the Remember Checked Tracks box at bottom right.
Incidentally, some of these tracks can be adjusted elsewhere within Windows XP: the Taskbar
Options dialog box and TweakUI, to cite just two examples. See Chapter 16 for information on con-
figuring the Taskbar, and Chapter 18 for details on TweakUI.
YAHOO! TOOLBAR
Numerous toolbars are available for download, at no cost, from the Internet. Google, MSN, and
Yahoo! are among the most popular. All of them have their useful features, and all of them clog up
the nice, neat elegance of your browser toolbar. Yahoo! has recently added a utility called Anti-Spy to
its toolbar, and to be sure, it’s highly useful. Not as useful as a standalone product, but an excellent
supplement to your main anti-spyware program.
After installing the Yahoo! toolbar, check the Anti-Spy button located third from the left after the
Search Web button (the Anti-Spy button looks like a crosshairs). Choose Run Anti-Spy; the software
immediately checks for updates and then presents the main interface screen. From here you can
check the options to have it scan for cookies or to have it scan immediately upon launching it (or
both), or you can just click Begin Scan to see what it locates on your system.
The progress area on the Scan Results screen (see Figure 3-6) tells you what the program is cur-
rently looking at — the registry, common file locations, or system memory. When finished (it takes
only a minute or two even on a large system), it presents you with a list of threats found, along with
the option to Remove or Allow each threat. To learn more about a threat, select it and double-click
the View Details command.
If you choose to Remove a threat, Anti-Spy informs you that doing so might cause some programs
to malfunction and that you might be breaking a licensing agreement. If you’re uncertain whether or
not to delete the threat, use System Restore to create a Restore Point on your system before perform-
ing the removal.
Chapter 3: Dealing with Spyware and Adware 41
SaveNow: Downloads promotional Web sites to your computer to help you search for
products.
New.net: Allows creation of Web sites with unofficial domain names — in practice, it sim-
ply becomes annoying.
Delfin Media Viewer: Shows movie trailers, portions of MP3 songs, games, and so on
without your requesting them.
MediaLoads: Delivers content to your desktop while you eat, sleep, or go out on dates.
b3d Projector: Displays ads on the Kazaa program itself.
Note
Most of the problems with Kazaa that I’ve been called upon to fix have been for the program bundle exam-
ined here. Different versions of Kazaa have installed different programs, but as of this writing, the current
version (2.6) has cut the additions considerably. The discussion here applies most directly to the equally
widely distributed earlier versions, although differences exist in many of them.
Simply put, you should allow none of these programs — not a single one — on your PC. If you
have not yet installed Kazaa, do so only without these programs. With the exception of New.net, a
bothersome add-on, all of these programs perform some form of adware or spyware functions. Not
only that, but Kazaa also includes technology from Cydoor, which inserts itself into your registry, can
be uninstalled only with extreme difficulty, and sends you customized ads based on a unique code
with which it tracks you. Together, these programs turn your PC into a machine that spits out infor-
mation about you regularly and sucks in files you couldn’t possibly want. And, unlike those pesky
telephone solicitors who call you at dinner time every night, you can’t just hang up.
1. Use System Restore to create a restore point for your system. If, after all the activity in this
list, your PC has trouble operating, enter System Restore again (you can do so in Safe
Mode), and restore the PC to the newly saved time.
2. Unload Kazaa from memory. Closing the program the normal way doesn’t accomplish this
goal because Kazaa minimizes itself to the icon tray and continues to run. Find the pro-
gram in the icon tray, right-click it, and choose Exit. To ensure that you have unloaded it,
press Ctrl+Alt+Delete to open the Task Manager, find Kazaa in the list, and shut it down.
3. Open the Add/Remove Programs utility in Control Panel, locate Kazaa Media Desktop,
click the Change/Remove button, and follow the wizard to uninstall it. With Kazaa itself
gone, it’s time to work on the other programs.
Tip
For best results when removing any program, reboot Windows after every uninstallation. Doing so sets the
Registry to its most up-to-date state and prevents any possible conflicts. In most cases, the reboot isn’t
strictly necessary, but, when removing problem software, such as the programs listed here, the reboot pro-
vides an extra degree of reassurance.
4. Open Task Manager, see if SaveNow appears in the list, and end it. Reopen Add/Remove
Programs, and uninstall SaveNow.
5. Repeat this process for MediaLoads, New.net, and b3d Projector.
6. Open My Computer or Windows Explorer. From the Tools menu, choose Folder Options.
Click the View menu, scroll down the Advanced Settings list, and click the Show Hidden
Files and Folders radio button.
7. Still in My Computer or Windows Explorer, locate the following folders and files:
■ C:\Documents and Settings\your_username\Start Menu\kazaa\: Delete the entire folder
and then repeat for every user’s folder in Documents and Settings. If the Default User
and All Users folders contain this folder, delete them as well.
■ C:\Documents and Settings\your_username\Desktop\: Delete any item with “Kazaa” or
“My Shared Folder” in the name.
■ C:\Windows\System32\: Delete the following files: cd_clint.dll, cd_gif.dll, cd_swf.dll,
and cd_load.exe. Also look in C:\Windows\System if the files are not in Windows\
System32. Deleting these files removes the Cydoor technology installed with Kazaa.
■ C:\Windows\BDE: Delete the entire folder.
■ C:\Program Files\BDE: Delete the entire folder.
44 PC Magazine — Windows XP Solutions, 2nd Edition
Congratulations. You’ve uninstalled the highly problematic Kazaa Media Desktop! It takes time,
but it’s worth it. Your machine is your own again.
Summary
Spyware is a major concern. At its worst, it sends information, without your knowledge, to Web sites
and databases you might not wish to be a part of. Even at its most harmless, however, it can seriously
slow your system and use up significant amounts of memory. Along with viruses, spyware represents
one of the most serious problems with computing today, and you owe it to yourself to do everything
you can to avoid it and, if necessary, get rid of it. You have a lot to lose.
Part I
Utilities
N umerous utilities are available for controlling viruses, spyware, and Internet intruders. You
have to purchase many of them, but some function partially in their shareware versions, and
a few are entirely free. Most offer the substantial benefit of a try-before-you-buy program, so you can
determine the effectiveness of the product, your need for it, and how well you like working with it.
Our suggestion is to download and try as many of these as you can to see the differences among
them and to learn how each can help you. While this guideline holds true for all utility categories
discussed in this book, it is especially true for this group, which focuses on keeping your system safe.
But along with the suggestion to try a number of them we must caution you that, used in conjunc-
tion with one another, these utilities can cause problems, especially when it comes to antivirus pro-
grams. You’ll do best to have only one utility running at a time, although you can comfortably run
more than one firewall.
Antivirus Utilities
Norton AntiVirus (www.symantec.com), covered in Chapter 2, is the granddaddy of antivirus pro-
grams and an extremely popular one even to this day. However, numerous others are available, many of
which have made their mark because PC manufacturers have installed them on their products before
selling them to consumers. One of the most widely used is McAfee’s VirusScan (www.mcafee.com), in
version 9 as of this writing, which like Norton AntiVirus is available via subscription. For roughly $40
per year for either program, you get a package of well-regarded software that does its job as well as any.
Depending on which reviews you read, either McAfee or Norton works more efficiently on a typical
home user’s PCs, and both work comparably in small business environments. There’s really very little
difference between them.
Also like Norton AntiVirus, McAfee VirusScan also comes bundled in software suites. McAfee’s
Internet Security Suite combines the company’s VirusScan, Personal Firewall, SpamKiller, and
Privacy Service products, for less than double the price of VirusScan alone. Personal Firewall runs in
conjunction with the Windows Firewall or can replace it on your system if you prefer to run only
one. Privacy Service offers parental controls over incoming downloads and provides warnings when-
ever intrusions occur that might endanger your personal data, including data related to identity theft
47
48 PC Magazine — Windows XP Solutions, 2nd Edition
(it attempts to detect phishing attempts, for instance). VirusScan Professional, another bundle,
includes VirusScan along with the company’s anti-spyware and anti-spam utilities. Many of these
programs are also bundled in the McAfee RedZone Suite, and these products offer access to the
online scanning version of the anti-malware programs.
Also in the anti-malware business is Central Command (www.centralcommand.com), which
offers a wide variety of utilities not only for Windows users but for numerous Linux and Unix sys-
tems as well. Vexira Antivirus is the utility that concerns us here. The key differentiating point for
Central Command’s products, as the company’s name suggests, is that they’re controllable over a net-
work, and in that way they are clearly designed for business use. In fact, Central Command offers its
Antivirus product for Windows Server networks as well as for Linux and Unix networks, and with all
its products IT managers (or whoever serves that function in smaller companies) can keep all the
workstations, and possibly servers, malware-free and guard the entire network.
Trend Micro’s PC-cillin Internet Security (www.trendmicro.com) is a single product merging fea-
tures similar to the suites mentioned previously. Well known for years as the antivirus program
included with various newly purchased PCs, PC-cillin continues as a popular and critically success-
ful antivirus program. The Internet Security package adds to this utility by including anti-spyware,
anti-phishing, and such niceties as Wi-Fi intrusion detection (to help you determine whether some-
one is tapping into your Wi-Fi network), spam filtering, and a personal firewall. As with other ven-
dors, Trend Micro offers a fully functioning 30-day evaluation copy from its Web site. It also offers a
free online virus scan, as does Panda Software (pandasoftware.com/activescan).
Alwil Software (.avast.com) provides easily the most compelling argument for insisting that every-
one you know install antivirus software. Its product, Avast Antivirus, is free, and is easy to use and
well proven. You may not use Avast on a business system, however; for that, you’ll need to purchase
the Professional edition. The company also offers a PDA version of the utility because PDAs have
increasingly become the targets of virus writers.
BitDefender (www.bitdefender.com) also offers a free version of its desktop antivirus product,
BitDefender Client Standard. The free version, BitDefender Free Edition, offers a full range of antivirus
capabilities, including scheduled scanning and automatic virus definition updates, and tosses in a very
nice skins feature, allowing you to customize the interface in a variety of different ways.
Anti-Spyware Utilities
Despite the fact that nobody seems to know exactly what spyware is, anti-spyware packages have
become increasingly numerous over the past 18 months. Many offer free versions, so your best bet is
to select two or three, try them, and then try a few more, until you get one or two you especially like.
Tip
Because some spyware installations are (in effect) spyware of a sort themselves, albeit harmless, you
should install anti-spyware programs only after using System Restore to set a restore point. This will allow
you to turn back your system to the time of the restore point if you notice anything unusual (such as slow-
downs) occurring in your daily work.
Part I: Utilities 49
Spybot Search & Destroy (www.safer-networking.org) is one of the better-known spyware utili-
ties, which is why I featured it in Chapter 3. But it’s far from the only free utility out there for con-
trolling spyware and adware. Among the others, also included in Chapter 3, are Microsoft’s
Anti-Spyware, and various “lite” versions of packages, the most famous of which is Ad-Aware SE
(www.lavasoft.com). Other programs, such as Computer Associates’ Pest Patrol (www.ca.com) offer
a downloadable trial version, which scans your system but does not fully remove the offenders; for
full functionality, you must purchase it (in other words, like trial versions of pretty much every other
kind of software).
Several sites offer free malware scanning. Computer Associates is one of these; the scan is available
at http://store.ca.com/v2.0-img/operations/safer/site/ab/promo53025.htm. Another is Ewido Networks
(www.ewido.net/en/), which promotes its commercially available ewido Security Suite by providing
an especially strong online scanner (which picked up details missed by the free Yahoo! toolbar scan-
ner in my case). Another is PC Tools Software’s Spyware Doctor (www.pctools.com/spyware-doctor).
However, these services aren’t really online scanners; instead, you download a program to your PC,
install it, and perform the scan that way. This is nowhere near as convenient as the free antivirual scans
available online, although to be fair those services also require a program download and installation —
but as an ActiveX script, its installation is easier.
Spyware utilities are readily available for purchase. In addition to those already mentioned here,
you can obtain the BPS Spyware Adware Remover from BulletSoft (www.bulletproofsoft.com), a
package that includes firewall, phishing, and Trojan/worm protection and an especially useful utility
package in the aforementioned Spyware Doctor from PC Tools. Spyware Doctor includes a pop-up
blocker, a keylogger blocker, phishing and adware protection, and so on. Indeed, most of these
packages guard against — and remove — numerous spyware-type threats.
Firewall Utilities
You have a good range of excellent choices when it comes to firewall protection. In addition to
Symantec, McAfee, and Trend Micro, all mentioned previously, which include firewall protection as
part of their security suites or as standalone products (in the case of Symantec and McAfee), and of
course Microsoft, which has a firewall that ships as part of SP1 and SP2, numerous other vendors
have developed strong firewall products.
Note
All firewall products state that they should be used exclusively, without other firewall software loaded. In
fact, Norton Internet Security, upon installation, is quite insistent that you disable Windows Firewall, going so
far as offering to disable it for you. The principle is that multiple firewalls can conflict with one another, leav-
ing your system either more vulnerable than with one product, or possibly so protected that it becomes
almost nonfunctional. In practice, you’ll do best with a dual-firewall setup: one that comes with your broad-
band or wireless router and one that comes with a software package. But you can certainly have more than
one software firewall running if you wish; just be prepared to deal with numerous messages, warnings, and
configuration information screens as you perform your daily online activities.
50 PC Magazine — Windows XP Solutions, 2nd Edition
Perhaps the best known of the standalone firewall utilities is ZoneAlarm (www.zonealarm.com),
which offers its firewall product as a free product as well as a purchasable product, ZoneAlarm Pro,
with additional features (including email security). In addition, you can get ZoneAlarm as part of the
ZoneAlarm Security Suite, which includes antivirus, anti-phishing, and anti-spam software, and as
part of a wireless security suite as well. ZoneAlarm is highly customizable, warns you continually of
threats and intrusions (unless you configure it for silent protection), and works very well in con-
junction with the firewall capabilities of most popular broadband and wireless routers.
Other firewall products operate similarly to those already mentioned. Kerio Personal Firewall
(www.kerio.com) makes your desktop invisible to outside intruders, blocks pop-up windows and
banner ads, and detects a wealth of hacker intrusions. Kerio specializes in enterprise-level products,
and its desktop firewall products take advantage of that specialization. Tiny Software (www.tiny
software.com) recently acquired by industry giant Computer Associates, offers Tiny Firewall, which
watches all network activity, establishes intrusion protection as you work, and offers a tool called
Track ‘n’ Reverse, which lets you see any changes to your files or your registry and reverse them so
that your system is as it was before. Think of this as a kind of System Restore at the microlevel, and
you have the idea.
Another full-featured product is Sygate Personal Firewall (www.sygate.com), available as a free
download for the Standard version or by purchase for the Pro version. Sygate’s product offers an
especially usable interface and an out-of-the-box configuration that makes it easy for even beginners
to get a firewall established. By all means, try out the Sygate and ZoneAlarm freebies before making
a firewall choice.
Backing Up
Your Data
I t’s the great truism of computing: Back up your data. Everybody knows it, yet many ignore it.
Computers work so smoothly most of the time, especially the part about saving files to the hard
disk, that days, weeks, even months go by before people start getting antsy about having all those
files sitting on their drives without a backup anywhere in recent memory. Partly this is the fault of
the hard drive manufacturers because they keep making their products more reliable, but mostly the
fault lies in the emergence of PC as a widespread, commonly used appliance. Except in business set-
tings, where backups tend to occur far more regularly, computers today are partly about convenience
and entertainment, and convenience and entertainment just don’t go well with the forethought that
regular backups demand.
Then again, maybe the computer manufacturers and operating system designers deserve some of
the blame. If backing up files has such great importance, why is it avoidable at all? Why don’t com-
puters come with built-in backup systems that kick in automatically? The answer, of course, is that
such things cost money, and computer makers constantly strive to keep prices as low as possible.
Except in business, once again, people tend to see data backup as optional or as something that
affects everyone else but not them, so they don’t want to pay the extra money for the backup equip-
ment. So, without a federal law — possibly an international one — forced backups won’t likely hap-
pen. Too bad, really.
As the owner of a Windows XP system, you have several backup techniques at your disposal, but
some require the purchase of additional software and, in some cases, additional hardware as well. This
book’s premise lies in the ability to perform important day-to-day functions from within Windows XP
itself, so it covers these other options in the “Utilities” section at the end of Part Two. The more serious
your backup needs, the more you should consider third-party solutions, but you can work very well
with only the techniques available with the operating system. This chapter outlines each of those tech-
niques and shows how you can use them to develop a usable and effective backup strategy.
Backup Basics
There’s nothing magic about backups. Backing up data means, at the very least, making a copy of
that data. In others words, if you have a copy of a file, you have a backup of that file. Knowing this,
however, leads to the three primary questions about backups:
53
54 PC Magazine — Windows XP Solutions, 2nd Edition
The methods outlined here answer these questions in various ways. No matter which method you
use, the principle of data backups never changes. Having only the original copy of a file is the same
as having only the original copy of your most important legal documents or photograph collection.
To prevent the disaster or disappointment of losing this copy, you make a copy of the item and store
it in a location where (a) you’ll be able to find it, and (b) it will be safe from problems affecting the
original.
The answer to point (b) matters a great deal. If you store your backup files on the same hard drive
partition as the original, you lose both if, for any reason, you reformat or otherwise lose access to the
partition. You’re quite a bit better off storing them on separate partitions of the same hard drive
because most actions affecting one partition have no effect on the other, but you still lose them both
if the hard drive fails. To gain any sense of real security, you should save your backups to a separate
storage device, such as a tape drive, a CD-RW drive, or a DVD burner, or a separate hard drive. You
can even store backup files on floppy disks, amazingly still the default for Microsoft’s own Backup
Utility (covered later in this chapter), but unless you have only really small files to back up, floppies
work only as an emergency backup device.
Floppy Disks
Floppy disks are used primarily for backup of small files, such as text files and simple word process-
ing files.
ADVANTAGES
They are inexpensive and readily available, including all those you’ve collected over the years and no
longer need.
DISADVANTAGES
Each floppy stores only 1.4MB of data, so a typical MP3 song would require three or four of them.
Your data files alone, unless you write exclusively text files, likely require dozens of floppies for a
backup. Furthermore, because you must stay at your PC to swap floppies in and out of the drive
during backup, long backups tend to be extremely tedious.
RECOMMENDATION
Not worth bothering with except for backing up only a few small files.
Chapter 4: Backing Up Your Data 55
Compact Discs
Compact discs (CD-Rs and CD-RWs) are typically used for regular backups of fairly large files and
folders, including multimedia files such as graphics and music.
ADVANTAGES
Almost all new PCs ship with CD-RW drives, and if you don’t have one, you can get a new one for
$100 or less. Discs are also inexpensive. CD backup software is plentiful, and each CD holds roughly
650MB of data. In addition, once you’ve completed your backup, you can easily copy the CDs to
store in another location entirely.
DISADVANTAGES
650MB sounds like a lot until you start backing up hard drives of 60GB or larger, in which case, you
will easily need 80 to 100 of them. Furthermore, CD media tends to deteriorate in quality, so you
shouldn’t rely on only CDs as your backup method. Also, not all CD drives read all CDs correctly.
RECOMMENDATION
Good choice for backup, especially for PCs with an existing CD player but a fairly small hard drive.
Even better if you don’t intend to add another hard drive any time soon.
ADVANTAGES
DVDs store much more than CDs, 4.7GB compared with 650MB for CDs. You can create decently
sized limited backups, particularly of important data files and program downloads you need in case
of reinstallation. Software that comes with DVD burners usually includes backup utilities, and DVD
media prices are dropping along with the burners themselves. As with CDs, you can make copies of
DVD backups, providing an easy method of getting a second backup.
DISADVANTAGES
Competing standards (that great computer industry oxymoron) provide the major problem with
considering DVDs as your primary backup technology. DVD+RW, DVD-RW, DVD-RAM: choose
wrong, and you might have a bunch of unusable backups only a year from now. DVD-RAM probably
works best for backup purposes, but not all DVD burners even support DVD-RAM. Price is a current
issue, but it is becoming less important with each passing month. Finally, even though DVDs can
hold 4.7GB of data, a full backup of a new 120GB hard drive requires a couple dozen.
RECOMMENDATION
Very good choice, better than CDs given the storage capacity. However, DVD burners are roughly
twice as expensive as CD burners, and DVD media are about twice as expensive as CDs.
Furthermore, only the most recent backup software recognizes DVDs as backup media.
56 PC Magazine — Windows XP Solutions, 2nd Edition
ADVANTAGES
With the price of hard drives dropping (at least in cost per gigabyte), and with the speed and ease of
backup to a hard drive, if you can afford this method, you should adopt it immediately. You can
install an internal drive for this purpose and, in doing so, give yourself the greatest backup speed of
all. For not a great deal more money, however, you can buy a large FireWire or USB 2.0 external
drive and experience not a great deal of speed difference (USB 1.0 or 1.1 is another matter entirely
from a speed standpoint). You can perform regular backups that are easily located when you need to
restore them, and in the case of an external drive, you can take the entire backup to another com-
puter as well. Finally, hard drives offer much greater storage capacity than any other method demon-
strated here, so you can back up entire hard drives in one easy step without the need to monitor the
process.
DISADVANTAGES
Internal hard disks can be difficult to install. Other than that, the only disadvantage to this method
is that fact that, when you need more hard drive space for your system, the temptation arises to use
the backup drive, and in the process you could possibly wipe out the backups.
RECOMMENDATION
This is your best choice for extensive backups, bar none. Hard drives are less expensive than they’ve
ever been, with a 120GB drive typically selling for $100–$130 or so. Put two of these in your system,
and you can back up your entire system nightly if you wish, using any of today’s backup packages.
Give yourself an extra drive for your daily work, and you can back up the main components of your
system to the third drive. And so on. Internal drives are less expensive than external drives, but the
latter are also dropping in price regularly. For example, at the time of this writing, online stores are
selling Maxtor 80GB external drives for $99. At this price, a small business could maintain one inter-
nal drive worth of data and two external drives, each with the same backup data, for a truly secure
system. That same small business, on a network, could back up the primary data from all PCs to one
large hard drive, rendering the cost even lower.
ADVANTAGES
USB thumb drives are extremely small, they weigh next to nothing, and they offer a surprisingly
large amount of storage (1GB and higher). In most cases, Windows XP recognizes them as soon as
you plug them into your USB port, and you can use them as you would any other folder on your PC.
Many public computers (at universities, for example) have USB ports available for this function, so
it’s easy to take your documents with you, plug the thumb drive into another PC, and keep working.
Chapter 4: Backing Up Your Data 57
DISADVANTAGES
They store too little data to function as a major backup solution. They work best only as a place to
store backups of important documents, a valuable function to be sure but not the only one you’ll
want to consider.
RECOMMENDATION
Whatever backup system you decide upon, include this as an added component. They’re great when
working on PCs other than your own, so that you can save to the thumb drive instead of the PC’s
own hard drive, and they have become the predominant technology for transporting a limited num-
ber of files from place to place. At $50 or so for a 256MB drive and $80 for 512MB, you really can’t
go wrong.
Tape Drives
Tape drives are typically used for full regular backup of partial or entire hard drives.
ADVANTAGES
Tape drive support is built into all backup software, because backup software over the years has
assumed this method. Tapes are reliable and longlasting, and methods have been well developed
over the years. Furthermore, because tape is used solely for backup purposes, you won’t be tempted,
as you might with a secondary hard drive, to use the tape for other purposes.
DISADVANTAGES
A good tape drive costs between $200–$300, and you might have to install a controller card as well.
Furthermore, you don’t usually find them in the standard computer stores. Media (tapes) can be rel-
atively expensive as well. You must install the tape drive and configure it to get it working. Retrieving
data can be slow because of the frequent need to switch tapes.
RECOMMENDATION
If you have a tape drive already in place, keep it. If not, you’re better off with an extra internal or
external hard drive. Tape drives and media were once the primary backup technology for businesses,
but they have become increasingly costly (compared to other technologies) and even difficult to find.
Network Drives
Network drives provide a wide range of backup functions.
ADVANTAGES
Backing up to a network drive means placing your data in the safest place possible: on another com-
puter entirely. If you control the network completely, this method works much like the secondary
hard drive option. You can schedule regular backups easily, and you can protect them from other
users using network security options. This method is faster than all other methods except secondary
hard drives, as long as the network is fast.
58 PC Magazine — Windows XP Solutions, 2nd Edition
DISADVANTAGES
If you use both computers, your backups take up space on the network drive. Furthermore, if you
don’t have full access rights on the network computer, your ability to restore backed-up data depends
on the person who does. Also, if the network experiences a slowdown, so will your backup.
RECOMMENDATION
For business purposes, network backups are highly recommended. With them, you can restore your
network’s data quickly and easily, and you have full control over it. For home purposes, network
backup is less useful because it’s usually easier simply to back up each machine locally, but they can
provide a strong option for controlled backup.
Support for all current media types, including all DVD formats, Zip disks, Pen storage, and
so on
Highly specific backup selections, combinations of files and folders in any location
On-the-fly compression of files, to provide reduced file sizes in the backup
Automatic comparisons of data after the backup, taking a number of forms
Support for multi-CD or multi-DVD backups, with a single backup spanning as many
discs as necessary
Detailed backup schedulers
Detailed methods of including or excluding file types
Backup from remote computers
In addition, some backup utilities now include the technology known as ghost imaging, or just
plain ghosting. A ghost image captures the entire hard drive, backing it up to the point where you
can restore your entire system from it. This technique represents an important difference from data
backup in that the image can include partitioning information and other files, such as the Master
Boot Record (MBR) that backup utilities do not. If you’re serious about backups, you should com-
bine a backup utility with a ghosting utility; this combination offers as close a guarantee as possible
that you will be able to restore lost data.
drive, a CD-RW or DVD, or a network drive. If you want to save a bit of disk space, send the folder
to a compressed folder first and then copy the zipped folder to the backup location.
To copy files for backup purposes, use Windows Explorer by clicking Start, right-clicking on My
Computer, and choosing Explore. In the double-pane interface, locate or create the folder you wish
to copy the files to in the left-hand column; then, in the main window, click the files or folders you
wish to copy. Right-click on the items (you can multiple-select and do this), and drag them to the
backup folder, choosing Copy from the context menu. After Windows has finished copying, click on
the backup folder to ensure that all the files are there.
Tip
If you copy an entire folder, you can perform a quick validity check by right-clicking on each folder in
Windows Explorer and choosing Properties. The Properties dialog box displays not only the size of the folder
in megabytes or gigabytes (5.24GB in this example) but also the number of files and subfolders the folder con-
tains (1,537 files and 22 folders in this example). If the Properties dialog box of both the original and the
backup folders display the same numbers, in all likelihood your backup has worked. To be even more certain,
however, spend a few minutes exploring both folders to check for the same filenames, the number of file
types, and any other comparative feature you want to check. If one or more files or subfolders are of partic-
ular importance, check these diligently, to the extent of opening several backup files to be sure.
Favorites, Cookies, and Desktop folders. Assuming that you have saved all your data in My
Documents, this selection backs up everything you have created on the PC and, therefore, functions
well for a periodic backup. If your data files reside elsewhere, however, and your email data almost
certainly will (not even Microsoft’s own email programs store their data in these folders), you will
want to customize the backup further. The second choice on the screen, the Everyone’s Documents
and Settings option, simply extends the selection to include the same data from all user accounts.
The last two choices show the two extremes of your backup options. If you choose the All Information
on This Computer option, you instruct Backup to copy everything on your PC to your backup device.
If you have backup media with sufficient space available, you should perform such a backup once, after
which you can add to it. If you have a computer with even one large hard drive, let alone the increas-
ing likelihood today of multiple hard drives, choosing this option takes a great deal of time and, more
importantly, a great deal of media. If you plan to back up to your CD-RW drive, prepare for a long,
drawn-out, and CD-consuming session. Practically speaking, backing up your entire system works
only when you have a second hard drive or a good tape system to work with.
By comparison, the fourth choice, the Let Me Choose What to Back Up option, offers the greatest
flexibility. Choosing it and clicking Next reveals the Items to Back Up window (see Figure 4-2), with
a folder tree of the PC on the left and the items inside the selected folders on the right. Open the
folders on the left, choose the items you wish to copy, and click Next to move to the Backup Type,
Destination, and Name screen. Here, you choose your backup media by clicking the Browse button
and navigating to the device where you want to store the backup. You can also label the backup, an
especially good idea if you intend to keep more than one type of backup. The Backup program auto-
matically time-stamps and date-stamps the backup file, so you don’t need to include the date here
(otherwise an obvious choice), but labeling your backup is still a good idea.
Chapter 4: Backing Up Your Data 61
One extremely useful set of options appears unfortunately almost buried beneath the Advanced
button. Clicking this button reveals a drop-down menu consisting of five backup types:
Normal: Copies the selected files into the backup file, marking them as backed up. This is
the standard form of backup, but not necessarily the best for your purposes.
Copy: Copies the files only, without marking them as backed up.
Incremental: This extremely useful option backs up the selected files only if you have cre-
ated or modified them since you last backed them up. In other words, this option saves
time and disk space by examining the current files in the backup and copying only the
files in those same folders that were not there last time or that bear a later date and time.
If you perform regular backups, this is probably your best choice.
Differential: The same as Incremental, but it does not mark them as backed up.
Daily: Not a bad habit to get into, this type backs up any files that were created or modi-
fied today, and only if they reside in the folders chosen for this backup. If you store your
word processing files in My Documents, for example, and you have already backed up
My Documents, running the Daily backup each day (as its name clearly wants you to do)
backs up any new and changed files in My Documents.
The next screen of the wizard gives you three more backup choices. With the Verify Data After
Backup option, you instruct the program to compare the data in the original folders with the data in
the backup file to guarantee the accuracy of the backup. Obviously, this is an excellent choice to
make, but the comparison can increase the length of the backup session by double or more. Also
available on this screen is the Use Hardware Compression, If Available option in which Backup will
62 PC Magazine — Windows XP Solutions, 2nd Edition
interact with your hardware to compress the files to save space (if your hardware does not support
compression, the option is grayed out). The third choice, the Disable Volume Shadow Copy option,
prevents Backup from copying files if you are currently working with them (for example, a spread-
sheet open on your desktop). Check this option only if you intend to copy the files manually later.
Clicking Next opens the Backup Options dialog box, as shown in Figure 4-3. Here you make a
choice if you already have a backup on your selected backup drive and if Backup finds identical file
names. You can opt to append the new backup to the existing files or to replace the existing files with
the new ones. The safer bet is Append, but Replace consumes less disk space.
Finally, you decide when to run the backup: now or at a later scheduled time. Clicking the Later
option reveals a scheduler; here you can click the Set Schedule button and make a number of selec-
tions. In addition to the date and time, you can click the Show Multiple Schedules box and set a
number of scheduled backups. If you click the Settings button, you can give additional commands
to the backup program (actually to the Windows Task Scheduler), instructing it (see Figure 4-4) to
stop if the task runs longer than a specified number of hours, allowing it to start only if the computer
has been idle for a specified number of minutes, and preventing the backup from starting when the
computer is running on batteries.
Once you have even a single backup saved, you can access its contents by using the Backup
Utility to restore it. You can do so using the Restore Wizard or the full program. Open the full pro-
gram by starting the wizard normally and clicking the Advanced Mode link in the middle of the
Welcome screen. This action yields the Welcome screen of the full program, and clicking the Restore
and Manage Media tab gives you access to the restore process. You can restore the entire backup, but
more typically you need only specific folders or even just certain files. Use the two panes to choose
precisely the items you want.
Next, choose where you want to place the restored files. By default, Backup restores them to their
original location, but by clicking the drop-down menu below the leftmost pane, you can choose to
restore the selected file or folder to an alternate location, or, if you wish, you can restore all selections
Chapter 4: Backing Up Your Data 63
to a single folder instead (making them easy to keep track of). In the Options dialog box (Tools ➝
Options), you can choose what to do if, during Restore, the Backup Utility finds a file with an iden-
tical name in the restoration folder. By default, Backup does not replace that file, but you can instruct
it to do so, or to do so only if the restored file is newer than the file already there.
functions, after all, like a rudimentary backup system, providing a guarantee against loss. By adjust-
ing its characteristics, you can give yourself another way to help you reclaim missing data.
You do so by controlling the size of your recycle bin and the schedule for emptying it. Because items
in the Recycle Bin use up disk space, Windows allows you to configure the size of each Recycle Bin
(Windows assigns one to each hard drive), thereby limiting the amount of disk space that deleted items
can take up. To change the storage capacity of the Recycle Bin, right-click on the Recycle Bin icon on
your desktop and choose Properties. Move the slider to increase or decrease the amount of disk space
that you want to set aside for deleted items. You can also use different Recycle Bin settings for different
drives by clicking Configure drives independently, or you can opt for a single size for all drives by click-
ing Use one setting for all drives.
The first stage in using the Recycle Bin as a backup tool consists of resizing all the hard drives to
make them larger than you would normally want them. While you use extra disk space as a result of
enlarging them, you increase the chances that the Recycle Bin will be able to store all your deleted
files. The size of your Recycle Bin matters for two reasons. First, as a hard drive begins to fill up,
Windows automatically reclaims space for that drive from the Recycle Bin by deleting files from it,
starting from the oldest and moving forward. Second, if a deleted item is larger than the capacity of
the Recycle Bin, that item will be permanently deleted without being saved. To allow the Recycle Bin
to back up your files, you must ensure that it can accommodate a significant amount of data. For
example, if you want the Recycle Bin to keep your Movie Maker files available for restoration once
you’ve deleted those, you’ll need an especially large bin.
Tip
To restore several deleted items at the same time, hold down the Ctrl key on your keyboard and then click
each item that you want to restore. When you have finished selecting all the items, choose File ➝ Restore in
the Recycle Bin. If you restore a file originally located in a folder that you have since deleted, Windows will
recreate that folder in its original location, and restore the file to that folder.
Chapter 4: Backing Up Your Data 65
When the Recycle Bin is full, you can empty it by double-clicking on the Recycle Bin icon on your
desktop and choosing File ➝ Empty Recycle Bin. But if you wish to use the Recycle Bin as a backup
device, you obviously don’t want to do this. In fact, when using the Recycle Bin as a backup device
you’ll need to monitor it frequently to make sure that you’re not losing files you might need later.
Keep watch on how full the Bin is because if you try to send a file to it that is larger than the space
available, Windows will complain and force you to resize the Bin or delete the file. It’s all too easy to
hit the Delete option and lose the file for good.
Caution
You can permanently delete an item without sending it to the Recycle Bin. If you hold the Shift key down
while deleting an item — by right-clicking on the item and choosing Delete or by holding the Shift key as you
drag it to the Recycle Bin — you bypass the Recycle Bin entirely and delete the item in a way that retrieving
it, if at all possible, requires the use of specialized command-line tools. For obvious reasons, you should
avoid this method of deleting files if you plan to use the Recycle Bin as a secondary backup tool. However, if
you want to ensure that other users do not find your deleted files, by all means permanently delete them.
Summary
Backing up matters. In fact, it matters as much as anything in your computing life. Use the Backup
Utility in Windows XP regularly, and, just as important, make manual backups of important folders
and files at least once a week. Never let yourself get caught in a situation where you have no backup
copies of important files you’re currently working on because that’s just inviting disaster. Your data is
just too important.
Chapter 5
Windows Update:
Letting Microsoft
Protect Windows
XP for You
Y ou can do a great deal of work to protect Windows XP on your own, but Microsoft has a
vested interest in helping you along. Contrary to the image sometimes presented by disgrun-
tled users as well as the computer press, Microsoft really does want its software to work well. (Not
well enough to prevent you from buying the next version, of course, but then, no software company
can afford that much excellence.) Like other companies, but on a huge scale and with more watchful
eyes on it, Microsoft continually offers updates to Windows XP, correcting bugs and plugging secu-
rity holes. Usually, they work. When they don’t, the company posts a further update.
To update, patch, and add to Windows XP, turn to Windows Update. This chapter examines three
essential elements of Windows Update: automatic updates, security patches, and service packs.
Operating system version number: The version number of Windows XP itself, indicat-
ing to Windows Update whether, for example, a service pack download should be made
available.
Internet Explorer version number: The version number of Internet Explorer, used to
determine if specific Internet Explorer downloads or service packs need to be included on
the list of available updates.
Version numbers of software for which Windows Update provides updates: The ver-
sion numbers for Windows Messenger, Backup Utility, and numerous other programs cov-
ered by Windows Update.
Chapter 5: Windows Update: Letting Microsoft Protect Windows XP 69
Plug and Play ID numbers of hardware devices: Identification for hardware devices
connected to your PC, allowing Windows Update to determine which hardware drivers
to include as part of the available updates listing.
Region and language setting: Your geographical location, used by Windows Update to
determine which language options and alternatives to list.
Product ID and Product Key: Information about Windows XP itself, to determine if
you have a legal copy. If you do not, Microsoft retains the information for possible future
action.
According to the privacy statement, Windows Update does not collect names, addresses, email
addresses, or any similar personal information. The process, though, generates a Globally Unique
Identifier (GUID) and stores it on your hard drive (much like a cookie) to track whether the down-
loads and installations succeed. Microsoft compiles much of this information to generate overall sta-
tistics, and the privacy statement continually reassures you that it gathers no information whatsoever
that points to you. Of course, you can choose whether to believe these reassurances.
Note
Many people take exception to the way Windows Update scans their hard drives, not wanting any outside
agent collecting information from their PCs. This is thoroughly understandable; In many ways, Windows
Update provides another example of Internet intrusion. You have two things to consider if you think this way.
First, Microsoft’s market position makes it particularly susceptible to analysis and examination by govern-
ment, the press, and the public. If it does anything weird, questionable, or otherwise untoward with a tool as
ubiquitous and powerful as Windows Update, the company will likely get hammered from many directions.
You can probably feel as assured as you can about anything that Microsoft has no plans to abuse Windows
Update by scanning your hard drive and stealing information from you (the company already knows how to
get your money, after all). Second, Microsoft typically makes its most important updates — those related to
security — available by conventional download as well as through Windows Update, so to keep your
Windows XP installation safe (if not completely up-to-date), you don’t need Windows Update at all.
To have Windows Update do what it deems necessary — scanning your system to see what requires
updating and implementing that analysis automatically — click the Express button. To choose for
yourself which elements to update, click the Custom button.
To begin the update process, click either the Express or the Custom button. After a minute or more,
Windows completes the scan and presents its results in a statement that Windows has — or has not —
located updates for your system. The Express update locates only critical updates and recommended
updates, while the Custom option (see Figure 5-3) displays, in the pane on the left, the number of
available updates under the categories discussed in the bulleted list below. For both types of Update, if
Windows has determined that updates are available, you can click the Review and Install Updates link
to see precisely what the service has located. As you add items to the update list (using the Custom fea-
ture), the numbers to the right of the Review and Install Updates link increase to reflect the number of
items, the cumulative size of the files, and the time it will take to download them.
The first statement you see tells you what, if any, critical updates are available, and the second
states whether other, noncritical updates are available. The left side of the main screen, as also shown
in Figure 5-3, contains three choices under the Pick Updates to Install link.
The three choices are:
High Priority: By far the most important examine category, these downloads update
Windows to guard against significant possibilities of crashes and other malfunctions and to
provide greater security for your PC. Many critical update downloads consist of patches
designed to correct security flaws discovered because of system break-ins by intruders,
while others plug security holes that Microsoft has discovered through testing. Service
packs, which are High Priority items) are discussed in the “Understanding Service Packs”
section later in this chapter.
Chapter 5: Windows Update: Letting Microsoft Protect Windows XP 71
Software, Optional: This is a catchall name for any number of noncritical updates, rang-
ing from new features to changes to programs included with the Windows installation. The
five updates referenced shown in Figure 5-2 covered issues ranging from USB availability
and wireless network security to the Advanced Network Pack — a collection of files pro-
viding compatibility with Internet Protocol version 6 — and a package supporting the new
HighMAT format for creating CDs. None of these can be construed as critical to the opera-
tion of your PC, so they get lumped together under a separate category. You can install as
many or as few of these updates as you want.
Hardware, Optional: Hardware drivers for devices attached to your system, including
video cards, sound cards, removable drives, modems and network cards, printers and
scanners, and so on. These are Windows signed drivers, meaning that they have passed
Microsoft’s approval tests. You can install as many or as few of these as you want.
Selecting Updates
Click any of the links to begin the process of selecting updates from that category. To choose the
Windows Update items to install, scroll through the list and click the Add button for the updates you
want. Windows Update displays the number of updates you’ve chosen at the top of the main win-
dow, beside the Review and Install Updates link, and also on the left with the identically named link.
72 PC Magazine — Windows XP Solutions, 2nd Edition
You can click either link to see what you’ve selected and to remove any items from your selections,
as shown in Figure 5-4.
Note
Windows Update automatically selects all critical updates for inclusion in your download and installation.
You can remove these if you want, but you have very little reason to do so. Critical updates are important.
When you’re satisfied with your choices for download and installation, click the Review and Install
Updates link, and then click Install Now. Windows presents you with the End User License Agreement
and lists the updates to which it applies. Clicking Accept begins the final process (if you don’t accept
the agreement, Windows Update closes). A dialog box displays the download and install progress for
you. Typically, the Install portion takes longer than the download — in fact, a great deal longer than the
download if you have broadband Internet access. However long it takes, the process often slows other
programs in Windows while it is taking place, so the best approach to completing a Windows Update
with numerous selections is to start the downloads and go make yourself a snack.
After installation, Windows might instruct you to reboot your computer. As always, you can
ignore it if you want, but something on your system might not work right as a result. Remember
that, especially in the case of critical updates, you’ve just altered Windows XP itself.
To have your PC help you (or not) with automatic updates, check one of the following options:
Automatic (recommended): Windows handles its own updating. At the time you sched-
ule, using the drop-down menus to specify frequency and time of day, Windows connects
to Windows Update, downloads any available updates, and installs them. Only High
Priority updates are acquired in this fashion; to get optional updates, you still need to visit
the Windows Update site.
74 PC Magazine — Windows XP Solutions, 2nd Edition
Download but let me choose: Windows downloads the updates and then asks if you
want to install them.
Notify: Windows checks the Windows Update site for available items and informs you if
it finds any. A dialog box appears identifying the updates and asking if you want to down-
load and install them; you can postpone the process until later if you wish.
Turn off Automatic Updates: Shuts down the Automatic Update feature. You should con-
sider this one only if you have the self-discipline to remember to visit Windows Update
frequently to update your PC manually. Lots of people don’t (me, for instance).
Choosing Automatic provides two benefits. First, it does everything for you. Second, it does not
interfere with your work; as long as you are not actually working at the computer during the sched-
uled update time, you do not experience slowdowns or the sudden appearance of dialog boxes. The
disadvantage, of course, is that you don’t control the process. Of all the options, this one demands
that you trust Microsoft most.
Note
You can use Windows Update to download and install security patches and service packs automatically. If
you dislike using Windows Update or want to keep manual track of the additions to Windows XP.
Your first stop is the Microsoft site itself (www.microsoft.com). Whenever the company releases
an important patch for Windows, it informs visitors to Web site, either on the home page or on the
Windows front page (www.microsoft.com/windows). If you see a new patch highlighted on one of
these pages, click the link to its download page.
Numerous other sources also provide information about the latest security patches. For example,
the PC Magazine Web site (www.pcmag.com) updates its news stories, and it places news about
important Windows patches at the top of the list. Other computer news sites such as Newslinx
(www.newslinx.com) and eWeek (www.eweek.com) also provide these details, and you can sub-
scribe to them (free) to get the headlines delivered to your inbox. All major newspapers feature patch
stories as well, so subscribe to your favorite (again, the free online version) and read about security
Chapter 5: Windows Update: Letting Microsoft Protect Windows XP 75
downloads as information about them becomes available. (In the process, you can learn a great many
other things about the world as well — always a nice extra.)
Installing a security patch in this manner differs from installing it using Windows Update. Once
you’ve reached the download site, click the download link to begin the process. When the File
Download dialog box appears, you have two choices: Open or Save. For the greatest ease, click the
Open button. When the download finishes, the file launches automatically and prepares the installa-
tion. If you feel at all unsure about security, save the file to your hard drive, and then locate the file
and double-click it to launch it.
If you don’t want to engage Windows Update too often, one sensible strategy is to use Windows
Update for Windows XP critical updates only and then wait for the rest of the updates until the next
service pack is released. As with security patches, you can find notices about Windows service packs on
the Microsoft site and all the computer news sites, as well as, frequently enough, the major newspapers.
Whatever update strategy you choose, when a service pack becomes available, you can install it in
two ways. Microsoft makes its service packs available on Windows Update with a one-click down-
load and installation, certainly the most convenient method. If you prefer, either because you don’t
like using Windows Update or because Windows Update does not work well on your system, you
can install the service pack as follows:
Figure 5-7: The service pack download page provides information and instructions.
2. Click Download.
3. Save the file to a location of your choice on your hard drive.
4. With the download complete, locate the file and double-click it. The service pack installa-
tion begins.
Chapter 5: Windows Update: Letting Microsoft Protect Windows XP 77
Tip
If you connect to the Internet through a dial-up modem, downloading the service packs can take hours. If you
prefer, you can order the service pack on CD by clicking the link at the bottom of the Service Pack page.
Summary
With your operating systems, you want continual support, and support comes frequently in the form
of fixes, patches, and add-ons. Windows Update provides the easiest method for keeping your
Windows XP installation current, but if you prefer, you can perform certain elements of the update
manually. This is especially true of security patches and service packs, which are downloadable from
the Microsoft Web site and elsewhere. (Third-party software contains its own similar update processes,
some of it Web-based, some of it merely the application contacting the download site, and you owe it
to yourself to keep it as current as possible as well.) While software has always undergone updates and
revisions, the fast and easy Internet connections of today mean that no software is ever truly finished or
completely up to date. In the case of Windows, given its susceptibility to ever more inventive forms of
intrusion and hacking, Microsoft’s recognition that it’s never completely finished is surely a good thing.
Chapter 6
Recovering from
Windows XP Problems
Y ou might get through month after month of Windows XP use without experiencing any diffi-
culties. Don’t bet your house on it, but it could happen. More likely, however, you will
encounter problems with your Windows XP installation once, twice, and perhaps more times during
the course of a few months’ activity, and you might very well need to categorize some of these prob-
lems as serious. This chapter features a wide range of reasonably simple techniques for dealing with
problems as they occur. Reasonably, that is, because any time your computer malfunctions, no mat-
ter what kind of computer it is or which operating system it runs, your life takes a turn for the dis-
tinctly uneasy. Windows XP experiences fewer problems than earlier versions of Windows, but you’ll
still likely experience your share, so these problem-solving techniques can come in handy.
This chapter covers a variety of methods for recovering from problems with your Windows XP
installation, beginning with the precaution of using System Restore to take a snapshot of your system
in running order.
Note
System Restore also deletes restore points when you disable it on your main drive or when you reinstall the
operating system. It also deletes restore points selectively as your hard drive fills up, deleting the oldest
points and leaving the most recent intact as long as possible.
System Restore is so important, in fact, that Microsoft has configured it to set restore points auto-
matically. The utility functions in the background, monitoring your system and waiting for an event
to trigger it. Automatic triggers include the following:
This list seems reasonably exhaustive, but a number of events can occur that make adding your
own restore points a very good idea. For example, if you install a new program, Windows XP auto-
matically creates a restore point at the moment you begin the installation. If you later restore your PC
to that moment, that program’s files and registry settings will disappear. Any data files you have cre-
ated remain in place, so that causes no concern. But if you’ve performed other installations in the
meantime, particularly of nonprogram software, such as media files or other add-ons, to get rid of
them using System Restore you might have to back up all the way to the moment before installing
that important application. More important, setting your own restore points lets you restore your
system to precisely the point you want, helping you avoid any unwanted deletions.
To set a restore point, follow these steps:
1. Choose Start ➝ All Programs ➝ Accessories, select the System Tools folder, and click
System Restore.
2. On the Welcome to System Restore screen (shown in Figure 6-1), choose the Create a
Restore Point option and click Next.
3. On the next screen, type in a descriptive name for the restore point. If you are setting a
restore point to install the program Quicken, for example, you might name it Before
installing Quicken. The instructions on the screen tell you that System Restore will add
the current date and time to the restore point, so you don’t need to include that informa-
tion in the description.
82 PC Magazine — Windows XP Solutions, 2nd Edition
4. Click Create to set the restore point. Windows responds with a screen confirming the new
restore point and showing you the time, date, and description. Click Close to exit System
Restore.
Tip
To determine whether you should use a specific restore point, click on that point and then on each high-
lighted calendar date after that time. If you see an installation of either hardware or software on a date (or
even just a time) later than the selected restore point, you will lose that installation. In the case of hardware,
Chapter 6: Recovering from Windows XP Problems 83
keep in mind that after the system restoration Windows will try to install the drivers automatically. As long as
you have them available, you can quickly reinstall them. If Windows Update has installed software, however
(System Restore notes this activity in the description), you will need to return to Windows Update and rein-
stall the program.
After choosing the restore point you want, click Next. Figure 6-3 shows the resulting screen, with a
warning to close any open programs and save data. It also informs you that it will shut down Windows
and restart with the settings of the time shown in the restore point description. Specifically, it restores
the registry and all necessary system files to their earlier state. Performing these replacements rolls back
any changes made by the new installations, an extremely important point — especially if the changes
were intentionally harmful, as with some viruses, worms, and spyware.
Figure 6-3: Last chance to change your mind about restoring your system.
Tip
If you have trouble loading Windows XP, you can still use System Restore. Following the instructions in the
“Safe Mode and Other Startup Menu Options” section later in this chapter, boot your computer into Safe
Mode. When the interface appears, Windows informs you that you are about to enter Safe Mode and asks if
you wish to launch System Restore to restore Windows to an earlier point instead. If you go past this point,
you can load System Restore from the System Tools menu as well.
84 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
To open the System Properties dialog box from the keyboard, press Winlogo+Break.
By default, System Restore monitors all hard drives, using a specific amount of disk space on
those drives to do its work. If you’d prefer not to use the utility at all, check the box at the top of the
Chapter 6: Recovering from Windows XP Problems 85
dialog box to turn off System Restore for all drives. Alternatively, you can disable System Restore on
each drive individually by highlighting that drive, clicking the Settings button, and checking the
Turn Off System Restore on This Drive option (see Figure 6-5). When you do this, Windows excludes
that drive from the entire process so that you cannot back that drive up to an earlier point. Programs
installed to that drive, however, will still be affected by a restoration if you installed them after the
date on the restore point. Windows resets the registry to that date, and the restored registry will no
longer include information about the application in question.
Figure 6-5: Changing the disk space allotment for restore points.
Figure 6-5 shows not only the disabling option but also the slider for changing the amount of
disk space used for restore points on that drive. Move the slider left to decrease the reserved space
and to the right to increase it. For System Restore to work most effectively, and especially if you
install software or hardware (or both) regularly, set all drives to their maximum disk space allotment
and let the utility back up everything it possibly can.
Changing the default intervals for automatic creation and deletion of restore points is consider-
ably more involved, primarily because it demands that you edit the registry in all its intimidating
glory. If that weren’t enough, you also have to do the multiplication necessary to convert days into
seconds.
Caution
Because editing the registry can cause your system to malfunction, you should always back it up before you
make any changes. To back up the registry, open the Registry Editor by clicking Start ➝ Run and typing
regedit in the Run box. In the Registry Editor dialog box, choose File ➝ Export. Check the All button under the
Export Range heading at the bottom of the dialog box in order to back up the entire registry. If you have a FAT
or FAT32 file system, save the registry file on that drive so that you guarantee access to it if you need to
restore it. Restoring the registry is a matter of loading Windows XP into Safe Mode (see the next section),
opening the Registry Editor, choosing File ➝ Import, and locating and opening the registry file. Then simply
reboot, and Windows should work the way it did before.
86 PC Magazine — Windows XP Solutions, 2nd Edition
The following steps let you change the intervals for both automatic creation and deletion of
restore points:
1. Click Start and choose Run. Type regedit in the Open field and press Enter to launch the
Registry Editor.
2. Expand the folder called HKEY_LOCAL_MACHINE by clicking its plus sign (+).
3. Expand the Software folder in the same way, and then scroll down to the Microsoft folder
and expand it as well.
4. Scroll to the Windows NT folder and expand it, and then click the CurrentVersion folder.
5. Scroll to the System Restore folder and click it. Figure 6-6 shows the result, a list of keys in
the right-hand pane.
6. To change the timing of the automatic restore point setting, right-click the
RPGlobalInterval key and choose Modify.
7. In the resulting Edit DWORD Value dialog box, click the Decimal radio button, revealing
the value as 86400. This is the number of seconds that pass between each automatic
Chapter 6: Recovering from Windows XP Problems 87
restore point: 86,400 seconds equals 24 hours. You can change this value to anything you
like, but bear in mind that the time calculated is based only on when the PC is powered on
and Windows XP is running. For example, if you want to increase the amount of time to
48 hours, type 172800 in the box and click OK. The Edit DWORD Value dialog box
closes, and the Data column in the Registry Editor reflects the change.
8. To change the amount of time that expires before Windows automatically deletes a restore
point, follow the procedure in step 7, but this time, modify the RPLifeInterval key instead.
The default value, 7776000 seconds, equals 90 days. To double this value so that restore
points hang around for six months, type the value 15552000.
9. Reboot to set these values. Note that you do not have to save the Registry Editor itself. As
soon as you make the changes, the registry changes.
With System Restore functioning precisely the way you want, you’re ready to take your system back
in time if negative things start happening. Now you can concentrate on installing your hardware.
Utility dialog box opens, click the BOOT.INI tab to access the Boot Options interface (see Figure 6-7).
Here you can force Windows to load in the following different ways, each of which is explained later in
this chapter:
/SAFEBOOT: This option boots Windows XP into Safe Mode, with one of the following
options:
■ MINIMAL: Standard Safe Mode (the default option). It is available on the Startup menu
as Safe Mode.
■ NETWORK: Safe Mode with networking enabled. It is available on the Startup menu as
Safe Mode with Networking.
■ DSREPAIR: On systems with the Active Directory enabled, booting with this option
lets you make repairs to the Active Directory. It is available from the Startup menu as
Directory Service Restore Mode.
■ MINIMAL (ALTERNATESHELL): This rather fancy name simply boots Windows into
Safe Mode with a command-line prompt only, with no graphical interface. It is available
on the Startup menu as Safe Mode with Command Prompt.
/NOGUIBOOT: Windows does not display the Windows XP splash screen during the boot
process. This is useful if you really loathe the Windows logo. It is unavailable on the
Startup menu.
/BOOTLOG: Windows logs every activity during the boot process, creating a file you can
examine for loading errors. It is available on the Startup menu as Enable Boot Logging.
/BASEVIDEO: Boots Windows with the default VGA driver, giving you an unattractive
screen to look at; however, by avoiding your video driver, this method is helpful in sort-
ing out problems with your graphics card. It is available on the Startup menu as Enable
VGA Mode.
/SOS: Windows displays the name of each driver as it loads, helping you determine which
drivers might be causing problems. /SOS slows boot time considerably because it also
checks your hard disk’s file system as Windows loads. It is available from the Startup menu
as Debugging Mode.
In the System Configuration utility, click the option you want and then the Close button. Reboot
your PC, and Windows boots as instructed.
Note
When you’ve finished troubleshooting Windows, return to the System Configuration utility and uncheck your
choices. Until you do so, Windows will continue to load in the specified boot mode.
Chapter 6: Recovering from Windows XP Problems 89
Windows provides another way to access Safe Mode, but not a way that you choose. When
Windows attempts to load but fails (even if you manually restart in the middle of a boot-up), a trun-
cated version of the Startup menu appears automatically on the next boot attempt.
Safe Mode
The most common reason for accessing the Startup menu is to launch Windows in Safe Mode. Safe
Mode is exactly what its name indicates — a safe means of starting your Windows XP system. In this
context, the word safe means, more than anything else, certain. You won’t get your full system up
and running, but what you do get will work. From Safe Mode, you can troubleshoot your system,
adjust your configuration, uninstall programs, and, as long as you select the Safe Mode with
Networking Option, access online help over the Internet.
Note
Sometimes your system will not even let you boot into Safe Mode. If this condition persists, often your only
choice is a reinstallation of Windows XP (see Appendix B). Before resorting to such an undertaking, how-
ever, turn your computer off for a couple of hours and try booting again. If it still doesn’t work, and if you have
a boot floppy — even from an earlier Windows version — boot with it and then reboot to try Windows XP
once more. There’s no real technical reason why such techniques work, but sometimes they do. Maybe even
operating systems need a rest.
Safe Mode works by launching Windows with only the files, settings, and drivers necessary for it
to operate. Specifically, it loads the basic Windows files along with standard drivers for keyboard,
mouse, monitor, and devices such as your hard drives. It dispenses with third-party drivers and
90 PC Magazine — Windows XP Solutions, 2nd Edition
inessential drivers you might have installed after initially setting up the OS, and it also bypasses
many of the settings stored in the Windows registry. In other words, it loads a minimal version of
Windows, one that can function on all standard PCs, largely independent of the hardware and soft-
ware installed in a particular PC.
The effectiveness of Safe Mode lies in the fact that most of the problems affecting the Windows
boot process result from the hardware and software specific to that PC, not from the standard,
unadorned Windows environment. If you’ve installed a new video driver, for example, and you no
longer get an image on your monitors, entering Safe Mode tells Windows to bypass the newly
installed video drivers and revert to the good old SVGA drivers, which are unquestionably boring
but nearly always functional. With Safe Mode running, you can uninstall those drivers and then
install an earlier version of them on restart.
Of course, Safe Mode has a built-in strike against it: If you need it, that means you’re having prob-
lems. As a result, you see it only when you’ve already tried everything you could think of to fix your
system and failed. Because you typically turn to it only in emergency situations, you might consider
working with it regularly just to maintain familiarity with it. Enter Safe Mode periodically, navigate
your way around (especially to the Windows configuration utilities and dialog boxes), and then shut
down and boot normally. That way, when disaster strikes you’ll be ready.
and examine this file to determine where the launch process has been failing. You can load the file
into Notepad or WordPad and scan through it to see any loading exceptions. Most importantly, you
can examine the end of the file to see which driver was the last one that Windows tried to load.
Frequently, this driver is the problem — the one that stopped the OS in its tracks. Using the Device
Manager dialog box in System Properties, you can delete the driver, or, in the case of drivers for older
products, you can edit the system files using the System Configuration Utility (click Start and choose
Run, and then type msconfig and press Enter). By doing so, you can stop the offending driver or
process from loading and, in many cases, allow Windows to launch without it.
After you’ve booted your system with the Enable Boot Logging option, Windows creates a log file
named ntbtlog.txt. You can find this file in the main Windows directory (but again, only after you’ve
used a Boot Logging startup). As you read it, you’ll notice that the vast majority of drivers in the list
are displayed as loading properly. But the log file stops at precisely the spot where Windows stopped
the loading process.
Figure 6-9 shows the Processes tab of Task Manager. Here you can see the computer processes
currently active in your system. All programs run processes, as do numerous elements in the operat-
ing system itself. As with the Applications tab, you can click on any process shown here and stop it
by clicking the End Process button. One of the main benefits of the Processes tab is that many items
appear here that do not appear as full programs on the Applications tab, and you can learn quite
quickly which processes you can shut down to save memory. If you don’t work regularly with
Acrobat reader, for example, terminate the Acrobat.exe process (near the top of the window in Figure
6-9). Similarly, if you’re not planning to use the DVD drive to play movies, you can terminate cine-
tray.exe. Before doing so, however, check the System Tray to see if the icons for these programs appear
there, and close them normally instead. Ending a process via the Task Manager can result in program
crashes and even complete system crashes. But when all else fails, with your system behaving errati-
cally or extremely slowly, try ending some recognizable services and see if doing so clears up the
problem.
work with Windows, the paging file expands and shrinks as the operating system requires, but as
you fill up your hard drive, you can render the paging file less and less useful.
Windows rarely tells you when the paging file gets too small. It does, however, inform you when
your hard drive is nearly full, and it tells you if it cannot perform a task because it has run out of
memory. Sometimes these messages are related; your paging file has reached its minimum size
because your hard drive has filled up and Windows needs more memory than the paging file allows
in order to run its programs. When you see this warning, keep in mind that not only will you soon
run out of disk space (usually when you’re trying to save the most important document of your life),
but you are also affecting the performance of everything on your system.
You can help your virtual memory’s cause in a number of ways:
Remove programs from your system by accessing the Add/Remove Programs utility on the
Control Panel.
Remove data from the hard drive to give the paging file more disk space.
Change the default size of the paging file to ensure that you never shortchange Windows.
Move the paging file to a location you won’t touch.
Delete the paging file and let it reconstruct itself.
With the first option, cleaning unneeded items off your hard drive, you help yourself in numer-
ous ways. You get more disk space and so does the paging file. Chapter 22 discusses various meth-
ods of reducing the data on your drives, but nothing replaces the good old Delete key. If you don’t
want to delete the files and folders, and if you have another partition (or another hard drive) with
space available, move the files to that partition. Windows ties the paging file to a specific drive, and
as long as that drive contains enough room for the paging file to act as a memory store, it continues
to work just fine.
To work directly with the paging file, open the System Properties dialog box by right-clicking on
My Computer and choosing Properties (or pressing Winlogo+Break). Click the Advanced tab, fol-
lowed by the Settings button in the Performance area. Click the Advanced tab on the resulting
Performance Options dialog box and look at the Virtual Memory area at the bottom. Here, you see
the current size of the paging file, as well as a Change button if you want to reconfigure it. Clicking
Change yields the Virtual Memory dialog box shown in Figure 6-10.
This dialog box shows all the partitions on your system, as well as an interface for changing the
size of the file. Unless you have a reason to set the initial and maximum size of the file, click the
System Managed Size radio button to let Windows XP control the size of the file on its own, increas-
ing and decreasing it as required by current memory needs. Figure 6-10 shows a paging file set to
768MB as the initial size (roughly 1.5 times the amount of system RAM in the PC), with a maximum
size of twice that amount. The benefit of setting the initial file size is that this size acts as the mini-
mum size as well; when Windows controls the paging file, it will let it get much smaller. But
Windows also uses maximum size to the best possible effect, so if you have plenty of hard disk space,
the System Managed Size option remains the best.
Chapter 6: Recovering from Windows XP Problems 95
If you have a large hard drive, you can deal with the paging file extremely effectively by creating
a separate partition 3–4GBs in size and assigning a system-controlled paging file to that partition
(see Appendix A for details on creating partitions). Unless you install over 2GB of RAM in your sys-
tem (unlikely today but possible by the time the next version of Windows appears), you’ll never
need a larger paging file. Because it’s on a separate partition, and assuming that you can avoid actu-
ally using that partition for data storage, your paging file will work as well as it possibly can in a
Windows XP system. Once you have a partition available for the paging file, you can assign the pag-
ing file to that partition via the Virtual Memory area of the Advanced tab of the Performance Options
dialog box.
If you experience numerous out-of-memory messages or low-virtual-memory messages, your
paging file might have become corrupted. Locate the file named pagefile.sys (typically in the root
folder of C: drive), delete it, and then reboot your PC. Windows automatically generates a new page
file during the boot process, this time without the corruptions.
To create this backup, open the Backup Utility from the System Tools folder by clicking Start and
choosing All Folders ➝ Accessories. On the resulting Welcome screen of the wizard, click the
Advanced Mode link. Figure 6-11 shows the Welcome page of the Backup Utility, with the Automated
System Recovery (ASR) Wizard displayed as the third option on the screen. Clicking the ASR Wizard
button takes you into the wizard itself.
Click Next on the wizard’s Welcome screen and browse for the location where you want to store
your backup — a CD-R or CD-RW disc, an external hard drive, a tape drive, and so on. Click Next
to begin the backup process. The Backup Utility requests media during the backup (CD-ROMs,
DVDs, and so on), so be sure to have them ready.
If your system crashes and you can no longer load Windows, use this backup to make the neces-
sary repairs. Locate the disk you just created, as well as the media for the backup itself. Finally, find
your Windows XP installation CD. Put the Windows installation CD in the CD-ROM drive, turn on
your computer, and press a key when prompted to start the installation from the CD. When you see
the notice on the Setup screen to press F2 for an Automated System Recovery session, do so. Put the
disc in your CD or DVD drive when instructed, and follow the process to recover your system.
the EFS renders any stolen data effectively useless. When you encrypt a file, you apply an encryption
algorithm to it — EFS uses both expanded Data Encryption Standard (DESX) and Triple-DES (DES3)
for its encryption — and in order to use that file, it must be decrypted. Once you’ve enabled EFS for
a folder or file, Windows XP performs these actions behind the scenes, encrypting when you save the
file to disk and decrypting when you load the file into a program. If you hold an Administrator
account for a PC (or several PCs), you can enable EFS for the good of everybody without anyone
even noticing it’s there.
Note
The Encrypting File System works only on NTFS formatted disks. In fact, if you copy or move a file from an
NTFS disk to a FAT32 or FAT disk, you remove the encryption entirely. For that reason, it makes little sense to
use a FAT32 partition as a backup location for an NTFS partition that contains EFS-enabled folders and files,
unless you can remove the FAT32 partition from the PC (as in the case of an external hard drive).
The EFS works through a trio of keys. Each file contains its own file encryption key, assigned
when first encrypted and required to decrypt the file later. For further security, EFS encrypts the file
encryption key as well, and anyone wanting to use the file needs the public key of the user who cre-
ated the file or of any other users specifically authorized to do so (not even computer administrators
can access another user’s encrypted files without this authorization). The person who then tries to
decrypt the file can do so only with a private key that matches the public key. In effect, the private
key unlocks the public key, which in turn unlocks the file encryption key. Only with all the locks
removed can the person use the file in an application.
1. Open Windows Explorer or My Computer, and navigate to the file or folder you want to
encrypt.
2. Right-click on the file or folder, and choose Properties.
3. Click the Advanced button on the resulting Properties dialog box.
4. On the Advanced Attributes dialog box, check the Encrypt Contents to Secure Data option
and click OK. See Figure 6-12.
5. Click OK on the Properties dialog box to begin the encryption process.
After clicking OK, another dialog box appears. If you apply the encryption to a folder, you get the
Confirm Attribute Changes dialog box (see Figure 6-13).
98 PC Magazine — Windows XP Solutions, 2nd Edition
This dialog asks if you want to encrypt the folder only or, as a default, the folder and everything
inside it — all files and all subfolders as well. When you apply encryption to a file, the Encryption
Warning dialog box appears (see Figure 6-14), explaining that if you encrypt the file but not the
entire folder, whenever someone modifies that file the encryption could disappear.
As both dialog boxes make clear, EFS works best when applied to entire folders rather than indi-
vidual files. When you encrypt a folder and all its contents, you instruct Windows to encrypt all files
you place in that folder from that point on, whether by copying them, moving them, or saving them
from a program. By contrast, if you encrypt only a file, you strip the encryption by modifying the file,
and you give up the full control provided by encryption at the folder level. The moral is this: Encrypt
folders, and let the folders encrypt the files for you. For both dialog boxes, therefore, accept the
default selection to encrypt the folder and all its files.
Windows indicates an encrypted folder or file by displaying its name in green. If you encrypt a
folder, it automatically changes the folder name and all filenames to green, making it easy for you to
see, in Windows Explorer or My Computer, which items operate under EFS. If you encrypt only the
file, the folder name itself gives no indication that it contains encrypted files. This is another reason
(albeit a less important one) to choose folder-level encryption.
If for any reason you want to remove the encryption from a resource, right-click on it and choose
Properties, click the Advanced button, and uncheck the encryption option from the Advanced
Attributes dialog box.
Note
You cannot use EFS on compressed folders. For that reason, on the Advanced Attributes dialog box, you can
choose either “Compress contents to save disk space” or “Encrypt contents to secure data,” but not both.
(Of course, from an interface design standpoint an either-or selection always calls for radio buttons rather
than check boxes, so this is one for the “Who designed this?” document.) Furthermore, you cannot encrypt
entire hard drives, nor can you encrypt files bearing the System attribute.
Caution
If you do not establish a Recovery Agent and you lose access to the Windows installation, you cannot access
files on that system encrypted through EFS. You might as well delete them (EFS doesn’t stop you from doing
that) because you have no way to access them at all.
100 PC Magazine — Windows XP Solutions, 2nd Edition
Creating a Certificate
To create a certificate for use in adding a Recovery Agent, follow these steps. This process assumes
a username of jones, but, of course, yours probably differs:
1. Open a command box by clicking Start, choosing Run, typing cmd in the Open field, and pressing
Enter.
2. Notice the current folder, which is displayed in the path at the top of the command box. Write
this down so you can locate the certificate once you’ve created it.
3. Engage EFS’s cipher utility by typing cipher /r: jones and pressing Enter.
4. Windows prompts you for a password. Type it and then retype it to confirm, pressing Enter each
time. Windows tells you it has created two files, jones.cer and jones.pfx.
5. Open the MMC (click Start and choose Run, then type mmc into the Open field and press Enter).
6. Choose File ➝ Add/Remove Snap-in.
7. On the Add/Remove Snap-in screen, click Add and click Certificates on the resulting dialog box.
Click Add.
8. Choose My User Account, and click Finish. Click Close on the Snap-in dialog box and OK on the
Add/Remove Snap-in screen.
9. Click OK. The console shows the Certificates – Current User tree. Right-click on the Personal
folder, and choose All Tasks ➝ Import. This starts the Certificate Import Wizard. Click Next.
10. Click the Browse window, and in the Files of Type menu, select Personal Information Exchange.
Double-click the jones.pfx file in the main window, and click Next in the File To Open window.
11. Type the password you decided on in step 4, and click the Mark This Key as Exportable option.
That way, you’ll be able to export the certificate (to another computer, for example) for safe-
keeping.
12. On the Certificate Store screen, choose the top radio button, Automatically Select the
Certificate Store Based on the Type of Certificate, and click Next. Click Finish to complete the
import.
13. Now it’s only a matter of telling Windows to use this key for the Recovery Agent. In the MMC,
choose File ➝ Add/Remove Snap-in, click Add, and choose Group Policy. Click Finish to add the
Group Policy snap-in, and click OK on the Add-Remove Snap-in window.
14. In the MMC, locate the Encrypting File System folder by expanding the following items in
the Console Root tree: Local Computer Policy, Computer Configuration, Windows Settings,
Security Settings, and Public Key Policies. Right-click on Encrypting File System, and choose
Add Data Recovery Agent. Click Next.
15. In the Select Recovery Agents window, click Browse Folders. Locate the jones.cer file you
just created, and double-click it. Click Next and then Finish to complete the process.
Chapter 6: Recovering from Windows XP Problems 101
When users without authorization try to access an encrypted file, they get a message telling them,
in a rather terse manner, that they cannot do so. Double-clicking on the file icon (even inside an
encrypted folder, the files themselves are clearly visible) results in the message, without letting the
user know why they can’t access it. The user simply knows that it’s not available and can draw on all
the conspiracy theories he or she wishes as a result.
The Recovery Agent can access these files, however. You create a Recovery Agent through the
Group Policy Editor (outlined in Chapter 27). Open the editor (choose Start ➝ Run, type
gpedit.msc, and press Enter), and navigate to the Encrypting File System folder, located inside Local
Computer Policy\Computer Configuration\Windows Settings\Security Settings\Public Key Policies.
Right-click on the Encrypting File System folder, and select Add Data Recovery Agent. The Add
Recovery Agent Wizard appears, guiding you through the process. If you do not have a certificate,
you can create one using the instructions in the “Creating a Certificate” sidebar in this chapter.
When you have the Recovery Agent in place, that person can access any encrypted files and fold-
ers, as long as the certificates for that user are installed on that machine. For this reason, you should
export the certificates to another location (ideally another computer) for later import should some-
thing go wrong. For example, in the case where you have an inaccessible Windows XP installation
on one partition of your PC and you install Windows XP on a new partition, you can import the
Recovery Agent’s certificates and, once they’re in place, gain access to the encrypted data. You can
encrypt the certificate files on the second computer, but you run the risk of making it inaccessible if,
in turn, you lose the keys for that second PC.
You now have a Recovery Agent in place. You should now back up your certificates by right-
clicking on them, choosing All Tasks ➝ Export, and storing them in a safe location.
Summary
Windows XP provides a number of extremely useful methods for recovering from the problems that
can result from your daily computer use. As long as you have taken a snapshot of your installation
using System Restore, and as long as you have backups of your most important data files, along with
installation media for Windows XP itself and for your most-used programs, you can recover your
system in a variety of ways. But even if you simply need to determine why Windows won’t start or
why you keep getting messages indicating low memory, you have ways to recover. Keeping these
methods in mind gives you a sense of peace, knowing that you can get your PC up and running
again even if the problem does happen — as it is wont to do — on a Sunday evening when all the
computer stores are closed.
Part II
Utilities
G iven the importance of guarding against data loss and system crashes, it makes sense to
explore this group of backup utilities immediately to ensure that your system is protected
against intrusion, viruses, spyware, and other unsavory malware. The products covered here help
you back up your data, back up your entire system, and turn back the clock to a previous version of
your system.
Windows XP itself contains utilities to handle two of these functions: Backup Utility handles data
back up, including backing up important system files. System Restore is a capable time-turner. As
with all other utilities, however, those included in Windows XP have fewer features than dedicated
products, so be sure to check out several of the following. Here, we’ve included information on some
of the more reputable data backup and ghost imaging products. Especially with the data backup
group, however, these are only a few of the many solutions available out there.
103
104 PC Magazine — Windows XP Solutions, 2nd Edition
NovaStor’s NovaBackup Professional (www.novastor.com) clocks in a bit high in price (about $80)
but offers support for a huge variety of media and is friendly to use. SimpleTech’s StorageSync (www.
simpletech.com) offers the best price of the bunch — the Standard edition is free — and gives you
all the features you need for regular backups. One of the most respected products for small busi-
nesses in this field is Dantz’s Retrospect Backup, designed for server backup as well as desktop
backup, and with an extremely strong focus on disaster recovery.
And what about online backup services? Well, they’re definitely out there. Xdrive (www.xdrive.
com), Iomega iStorage (www.iomega.com), @Backup (www.backup.com), and more. These services
synchronize with your hard drive and let you send your data to their servers, which store the data for
as long as you have your account. They’re a superb idea for backing up your most important files, but
they’re quite costly for large backups. Xdrive’s price of $5.95 per month for 5GB is the best I found.
That’s not bad, but if you took the $70 you’d spend in one year and doubled it, you’d get a far larger
internal or external hard drive. Still, the benefit of these services is that they keep your data in a highly
secure server environment that won’t be affected by your PC breaking, being stolen, or being caught in
a house fire, and for that reason you might certainly consider it.
For relatively small files, consider Yahoo! Briefcase (briefcase.yahoo.com), which gives you
100MB for absolutely zero dollars and which makes a superb choice for uploading files from your
home that you can later access at work. And it’s a pretty good secondary storage area to boot.
Connecting to
the Internet
C onquering the Internet begins with connecting consistently and reliably to the Internet in the
first place. Windows XP embraces the Internet in many ways, and you have numerous options
available to you for connecting, reconnecting, and improving and repairing connections.
This chapter covers a variety of Internet connections, demonstrating how to set up the three most
common types for residential use: dial-up, cable, and DSL. In addition, the chapter looks at the ben-
efits of using a router as well as the Windows XP feature of automatic connections.
Note
IP addresses are numeric. For example, the IP address for microsoft.com is 207.46.250.119. Each computer on
the Internet has its own IP number, although a local area network (LAN) can assume a single IP number and
parcel out data to other computers on the LAN, each of which has its own private IP number (this is the basis
of Dynamic Host Consideration Protocol (DHCP) networks, covered in this chapter). From the Internet’s per-
spective, however, only the public IP numbers exist, so the entire local area network (LAN) consists of only
one official address.
Dialup: The slowest connection, dialup uses a standard telephone modem and transmits
data through the same telephone cable bandwidth as telephone conversations themselves.
109
110 PC Magazine — Windows XP Solutions, 2nd Edition
Its primary selling feature has long been price, but cable and DSL connections have
recently decreased in price to the extent that unlimited dial-up access is now attractive
primarily to those who have no other access type available, rural users in particular.
Dialup remains of strong interest to anyone needing only a few hours of access each
month; in such cases, a limited-hours account is often less than $10 per month.
DSL: An abbreviation for digital subscriber line, DSL increases the speed over standard
modems by 10 times or more, although providers now offer slower DSL connections at
lower prices than full DSL. DSL is one of the two major forms of access (along with cable)
known as broadband or high-speed. DSL comes in several different forms (asymmetric
digital subscriber line (ADSL), High bit-tate Digital Subscriber Line (HDSL), and so on),
but when ordering Internet access, you won’t likely need to know the difference. Indeed,
you won’t likely have a choice because your telephone company (or a third-party company
that essentially sells the phone company’s DSL service) will typically have only one tech-
nology available. DSL’s great potential comes from the fact that it uses the same lines as the
telephone service that comes into your home, so your house needs no additional wiring.
Unlike dial-up access, however, DSL traffic uses a different portion of the connection and
does not interfere with voice traffic, so you can use the Internet and talk on the same
phone line simultaneously.
Note
DSL suffers a disadvantage in requiring filters to eliminate noise stemming from the differences between
data traffic and voice traffic, but because DSL providers typically include several filters in the package, that
disadvantage is small. The chief disadvantage of DSL lies in the overall topography of a DSL networking sys-
tem; to receive DSL service, your home or office must be physically located within a specific distance from
the closest endpoint, with the result that it’s entirely possible for your house not to have service, while your
neighbor’s house down the block does.
Cable: Because cable services already carry TV signals, it makes sense that they could
carry Internet data as well. By connecting a cable modem to your computer, you can
receive cable Internet at a speed similar to DSL, 10 times or greater than the speed of
dial-up service (but as with DSL connections, less expensive limited-speed cable accounts
are available). The benefit of cable is its widespread availability in urban areas, but its dis-
advantage is the reverse: outside of population centers, cable simply doesn’t exist. When
working at its peak, cable Internet tends to exceed DSL in speed, but many users report
that cable speeds slow down during times of peak television use in their immediate area
(Sunday evenings, for instance). Cable Internet providers continually argue against this
viewpoint, but the perception remains. Theoretically, cable connections also suffer from
Chapter 7: Connecting to the Internet 111
the standpoint of security because they do not shut down (you can set DSL connections to
time out after a specific period of inactivity) and because many users share a single cable
line instead of DSL’s standard of a separate line for each connection. This security point,
too, cable companies deny, and certainly the separation of user accounts through a single
cable has improved significantly since the advent of cable Internet. Cable is the other
major form of broadband or high-speed access (along with DSL).
Satellite: Many satellite television providers offer satellite-based Internet service as well.
They have succeeded in large part because of the geographical limitations of cable and
DSL: Satellites provide TV signals to nonurban areas, and they provide Internet service to
those same areas. Download speeds approach or match those of cable and DSL services,
but upload speeds tend to be slower because in many cases you upload through a dial-up
modem. Satellite connections tend to be considerably more expensive than DSL or cable
connections, but if you don’t have cable or DSL available where you live, your only other
choices are dialup or the emerging broadband wireless.
Wireless: Wireless connections take several forms. You can connect a wireless network to
your wired LAN at home or in the office, enabling mobile users to connect without cables.
The same principle holds for commercial establishments such as coffee shops and book-
stores offering wireless access for their customers. Popularly known as Wi-Fi (wireless
fidelity), these connections make use of networking technologies under the IEEE 802.1x
banner. 802.11b has been the standard, with the newer 802.11a offering higher speeds but
little compatibility with 802.11b. 802.11g offers the best of both. Another form of wireless
Internet connection is the cellular phone system, which lets you connect to the Internet in
a manner similar to dial-up modems without the cables. Cell access tends to be slow, but
because the tiny LCDs so far offer primarily text, speed is of much less concern than with
standard notebook and desktop PCs.
Broadband wireless: The emerging broadband wireless standard combines the best of
satellite Internet service with public Wi-Fi service. Targeted to nonurban areas, broadband
wireless works via a series of antennae that provide a high-speed wireless signal to which
users can connect. To become a force, broadband wireless must solve the twin bugaboos
of Wi-Fi technology: security and reliability. But the promise is significant.
T1 and higher: Larger organizations requiring bandwidth greater than standard DSL
access can turn to a number of technologies, ranging from the venerable but still suitable
T1 through T3, Dedicated Private T3 (DS3), OC3 up to OC48, and more. Prices range
from approximately $300 per month for a fractional T1 connection (a portion of a T1,
shared with other organizations or departments, for example) through approximately
$50,000 per month for an OC3 connection. Higher-speed OC connections run into
several hundred thousand dollars per month.
Table 7-1 shows the relative speeds and approximate prices of the various Internet connections.
All prices are approximate.
112 PC Magazine — Windows XP Solutions, 2nd Edition
This book explicitly covers only the first three types of Internet connections: dial-up, DSL, and
cable. Many of the principles of these Internet connections, though, apply to other types as well.
Still, if you work with an OC3 connection or above, you’ll have a professional, dedicated support
staff in charge of overall and local connections, in which case you’re not likely to get involved with
connecting your PC at all. They just won’t let you.
An interesting new type of connection is making its way into test markets as this book goes to
press. Broadband over Power Line (BPL) will make use of existing standard electrical wiring to
deliver broadband services to homes and businesses, especially useful in areas where DSL and cable
services are unavailable. It’s been possible for some years to use your home’s electrical wiring as a
means of sharing an Internet connection, but offering full broadband services over the electrical ser-
vices is of potentially strong value.
Your first step in connecting to the Internet consists of activating the TCP/IP protocol on your PC.
Fortunately, when you install Windows XP in the first place, you install and activate TCP/IP with it.
To confirm its activation, open My Network Places, click the View Network Connections option in
the Network Tasks pane, right-click the dial-up and/or LAN connection icon, and choose Properties.
On the General tab of the Properties dialog box, you should see a check box for Internet Protocol (IP).
By default, this box is checked.
Chapter 7: Connecting to the Internet 113
If not, click the Install button near the middle of the dialog box, highlight the Protocol item in the
resulting Select Network Component Type dialog box, click Add, and choose Internet Protocol.
Note
In Windows XP, unlike previous versions of Windows, the only reason you’d have to install TCP/IP manually
is if the original setup was a nonstandard installation.
1. If it’s not internal or already connected, connect the modem to your PC either by installing
it in an available slot on the motherboard inside the case (for an internal modem) or by
using the appropriate cable to connect the modem to the serial port or USB port on your
PC (for an external modem).
2. Open My Network Places, and choose View Network Connections in the Network
Tasks pane.
3. Click the Create a New Connection link in the Network Tasks pane of the Network
Connections window. The New Connection Wizard starts. Click Next.
114 PC Magazine — Windows XP Solutions, 2nd Edition
4. Select the Connect to the Internet radio button, and click Next.
5. Choose either Set Up My Connection Manually or Use the CD I Got from an ISP on the
Getting Ready window. This book assumes the former, a manual connection. Click Next.
6. Select the Connect Using a Dial-Up Modem radio button.
7. Type a name for your connection. You can use any name you’ll later find memorable.
8. Drawing on the information provided by your ISP, type the local phone number your ISP
has instructed you to use.
9. Again drawing on the ISP’s documentation, type the username and password your ISP
assigned to you. Determine if you want to use the account name you’ve just typed for
everyone who uses your PC to dial in to that ISP (families often use this kind of arrange-
ment), and if you want this connection to be the default Internet connection (see the
“Understanding Automatic Connections and How to Turn Them Off” section later in this
chapter). Finally, decide if you want the built-in Internet Connection Firewall provided
by Windows XP to be turned on automatically for this connection. The firewall increases
Internet security but tends to make some activities, particularly those related to video
cameras and audio transfer (such as talking over the Internet with other users) much
more difficult to configure.
Note
In increasingly rare cases, the username and password will have no effect if entered in the Internet Account
Information window. If your ISP instructs you to dial in first and then establish a terminal window in order to
enter the username and password, leave this window blank and refer to the “Dial-up connections through a
terminal window” sidebar.
1. Connect the DSL modem to the phone line using a standard telephone cord, and run an
Ethernet cable from the modem’s Ethernet jack to the Ethernet connection in your PC. If
you have a DSL modem with a USB connector, run a USB cable from the modem to a USB
port on your computer. Do not connect both the USB and Ethernet connections simultane-
ously unless your ISP specifically instructs you to do so.
2. Open My Network Places, and choose the View Network Connections item in the Network
Tasks pane.
3. Click Create a New Connection in the Network Tasks pane of the Network Connections
window. The New Connection Wizard starts. Click Next.
4. Select the Connect to the Internet radio button, and click Next.
5. Choose either Set Up My Connection Manually or Use the CD I Got from an ISP on the
Getting Ready window. This book assumes the former, a manual connection.
6. Select the radio button labeled Connect Using a Broadband Connection that Requires a
User Name and Password, and click Next.
7. Type a name for your connection. You can use any name you’ll remember later. Click Next.
116 PC Magazine — Windows XP Solutions, 2nd Edition
8. Drawing on the ISP’s documentation, type the username and password your ISP assigned
to you. Determine if you want to use the account name you’ve just typed for everyone who
uses your PC to dial in to that ISP (an arrangement often used by families) and if you want
this connection to be the default Internet connection (see the “Understanding Automatic
Connections and How to Turn Them Off” section later in this chapter). Finally, decide if
you want the Internet Connection Firewall that’s built into Windows XP automatically
turned on for this connection. The firewall increases Internet security but, as previously
mentioned, it tends to make some activities, particularly those related to video cameras
and audio transfer (such as talking over the Internet with other users), much more diffi-
cult to configure.
9. Click Finish to complete the procedure, and then double-click the icon you just created to
connect to your ISP.
Tip
Don’t toss away the documentation you received from your ISP. For whatever reasons, some ISPs assign
usernames and passwords that are extremely difficult to remember, and while you can often change the
password, you can rarely change the username. Write down the username in several places, and be sure to
keep the documentation so you’ll have it later if you need to set the connection up again. This is true of all
types of connections, but it seems especially true of DSL connections.
1. Connect the DSL modem to the phone line using a standard telephone cord, and run an
Ethernet cable from the modem’s Ethernet port to the DSL input jack on the DSL router.
Run a second Ethernet cable from one of the output ports on the router to the Ethernet
port on your PC.
2. Using your Web browser (or sometimes separately installed software), open the configura-
tion screen for your router. For browser-based configuration screens, this means typing an
IP number into the Address bar of the browser. A fairly typical URL for these settings is
192.168.0.1, but different routers require different numbers. Microsoft’s DSL router, for
example, uses 192.168.2.1. You can find this number in the manual that came with your
router. You can also find it in the support section of the manufacturer’s Web site, but the
Catch-22 here is the need for an Internet connection, which, of course, you don’t have yet.
Another good reason to have friends.
Chapter 7: Connecting to the Internet 117
3. Locate the section in the configuration screen that lets you configure the PPPoE (Point-
to-Point Protocol over Ethernet). It might also be more simply labeled DSL connection
settings or something similar. In the PPPoE settings fields, type the username and pass-
word that your ISP provided in the documentation.
4. The configuration screen also contains an area, usually close by, where you determine dis-
connection behavior. You can keep your PC connected at all times to your ISP, or you can
have the router automatically disconnect from the ISP at specified intervals. You can also
have the router automatically connect whenever you request Internet traffic, so that you
don’t have to reconnect manually, a feature that’s often called Connect on Demand.
Tip
Having your router automatically disconnect provides a useful level of security. When you’re disconnected,
nobody can hack into your machine. Even if you use the Connect on Demand feature, the router connects
only when it sees traffic coming from the PC, not from the outside.
Caution
As you’ve no doubt guessed, the fact that you don’t need a username/password combination with cable con-
nections renders these connections potentially insecure. You should use a firewall for any Internet connection,
but especially with a cable connection. If you do not, whenever you leave your PC on, it is fully connected to the
Internet, and hackers can have a field day. Indeed, they do . . .
118 PC Magazine — Windows XP Solutions, 2nd Edition
Proxy Servers
One of the connection settings that sometimes causes connection difficulties is the Proxy Server.
By enabling the Proxy server setting in Internet Options, you instruct Windows to look for a proxy
server when connecting to the Internet. Like a firewall, a proxy server sits between your PC and the
Internet, intercepting requests either to filter them — you can configure a proxy server to disallow
requests to specific Web sites, for example — or to answer the request (if possible) without sending
it through to the PC. While certainly no substitute for a firewall, proxy servers help with the overall
process of guarding your PC, and they perform one other significant function as well: for a specified
amount of time, proxies store frequently requested resources, such as Web pages, in order to speed
up subsequent downloads of those pages.
To enable the proxy server, open Internet Options from the Control Panel, click the Connections tab
and then the LAN Settings tab, and check the Automatically Detect Settings option. If your ISP runs
a proxy server (and the vast majority do), Windows attempts to locate that server, along with other
Internet settings, when you perform an action (such as clicking a hyperlink) that causes a resource
request. If you know the address for the proxy server attached to your LAN, fill in the details in the
Proxy server section of the dialog box.
The problem with enabling the proxy server setting is that often it slows things down, at least
during the first few resource requests. Sometimes in practice, indeed, Windows can’t seem to con-
nect to them at all, in which case you have no choice but to toggle the setting off until later. Still,
until you experience difficulties, by all means run your system through your proxy server.
Caution
Back up the registry before editing even a single character. The best way to do so is by opening Windows’
Backup Utility (found by clicking Start ➝ All Programs ➝ Accessories ➝ System Tools), and clicking the
Advanced Mode link on the wizard’s startup screen. From the resulting Welcome screen, click the Backup
Wizard icon, then the Next button. On the What to Back Up screen, choose Only Back Up the System State
Data. This choice backs up the registry, the boot files, the Windows system files, and more. Another highly
useful thing to do before editing the registry is to set a restore point using System Restore so that you can roll
back your entire system if something goes wrong.
Note
The instructions that follow enable you to experiment with under-the-hood settings for increasing your con-
nection speed. However, there’s a perfectly reasonable chance that you could try everything listed here and
experience no speed increase or indeed discover that you’ve actually decreased your speed. Even if you do
increase your speed, it’s often hard to tell, given the extremely uneven speeds experienced by Internet users
constantly. So have fun playing, but don’t expect magic.
You can tweak the registry in a variety of ways to get your connection to maximum speed. However,
the following list outlines the most typical settings. This list assumes that none of these registry keys
already exist on your system; look for them first and, if they’re already in place, edit them rather than
create them.
2. Right-click in the pane on the right and choose New ➝ DWORD Value.
3. Create a DWORD Value and give it the following name: TcpWindowSize. Double-click
the name and, in the Edit DWORD Value dialog box, choose Decimal and type 32767
in the Value Data field. If this seems to make no difference in speed, you can edit the
key and try each of the following values instead for TcpWindowSize: 93440, 186880,
and 256960.
4. Following the same procedure, create the following DWORD values shown in Table 7-2.
Chapter 7: Connecting to the Internet 121
Once you have your DWORD values in place, close Registry Editor and restart Windows. You can
test the speed of your connections using a variety of free tools on the Internet, including such sites as
www.broadbandreports.com. Figure 7-1 shows the results of a scan at this site, with the results spec-
ifying that the connection is in good order.
Figure 7-1: A speed testing site provides a useful service when tweaking your connection.
122 PC Magazine — Windows XP Solutions, 2nd Edition
Summary
Your Internet experience begins with your choice of Internet connection. If you select an inexpensive
dial-up connection, you’ll discover quite quickly that the majority of today’s Web sites are clearly
designed for faster connections, and the volume of email, particularly unsolicited spam, means long
downloads. For efficient use, broadband connections have become almost necessary, and Internet
content designers continue to push the limits of their bandwidth capabilities as well.
Chapter 8
W indows XP contains so many Internet features that simply knowing about all of them is a
challenge. In fact, until you start digging through the mountain of configuration dialogs
and setup menus, you’ll miss out on a huge array of possibilities. This chapter outlines many of the
possibilities, but a full description of all of them would require a book of its own.
Web browser
Email program
Media player
Instant messaging program
Virtual machine for Java
This utility is not necessary, strictly speaking. You have always been able to configure Windows to
use whatever programs you wanted as your default Internet programs. The problem was in what you
had to go through to make these changes happen — and getting the changes to stick after you made
them. To change defaults, you had to open numerous configuration dialogs, sometimes from within
the alternative programs themselves. Set Program Access and Defaults gives you this control from
one dialog box.
123
124 PC Magazine — Windows XP Solutions, 2nd Edition
The SPAD dialog box consists of three (possibly more if your computer manufacturer has configured
it differently) radio buttons, each of which, when selected, offers a distinctly different view. Figure 8-1
shows the expanded dialog box after the Microsoft Windows option has been clicked. Here, you see all
Internet programs set to their Microsoft defaults, with email the only exception. Because the PC used
for this figure contains both Outlook and Outlook Express, Microsoft lets you choose which one you
want to use as your default. But because Microsoft produces only one Web browser, one media player,
and one instant messaging program, you can’t increase the selections available in those categories. If
you have installed non-Microsoft products in these categories, they show up beneath the category title
against the Enable Access heading. This designation means that you can access all non-Microsoft prod-
ucts (and additional Microsoft products) from the Start menu and All Programs.
Changes start to happen when you click the other two radio button options. Choosing the Non-
Microsoft radio button reveals a similar interface to the Microsoft Windows radio button, but with a
few noticeably different features. First, for each non-Microsoft product installed on your system, you
can choose that product from the drop-down list that accompanies every category. If you install
Eudora, America Online, and Netscape Mail, for example, you can choose any of these from the
drop-down list as your default email program. Programs such as QuickTime, RealPlayer, and iTunes
appear in the Media Player drop-down list, and ICQ, AOL Messenger, and Yahoo Messenger all
appear in the Instant Messaging list.
Tip
The number of programs in the Non-Microsoft and the Custom lists changes as you install and uninstall pro-
grams on your PC. To choose non-Microsoft programs, you must install those programs on your system.
Windows will not install them for you, nor will it tell you how to do so.
Chapter 8: Putting the Internet to Work for You 125
The most interesting change — and the most obvious demonstration of Microsoft’s fulfilling the
DOJ demands — is the Remove Access line beneath the menu for each category. Here SPAD shows
you which Microsoft programs you can no longer access in the menus of your system. Choosing the
Non-Microsoft option not only tells Windows to use an alternative program as your default software
for that category (see Figure 8-2), it also tells Windows not to let you use the Microsoft counterpart
any longer. You can’t even select the Microsoft counterpart in the drop-down menus.
Note
Excluding the Microsoft counterparts is precisely how SPAD differs from the standard methods of choosing
default programs. With those methods, you choose the program either from the Programs tab of the Internet
utility in Microsoft Windows or from the configuration areas of the individual programs (or you reply Yes
when the program asks, upon launching, if you want to use it as the default for that purpose). In all those
cases, the Microsoft programs are still available. Here, they are not, at least not from the Start menu and All
Programs menu.
The final option, Custom, lets you mix and match Microsoft and non-Microsoft default programs
and also lets you determine which programs will continue to be accessible and which will not. As
Figure 8-3 shows, the Custom option shows each of the categories as a heading, with a radio button
and an Enable Access to This Program check box beside each Internet program installed on your sys-
tem. Click the radio button beside the program you want to use in each category, and check or uncheck
the boxes beside all the others, depending on whether or not you want them to be accessible. Happily,
you can’t set your chosen default program as inaccessible, although it would be fascinating to figure out
how to use the Internet if you could.
Your system might not display the SPAD choices precisely as outlined here. Much depends on the
computer manufacturer’s configuration as well as the programs installed on your PC.
Outlook Express, for example, offers security options in the form of virus protection, image block-
ing, and email encryption with digital signatures. It also offers the capability to check specific
accounts for messages automatically, to log server messages, and to set up accounts using the IMAP
protocol. Take a look at all the configuration menus of OE and IE as you work with them to get a
sense of how to personalize them for your specific uses.
Tip
Because you’re using Windows XP, you can separate email data among users much more completely by
assigning each user a separate Windows account rather than by creating separate identities in OE.
Windows automatically creates a separate set of folders for each account and a subfolder in that account’s
Documents and Settings folder. Logging on to the account provides access to the email data for that
account. Many people, though, like to use a single account for Windows, and this is where Identities comes
into play to separate one user’s email from another’s.
After you’ve set up your identities, you can switch to them whenever you want. Choosing File ➝
Switch Identities summons the Switch Identities dialog box, from which you choose the identity you
128 PC Magazine — Windows XP Solutions, 2nd Edition
want to work with, type in the password, and click OK. You can configure OE to start with a specific
identity by opening the Manage Identities dialog box (File ➝ Identities ➝ Manage Identities) and
choosing the identity from the drop-down box under the Use This Identity When Starting a Program
check box.
Windows stores the data for OE identities inside the Documents and Settings folder of the main
hard drive (typically the C: drive). To see these folders, open Windows Explorer or My Computer
and navigate to c:\Documents and Settings\username\Application Data\Identities. You need aware-
ness of these folders only to avoid losing email when reinstalling your system (see Appendix B) or to
get rid of data — such as newsgroup information — you don’t want on your hard drive (see the sec-
tion “Using OE for Newsgroups” later in this chapter).
1. With OE open, choose Tools ➝ Accounts to open the Internet Accounts dialog box.
2. Click the Add button followed by the Mail option.
3. In the first screen of the resulting Internet Connection Wizard, type the name you want to
appear on your Hotmail or MSN messages and click Next. Note that this is not your
Hotmail address itself, but rather whatever you want to appear in other people’s email pro-
grams beside the address. Your real name is fine if that’s what you want people to see.
4. In the Internet Email Address dialog box, type your full Hotmail or MSN email
address, complete with the hotmail.com or msn.com portion, and click Next. Example:
[email protected].
5. On the resulting Email Server Names screen, choose the HTTP option from the My incom-
ing mail server drop-down menu, and Hotmail or MSN from the My HTTP mail service
provider is drop-down menu. Click Next.
6. Type your Hotmail or MSN password on the Internet Mail Logon screen and verify that the
Hotmail address is correct. Click Next, click Finish, and then close the Accounts dialog box.
OE now asks if you want to download mail from the mail server you’ve just added. Click Yes. This
action causes OE to synchronize with the Hotmail or MSN account. Whenever you access this
account from within OE, synchronization occurs. You can manually synchronize the two accounts
by clicking the Hotmail or MSN entry on the Folders list at the left of the OE interface and clicking
the Synchronize Account button.
Chapter 8: Putting the Internet to Work for You 129
Send and receive messages at startup (General tab): Simply put, turn this one off. If
you don’t, every time OE starts it logs onto your mail server and downloads messages —
and (more significantly) if you have messages in your Outbox, it automatically sends them.
Sometimes you just don’t want that.
Check for new messages every xx minutes (General tab): If you want your messages
downloaded automatically, leave this option checked and specify the frequency by using
the Minutes drop-down box. You can also determine if you want your computer to con-
nect to the Internet automatically in order to do so, usually a consideration only for dial-
up users.
Make Default (General tab): If OE is not your default email program, clicking the Make
Default button will make it so. The default email program is the one that opens when you
click an email link on a Web page. You can also make OE the default when you open it; if
it is not the default program, a dialog box appears asking if you wish to make it the
default. However, that dialog also offers a check box to stop it from automatically appear-
ing, in which case the Make Default button is your only option from within OE itself.
Fonts (Read and Compose tabs): You’re not stuck with OE’s default fonts for either read-
ing or writing messages. At the bottom of the Read tab is a Fonts button; click it to choose
the font for messages that use proportional fonts, messages that use fixed-width fonts, and
the relative size of both (very small through very large). The Compose Font section of the
Compose tab lets you set the defaults for outgoing messages.
Receipts (Receipts tab): The Receipts tab lets you configure OE to request a receipt for all
your outgoing messages. Uncheck this option unless you have a need for annoying all your
contacts to distraction. More usefully, you can tell OE what to do when you receive a mes-
sage that requests a receipt. You can have it never send a receipt, inform you if there’s a
receipt request, and let you determine what to do on a message-by-message basis, or
always send a receipt except for mailing list messages. Generally, the best option is the sec-
ond one, which is also the default; receipts can be important, but too often they’re not.
Save copy of sent messages in the “Sent Items” folder (Send tab): This option auto-
matically saves a copy of all your outgoing messages. It’s useful for keeping track of your
correspondence, but it uses up disk space — especially since attachments are saved with
the messages. Still, saving them is a good idea, especially if you routinely visit the Sent
Items folder to delete what you no longer need.
130 PC Magazine — Windows XP Solutions, 2nd Edition
Send messages immediately (Send tab): Toggle this one off. If it’s on and you compose
a message and click the Send key, the message is gone, with no opportunity for you to
edit or delete it. With the option off, the messages are stored in the Outbox folder until
you click the Send and Receive button.
Empty messages from “Deleted Items” folder on exit (Maintenance tab): When you
delete a message in Outlook Express, you don’t actually delete it. Instead, it transfers to
the Deleted Items folder. You can automate the deletion process by checking this option;
from that point on, when you close OE, the deleted messages disappear. Unless you
know you’ll want to find items in that folder, and unless you have sufficient self-
discipline to empty your Deleted Items folder periodically, consider toggling this
feature on.
Store Folder (Maintenance tab): By default, Windows saves your OE messages deep
inside the Documents and Settings folder. Not only is it difficult to find, but it can get
deleted if you have to reinstall Windows. By clicking the Store Folder tab, you can
change the location where these messages are stored. One useful suggestion is to move
it to My Documents, perhaps in a subfolder called My Mail. That way, you’ll always be
able to find it.
Block images and other external content in HTML email (Security tab): Leave this
option checked if you want only the text of a message to appear when you read a message.
It’s a good option to use because external content can consist not only of pictures you
might not want to display on your screen but also malicious code. You can choose to
display the graphics on a message-by-message basis.
Get Digital ID (Security tab): Clicking this button takes you to the Microsoft Digital ID
Web area, from which you can move to sites that offer Digital ID certificates. Once you
have an ID, you can digitally sign your outgoing messages (one at a time or all automati-
cally), providing security that email otherwise does not have.
screen. Here, you type the name of the news server, as provided on the Web page you were visiting
(many software companies offer newsgroup forums, for example) or by your Internet service
provider. Virtually all ISPs offer newsgroup access, although most are selective about the newsgroups
they actually provide.
In many cases, especially with the newsgroups provided by ISPs, you need username and pass-
word authentication to access the groups. Still on the Internet News Server Name screen, check the
My News Server Requires Me to Log On check box, click Next, and provide the username and pass-
word combination on the resulting screen. Click Next, click Finish, and then close the Accounts dia-
log box to get started with the newsgroups.
Tip
To put this as mildly as possible, you would be unwise to post your real name and email address on some
newsgroups. In these cases, use a completely fake name and a completely fake address (the newsgroup
system doesn’t check for valid email addresses). If you have some newsgroups to which you want your name
posted legitimately and others to which you do not, create separate identities to hold each one, and give
them different properties.
OE starts the process by asking if you want to download newsgroups from the account you just
added. This process can take a bit of time because Usenet (the server system that contains the news-
group system) contains tens of thousands of newsgroups. In this stage, OE downloads the names of
the newsgroups, not the messages themselves, and lists them in a dialog box called Newsgroup
Subscriptions.
As Figure 8-4 shows, you can use this dialog box to subscribe to newsgroups. When you sub-
scribe to a newsgroup, OE keeps the name of that newsgroup in the Folders pane beneath the name
of the news account itself and continually monitors the group to determine if new messages are
available for reading. To see the newsgroups available, either scroll through the list or — this is much
more practical — type a keyword in the Display Newsgroups Which Contain: field and wait until the
list refreshes. To subscribe, highlight one or more lists (hold the Ctrl or Shift key while selecting
newsgroups to include multiple groups) and click the Subscribe button. Once you’ve completed the
subscription request, the newsgroup name appears in the Folders list at the left and the message
headings appear in the main window. Click on any heading to read the message.
Tip
You don’t have to subscribe to a newsgroup. Instead, you can read the current messages to see if you’re
interested. To do so, highlight the newsgroup you want to examine and click the Go To button. When you exit
OE, the newsgroup disappears from the list. This is a very good way to examine newsgroups without anybody
knowing you’ve been examining them — which you may want to be the case with some of the, oh, less uni-
versally accepted topics that Usenet contains.
132 PC Magazine — Windows XP Solutions, 2nd Edition
Here are a few things you can do with OE’s news client:
With your newsgroups active, right-click on messages and group names to explore the
options available to you.
Ignore complete threads (conversations) or mark them to follow their progress.
Mark all messages as read by right-clicking the newsgroup name and choosing Catch Up.
Combine messages in order to decode attachments.
Reply either to the initial sender of a message or to the entire group.
Note
In virtually all cases, the old Internet commands and protocols bore names in lowercase text only. FTP is
really ftp, Telnet is really telnet, and so on. In some cases this book uses uppercase characters to make read-
ing much clearer, all the while recognizing and even revering the spelling of the original names. At least
nobody used today’s ubiquitous internal uppercase (camel case) system, such as PowerPoint, SystemWorks,
and iTunes, with capitalization designed to stymie anybody’s attempt to get it right. But enough ranting.
134 PC Magazine — Windows XP Solutions, 2nd Edition
Here are some of the command-line utilities you can access in Windows XP:
telnet: Long the most common method of logging into a remote account, Telnet lets
you access a Unix or Linux account on another machine. To start a Telnet session, click
Start and choose Run; in the Open field, type telnet and either the name or IP number
of the server and press Enter. For example, telnet dragon.uwaterloo.edu connects you
to the server named dragon.uwaterloo.edu and opens a command box with a username
prompt. Type your username, press Enter, and type your password and press Enter. You
can now proceed to work inside your remote account from there. Telnet has several more
secure versions, most popularly SSH, but these are not built into Windows.
ftp: Still the fastest downloading and uploading system available, FTP (File Transfer
Protocol) is now built into Web browsers. You can access an FTP site by typing
ftp://server.name/ (replacing server.name with the real Internet name, of course) into
the address bar of a browser and pressing Enter. If the server requires a username and
password, the command will be ftp://[email protected]. The latter option results
in a dialog box asking for your password, after which you enter the FTP site and treat
the browser window as if it were any other My Computer window. You can still access
FTP sites the original way, by choosing Start ➝ Run, typing ftp, and pressing Enter.
In the resulting command box, type open server.name and wait for the User prompt.
Once in the account, you work with the files using the standard Unix-based FTP
commands.
ping: The ping utility lets you see if a resource is online. Actually, it lets you see if it’s
online and accepting ping requests (many addresses no longer do). But even here ping
can be useful because it shows you the IP number of the Internet address you’re trying to
reach. Open a command box (click Start, choose Run, type cmd, and press Enter), type
ping server.name, and press Enter. The first line of the response shows the name of the
server as you typed it, as well as the four-part IP number of that resource. For example,
ping microsoft.com results in
Pinging microsoft.com [207.46.245.214] with 32 bytes of data
Summary
In addition to the Internet programs discussed in this chapter, you can, of course, download an
enormous amount of additional Internet software for Windows from the Internet, including email
programs, Web browsers, FTP clients, network-monitoring utilities, news readers, chat and messag-
ing programs, search software, games galore, and much more. Indeed, if you’re the type of user who
feels that you can’t ever have enough software, working with Internet packages will make you
extremely happy.
Chapter 9
Tailoring Internet
Explorer 6
W hen you install Windows XP, you also install Internet Explorer (IE) version 6 —
Microsoft’s long-controversial Web browser. And despite the trend of a great many users
toward alternative browsers, especially Mozilla’s Firefox, IE 6 works well. Indeed, it remains the only
browser capable of accessing all the features on virtually all Web sites out there, although certainly
Firefox is closing the gap. As for which browser you should use for your daily browsing, well, that’s
not a difficult question to answer. Why not just use them both? They’re both free, they both have
their positives and negatives, and it looks pretty promising that they’re both here to stay.
Still, this chapter isn’t about reviewing Web browsers. Instead, it’s about tailoring the one you
automatically get with Windows XP — Internet Explorer 6. And, to be sure, it works just fine straight
out of the box. As long as you’ve established your Internet connection, you need only launch IE to
start navigating the World Wide Web. But like pretty well everything else in Windows, you can tai-
lor IE to suit your particular style of Web use, emphasizing the browser’s strengths and avoiding pos-
sible pitfalls.
Indeed, IE comes with almost as extensive a set of configuration options as Windows XP itself.
Strictly speaking, IE is not part of Windows, and you can use the Set Program Access and Defaults
utility to render it (almost) inaccessible if you wish. But most users have IE installed on their sys-
tems, even if they use another Web browser in its place. For many Web designers, moreover, IE has
become the de facto standard, even if — as many critics have pointed out — IE itself strays from the
standards set by organizations such as the World Wide Web Consortium (W3C). It makes sense to
configure it to suit your needs precisely.
This chapter covers some of the most important configuration options available in Internet
Explorer, focusing especially on security and program associations.
And what’s the big deal about blocking popups? First of all, they’re annoying. They not only inter-
rupt what you’re doing by simply appearing (seemingly) out of nowhere, they also slow down your
browser considerably. Furthermore, if they originate on slow servers, they slow you down even more
as they load their multimedia files (most popups are multimedia-heavy). Finally, they consume some
of your system’s memory, especially those (truly annoying) popups that load behind the windows on
your desktop. You don’t even know they’re there, but they continue to take up memory. If you use
your desktop for designing graphics, video, or sound, they can slow Windows down dramatically.
And what happens if you use SP2’s pop-up blocker with other pop-up blockers? Certainly there’s
no lack of pop-up blockers out there, some of which are free. The Google and Yahoo! toolbars
include pop-up blockers, for instance, as does the software available from numerous ISPs. One of
the questions I’ve been asked repeatedly is whether it’s okay to run two or more pop-up blockers
simultaneously.
The answer is . . . sure. Whatever popup one of them misses might very well be taken care of by
one of the others. The only problem is that each blocker takes up a small portion of memory, so each
can slow down your system slightly while it does its work; but this will rarely be a problem.
The details behind the use and configuration of SP2’s pop-up blocker are covered in Chapter 1.
This chapter is designed to cover IE’s built-in configuration possibilities.
Controlling Cookies
Cookies are small files placed on your hard drive as a result of visiting a Web site. In the vast major-
ity of cases, they are not only harmless but actually helpful; they customize your Web experience so
that you can retain specific settings for specific Web sites. For example, the shopping cart of your
favorite bookseller or electronics store is cookie-based, allowing you to place items in the shopping
cart, leave the site and even turn off your PC, and come back to the site with the items still in the
cart. But despite their relatively benign nature, many people distrust them, so IE lets you control
them. Keep in mind, however, that if you delete or disable cookies, you might very well have to reen-
ter information when you return to a site. Cookie removal can be a double-edged sword.
To manage cookies, open the Internet Options dialog box by choosing Tools ➝ Internet Options.
Click the Privacy tab to reveal the current cookie settings. As you move the slider, the setting
changes, as does the accompanying explanatory text. At the one extreme, IE blocks all cookies from
all Web sites and, furthermore, blocks all sites from reading cookies already stored on your hard
drive (until you readjust the privacy setting). At the other extreme, IE accepts all cookies and all
requests for existing cookie data.
Chapter 9: Tailoring Internet Explorer 6 139
Except for these two extremes, you can change cookie settings for individual sites. Click the Edit
button near the bottom of the Privacy tab, type in the URL of the site, and click Block or Allow.
These per-site settings are especially useful when you use the High setting, thereby blocking most
cookies. When you encounter a site whose cookie you need in order to move further into the site,
you can manually allow it by editing the per-site privacy.
No matter how you configure the Privacy settings, you can erase all cookies from your hard drive
whenever you wish. Choose the General tab of the Internet Options dialog box and click the Delete
Cookies button. When you do so, IE asks if you wish to delete all cookies in the Temporary Internet
Files folder; but this question is somewhat misleading. IE stores cookies in the Cookies subfolder of
each user folder within Documents and Settings, whereas pointers to these cookies are stored in the
Temporary Internet Files folder (inside the Local Settings folder within each user account folder),
because are cookies applicable to your current IE session (these are called session cookies; those in
the Cookies folder are called persistent cookies). Using the Delete Cookies button gets rid of the
cookies in both folders; clicking the Delete Files button deletes only the cookie information in the
Temporary Internet Files folder, leaving the actual persistent cookies intact.
Tip
If you adjust the Privacy setting to a lower setting in order to receive cookies from which IE has restricted
you, check to see if you have third-party privacy software, such as a firewall, running on your computer.
Firewall utilities such as Zone Labs’ ZoneAlarm provide an additional level of security against cookies, and in
some cases, you have to shut down this software to receive a cookie. This behavior can occur even if you
temporarily disable the cookie settings on the third-party utility, so the best idea is to close the firewall com-
pletely for a short period of time.
Controlling History
The Internet Options dialog box provides control over other areas of privacy as well. One such area
is the History list, a set of URLs maintained by IE and displayed when you click the History button
on the toolbar. The History list is especially useful when you click the History button in the IE tool-
bar; all the site names and corresponding URLs appear in the History pane to the left of IE, segre-
gated by date visited, and you can return to any of them by expanding the folder for the specific day
on which you visited the site and clicking on the site name.
However, the History feature also leaves a trail of URLs that anyone can follow, letting any curious
user know your browsing activities. To clear this list, go to the General tab, and click the Clear
History button. To stop IE from maintaining the list in the first place, use the drop-down menu
beside the Days to Keep Pages in History heading to set the number of days to 0.
when you revisit a Web page, the page doesn’t have to be downloaded again but can be loaded much
more quickly from the hard drive. By default, IE sets aside many megabytes of disk space for this
function (the actual amount depends on the size of your drive), but you can reduce the size of or
even eliminate the cache. To change the default size, click the Settings button in the Temporary
Internet Files section of the General tab. Use the slider or the drop-down menu to decrease the
amount of cache space to its lowest setting or, to be completely safe from prying eyes, to zero. But
because the cache really does save download time — even with high-speed connections — you
should give yourself 25MB or so to work with. If you’re concerned about other users examining your
IE cache, however, set a reminder for yourself to delete the cache every day or at least once every few
days by clicking the Delete Files button in the Temporary Internet Files section of the General tab.
Controlling AutoComplete
Convenience also works against both activity tracking and security with the AutoComplete feature.
This feature works with IE’s Address bar and with Web-based forms, saving you time and typing by
filling in the fields for you (that is, automatically completing them, hence the name). It derives its
information from a store of URLs, usernames, and passwords; as you type, it performs pattern
matching against this store to come up with possible completions. Whenever you type a URL in the
Address field, you add to this store. Whenever you reply Yes to IE’s asking you if you want to save the
username and password for a Web form, you also add to this store. After that, when you type part of
the name in the Address field or select a username in a form field, IE completes the URL or, in the
case of the form, fills in the password field as well.
Caution
This is obviously extremely convenient, but it also means that anyone who uses IE to surf to that site will have
access to your password as well!
To change the AutoComplete settings, click the Content tab on the Internet Options dialog. Now
click the AutoComplete button. The resulting AutoComplete Settings dialog box offers several
adjustments:
Web addresses: By unchecking the Web addresses item, you tell IE to stop filling in the
URL in the Address bar as you type. Note that clearing this box does not stop IE from stor-
ing addresses you visit and from offering them on the Address bar’s drop-down menu; you
must delete the browser history (on the General tab) to do so. But anyone using your
browser will no longer have the address filled in automatically.
Forms: Unchecking the Forms item tells IE to stop listing possible entries in a field on
a Web form. For example, if you’ve typed your postal code in a form with this option
checked, the next time you begin to type it, AutoComplete suggests a completion. Clearing
this button stops that behavior.
Chapter 9: Tailoring Internet Explorer 6 141
Username and passwords on forms: Here is a major privacy and security concern, with
dangers firmly related to identity theft. It’s extremely convenient to have IE save the user-
names and passwords you enter in Web forms, especially if these identifiers are unusual
(for example, a partially numeric username or a password you did not choose yourself).
But when you store these items on your hard drive, you open yourself to theft, either
directly from the hard drive (in the case of online intruders) or by someone logging in to
your account and using IE to call up the URLs to which those username/password combi-
nations belong. Clearing this check box stops IE from giving you a list of usernames and
from filling in the passwords for those usernames.
Clear Forms and Clear Passwords: These two buttons clear IE’s store of forms informa-
tion and passwords. For obvious reasons, clicking these buttons every so often helps your
security efforts. But it also means that you won’t automatically access some Web sites that
require usernames and passwords, including newspaper sites, blog sites, and discussion
sites. Once cleared, you must reenter the information for these sites.
You can assign specific sites to specific zones in order to control them. As you use IE to navigate
the Web or other online resources, IE checks each URL or resource against your security zone set-
tings. When a site meets the criteria you’ve established for these settings, IE displays it according to
the behavior you’ve set for those criteria and displays the site’s zone in the far-right portion of the
browser’s status bar. The four zones are as follows:
Internet (Default: Medium): Everything else. If a Web site does not meet the Local
Intranet, Trusted Sites, or Restricted Sites criteria, IE treats it as an Internet site.
Local intranet (Default: Medium-Low): This zone includes resources for which security
is relatively unimportant, typically those accessed only through your local network. Your
company’s intranet represents the primary focus of this zone, but it can also include other
network connections. Clicking the Sites button lets you choose which resources to include.
Tip
You can configure IE to bypass the proxy server — a server operated by your ISP that stands between the
Internet and your PC — at all times via the LAN Settings button on the Connections tab. Doing so does not
stop IE from distinguishing between intranet and other zones. It’s a good thing, too, because many users rou-
tinely disable proxy servers because of their tendency to bog down connectivity.
Trusted sites (Default: Low): As you come to trust specific sites, click the Trusted Sites
icon and then the Sites button to add those sites manually to this zone. If you become
extremely concerned about security, you can set your Trusted Sites zone to Low security
and all others to High security, thereby assuring yourself that only the sites in your Trusted
zone will be able to do anything besides present the page for viewing. (You could, for
example, enable sites in your Trusted zone to run scripts.) You can feel safe downloading
files or allowing cookies from your trusted sites, and you need not feel concerned about
what these sites are attempting to do.
Restricted sites (Default: High): This zone represents the opposite of the Trusted zone.
Add URLs to this zone (via the Sites button) when you know you don’t want to allow them
to do anything but display content.
The whole point of assigning resources to zones is to allow you to control the behavior of each zone.
IE assigns a default security level to each zone (as shown in parentheses in the preceding list) and
displays the features of that level in the dialog box when you click the icon for each zone. For exam-
ple, in Medium setting (the default for the Internet zone), IE does not download unsigned ActiveX
controls but prompts you when it encounters signed ActiveX controls. In Medium-Low, IE does not
download the controls but also does not prompt for signed controls. In the High setting, it disables
all ActiveX controls, signed or not.
Chapter 9: Tailoring Internet Explorer 6 143
To customize the behavior of the security zones, click the Security zone’s icon and then the Custom
Level button. Figure 9-2 shows the file download portion of the resulting Security Settings dialog
box in its default configuration for the High setting. Nearly everything is disabled. Scroll through the
settings and change those you want more or less restricted. In most cases, however, you’ll find that the
preconfigured settings — Low through High — will provide you with all the detail you need. The real
trick in using IE’s security zones is to keep adding URLs to the Trusted and Restricted zones and gain-
ing control as a result.
Figure 9-2: Forget about downloading files with the security setting on High.
Tip
Double-click the globe or the word Internet in the lower-right side of the status bar for quick access to the
zones.
You have two mechanisms for setting file associations: IE’s Programs tab and the File Types tab in
Windows XP’s Folder Options. We cover both here because changing them comes into play most
readily when launching these files from Internet hyperlinks rather than from standard programs.
HTML editor (responds to IE’s Edit command and the Edit toolbar button): While
viewing a Web page in IE, you can load that page into your favorite Web-creation program
for editing. To do so, either click the Edit button (which appears if you have installed
particular Microsoft programs) on IE’s standard toolbar or choose File ➝ Edit. When you
choose File ➝ Edit, you see the full name of the default HTML editor on the Edit com-
mand. Clicking the toolbar button activates the icon for that same default HTML editor
(as long as your default editor is a Microsoft program). Next to the button, IE includes a
drop-down list for other installed HTML editors, letting you choose from among them
on the fly. But you can set the default program — thereby including its name on the File
menu — by selecting it from the drop-down list under the Programs tab. You have to
restart IE for this change to take effect.
E-mail (responds to email mailto:// hyperlinks): When you click an email mailto://
hyperlink on a Web page, IE opens the selected program. The menu lists all email pro-
grams installed on your PC, including those built into AOL, Netscape, Mozilla, and other
multipurpose applications.
Newsgroups (responds to newsgroup news:// hyperlinks): When you click a news-
group news:// hyperlink on a Web page, IE opens the selected program. Unfortunately,
the menu does not include all capable newsgroup programs. AOL, Netscape, and Mozilla
do not automatically appear.
Internet call (responds to callto:// hyperlink): IE loads the selected collaboration
program when you click a callto:// hyperlink. Only Microsoft NetMeeting is fully
supported.
You can also set default programs for calendar and contact functions; but in both cases, IE
responds only to Microsoft Outlook.
functions. From here, you decide which program to open when, for example, you double-click a
JPG, .Doc, .Wav, or other file type, which program launches when you click a PDF or an MP3 hyper-
link, and which icon is displayed for a .Zip or TIFF file.
To change or add a file association, go to My Computer or Windows Explorer and choose Tools ➝
Folder Options. Or click the Start menu and choose Settings ➝ Control Panel ➝ Folder Options.
Then in the Folder Options dialog box, click the File Types tab to see the current associations. As
Figure 9-3 shows, the file extensions appear in the left column of the Registered File Types window
of the dialog box, with the associated file type in the column immediately to the right. Below that
window, in the extension details area, the dialog box shows the program currently configured to
open that type of file. You can change the associated program by clicking the Change button (or the
Advanced button if Change is grayed out) and locating the program of your choice in the resulting
Open With folder. If you don’t see the program here, click Browse and find the .exe file for the pro-
gram on your hard drive. Usually, you can find these files in the subfolder named for that program
within the Program Files folder on your main XP drive.
You can change the programs for Internet activities directly from this dialog box instead of using
the Internet Options dialog box in Internet Explorer. Scroll down the list until you see the group of
file types beginning with (NONE) followed by URL (these are near the top of the list); each has a sep-
arate program associated with that protocol when encountered in a Web browser. To configure the
browser’s associated email program, for example, click the URL: Mailto Protocol item and then click
the Advanced tab. In the Actions window, click the Open action and then the Edit button. The
resulting dialog box shows the path for the associated program in the Application Used to Perform
Action field. To effect a change, click the Browse button, navigate to the .exe file of the program you
want in its place, and click Open. Click OK to set the new application in place. You can repeat this
action for each Internet activity, including several not listed on the IE Programs tab, such as Gopher
and Telnet links. If a specific URL is not listed among the file types, you can add it by clicking the
146 PC Magazine — Windows XP Solutions, 2nd Edition
New button, then clicking the Advanced tab on the resulting Create New Extension dialog box, and
locating the specific URL in the Associated File Type drop-down box (these are in the U’s, near the
bottom of the list).
While you’re at it, you might as well tailor the file associations even further, giving you even more
options when dealing with specific file types, albeit not in Internet Explorer. Specifically, for each file
type, you can tailor the context menu that appears when you right-click on a file of that type in a
Windows XP folder. For example, if you have more than one graphics program (as most people do),
you can give yourself a choice in the context menu of opening the file with any of them.
To do this, locate and click the JPG extension (as an example) in the Registered File Types window
under the Folder Options File Types tab. Click the Advanced tab and then, in the resulting Edit File
Type dialog box, click the New button. Type a name for the action, something like Open with
Photoshop, in the Action field, and click the Browse button to locate the .exe file for that program.
Now when you right-click a JPG file icon, you see two items for launching the file inside a program:
Open (which opens the default graphics program) and Open with Photoshop. You can add as many
of these as you wish for each file type.
Caution
If you make a mistake while changing the default program for Open, you may do yourself more harm than
good by possibly attempting to launch a program incapable of opening that specific file type or choosing a
program that no longer functions on your PC. To get around the problem, instead of using the Change button
to select a new default program, use the Advanced button to add a new program capable of opening that file
type, set it as the default (press the Set Default button), and then, if it doesn’t work properly, return to the
Advanced dialog box to reset the default to the original program.
Summary
Internet Explorer currently remains the most popular Web browser of all, but you have choices if
you want them. The venerable Netscape browser still exists, as does the more experimental client on
which it is based, Mozilla. Opera is yet another choice. In the future, the once-fascinating browser
wars could resurface, with Microsoft no longer offering IE as a separately available download (it will
still ship only with Windows itself). So, it makes sense to give others a try now, in part because they
make your Internet experience different and a bit fresher.
Chapter 10 completes your look at the built-in Internet technologies of Windows XP by examin-
ing the two remote control features, Remote Desktop and Remote Assistance.
Chapter 10
Controlling Windows
from Afar
W indows XP ships with two features designed for remotely controlling one computer from
another. Both allow you to take control over another computer on the network (LAN or
Internet), but they differ in their purpose and their capabilities. Remote Desktop gives you the capa-
bility to work on a remote PC as if it were the machine in front of you. Remote Assistance lets you do
the same thing but expands on this notion by including interaction with the user of the remote
machine. Remote Assistance lets one user help another from a distance with troubleshooting or
training by offering a variety of interactivity options, whereas Remote Desktop is a simple remote
control feature, dispensing with interactivity entirely.
Of these two features, only Remote Assistance is actually new. Windows NT 4.0 and Windows 2000
already allowed remote control of a networked computer, albeit not as easily, through the separately
installable Terminal Services feature (indeed, both remote features are Terminal Services applications).
The two features have different requirements. For Remote Assistance, both computers must be running
Windows XP Professional; by comparison, Remote Desktop must be initiated by a computer running
Windows XP Professional, but the remote PC simply needs the Remote Desktop client software
installed atop Windows 95 or later. You can install the Remote Desktop client from the Windows XP
installation CD or by downloading the client from the Microsoft Web site at www.microsoft.com/
windowsxp/pro/downloads/rdclientdl.asp.
This chapter compares the features of Remote Desktop and Remote Assistance, outlines how to
get these features up and running, and describes how to use them to their best advantage. Both,
unquestionably, are highly useful features.
Of course, in the latter scenario you could just walk to the study and do what needs doing, but in
many cases that would be inefficient; in other cases, you actually want two machines at your disposal
rather than just one, especially in the case of testing different configurations or different types of soft-
ware. In both scenarios, you might very well find that using Remote Desktop is easier and more
consistently reliable than the Windows networking features — even for simple tasks such as trading
files.
Microsoft offers two versions of Remote Desktop: the standard version and the Web Connection
version. With the standard version, you can use any version of Windows (Windows 3.1 or later, that
is) to connect to and take control of a PC running Windows XP Professional (not the Home version).
The Web Connection version gives you the same features, but you control the host machine (i.e., the
machine running Windows XP Professional) through Internet Explorer by way of an ActiveX con-
trol, instead of through the separate Remote Desktop client program. Windows XP Professional can
host a Remote Desktop Web Connection, but so can Windows 2000 and Windows NT 4. The Internet
Information Services (IIS) Web server software version 4 or higher must be running on the host PC
for the client PC to connect.
Note that the host computer is simply the PC running Windows XP Professional; the controlling
computer is the one from which you connect to the host.
Note
In this chapter, we look at the standard version of Remote Desktop only because this book is about Windows
XP and we can assume a Windows XP host. In addition, experience with both has shown that the standard
version operates somewhat more speedily than the Web Connection version — even across precisely the
same broadband connection. Furthermore, many users have their PCs configured to deny ActiveX controls,
a configuration that renders the Web Connection version unworkable. But this is not to deny the conve-
nience of an IE-based Remote Desktop or its importance as a remote control program for PCs running
Windows NT 4 or Windows 2000.
work with Remote Desktop as soon as you’ve enabled the feature from the Remote tab of System
Properties. If you wish, however, you can further restrict access by clicking the Select Remote Users
button and choosing the specific user accounts that may use Remote Desktop to access the PC. For
example, if you share your remote PC with multiple users, but you want only yourself and one other
user to be allowed access from home, you can configure the feature to accept only these two users.
In all cases, however, all users belonging to the Administrators group have access as soon as you
enable the feature.
Now that you’ve configured the host PC to accept Remote Desktop connections, leave that com-
puter powered on, move (physically) to your other PC — this will be the client PC — and fire it up. On
the client PC, click the Start button and choose All Programs ➝ Accessories ➝ Communications ➝
Remote Desktop Connection (you’d almost think Microsoft doesn’t want you to find this, wouldn’t
you?). Alternatively, you can press Winlogo+R and type mstsc. In the resulting Remote Desktop
Connection dialog box, type the network name of the computer (its IP number, its name on the local
network, or its URL), and click the Connect button. Windows XP connects to the host PC, opens a sep-
arate window on your local client PC, and displays the host PC inside that window, beginning with the
Log On dialog box. Note that it displays the Log On dialog box even if you have the host PC configured
to use the Windows XP Welcome screen.
Tip
If you have the host PC configured to AutoHide the Taskbar, you’ll find Remote Desktop easier to use if you
unselect that option, allowing the Taskbar to be fully visible at all times. Otherwise, accessing the Taskbar
can prove both slow and cumbersome.
To save time with your connection and to configure the connection for other purposes, you can cus-
tomize the Remote Desktop Connection dialog box. Launch Remote Desktop, and click the Options
button in the dialog box. On the General tab, type your username and password (for the remote
machine, not the local machine) and, if applicable, the host’s domain. Click the Display tab, and choose
the desktop size and color quality for the remote display, keeping in mind that the larger and more
colorful the display, the slower the response. You can adjust this response further by clicking the
Experience tab and telling which of the following items you want to allow or disallow:
Desktop background: If you don’t need the background, leave this option turned off.
Show contents of window while dragging: When you drag a window, Windows con-
tinually redraws the screen to display the contents. Turning this feature off (the default
setting) stops the local machine from having to constantly download the redrawn
screen.
Menu and window animation: Again, Windows continually redraws the screen with
these features, so leave them off.
Themes: The fewer the graphics, the faster the connection, but if you get rid of themes,
you also change the way your remote machine looks and feels to you.
Bitmap caching: Toggled on by default, this feature saves images on the remote
machine to your local hard drive so that they are displayed without downloading the
next time they appear on the host.
From this dialog box, you can also choose your connection speed, but all this does is reset the
options. Leave it at modem speed for optimal performance.
You can adjust two other important features. On the Programs tab, you can configure a program
to load automatically when you connect to the remote PC — an option of particular use if you always
load the same program (such as your word processor, spreadsheet program, or Web design tool)
every time you access the host. On the Local Resources tab, you can choose whether you want to
hear the remote PC’s sounds on your local system (useful if you rely on sounds for your interface fea-
tures), as well as whether the Windows keyboard combinations operate on the local machine or the
host machine. Finally, and most important, you can configure Remote Desktop to provide access to
the disk drives, printers, and serial ports of your local PC. This way, you can save data from a remote
program to your local PC, print documents locally, and use serial port–based devices. Figure 10-2
shows this tab.
Chapter 10: Controlling Windows from Afar 151
To save yourself from setting all these options again, click the General tab, click the Save As but-
ton, and save your configuration to a file.
Tip
If you use the TweakUI Desktop Manager utility, you can even set up individual desktops, each with its own
Remote Desktop window, and switch back and forth to control your various PCs (see Chapter 18 for more
information about TweakUI).
Internet and fix technical problems, demonstrate how to use programs, or simply observe the user’s
actions to help him or her become more proficient.
Interactivity and permission lie at the core of Remote Assistance. A typical session begins with the
Novice requesting remote assistance, at which point the Expert can accept or decline. If the Expert
accepts, the Novice receives a message asking if it’s okay for the Expert to connect to the computer
for the purpose of viewing the screen and chatting. If either party decides to send the other a file or
to invoke voice communication over the network, the other party is presented with a dialog box to
grant or deny permission. Similarly, the Novice must grant permission if the Expert wishes to take
control of the Novice PC and can terminate the remote control by simply clicking the Stop Control
icon in the RA window. At any time, either party can disconnect the session without permission from
the other.
Figure 10-5: Using the Help and Support Center to request assistance.
These separate IP numbers are necessary so that each PC sharing a single cable or DSL account can
be treated as a unique host. NAT combines with Dynamic Host Configuration Protocol (DHCP) to
route the responses to Web, email, FTP, and all other communication responses to the PC that made
the request to preserve the illusion in each case of an independent connection to the Net (otherwise,
specific routing would be impossible).
Note
Windows XP Service Pack 2 (SP2) has modified the built-in firewall significantly, but the procedure to open spe-
cific ports remains similar to that described in the following steps. You have greater flexibility in port modifica-
tion with SP2, and indeed upon installation SP2 clears up a number of earlier problems with these connections.
But if you cannot connect after installing SP2, or if you’re still running SP1, open the firewall properties available
from the Control Panel and adjust accordingly, or turn the firewall off.
To use Remote Desktop or Remote Assistance through a firewall, you must open port 3389 on
your host machine. All activities for these two features happen through that port. If you use the
built-in Windows XP firewall to protect your host PC, open the port by following these steps:
1. Open the My Network Places folder. (Alternatively, you can use Winlogo+R, control fire-
wall.cpl to skip the first four steps.)
2. Click the View Network Connections link in the panel on the left. (If you don’t see the
link, click the Folders button to show the task pane.)
3. Right-click the icon representing your Internet connection, and choose Properties.
4. Click the Advanced tab of the resulting Properties dialog box, and then click the Settings
button.
5. Click the Exceptions tab, and in the Programs and Services section (see Figure 10-6),
check the Remote Desktop item.
6. Click OK until you’ve dismissed all the dialog boxes.
This sequence opens port 3389 in the Windows XP firewall (although it doesn’t actually say that
it does so). If you use this firewall in conjunction with another firewall, either hardware or software,
you must open all 3389 ports. However, that port need not be open on your client machine, only on
the machine you want to control remotely (that is, the host).
Neither remote feature functions if both the Expert and the Novice computers are operating behind
a NAT device. Quite simply, it cannot make the connection. If the Novice connects through a NAT
device, however, and the Expert has a direct connection (that is, a non-local IP address), the connection
can be made and Remote Assistance can continue. This is true whether the TCP/IP configuration on the
Expert computer specifies a fixed IP number or, as is the case of many cable and DSL connections,
allows the ISP’s DHCP server to assign that IP. As long as the Expert PC is identified by a non-local IP
Chapter 10: Controlling Windows from Afar 157
number, the Remote Assistance link can usually be made (ISP proxies and local firewalls can block
this). To determine the current IP address of your Windows XP machine, open a command prompt by
clicking Start and choosing Run (or use Winlogo+R), typing command or cmd in the box, and press-
ing Enter. Then type ipconfig at the prompt and press Enter once more. You’ll see your IP address in
the resulting Ethernet adapter information. If that address begins with 192.168., your PC has been
assigned a local IP by a NAT device and will not be able to act as the Expert machine. You can, how-
ever, still be the Novice.
Another option for getting the connection to work is editing the RAInvitation.msrcincident file
sent from the Novice PC via email or as a separate file. The file consists of XML code that you can
edit in an text editor such as Notepad. If the problem is that one of the parties is operating behind a
NAT device, you can examine the code for the embedded local IP number and change it to the pub-
lic IP number. Depending on the NAT device, the connection might now work. Other factors, how-
ever, such as proxies and firewalls at either end, can still block access.
If you want to experiment with advanced configuration of your cable/DSL router or another net-
work hub, the main point is that Remote Assistance functions through port 3389. Opening this port
on the Expert machine can alleviate problems with establishing RA connections, but even this might
not work on a cable/DSL router. If you’re attempting to establish RA capabilities across the Internet
through your company’s hub, contact your system administrators to see if they’re willing first to
allow RA connections and second to open port 3389 in order to do so.
Note
None of this is to suggest that remote control has not been available before the release of Windows XP.
Remote control packages have been available to IT departments for years, long enough indeed for
Symantec’s PCAnywhere to reach version 10 (and PCAnywhere works with other versions of Windows, too).
But whenever Microsoft adds a feature to Windows itself, the feature suddenly takes center stage.
Summary
With most PC users using some form of Internet connection today, it makes sense for an operating
system to provide a variety of techniques for making use of the fact that remote computers are so
readily accessible. Remote Desktop and Remote Assistance represent two extremely useful examples
of the kinds of tools that have made the Internet more than just a massive information source by
actually letting you control PCs directly in order to configure them, perform tasks on them, repair
them, or train others on them. Use these features even once and you’ll begin to see their potential.
Part III
Utilities
I n no category will you find more utilities available than in anything to do with your Internet life.
A huge array of programs lets you control every aspect of your daily Internet use, from browser
configuration to every email function imaginable. Here, I cover only a smattering, but all of them
useful.
Alternative Browsers
You probably already know that you’re not stuck with Internet Explorer for your Web-surfing needs.
Several other browsers are out there ready for use, and each of them has its own advantages. The pri-
mary advantage over Internet Explorer is simply the fact the IE’s huge market share, as well as a gen-
eral dislike among hackers for everything that has to do with Microsoft, has made this popular
browser the target of seemingly endless security hits. Get a different browser and many of these
problems — although certainly not all — go away. But one of the problems is that Web designers fre-
quently construct Web sites specifically for IE, meaning that some of them might not be fully com-
patible with other browsers. Still, it never hurts to give them a try, especially since most are free. And
you don’t need to uninstall IE in order to try them.
If you’re an America Online customer, you already have an alternative browser, although AOL
seems to change its mind fairly often about exactly what to offer. The latest buzz has them providing
a newly modified version of Internet Explorer, one that loads when you access the Web from within
AOL. For a time, the service wanted to use non-Microsoft products, but the ongoing bugaboo of
Web site compatibility with non-AOL browsers kept rearing its head.
The most popular non-Microsoft browser comes from the Mozilla Project (www.mozilla.org), the
original developers of the first popular browser in Web history, Netscape. Netscape itself is still avail-
able (www.netscape.com), and it uses the Mozilla browser as its core technology. Mozilla, a full suite
of Internet software, including an email program, a newsreader program, and the Mozilla browser,
can be downloaded from www.mozilla.org, as can its even more popular browser, Firefox. Firefox
has come as close as any browser yet to disrupting IE’s hold over the browser market, to the degree
that it, too, has recently been undergoing security hacks. Firefox is regularly touted as being some-
what faster than IE in downloading pages and displaying them, and it has an tabbed interface that
161
162 PC Magazine — Windows XP Solutions, 2nd Edition
lets you have only one instance of the browser open with each page having its own tab. Whether or
not you intend to use Firefox regularly, you owe it to yourself to download it and give it a try. Firefox
has hundreds of free extensions that add almost any feature you could want to the program. So, the
core program is simple, but with extensions, very powerful. The full Mozilla suite is also free and
similarly worth your while.
Opera Software produces another highly regarded browser alternative, Opera for Windows.
Opera has a free download (www.opera.com), but eventually you’ll have to decide if you want to pay
its $39 price — certainly not exorbitant, but it might very well seem that way given the fact that IE
and Firefox/Mozilla/Netscape are free. Opera’s free version is supported by small ads. Opera’s paid
version includes email. Everything in Opera can be done through the keyboard. It has a truly unique
Zoom In and Out. Opera is an extraordinarily fast browser and uses a fully implemented tabbed
interface. It even contains a voice interface feature that not only lets you control it with your voice
but also reads Web content to you as listen on your headphones or through speakers. As with
Firefox, this one is absolutely worth trying.
If you want to take IE itself to a different level, consider Avant Browser (www.avantbrowser.com).
Avant is a free add-on to IE, providing support for three-button mice, a full-screen mode that dis-
penses with toolbars and displays only the Web content, built-in Google and Yahoo! search engines,
and (very nicely) an automatic restore feature that reloads the Web pages you had open when the
browser or your system crashed. Also included is a Flash animation filter, designed to block Flash
advertising.
Other recommended free browsers include Ace Browser (www.aceexplorer.com), Slim Browser
(www.flashpeak.com), and Maxthon (www.maxthon.com).
Email Programs
You won’t find as many email alternatives as you could six or seven years ago, but there are more
than enough to keep you occupied trying to find the one you like best.
Aside from Outlook Express, Microsoft Outlook itself is probably the most popular email client — a
favorite among businesses and with anyone who owns Microsoft Office. It owes its popularity to its
wealth of features, but primarily because it functions not just as an email program but also as a personal
information manager. With it, you can keep contacts, appointment calendars, notebooks and journals,
and much more. The biggest single problem with Outlook, aside from its sheer size as a program (and
such annoyances as the fact that it doesn’t have a standalone mail checker) is the fact that it is the tar-
get of by far the most viruses and other malware. If you use Outlook, you absolutely need a virus-
checker for incoming and outgoing email.
The Mozilla suite (www.mozilla.org) comes with its own email program, which has been spun out
into a standalone program, Thunderbird. While Thunderbird and Mozilla do not function as per-
sonal information managers, they’re correspondingly smaller than Outlook and as fast and reliable as
Outlook Express. Mozilla and Thunderbird import messages and account information directly from
Outlook Express and Outlook, so you can get up and running quickly and with no loss in produc-
tivity. Additionally, Thunderbird has many free extensions. Interestingly, Mozilla (like Outlook
Express) can be used for newsgroup reading, while Firefox cannot, but given the lack of interest in
newsgroups these days, that doesn’t matter unless you still need that capability.
Part III: Utilities 163
Poco Systems (www.pocosystems.com) offers two useful email programs, Barca and PocoMail.
The former operates as an email reader as well as a personal information manager, so it’s close to
Outlook in functionality, although unlike Outlook it does support newsgroup reading. PocoMail is
simply an email program, but it has an advantage for those concerned about malware by not running
scripts written in JavaScript or VBScript, both of which can be used to distribute viruses.
Qualcomm’s Eudora (www.eudora.com), probably the most used email program early in the
Internet’s popularity, continues development and remains popular. With a strong message-filtering
system and better Outlook import features than it had before, and with its continuing fast email
management capabilities, this program is still worth trying. It’s available in three modes: Paid mode
(you buy it, you get all the features, and you get no ads), Sponsored mode (the full program but with
an ad bar that isn’t nearly as annoying as it sounds), and Light mode (no ads, but not quite as capa-
ble). Start with Light mode and see how you fare.
One of the more popular third-party programs today is RiTLabs’ The Bat (www.ritlabs.com). The
Bat connects with Microsoft Exchange servers, thereby letting you work with it instead of Outlook,
and along with its templates and forms, and its highly sophisticated filtering and sorting systems,
this feature demonstrates its ties to the business community. But it’s also of considerable use on non-
business PCs, particularly if you grow tired of Outlook (or don’t want to buy Outlook).
Password Managers
One of the more important utilities to consider when using the Internet is a password management
tool. Not only can such a utility help you keep track of your passwords but it can also help you cre-
ate passwords that are hard to figure out, simply because you don’t have to remember them yourself.
Password Manager XP (www.cp-lab.com) is about as full-featured as you could ask for in this cat-
egory. You can create multiple databases, each with its own password and with whatever type of
encryption you choose (indeed, multiple algorithms per database if you want), with each database
storing passwords, PINs, credit card info, and any other sensitive data you need to protect. When
you need a password or other code, you can access the database and retrieve it, and you can even
install the utility on removable drives such as thumb drives for easy portability. It never creates unen-
crypted temporary files, it clears out memory immediately after use, and it can be set to turn itself off
after being idle for a specific amount of time.
PassCrypt (www.seamistsoftware.com) offers encrypted databases and links to fill-in forms, help-
ing you keep that data both handy and secure. A similar program is the popular RoboForm
(www.roboform.com), which allows automatic logons to Internet sites again with secured data. Both
programs memorize your passwords and fill in data as you type it the first time, much the way your
browser does but with far greater security.
Part IV
Letting Windows’ Hair Down:
The Creative and Entertaining
Side of Windows XP
Chapter 11
Imaging Central: Working with Digital Scanners and
Cameras
Chapter 12
Working with Video Files
Chapter 13
Unleashing Your Inner Spielberg: Making Videos
Chapter 14
Playing, Ripping, and Recording Music
Part IV Utilities
Chapter 11
Imaging Central:
Working with
Digital Cameras
and Scanners
O ut of the box, Windows XP lets you work directly with digital cameras and scanners, two of
the most popular types of imaging hardware. The Scanner and Camera Wizard takes you
step by step through the process of scanning documents from your scanner and transferring pho-
tographs from your digital camera to your hard drive. But beneath the hood lies the single most
important element of this support: the automatic recognition of scanners and cameras when you
plug them into a USB port. You don’t even have to keep these items connected to your computer;
just plug them in when you need them, and Windows either sets them up instantly or walks you
through the procedure necessary to get them working.
As with all hardware devices, Windows needs your scanner’s or camera’s drivers in order to work
properly. Even here Windows XP eases the process. The operating system ships with drivers suitable
for an extremely wide selection of hardware, and hardware vendors, along with Microsoft itself, con-
tinually post new drivers to the Windows Update site. If you buy a new device that comes with a CD
containing a driver and you’re in a hurry, plug in the device before even considering the CD; often,
Windows installs a driver that, while possibly not the most recent version, lets you work with the
device immediately. You can always upgrade later.
Quite possibly, however, the drivers and associated software that comes in your imaging product’s
package will support more and different features than the drivers found in Windows XP do, so by all
means give them a try. As always when installing software, use System Restore to create a restore
point, then follow the installation instructions in the package.
This chapter covers the features built into Windows XP for working with digital cameras and
scanners. These features include automatic connection with cameras, controlling cameras from
within the imaging software in Windows XP, and using your scanner effectively in Windows XP.
167
168 PC Magazine — Windows XP Solutions, 2nd Edition
If you want simply to view the pictures on your camera, choose View a Slideshow of the Images
Using Windows Picture and Fax Viewer, and click OK. Windows then switches into a full-
screen window showing the first picture in the camera. Click on the screen at any time to move to
the next picture. Right-click to display the context menu (see Figure 11-2) that enables you to rotate
the picture, set it as the desktop background, or load it into a photo editor. At the top right of the
window is a command bar from which you can start the slide show or move to the next or previous
picture.
Chapter 11: Imaging Central: Working with Digital Cameras and Scanners 169
Figure 11-2: The slideshow feature in Windows Picture and Fax Viewer includes a helpful context menu.
You can also view and work with the pictures on the camera by selecting the Open Folder To View
Files Using Windows Explorer option in the Removable Disk window. Because Windows sees your
camera as simply another storage device, no different from a floppy disk or CD-ROM, you can treat
each picture on the camera as a separate graphics file in Windows Explorer. You can use Explorer’s var-
ious views to see the files, selecting, moving, and copying them as you would any other files.
Tip
Whatever method you choose to transfer pictures from your camera to your computer, pay attention to the
filenames associated with the pictures. Your camera’s proprietary software, like Windows itself, will create
generic filenames, often along the lines of photo-001.jpg, photo-002.jpg, and so on. To work with your pic-
tures, it can help a great deal to change the filenames, using Windows Explorer, as soon as you copy the pic-
tures to your hard drive. That way, when you return to your pictures folders to fine a particular photo, you’ll
be much more likely to locate it.
170 PC Magazine — Windows XP Solutions, 2nd Edition
One the most useful of these views is the Filmstrip view. Figure 11-3 shows the Filmstrip view of
the pictures on the digital camera. The File and Folder Tasks on the left let you choose the options
you want to perform.
While you can work with your picture files individually using these methods, transferring them
from the camera to the PC one by one and only as you require them, and deleting them from the
camera one by one as well, you can use the Scanner and Camera Wizard to copy all the pictures at
once to your hard drive (this should be what you do most of the time) and then delete them all from
the camera files unless you want to store them on the camera so that you can copy them to other PCs
as well (or just view them on the camera itself). This wizard is especially useful if you fill up your
camera rapidly. You can offload your pictures, offloading them to the hard drive, and deleting them
from the camera, and then so that you can use the camera again immediately. The wizard’s design
assumes that your primary activity for photographs is to get them off the camera and onto the hard
drive.
After the pictures are copied to your hard drive, unplug the camera and turn it off, to save batter-
ies if nothing else. The pictures are on your hard drive, and you can view them as a slideshow, as
thumbnails, and with the Filmstrip view, and organize and edit them any way you want.
From the Removable Disk window, choose the Copy Pictures to a Folder on My Computer using
the Microsoft Scanner and Camera Wizard option, and click OK. Click Next on the Welcome screen
of the wizard to reveal the Choose Pictures to Copy window. This window features a check box in
Chapter 11: Imaging Central: Working with Digital Cameras and Scanners 171
the top-right corner of each photo thumbnail, and by default all pictures are checked. If you want to
copy them all to your hard drive, click Next. Otherwise, uncheck the ones you don’t want to copy.
You can select only a few to copy by clicking Clear All to remove all the check boxes and then check-
ing only the pictures you want to copy. Click Next.
The Picture Name and Destination window (see Figure 11-4) opens. Type a name for this group
of pictures and choose a folder in which to copy them. By default, the wizard displays the folder you
most recently used for this purpose along with a drop-down menu that lists all your recent folder
selections when using the wizard. Once you’ve chosen a destination folder, decide if you want to
delete the pictures from the camera. Click the check box if you do, and then click Next.
In the wizard’s final stage, Copying Pictures, Windows transfers the photos to the destination
folder and, after doing so, deletes the pictures from the camera if you so choose. Your pictures are
now stored on your hard drive, ready for editing, printing, or simply viewing.
If you did not choose to delete the pictures from your camera in the wizard, you need to delete
the pictures from your camera now to create room for new pictures. You can delete pictures by using
the software built into your camera or through the imaging feature of Windows XP.
If you use a digital camera to take pictures while traveling, you practically need a notebook com-
puter or a hard drive–based personal digital assistant (PDA) or audio player with you as a place to
store your pictures so you clean them off your camera and prepare to shoot more. Today’s hard
drive–based audio players, for example, frequently double as portable hard drives and are ideal for
this purpose. The drives, however, tend to be significantly smaller than notebook drives.
172 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
Once you have your pictures saved onto your hard drive, you can view them regularly via XP’s My Pictures
Slideshow Screensaver. From Control Panel, launch Display Properties, and click the Screen Saver tab. In
the Screen Saver pull-down menu, choose My Pictures Slideshow. From now on, when your screensaver
kicks in, you get a slideshow of the picture files stored in the My Pictures folder.
Note
You can also open Paint by clicking the Start button, choosing Run, typing mspaint into the Open field, and
clicking OK. You can open it from a Command box by typing mspaint and pressing the Enter key.
You can use Paint to set the photo as your desktop wallpaper, to rotate the image or flip it verti-
cally or horizontally, and to resize it with the Stretch and Skew dialog box (you need to increase each
dimension by precisely the same amount). You can add text and various shapes to the image, provide
a bit of airbrushing, and crop it to avoid printing unwanted areas. To crop, use the Select tool to
frame the area you want to keep, right-click on that area, and choose Copy. Choose File ➝ New and
then Edit ➝ Paste to paste the cropped photo into a new file.
Smudge or sharpen the photo by choosing the desired effect from the Tools menu.
Change the size of the photo precisely to your liking using the Resize dialog box.
Use the Crop dialog box to crop the photo or apply special effects, such as a corner curl
(called Ear, in Photo Editor) to the corners of the cropped picture.
Adjust brightness, contrast, and color using the Balance dialog box.
Apply special effects ranging from giving the picture a stained glass or watercolor look to
creating a negative image of a selected portion of the picture.
If you do get a chance to work with Microsoft Office Picture Manager, the photo-editing compo-
nent of Office System 2003, you’ll discover that it contains fewer features than Photo Editor. It
makes strong use of the task pane of the Office suite to provide easy access to the features as you
work with the pictures. From a user interface standpoint, the Office task panes are modeless, in that
they do not require input (as do many dialog boxes, such as the Save As boxes in Office) for the user
to dismiss them.
Several freeware or shareware photo editors are available if you don’t have access to the Microsoft
utilities discussed here.
Tip
When you determine which graphics programs you want to work with frequently, consider adding them to
My Computer’s Send To menu. To so do, open the Send To folder by clicking Start ➝ Run, typing sendto in the
Open field, and pressing Enter. Now, drag the icon for your desired program from any other folder, or from the
Start menu, Quickstart menu, and so on, into the Send To folder. When you right-click your picture file, you
can choose Send To and your newly added program and have the file load in that program.
174 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
To print multiple pictures using the same printer and settings, highlight all the files you want to print before
clicking the Print This Picture link. To select all the pictures in the folder, click the link before selecting any
individual pictures; by default, the wizard opens with all of them checked.
Caution
Apart from sending your credit card information over the Internet, always a somewhat risky venture, be
careful what photos you actually send. No matter how good your prints look on the screen, in many cases
they simply don’t have a high enough resolution, or a rich enough color depth, to make good prints. A good
photograph will look reasonably good even when printed on a monochrome laser printer, so first try printing
a copy yourself. Doing so also gives you a sense of how large the photo will be when you get it back from the
printers. Your first few times, you might very well discover that that full-page photo actually takes up only a
small section of the page. In other words, be careful that you don’t simply waste your money.
publish them to a private server (and later direct people to the URL so they can view them), or you
can create a new MSN group where you and others can share pictures.
Figure 11-6 shows the screen in the wizard where you can choose to upload documents and/or
pictures to this site, after which you choose whether you want the pictures to appear as small (640 ×
480), medium (800 × 600), or large (1024 × 768). The larger the picture, of course, the longer it
takes to upload, and you have only three megabytes available to you on the MSN servers. The wiz-
ard then initiates the upload and, after it has finished, steps you through the creation of an MSN
account or, if you already have one, lets you log into it and perform the upload.
Scanning Images
With the Scanner and Camera Wizard, you can import pretty much any physical document into
Windows as a graphics file. You can use your scanner as a photocopier in this way, scanning a page
as an image file and then sending it to your printer, or as a fax machine by scanning the document
Chapter 11: Imaging Central: Working with Digital Cameras and Scanners 177
and sending it to a recipient as a fax. You can also use the scanner to store copies of documents
(typed, handwritten, illustrated, whatever) by scanning them and saving them as graphics files in an
organized folder system.
To scan an image, first place the item in the scanner. After that, you have several options, depend-
ing on the software you’ve installed. First, you can use the Import or Acquire commands in your
graphics software (in MS Paint, this command is on the File menu and it’s called From Scanner or
Camera). Second, you can load the Scanner and Camera Wizard (which in fact many graphics pro-
grams use anyway) by launching it from Start ➝ All Programs ➝ Accessories. Click Next on the Wel-
come screen; the Choose Scanning Preferences dialog box opens. Choose your picture type: color
picture, grayscale picture, black-and-white picture or text, or custom (grayscaling converts color or
black-and-white images to shades of gray, resulting in a smooth image suited for printing in black
and white). Figure 11-7 shows the result of clicking the Preview button, which activates the scanner
and loads the result into the Preview area.
By default, the wizard scans the image at a resolution of 150 dots per inch (dpi). You can increase
or decrease this resolution by clicking the Custom Settings button. In the resulting Properties dialog
box, use the arrows to change the resolution and the sliders to adjust the brightness and contrast.
Note
In a rather questionable decision, Microsoft has provided an image on the Properties dialog on which to
base the brightness and contrast settings (which is a good thing), but not the image you’re actually working
with (a less good thing). Surely, it would have been more useful to show the actual picture.
178 PC Magazine — Windows XP Solutions, 2nd Edition
Click Next. The Picture Name and Destination screen lets you choose the name of the scan (badly
named as “group of pictures” because it’s the same screen used for transferring photos from a digital
camera), the folder in which you want to store it, and the file type. Four file types are available: BMP
(excellent quality but large files), JPG (good quality, much smaller files, the most common type on
the Web), TIF (high quality, larger files, excellent for printing), and PNG (much like JPG, suitable for
the Web). Click Next to perform the scan.
Once you’ve scanned the image and saved it as a file, you can do anything with it you want: print
it, publish it to a Web site, edit it, attach it to an email message, load it into photo album software,
incorporate it into documents, and more. If you use images a great deal, your scanner can quickly
become one of your most important peripheral devices.
Scanning Text
The Scanner and Camera Wizard provides a setting for text, but it captures text as an image without
any provision for converting it into text. It lacks, in other words, Optical Character Recognition
(OCR) capability. If you want to scan paper documents into your PC and convert them into text,
tables, and multicomponent productivity files, you must buy third-party OCR software. Many scan-
ner manufacturers bundle OCR software with their scanners, even if only a reduced-feature version
of their standard OCR software, but if you are buying a scanner for this purpose, instead of the more
common purpose of scanning photographs, illustrations, and images, be sure to look for bundled
OCR software.
To get the most out of OCR software, look for the following features, at the very least:
Accuracy: Even when converting the clearest and most noise-free paper document possi-
ble, OCR software will probably make one or more errors during the conversion. An
accuracy rating of less than 95% renders the process almost unworkable; on a 2,000-
word white paper, 95% means 100 errors, which you have to catch by hand later. Higher
accuracy, indeed, is often what you pay for when you buy more expensive OCR software.
Form and table conversion: When you scan a paper document containing a form or
a table, you want the OCR software to recognize them as such and convert them into
spreadsheet or word processor versions, with formatting intact. All OCR software touts
this feature, but if your goal is to digitize your forms and tables, try it out first to avoid
frustration.
Document component recognition and conversion: While you want your OCR to con-
vert forms and tables, you also want it to recognize other features, such as images and
drawings, and convert them to like elements within your digital documents. An image
should feed into your word processing software as an editable image, a chart, ideally, as
an editable chart.
PDF conversion: The Adobe PDF standard has grown successful precisely because of the
similarity of PDF files to paper documents. But PDFs are difficult to edit, and their infor-
mation is difficult to capture. Your OCR software should be able to perform the conversion
for you, so that you can edit the PDF file with your productivity software.
Chapter 11: Imaging Central: Working with Digital Cameras and Scanners 179
Fortunately, most OCR software makers provide downloadable trial versions (time-limited rather
than feature-limited) from their Web sites. Microsoft includes OCR software as part of the Microsoft
Office Document Scanning feature of its Office XP product and the Microsoft Office Document
Imaging feature of Office System 2003. If you do not see the software in Start ➝ All Programs ➝
Microsoft Office Tools, you can install it from the Shared Tools section of the Office installation CD.
Check the batteries in the camera. If you are not working with your camera through a
power cable, you might simply have lost battery power.
Make sure that the battery is turned on and set to its photo-viewing setting (playback set-
ting), whatever that setting happens to be on your particular camera.
Check that the cable between the camera and the PC has not somehow lost the connec-
tion. Many cameras have tiny USB ports, and they tend to stand up less well to even the
smallest pull on the cord. The easiest thing to do is to unplug the cable and plug it in again
each time you use the camera.
If the Removable Disk window fails to appear, check to see if you have customized third-
party software to handle transfers automatically. Right-click on the Removable Disk icon in
My Computer, and examine the properties. On the Autoplay tab of the Properties dialog
box for the camera, you can also see if AutoPlay for the camera is turned off; if so, toggle it
back on. You can also set up Autoplay by right-clicking the Removable Disk icon in My
Computer and selecting Autoplay.
Ensure that your USB or IEEE 1394 ports work properly. These ports fail, temporarily, far
too often and usually for reasons difficult to trace. If you’ve used your camera (or scanner)
successfully before and suddenly it no longer works, open the Device Manager section of
the System Properties dialog box, locate and expand the Universal Serial Bus Controllers
section, and see if any appear as malfunctioning. If so, reboot your computer and see if the
problem fixes itself (despite advances, this procedure remains the best way to repair tem-
porary problems in Windows). If not, follow the guidelines for troubleshooting USB and
IEEE 1394 connections in Chapter 23.
Systems’ ACDSee, JASC Paint Shop Photo Album, and Adobe Photoshop Album enable you to orga-
nize your photos in a variety of ways, letting you enhance them and share them easily. Two excellent
free packages are Picasa (www.picasa.com), which lets you edit photos and organize them, and
Irfanview (www.irfanview), a powerful image editor.
If you want better results with optical character recognition, you can turn to third-party software
such as IRIS’s Readiris Pro and ScanSoft’s venerable OmniPage Pro.
Summary
Windows XP provides everything you need to use your digital camera and your scanner effectively.
It recognizes cameras and scanners when you plug them in and automatically launches the software
you need to control them. It also provides features in Windows Explorer itself that let you view
images as thumbnails or slideshows, and save them as various graphics file types. Enhanced with
additional software, your Windows XP system can solve even more of your imaging needs.
Chapter 12
Working with
Video Files
I n much the same way that giving people a GUI word processor with fonts turned everybody into
a desktop publisher, the readily available combination of camcorder and video-editing software
has everyone making movies. In both cases, the results rarely get confused with the same work done
by a professional, but in both cases the enjoyment, challenge, and sense of creative freedom com-
pensate more than adequately.
Windows XP contains three programs for use with video:
Windows Media Player: Watch video files; also encode, create, and convert movie files.
Windows Movie Maker: Import and edit video as a means of creating a finished video file
for viewing on a PC, a DVD, or videotape.
Windows Media Encoder: Convert, capture, and broadcast video files.
Together, these three programs demonstrate Windows’ increasing emphasis on multimedia view-
ing and production.
This chapter covers Windows Media Player and the Windows Media Encoder. Chapter 13 fea-
tures Windows Movie Maker and the creation and editing of videos.
Best known as a general-purpose audio listening tool, Windows Media Player also does some rea-
sonably impressive video work. In fact, Windows Media Player Version 10, the most recent version,
contains features that very few people seem to know about, and on which Microsoft doesn’t seem to
place a great deal of emphasis. Then again, even fewer people appear to know about Windows Media
Encoder, so perhaps most Windows XP users listen to or watch multimedia files rather than create
them. For those users who do, and for those who eventually will, both programs are well worth
attention.
181
182 PC Magazine — Windows XP Solutions, 2nd Edition
support for numerous types of video files. Open WMP by clicking Start and choosing All
Programs ➝ Accessories ➝ Entertainment ➝ Windows Media Player, or by clicking its icon on the
Quick Launch toolbar. After it’s open, you can load a video file to view.
ASF (Advanced System Format): A video format especially suitable for streaming over
the Internet and other high-speed download systems that WMP has, at least in part, been
designed to handle. Covers .asf, .asx, .wm, .wmp, and .wpl extensions.
WMV (Windows Media Video): The standard compressed file format used by WMP and
Movie Maker. Covers .wmv and .wvx extensions.
AVI (Audio Video Interleaved): A cross-platform compressed video file format noted for
high-quality but large files. Covers .avi extensions.
MPEG (Moving Pictures Expert Group): Cross-platform and extremely common video
file format, noted for the high quality of both video and audio, and efficient and effective
compression. Covers .mpeg, .mpg, .mpe, .mp2, .mpv2, and .mpa extensions. (.mp3 is an
audio format, not a video format).
Watching DVDs
Media Player also works as a DVD player, but not in and of itself. To play DVDs, you need DVD
decoder software, which you can purchase from a number of vendors and install yourself (purchas-
ing and installing practically any standalone DVD-viewing software package will also give you what
you need). If you bought a DVD player with your computer, you almost certainly have a DVD
decoder already installed on your system that Media Player will recognize and use. If not, download
and install a program such as Cyberlink’s PowerDVD or Intervideo’s WinDVD to get the decoding
technology you need.
With the decoder in place, use the View menu to select from a variety of DVD-viewing options,
including playing the movie at different screen sizes (View ➝ Video Size), accessing the Root or Title
menus (View ➝ DVD Features), and changing the camera angle (View ➝ Video Features) for DVDs
that support such features. The control area at the bottom of the Media Player interface lets you per-
form standard DVD operations such as pausing, muting, and skipping forward or backward from
scene to scene. If your video card and your DVD decoder support video mixing rendering (which
you can turn on via Tools ➝ Options ➝ DVD tab ➝ Options button), you can use the View ➝ DVD
Features menu to capture the current frame as a still image. Even so, WMP lacks a number of useful
features provided by dedicated DVD players, including the capability to move ahead in the movie by
tiny increments to watch scenes frame by frame (this feature is extremely useful for teaching pur-
poses), but for the most part it will support your needs.
Chapter 12: Working with Video Files 183
Using a wizard very similar to the Convert a File Wizard, you can use Media Encoder to capture the
incoming signal from a video device attached to your PC. Click the New Session button, and double-
click the Capture Audio or Video option. On the Device Options screen, specify the video and audio
devices you want to capture; the drop-down menu pertaining to each type of device (that is, video and
audio) lists all installed options available, separated by device. You can customize each device by click-
ing its Configure button. The resulting dialog box gives you control over the input type, input level,
and other relevant properties, including, for TV tuner cards, the input channel from antenna or cable.
Chapter 12: Working with Video Files 185
Stepping through the wizard, choose the most appropriate quality of the content (depending on
its ultimate purpose), and after that the encoding options for both video and audio. Video-encoding
options range from low-bandwidth video to live-broadcast video and DVD-quality video, while
audio options start with voice-quality radio and proceed through CD-quality sound and higher.
After setting optional author and title information, which viewers can see by enabling the cap-
tions feature in WMP, Media Encoder begins the capture.
In addition to the wizards, Media Encoder provides two Quick Starts for capturing video and a
third for converting it. All are available from the Quick Start tab of the New Session dialog box. The
Capture Live Content for Local Playback Quick Start captures from your attached video device and
saves the file with settings appropriate to viewing it on a PC. The Capture Live Content for Streaming
Quick Start option creates a file best suited for streaming over the Internet for recipients using WMP
or another streaming video viewer. The Convert Film Content to Video Quick Start is specially
designed to capture video recorded on film (such as from a VCR) and rendering its attributes suitably
for recording onto a DVD or a CD.
Broadcasting Live
The Broadcast a Live Event option in the Wizards window lets you use video devices attached to
your PC as a means of broadcasting across the Internet. To make the broadcast work, you need
access to a Windows Media server and possibly a Windows Server 2003 system with video stream-
ing already established. This means, of course, that the live broadcasting feature isn’t for everyone,
but if you do have access to the servers, either through your organization or by renting space from a
service provider, you can broadcast meetings, talks, classes, or anything else for which you have
video and/or audio equipment.
186 PC Magazine — Windows XP Solutions, 2nd Edition
To broadcast live, either you push the content from Windows Media Encoder or you have the
recipients pull the content to their own encoders. Pushing content, in which you distribute it with-
out a request from a remote machine, provides the closest to an actual broadcasting scenario because
that’s how the broadcasting industry — television and radio — distributes content (that is, they don’t
wait for requests, they just send it out and people tune in as they want to). Pulling content works in
the opposite way; you place the content on a server, and the recipients use their client software to
request it. Pushing works best for large distributions; pulling works best for smaller distributions.
To push, you need to distribute the content from a Windows Server 2003 with Windows Media
Services 9 enabled. Pulling can happen from any server with Internet Information Services (IIS)
enabled, but only five clients can view the content at a time using Windows Media Encoder. If you
are distributing from a Windows 2003 Server environment, you can add a publishing point to the
content, so that the broadcast begins only when the first client connects. That eliminates unneces-
sary traffic between the encoder and the server.
You make the decision to push or pull on the Broadcast Method screen of the wizard. If you
choose Push, clicking Next yields the Server and Publishing Point screen (see Figure 12-4), in which
you enter the name of the server and the publishing point or location.
Click Next, and then set the audio and video bit rates for the content and whether you want to
archive the broadcast as a file for later access. Finally, click Next and you have the choice of adding
up to three files to the broadcast: a welcome file, an intermission file, and a goodbye file. Media
Encoder adds each of these files to the broadcast, and you can switch to them when you’re ready to
do so. Configuring a pull session works much the same way, except that instead of establishing a
server name and publishing point, you simply specify the server URL and port through which the
recipients can access the stream.
Chapter 12: Working with Video Files 187
You can also engage the push method of broadcasting by using the Broadcast Company Meeting
Quick Start option. This script simply steps you directly into the Windows Media Server Publishing
Point screen of the New Session Wizard and requires that you run the broadcast through a Windows
Media Server with a publishing point already in place.
Summary
Windows Media Player and Windows Media Encoder together offer a significant suite for working
with video. When combined with Windows Movie Maker, the subject of the next chapter, you have
a production suite for decent homemade video, complete with the capability to create simple sound-
tracks or narrations and even to broadcast the video or share it over email, via the Web, or on DVD.
Chapter 13
Unleashing Your
Inner Spielberg:
Making Videos
W indows XP ships with Windows Movie Maker 2.0, Microsoft’s second attempt to create a
general-purpose video creator and editor. Version 1.0, which originally shipped with
Windows XP, suffered from numerous problems ranging from frequent crashes to lack of features,
especially when comparing it with the Mac OS’s classy little iMovie — as Apple Macintosh owners
frequently did. The good news for Windows fans is that Movie Maker 2.0 runs rings around version
1.0 in both features and stability. If you don’t have version 2.0, you can download it from the
Microsoft Web site or though Windows Update. Version 2.1, a minor upgrade from 2.0, is also avail-
able via Windows Update. This chapter deals exclusively with version 2.1.
Tip
If you download Windows XP Service Pack 2, you automatically get Movie Maker 2.1 with it. You don’t need
to install version 2.0 before 2.1; you can upgrade directly from 1.0 to 2.1.
Windows Movie Maker 2.1 (hereafter just Movie Maker) offers all the power you need to get
started making videos. You can import video from a camcorder, VCR, or DVD player; chop it into
individual clips; set transition effects between the clips; add titles and narration; and save it to a vari-
ety of different file types with a variety of different compression algorithms. As an introductory
movie creator with features that dip into the intermediate level, you simply can’t go wrong with this
program. It works, and it works well.
This chapter shows you how to use Movie Maker to construct a complete video. In addition to
editing and compiling video, it covers the various camcorder types available for shooting video, how
to capture video to your PC, and how to add audio tracks.
189
190 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
Before installing Movie Maker 2.x, you should manually uninstall version 1.0 by using the Add/Remove
Programs utility in Control Panel. Numerous users have reported problems launching version 2.x when they
simply installed it over 1.0.
Next, you need video, which you can acquire in a number of different ways:
VHS tapes: If you have a bunch of VHS tapes lying around — and many of us do —
you can capture them in Movie Maker, edit them, and either view them from your hard
drive or store them for recording back onto tape. The primary purpose of this kind of cap-
ture is to convert your home movies into edited video files to send to friends, family, or
colleagues, or for storing as DVD videos. Of course, you could also edit all your favorite
Happy Days episodes down into, say, three or four short ones, but because of copyright
law you can’t actually show them to anyone, so there seems little point.
Digital camcorder: Digital camcorders offer enormous advantages over everything else as
a source of video. Movie Maker not only captures from digital camcorders, it also controls
the camcorder’s playback, rewind, and speed-up functions and even finds the start and end
points you specify. The question, though, is which digital camcorder to get. See the
“Which Camcorder?” sidebar for a brief guide.
Analog camcorder: Although Movie Maker prefers digital camcorders, it works perfectly
well with all those good old VHS and 8mm camcorders. The quality of digital recordings
is superior to analog recordings, but besides that the only real difference between the two
in Movie Maker is the need to control the analog camcorder manually. The program’s
play/rewind controls do not appear when you connect an analog camera.
Webcam: For low-quality video at equally low expense, you can’t beat a Webcam. Some
offer surprising results when used as standalone video cameras instead of for real-time
video over the Net, and they definitely provide a way to get started, especially because
many PCs ship with them. But if you want video anyone might actually want to watch,
a Webcam won’t take you very far.
Television: Television provides video 24 hours a day, so why not capture some and learn
Movie Maker with it? The program lets you capture directly from TV tuners, providing a
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 191
Properties dialog that gives you control over the channel you wish to record, the NTSC or
PAL video standard, and more. One superb way to learn Movie Maker is to edit the com-
mercials out of your favorite sitcom or, as you get more experienced, capture a game by
your favorite sports team and edit it down to a 10-minute highlight video. Copyright laws
forbid you from distributing or sharing these videos, but they work extremely well for self-
training purposes.
Web sites and existing video files: If you have video files stored on your PC, you can
possibly import them into Movie Maker and edit them. The word possibly refers to the
formats Movie Maker can import. It can handle AVI, MPEG, WMV, and ASF, but not other
popular formats such as MOV (an Apple standard). To use other formats, you must first
convert the file to one Movie Maker can work with, and the program itself does not pro-
vide that function. You can also download videos from innumerable locations on the
Internet, but here again, keep in mind that copyright laws forbid almost all distribution
or showing of the content except to yourself.
Which Camcorder?
You can use any camcorder with Windows Movie Maker. As long as the camcorder has a video
output jack (RCA, USB, FireWire, or anything else) and you have the correct cable to run from that
port to the video card, you can import video into Movie Maker. But if you’re in the market for a
camcorder and you intend to use it primarily or even significantly for creating video to edit on your
PC, you should consider the quality of the video you want to create and the ease with which the PC
and the camcorder communicate with one another.
PC-camcorder communication becomes less of an issue with each generation of camcorder. Today’s
camcorders are made with digital video editing in mind, so they offer appropriate interfaces. These
interfaces include not only the ability to control the digital camcorder from within video editing
software such as Movie Maker, but also fast, reliable transfer connections with either or both
FireWire and USB 2.0. If you are buying your first camcorder, however, watch which type of transfer
connection the camcorder supports. At this point, only FireWire provides all the benefits, with USB
2.0 coming along quickly. Older, slower USB 1.1 or 1.0 connections will frustrate you not only with the
poor transfer speed for video but also with the lack of control over the camera from within the
program. Recent USB-connected cameras, however, have offered sophisticated support for USB
streaming, in which the computer imports the video as a stream.
Of greater concern is the video format your camera supports. Two primary digital formats are now
available, DV (and the related MiniDV) — DV stands for Digital Video — and Digital-8 (the latter
introduced by Sony). Older-style VHS and 8mm camcorders still exist, along with the better-
resolution Hi8mm, but DV and Digital-8 record in digital format, with far better preservation of signal
when transferring between camera and PC. DV recorders use either specialized tapes or built-in
disk-based storage, while Digital-8 recorders use Hi8mm or even regular 8mm tapes and record a
digital signal onto them. The benefits of Digital8 are the ability to use less expensive tapes, along
with compatibility for your existing 8mm and Hi8mm tapes. Ultimately, DV gives you better quality,
and if you’re serious about producing digital video you should consider a DV camcorder carefully,
but Digital8 camcorders are also extremely appealing for many reasons.
192 PC Magazine — Windows XP Solutions, 2nd Edition
In addition to the video itself, you need some items that, in all likelihood, came with your com-
puter if you bought it within the last few years or that you’ve accumulated over time. First, and obvi-
ously, you need a video card, and while you do not need the most expensive or technologically
advanced card, you should aim for a card with a minimum of 64MB of video memory (128MB is
even better) and, ideally, an AGP 2X (or higher) interface. The reason for this is performance: You
can create videos with a less capable video card, but you’ll quickly notice that Movie Maker’s respon-
siveness suffers along with the quality of what you’ve captured. Closely related in terms of perfor-
mance issues is the CPU of your system; here, too, the more powerful the processor, the better your
system’s performance with any video features, not just Movie Maker. At this point, you should count
on a 2.8GHz Pentium 4 processor or above, although certainly you can use Movie Maker with less.
You should also work with at least 500MB of system RAM in order to give Movie Maker the room it
needs to process video, but here, too, you can do with less as long as you’re willing to put up with
slow response. The problem is that the response can get extremely slow, so be prepared if you choose
to go this route.
One thing you must look for in a video card is the ability to import video signals from external
devices. To this end, you need either a video input jack or, if you plan to work with only VCRs or TV
signals, the coaxial jack that TV tuner cards have. Many video cards possess neither and contain only
a monitor port, so be sure that you have input capabilities. If not, you can buy a reasonably good
video card for not much more than $100 that will contain everything you need. Some cards, in fact,
offer an extension component that plugs into the video card and contains jacks for audio, video, and
often USB or FireWire input. You can also buy separate TV tuner cards that fit into a vacant PCI slot
on your motherboard and work in conjunction with the video card to capture TV signals. TV capture
hardware is also available for external attachment via USB, USB 2.0, or FireWire ports.
Unless you plan to produce nothing but silent movies, you also need a sound card. Here, too,
however, you probably already have one because all PCs ship with sound capabilities, either as a sep-
arate peripheral card or built into the motherboard, unless you specifically request that they do not.
You can work with two different audio sources in Movie Maker — the audio captured during the
filming itself, which you cannot separate from the video, and an entirely separate audio track, which
you can create separately using audio- or music-editing programs and import into Movie Maker. You
can use a microphone to narrate the video, but you can’t have both a separate audio track and narra-
tion at the same time. In other words, if you want musical background for your video, the only way
to add narration is to cut the audio track into sections and record narration between them. See the
“More On Audio” sidebar for a way to compensate for this shortcoming.
Finally, you need the cables necessary to connect the video and audio sources to the sound and
video cards. Things can get tricky here because the connections on your sound card frequently dif-
fer from those on the other equipment. For example, to capture video from a VCR, you need both a
video and an audio cable; the video cable has an RCA-style plug at both ends, while the audio cable
has two RCA-style plugs at one end — one for each stereo channel — and a mini-stereo plug at the
other. Other situations demand different kinds of cabling. You can get all the cables you need at your
local computer or electronics store; take the product manuals for your sound and video cards with
you when cable shopping. (For that vast majority of PC users who have no idea where those manu-
als might have disappeared to, you can usually find PDF versions in the support section of the man-
ufacturer’s Web site.) You can also buy a wide array of adapter cables, in case you have one type of
connector on one device and another on the other device. One such adapter cable lets you connect
S-Video connectors to RCA jacks, allowing you greater flexibility in choosing a multimedia card.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 193
More On Audio
You can add only one audio track to a Movie Maker video in addition to the audio recorded with the
video file itself (that is, while the recording was taking place). Unfortunately, having only one track
of audio limits your options considerably, especially given the very real fact of the importance of
sound in movies. Movie houses keep investing in better and better sound systems for a reason:
sound and music, they realize, are very nearly as important to the viewing of a movie as the pictures
themselves — in some cases, maybe even more important.
The best way to create a separate audio track is to use third-party multitrack-recording software,
of which numerous packages are available. These programs range in cost from under $100 to over
$800, but you can do almost as much with the cheaper ones as you can with the expensive ones. As
an example, Magix Music Studio 2005 offers a full-featured multitrack recording studio for about
$100, and while Cakewalk’s Sonar 4 Producer Edition offers more features and more precise control,
at roughly six times the price you have to be a serious musician to consider it. Both programs include
video-editing software, however, and Cakewalk 4 Producer Edition has generated considerable
enthusiasm for the way in which its audio- and video-editing capabilities work together.
These programs let you record audio (typically WAV) and MIDI files as a series of tracks. If you are
recording music, for example, you record a drum track first, then a bass track, then a guitar track,
and you follow it up with a main vocal track and some harmony vocal tracks. If you’re not satisfied,
keep adding tracks of various instruments and sounds until you’re finished. You can add numerous
sound effects, ranging from the standard reverb to bizarre items that make it sound extremely
spacey, and you can fiddle with the equalization and settings to your heart’s content.
When you’ve finished your recording, you combine the tracks into one (the term is track bouncing)
and record it as a single audio file, usually in WAV format or MP3 if you want a smaller file. You can
then import the track into Movie Maker’s single audio track and have a full, rich sound on your video.
Of course, the problem then becomes synchronization. Unless you’re providing only some generic
background music or sound effects, where the timing of the sound does not matter, you want to
synchronize the sounds and music in the audio track with the events of the video track. You can do
this in numerous ways:
■ Using your music-recording software, create multiple audio files. Import them all into Movie
Maker as a separate collection called, say, Audio Files, and drag each item onto the audio
track as needed. Use the timeline to split or clip the audio segments in order to synchronize
them with their corresponding video elements.
■ Create a single audio file with your music recording software, import it into Movie Maker, and
drag it to the audio/music track on the timeline. Play the movie to the point where you need to
make adjustments, pause it at that point, and split the audio track. Continue this process until
you have as many splits as you need, and then resize the newly created clips to correspond
with the video elements.
Continued
194 PC Magazine — Windows XP Solutions, 2nd Edition
The question, as always, is how much work you want to put into your project. But with a combination
of Movie Maker and good audio software, your videos are certain to be more impressive than ever.
Digital camcorders connect to PCs via FireWire (IEEE 1394) or, increasingly, through USB 2.0
ports. To capture video, you need both the matching connection on your PC and the appropriate
cable to connect the two together. To be safe, buy a PC with both FireWire and USB 2.0 ports, but if
you have only one of the two and your camera requires the other one, you need to purchase a
peripheral board for your desktop PC or a PC card adapter for your notebook. If you’re not sure
whether your computer has the appropriate ports, open Device Manager from the Hardware tab of
the System Properties dialog (you’ll find System Properties in Control Panel, or use Winlogo+Break)
and look for sections labeled IEEE 1394 Bus Host Controllers and Universal Serial Bus Controllers.
Your PC must have these devices installed for them to appear in Device Manager.
To be sure, this list seems extensive. You’ll quickly discover, though, that the stages quickly become
almost second nature because once you start using Movie Maker the logic of the sequence stands out.
You actually require only a single video track consisting of one or more video clips; you add the rest of
the steps to create a video worth watching (and hearing). Once you get the pattern of dragging clips to
the storyboard or the timeline, then editing the clips and adding effects, titles, and audio to enhance
those clips, the process seems to require fewer steps than those listed here.
Decide what you want to say. You don’t need an overarching epic story or even a consistent
narrative thread. But even if you decide to show your audience something as simple as
“our wedding was beautiful,” you have a place to start. You want to focus on the events,
people, and places that made it beautiful, and you omit, shorten, or deemphasize the rest
(like Uncle Billy getting drunk and passing out in his food). In a business video covering
new procedures, a production that clearly states how the new procedures will streamline
tasks not only speaks more strongly to the audience but also provides a sharper focus on
what to include.
196 PC Magazine — Windows XP Solutions, 2nd Edition
Watch the video and note the 10 most important moments, keeping in mind your decision
about what you’re trying to say. Watch it again, and cut that number to five. Watch it one
last time, and decide on the three absolutely essential moments. Now you’re ready to build
your video with a sharp focus. All other moments remain important, but you now know
where you wish to direct your audience’s attention through careful use of the Movie Maker
editing capabilities.
With a pencil and paper, storyboard the video. Draw four rows of five boxes, with each
box having enough room for notes, and draw a line beneath each row on which to note
the timing of the boxes. In the first box of the second row, write the name of the first of the
three most important moments you determined beforehand. Write the name of the second
in the first box of the third row, and the third in the first box of the last row. Fill in the first
row with items in the video that lead toward the first moment, fill in the remainder of the
second row with items leading to the second important moment, and so on. By the time
you’ve finished, you’ll have a useful little storyboard to refer to as you edit.
At the end of the line beneath the last row of boxes, write down the endpoint of the video
in minutes. For example, if you want a 30-minute video, write 30. On the line below each
row, note the approximate time at which each box will occur, keeping the total length of
the entire video in mind. This procedure helps you time your important moments and
then, with those decided, the remaining events and sequences.
Write down anything else that comes to mind that you want in your video, including
music, narration, the types of transitions, and titles, text, and credits. Where you can, note
the location of each of these on the timeline.
Obviously, you can plan much more by expanding the number of boxes and specifying numerous
events on the timeline. But even if you follow only the processes in this list, you’ll start your editing
session with an excellent idea of what you’re trying to accomplish.
1. Connect the camcorder to the video card and turn the camcorder on.
2. Load Movie Maker. Click the Capture From Video item in the Movie Tasks pane. The
Video Capture Wizard loads.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 197
3. On the Video Capture Device screen, select the appropriate device (you might have only
one). Also set the input source for the video by choosing Composite, TV Tuner, or SVideo
from the drop-down menu. Composite refers to the standard video input jacks on your
video card, but if your card and video device let you work with the higher-quality SVideo
connection, by all means do so.
4. In the Audio section of the screen, shown in Figure 13-1, choose the audio device you
want to use (often your sound card is the only option listed here) and the input source of
the audio data. Usually you select the Line In option because the Line In jack acts as the
primary nonmicrophone input for sound cards. This is most certainly true of camcorders,
VCRs, DVDs, or TVs; to capture the audio portion of the tape, you run your cable from the
output of the camcorder or VCR to the Line In jack on your card. You can, however, create
an audio track entirely separate from the video by choosing a different sound source, such
as your computer’s CD player. In this case, you bring no audio from the video source at all,
so don’t use this separate sound source option unless you know you don’t want the audio
portion. One benefit of this approach is that, in effect, it gives you two audio tracks sepa-
rate from the video: the audio you capture while capturing the video, and the audio you
capture later to place on the audio/music track.
5. If you wish, you can configure the camera settings, video settings, and TV tuner from this
screen as well, by clicking the Configure button. Of particular note is the Camera Settings
button that appears after you do so, which itself yields the Properties screen, one tab of
198 PC Magazine — Windows XP Solutions, 2nd Edition
which is shown in Figure 13-2. Under the Video Decoder tab, you can see the number of
lines of resolution detected on your tape (the higher the better), but more important, you
can adjust the way Movie Maker processes the video during the capture. Under the Video
Proc Amp tab, you can adjust the brightness, contrast, hue, and saturation, and with some
input devices other attributes as well, but in doing so keep in mind that you cannot undo
these settings. Still, if you are trying to create a bright, richly contrasted video from a sub-
standard original, experiment with these settings. In addition to the camera settings, you
can adjust the settings for your TV tuner from this screen, setting the television channel
you want to capture (TV Tuner button), the input source if you have more than one (main
screen), and whether you wish to capture in NTSC (North American) or PAL (European)
configuration (Video Decoder tab). Once you’ve made all your selections, click OK for
each of the individual dialogs, to get back to the initial wizard screen, and then click Next
to move to the next stage of the wizard.
Caution
Be careful not to overadjust the video-processing settings. Sliding the brightness control even a short dis-
tance to the right increases the picture’s brightness considerably, and sliding it all the way over makes even
a dark video far too light. Even worse, sliding any one of these controls by half the distance to the left or right
can cause Movie Maker to crash, especially with analog camcorders.
6. On the resulting Captured Video File screen, you give the file a name by which Movie Maker
can later refer to it and decide on a location in which to store the file on your hard drive. By
default, Movie Maker uses the My Videos folder, a subfolder within My Documents, but to
keep your projects separate you should click Browse and create a new folder for each project.
Click Next when you’ve finished this step.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 199
7. The Video Setting screen (see Figure 13-3) provides a crucial set of options. The Movie
Maker default, the Best Quality for Playback on My Computer option, configures the video
according to the technical capabilities of your PC. In most cases, you end up with a video
with a size of 320 x 240 pixels at 30 frames per second, with a variable bit rate and a rela-
tively low file size. If you intend to distribute the video instead of simply playing it on your
own PC, click the Other Settings radio button and choose one of the numerous options from
the drop-down menu. These options change depending on the video source. Figure 13-3
shows the menu that appears with the Sony Digital-8 camcorder attached to the PC, while
the older Sharp analog camcorder dispenses with the DV-AVI option as well as the two
options for video with local playback (NTSC).
As you click on each option, the Setting details area of the dialog box shows the display size,
bit rate, and frames per second properties associated with that selection. Simultaneously, the
Video File Size area changes to reflect the amount of disk space required for each minute
of video along with the space available on the hard drive. You will find this information
extremely important because of the speed with which video chews up disk space. This is
especially true if you select the DV-AVI format (click the middle radio button under the
Video Setting heading), which is designed to let you copy the edited video back onto tape.
As Figure 13-4 shows, this setting offers the highest video quality, with a bit rate of 25
Mbps and a display size of 720 × 480 pixels, but it eats a whopping 178MB of your disk
for each minute of video.
8. After you’ve decided on the video setting, click Next to get into the real action. The Capture
Video screen (shown in Figure 13-4) gives you a preview window showing the video,
200 PC Magazine — Windows XP Solutions, 2nd Edition
along with a Start Capture button, a Stop Capture button, and, in the case of a digital
video camcorder, a set of DV camera controls. The DV camera controls do just that: They
let you control your DV camcorder from the Movie Maker interface instead of from the
camcorder itself. With an analog camcorder, by comparison, you have to use the controls
on the camcorder, with Movie Maker providing only the capture capabilities. The Capture
Video screen also gives you the options of muting the computer’s speakers (Movie Maker
captures the sound, but you don’t hear it during the capture), of automatically splitting the
video into clips (otherwise, it creates a single long clip), and of setting a capture time limit.
Only automatic clip creating appears as a default; for your first movie leave it checked.
9. Click the Start Capture button. If you’re using a non-DV camcorder, press the Play button on
the device. Movie Maker is now capturing your video. If you have a DV camcorder, initiating
the capture opens another screen, as shown in Figure 13-5. This Capture Video screen lets
you choose to capture the entire tape automatically, in which case Movie Maker rewinds the
source video to the beginning and begins the capture, or to capture manually by cueing the
tape yourself and clicking the Start Capture and Stop Capture buttons according to the video
you wish to capture. This screen also provides an option to prevent the video from appearing
in the preview window during capture, a choice that guarantees the best-quality video but
also somewhat lessens the usability of the Capture Video screen (if capturing manually, you
have to view the video on the camcorder). Make your choice, and click Next.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 201
Caution
Watch the Size of Video File display for the first few minutes of the video capture. When using an analog
camcorder, Movie Maker sometimes fails to perform the capture, even though the preview window displays
the video in progress. If the video file size does not rise, Movie Maker has probably stopped working prop-
erly. In this case, click Stop Capture and then Finish, or just Finish by itself, which results in a Windows error
message and the loss of your work so far. Even if the video file size does seem to work correctly, test a short
capture before launching into a long one.
10. When you’ve captured the video you want, click Stop Capture. If you want to capture
additional video, cue the source video to the desired location and repeat the Capture
process. When you’ve finished capturing, click Stop Capture (if it is not already stopped)
and then the Finish button. Movie Maker takes a few minutes to create the clips and then
displays them in the Collection area of the main Movie Maker window. Figure 13-6 shows
the wedding video with two clips appearing in the Collections area.
202 PC Magazine — Windows XP Solutions, 2nd Edition
1. Click on the first clip and preview it for a few seconds (or as long as you want) by clicking
the Play button below the preview window.
2. Now get used to the controls. Click the Stop button to halt the video and return to the
beginning. Slide the Seek bar, located just above the controls, to any location in the movie.
Click Play to view the clip from that point. While viewing the video, click the Next Frame
button (fourth in line from the Play button) to pause the video; click it again several times
to move ahead one frame each time. When you’ve reached a frame you like, capture it as a
still image by clicking the Take Picture button. The Save Picture As window opens, letting
you save the still as a JPG file in whatever folder you wish. The photo also appears
instantly in the collection.
3. With the first clip still selected, drag it to the first placeholder on the storyboard (that is,
the square on the far left). The clip now exists both on the storyboard and in the collection.
Clicking on the clip places it in the preview window, from which you can view it as before.
You can also play it by clicking the Play Storyboard button in the storyboard toolbar.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 203
4. Drag the second clip to the second storyboard placeholder and the third clip to the third
placeholder. You now have a three-clip movie ready for viewing (see Figure 13-7). Clicking
the Play Storyboard button plays the three clips in succession; the currently playing clip is
highlighted on the storyboard, and this highlight changes as the movie moves to the next
clip. As the movie plays in the preview window, clicking on a clip moves the Seek slider
to the start of that clip and plays the movie from that location; similarly, as you move the
Seek slider, the highlighted clip on the storyboard changes to reflect that move. In part,
this is what makes Movie Maker easy and quite powerful: Its various components interact
so completely.
5. Split the existing clips into additional clips. This step is unnecessary if you already have a
large number of clips, but if Movie Maker created only a few, you can add more in two
ways. First, you can play the video to the point where you want a new clip to start, then
click the Split button on the preview window’s control bar (the button lies immediately to
the left of the Take Picture button) or choose Clip ➝ Split. This process splits the clip into
two clips and lets you work with each independently. Second, you can have Movie Maker
create additional clips automatically by right-clicking the clip in the Collections area and
choosing Create Clips from the menu. This process gives you many additional clips, and
you essentially start your storyboard over again. If you wish, you can continue to split and
create clips, breaking your footage into smaller and smaller segments.
204 PC Magazine — Windows XP Solutions, 2nd Edition
6. Edit out unnecessary footage. Much unedited video has a great deal of unnecessary
footage, at least from the standpoint of the intended audience. You can eliminate excess
footage in two primary ways — first, by deleting clips and, second, by decreasing their
duration. You can delete clips from either the storyboard/timeline or the collections
window by right-clicking the appropriate item and choosing Delete; you can decrease their
duration by trimming them. To trim a clip, click the Show Timeline button just above the
storyboard, click the appropriate clip in the timeline, move the pointer over either end of
the clip until it turns into a double red arrow (see Figure 13-8), and drag the clip either
left or right, depending on whether you want to eliminate footage from the beginning or
the end of the clip.
7. Add effects to individual clips by right-clicking the clip and choosing Video Effects. Figure
13-9 shows the Add or Remove Video Effects dialog box atop the movie interface, with
only the first clip, at the far left of the storyboard, selected. Click the effect you want, and
then click the Add button. When you’ve finished adding them, click OK to put them into
effect. You can also add effects by choosing Tools ➝ Video Effects, clicking the icon for the
desired effect in the resulting Video Effects window, and dropping it onto the clip. When
you’ve applied a video effect, the Effects icon at the bottom-left corner of the clip (in the
storyboard) becomes highlighted, and you can hover the pointer over that icon to see a list
of the effects for that clip.
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 205
8. Add transitions between clips, especially when an edit or trim has produced discontinuity.
To add a transition, choose Tools ➝ Video Transitions to display the Transitions area. Click
on the Transition icon you want and drag it to the small square on the storyboard just in
front of the clip into which you wish to transition. The transition creates an artificial link
between the clips, adding a special effect that acknowledges the discontinuity but prevents
jarring the viewer by making it obvious. Movie Maker includes transitions ranging from
upward and downward wipes to page curls, shatters, dissolves, checkerboards, pixelation,
and even a keyhole (see Figure 13-10). The transition appears briefly in the video to help
your audience make the switch from clip to clip easily.
Tip
Transitions can be extremely effective, but if you use too many of them they quickly come to seem amateurish
to an extreme. Use them only when you need to give your viewers’ eyes something to focus on between the
clips. They provide an excellent means of switching from one location to another in your video, such as from
the final scene in the wedding ceremony to the opening scene halfway into the reception later in the day.
206 PC Magazine — Windows XP Solutions, 2nd Edition
9. Click the Rewind Storyboard icon just above the storyboard to rewind to the beginning of
your video. Click the Play button, and watch the movie all the way through, stopping to
make additional changes as you see fit.
10. Click the Show Timeline button to reveal the timeline. Here, you can see the Audio/
Music track and the Title Overlay track. If you want to add narration to your video, plug
a microphone into your sound card (or whatever audio device you have configured in
Movie Maker), and choose Tools ➝ Narrate Timeline. Click the Start Narration button in
the Narrate Timeline area, perform the narration, and click Stop Narration when you’ve
finished. Movie Maker adds a clip in the Audio/Music track, showing the beginning and
ending of the narration. You can add music clips and other sounds to that track as well.
11. To add titles, credits, and other text overlays, choose Tools ➝ Titles and Credits. Figure
13-11 shows the result: a number of hyperlinks that change the interface once more when
you click them, allowing you to add the textual elements precisely where you wish. To
add an overall title, probably the choice you’ll want most frequently, click Add Title at the
Beginning of the Movie and fill in the cells. To add text between clips or on top of clips,
click the appropriate link and fill in the cells once again. At the bottom of the Enter Text
screens are two important links that let you change the animation for the title, including
Chapter 13: Unleashing Your Inner Spielberg: Making Videos 207
fading, mirroring, and paint-dripping effects, and that also let you change the font along
with its color, size, and transparency level. Click the Done link to add the text elements to
the video.
12. Save your project in two ways. First, throughout the creation and editing, save it as a
Movie Maker project by choosing Save ➝ Project. When you’ve finished all your editing,
choose File ➝ Save Movie. You have several options for saving a video, ranging from saving
it to a CD to saving it to a DV camera. Saving to a CD means that you can play it on any
compatible video CD player, which includes most newer standalone DVD players. Saving
to the Web requires a hosting location. Saving in order to send by email results in the
smallest possible file and the lowest available quality.
Tip
You can save yourself a great deal of time and effort by using Movie Maker’s AutoMovie feature, accessible
in the Tasks pane. AutoMovie will create a movie with the clips you give it, adding transitions, effects, and
fairly substantial edits. The result is always pretty good, but you’re better off in the long run controlling the
process yourself.
208 PC Magazine — Windows XP Solutions, 2nd Edition
Summary
Congratulations! You’ve completed your first movie from start to finish. Get a bit of practice at this,
and before long you can set up a ticket booth and a concession stand, wait for nobody to show up to
watch it, and then complain bitterly about the prejudice of the movie industry against films that
really matter. More seriously, once you’ve mastered the beginnings of Movie Maker, you can start
digging into its numerous capabilities, such as precision placement of clips, additional special
effects, and downloadable add-ons. Clearly, this program excels at usability, and its results are amaz-
ingly good, so get the most out of it before even considering advanced video software.
Chapter 14
W indows XP ships with Windows Media Player. It is best known as a multimedia file player,
but it’s surprisingly adept in other areas as well. Surprisingly, that is, because most people
know Media Player as a music and video player only. Pop an audio CD into your CD drive, and
Media Player starts and plays the music, unless your PC’s manufacturer has changed the Windows
XP default to launch a different program instead. Click on a Windows Media link on a video site, and
Media Player lets you view the video. Even if the program doesn’t actually start when you insert a
CD, it always appears as an option in a menu of choices along with any other music software you’ve
installed on your system. Thanks to its inclusion in Windows, Media Player is all over the place.
But the program does more than just play music and video files. In fact, it offers a range of
advanced features that give you control over numerous multimedia tasks, including: listening to the
radio, burning CDs, transferring playlists to portable devices, and purchasing music online.
This chapter covers the variety of music-related activities possible with Windows Media Player, from
playing songs and acquiring album information to ripping and burning CDs. To follow the details in
this chapter fully, you need version 10 of Windows Media Player. If you don’t have version 10, you can
download and install it via Windows Update or from the Microsoft site at microsoft.com/windows/
windowsmedia/mp10/default.aspx. Alternatively, by installing Service Pack 2 (see Chapter 1), you get
version 10 automatically.
Incidentally, lest you think I’m advocating particularly violent actions in your musical computing,
ripping (in CD-land, anyway) means copying songs from a CD to your hard drive, while burning
means copying data to a CD. Just another couple of charming computer terms, nothing more.
Note
Many who use Media Player recommend against installing version 9 or 10, first citing problems with stability
and then decrying the Digital Rights Management (DRM) features built into it (see the DRM sidebar later in
this chapter). Both issues are valid for certain users, but many users have also reported no stability prob-
lems, and many either do not know about or have no problem with DRM making its way into entertainment
presentation software. This chapter examines version 10 because it offers the latest features, but if either of
these items concern you, feel free to stick with Media Player 8 or earlier, whatever you already have on your
PC. If you do, though, be aware that some of the instructions in this chapter won’t do you a lot of good.
209
210 PC Magazine — Windows XP Solutions, 2nd Edition
Playing Music
In all likelihood, you’ve already discovered that Media Player plays music. It does so very well, auto-
matically, and painlessly. But inside the Media Player interface lies a plethora of features that few
users ever bother to learn. Then again, it also has limitations that many people overlook. As an
example of the former, Media Player contains a built-in graphic equalizer with three different modes
of operation, giving you full control over the tone of your music (see the “Sound Enhancements” sec-
tion later in this chapter). As an example of the latter, Media Player does not, in and of itself, work
completely with two of today’s primary digital formats: MP3 and DVD.
If you want to record MP3 files (Media Player plays them just fine) or watch DVD movies, you
have to install add-ons. In the case of MP3 encoding, this usually means purchasing new software
(often inexpensively, but it’s still a purchase). In the case of DVD viewing, you can also purchase an
add-on, but first check your DVD movie collection. Many DVD movies come with their own DVD
decoder for your PC (insert the DVD into your DVD drive to find out), and this can help you over-
come that limitation. But back to music.
You can play almost all popular music formats in Media Player. A summary of digital music for-
mats appears later in this chapter; but for now, you can assume that Media Player will play whatever
you offer it, including audio CDs, .wav files, MP3 files, .wma files, and more. It cannot, however,
play your RealAudio files (including RA, RM, RPM) or Apple iTunes files (AAC format). So, if you get
your music via iTunes, stick with the iTunes player.
To play a music track in Media Player, you have several choices:
Open Media Player, choose File ➝ Open, use the Open dialog box to navigate to the music
file, select the file, and click Open.
Use My Computer or Windows Explorer to navigate to the music file, right-click on the
filename, choose Open With from the menu, and click on Windows Media Player. If the
file bears the Media Player icon, you can simply double-click it to play it with Media
Player; if you’ve assigned that file type to another music program (some programs, on
installation, make it hard not to do this), the file will have that program’s icon. In this
case, you’ll have to use the right-click method.
Use My Computer to navigate to the music file. Select it and click the Play All item in the
Music Tasks area on the left (this item becomes Play Selection if you choose multiple
tracks).
Launch Media Player and insert a music CD in the CD drive.
Without Media Player or any other music program running, insert a CD in the CD drive
and wait for the Audio CD dialog box to appear. Choose the Play Audio CD using Windows
Media Player option. If you want Media Player to load automatically whenever you insert
a CD, click the Always Do the Selected Action check box and click OK.
In all these cases, the music file begins playing. The Seek bar, located just above the Play controls
at the bottom of the screen, indicates the current location in the track. You can slide the Seek control
forward to jump ahead in the song or backward to rewind it. To see information about the song
itself, click the Now Playing button on the toolbar.
Chapter 14: Playing, Ripping, and Recording Music 211
Note
Although you can use Media Player without being connected to the Internet, the first time you play a CD you
must have an Internet connection in order for Media Player to download the album and track information for
that CD.
Like the view itself, the actual information you get from the Info Center depends on which store
you’ve selected. Figure 14-1 shows the result of clicking the album cover for the currently playing
CD using the MSN Music Info Center. As you can see, the only information here is about the album
itself, how to buy tracks from it, and CDs you might also like (the list on the right). Other Info
Centers (such as Puretracks) give you more information about individual tracks. The Walmart Music
Downloads view of the Info Center provides a short text write-up of the current CD, but nothing else
other than a link to buy it.
All of which brings up the question, “Who thought this was a good idea?” In Windows Media
Player 9, the Info Center was still related to purchasing the product (there was a link to do so), but
it also provided useful links to artist information, lyrics, similar music, and more. In other words, the
Info Center actually had information! Obviously, Microsoft figured it was time to link directly into
the sales of music — commendable in that nobody should be downloading music without paying for
it — but why penalize the potential purchasers by providing even less information than before? The
result is a poorer Media Player than before from an information standpoint, but a richer one for pur-
chasing online. A fair trade-off? No, I don’t think so.
There are several ideas at work here. In the case of music, you purchase either individual songs or
entire albums and download them into Media Player’s library. Then you listen to them on your PC,
make them available via your networked media player, or burn them to a CD. Movies work much
the same way. Radio purchases give you access to multiple stations, while TV access gives you access
to various programs. MLB Baseball, for example, offers a $14.95 package that lets you listen, via
Media Player, to live audio broadcasts of every game on the schedule; for this price, you also get
archives. For $79.95, you can watch televised broadcasts of games taking place outside your local
area (again, with archives); $99.95 gets you both.
When it comes to making purchases, or gleaning information about the products, don’t expect
all the online stores to work the same. Each has its own interface, and each looks like a Web site
rather than part of Media Player itself. In fact, Media Player basically acts as a Web browser for these
stores; the only difference between buying items here and over the Web is that the files download
directly into Media Player’s library and are instantly ready for use. Which, by itself, is obviously a
useful feature.
After selecting a store, click the Now Playing button to get the Info Center view specifically
designed for that store.
SOUND ENHANCEMENTS
From the standpoint of Media Player as a playback vehicle for your music, the most important
enhancements are those that let you change the sound of the currently loaded track. And make no
mistake, these enhancements do their job. You can thoroughly alter the sound of the song you’re lis-
tening to, in effect creating a different experience each time out.
As with even the cheapest stereo, tone controls provide the greatest single difference in sound
(well, technically volume controls do because you can silence the music completely or blow out your
ears and your windows, but we’ll stick with tone controls here). Media Player goes beyond the stan-
dard bass and treble controls, however. Instead, you get a full 10-band graphic equalizer (see Figure
14-3), giving you pinpoint control over the full range of frequencies. Not only that, but you can con-
trol these frequencies in three different ways. The equalizer represents Media Player’s true tour de
force from a listening standpoint — a true enhancement.
214 PC Magazine — Windows XP Solutions, 2nd Edition
Choose Graphic View ➝ Enhancements ➝ Equalizer. Activate the equalizer by clicking the Turn
On link near the top of the Enhancements pane (it should be on by default). Now, play some music
and slide the controls up and down. The slider on the far left controls the lowest bass sounds; the
one on the right, the highest treble sounds. Between those two extremes lie the remaining frequen-
cies, with midrange — in which you find the majority of vocals, guitars, and middle-range piano —
occupying the middle three to five bands. If you love bass at the expense of everything else, drag the
treble sliders down and raise the bass; if you want only midrange booming bass, emphasize the sec-
ond and third sliders from the left. If you want to emphasize high-hats, triangles, piccolos, and other
high-end instruments, raise the sliders near the right extreme. And so on.
You have several ways to adjust these settings. The three radio buttons to the left of the sliders
give you the following modes of control (from top to bottom):
Independent: Each slider moves independently of the others, thereby providing precise
control over each frequency range.
Loose Group: Moving one slider affects all the others, but only to a limited extent, with
the frequencies closest to the slider being moved undergoing the greatest change.
Tight Group: Moving one slider moves all the other sliders to a significant degree, with
the cluster of nearby sliders undergoing the greatest change.
Chapter 14: Playing, Ripping, and Recording Music 215
These options provide an extremely useful variety of methods for adjusting the tone. If you know
precisely which frequency you want to change, click the Independent button. If you have a pretty
good idea, but you want to make sure by adjusting similar frequencies, click the Loose Group but-
ton. Finally, if you want a general change, something closer to the standard Treble and Bass controls
on a stereo, use the Tight Group option.
If you prefer, simply choose the sound you want and let Media Player perform the actual adjust-
ments. This option appears in the form of a menu when you click the Custom link just above the
sliders. From this menu, you can choose from a variety of configurations with the frequency adjust-
ments preset to genres of music such as rock, grunge, opera, classical, blues, and more. Click the one
you want, and watch the sliders readjust.
Also available on the Graphic Equalizer Enhancement pane is the left and right balance control.
The SRS WOW enhancement (not pictured in Figure 14-3) also significantly affects tone. A combi-
nation of technologies, SRS WOW simulates a surround-sound experience, with more powerful bass
and enhanced midrange sounds, especially good for listening to quiet tracks, in quiet environments, or,
on the other extreme, for locations where you need to get additional power from your speakers. Click
the Turn On link to activate this feature, and then click the speaker link beside it to customize the
sound for large speakers, normal speakers (the default), or headphones. Slide the TruBass control to the
right for stronger bass or left for weaker, and the WOW Effect slider to enhance the surround-sound
simulation.
Two additional enhancements change the listening experience (again, not pictured in Figure 14-3).
Quiet Mode helps when you need to keep the volume turned down by evening out the differences in
volume between loud and soft passages in the music (in music lingo, this process is called normaliza-
tion). Turn the feature on and specify the result you want: medium difference for a moderate amount
of normalization or little difference for maximum normalization in which loud and soft passages will
be as close to the same volume as possible. The Crossfading and Auto Volume Leveling Enhancement
pane provides two more controls. Auto Volume Leveling works somewhat like normalization, but
instead of leveling out the volume differences in a single music track, it levels out the volume differ-
ences between tracks, a problem particularly acute when downloading music (purchased albums are
mastered to ensure balanced volume levels). Crossfading makes Media Player sound like a radio sta-
tion by overlapping the end of one track with the beginning of the next. Note that both Auto Volume
Leveling and Crossfading works only with downloaded files or files ripped from audio CDs, not with
audio CDs themselves.
OTHER ENHANCEMENTS
While the sound enhancements affect your listening, you can influence the appearance and perfor-
mance of Media Player in other ways as well:
Skin Mode: Not related in any way to listening to music while unclothed, choosing Skin
Mode shrinks the size of Media Player dramatically, configuring it as a small, stylish-
looking device that’s easier to keep out of the way of other windows. Figure 14-4 shows
the result of clicking the Skin Chooser item on the View menu: Click on each item on the
Skin list to see what each skin looks like. When you’ve decided on one you like, click the
Apply Skin item just above the main windows. From this point on, when you choose
View ➝ Skin Mode in the standard (Full) version of the player, the player will take on the
look of this skin.
216 PC Magazine — Windows XP Solutions, 2nd Edition
In Skin Mode (see Figure 14-5), right-click the player and choose Switch to Full Mode to
return to the standard player. In fact, while in Skin Mode the right-click menu becomes in
many ways your best friend, offering all Media Player options.
Color Chooser: This Enhancement pane lets you set the hue and saturation of the stan-
dard player or choose black as the background color.
Play Speed Settings: This Enhancement pane, available with only downloaded or ripped
tracks, lets you speed up the audio without changing the pitch. Use it when you want to
listen to a track but want to get through it more quickly, or if your offspring want to listen
to music that wouldn’t sound very different when sped up by, say, double.
Video Settings: This Enhancement pane gives you control over hue, saturation, and
brightness/contrast of videos. It works best with downloaded items such as music videos.
Visualizations: On the theory, pushed hard by MTV and its spin-offs, that one cannot
possibly concentrate on music without something to look at simultaneously, you can play
visualizations — primarily colorful animations — in the large Now Playing area of Media
Player. They range from the genuinely pretty to the bizarrely psychedelic.
Tip
While in Skin Mode, the player is much smaller, and it’s quite easy to lose on a crowded desktop. You can
keep it always on top by opening the Options dialog (Tools ➝ Options in the full player, or right-click and
choose Options in Skin Mode). On the Player tab, choose Keep the Player on Top of Other Windows.
Tip
You can configure Media Player to add items to the Media Library automatically. Choose File ➝ Add to
Library, select the By Monitoring Folders option, and click the Add button to browse for additional folders to
monitor. Then click OK. By default, Media Player monitors My Music only.
Once you have items in the Media Library (see Figure 14-6), you can start organizing them into
playlists. To do so, you can choose from several different methods. The first method is to right-click
on any file in the Media Library and choose Add to Playlist, an action that opens the Add to Playlist
dialog box, which contains a list of your playlists. Choose the playlist to which you want to add the
file and click OK or create an additional playlist by clicking New. You can select multiple songs in
Media Library and add them all to a playlist with a single action of this type. The second method is
to expand the folder list on the left-hand side of Media Library, and right-click on one of the ele-
ments in the Artist, Album, Genre, or Other Media folders and choose Save as New Playlist. Another
method is to drag songs and albums from the Media Library to the playlist. The final method is to
choose New Playlist from the File menu, create the playlist, and then locate songs in Media Library
to add to it.
When you have created a playlist, you can play the entire collection in sequence by right-clicking
on it and choosing Play. At any time, you can drag and drop the songs in the playlist to have them
play in the order you like.
Figure 14-6: The Media Library filled with songs and playlists.
Chapter 14: Playing, Ripping, and Recording Music 219
Tip
You can create and populate playlists from any Windows folder, not just from the Media Library in Media
Player. Open a folder on the desktop or inside Windows Explorer, locate the song files and select them, either
individually or as a multiple selection, right-click, and click Add to Playlist. This action opens Media Player
(if it is not already open) and also opens the Add to Playlist dialog box.
Raw music takes up a great deal of hard disk space. A commercially produced audio CD, for
example, can typically hold 74 minutes of music. Because the same CD could hold roughly 650MB
of data, each minute of music consumes close to 10MB of the CD. If you own music simply to listen
to it, the size of the files poses no problem. Seventy-four minutes of music on a CD is more than
enough for most of us, especially because most musicians seem unable to produce more than 20
minutes of even remotely memorable music with each new release.
220 PC Magazine — Windows XP Solutions, 2nd Edition
If you want to store songs on your hard drive, put them on small units that use flash memory, or
send them across the Internet (legally, we mean), 30MB for a three-minute song is far too much data.
For those purposes, you need a compressed format that shrinks the size of the file dramatically, ide-
ally without losing any — or at least not very much — of the sound quality. Different compression
technologies have appeared over the lifetime of the personal computer, each technology claiming
different benefits and many having their 15 minutes or more of fame. The Sun Audio format, for
instance, had a heyday in the Internet’s early years as the only file you could realistically download
over a dial-up modem. In the past couple years, the most famous audio format of them all, MP3, has
fulfilled that same purpose and more.
The following sections briefly describe the major formats.
WAV
By far the most common file format among Windows music developers, WAV (which stands for
Waveform sound), was a joint development of IBM and Microsoft. Although you can run into pro-
grams that don’t play certain types of audio files, every piece of sound software in the Windows
world plays .wav files. It is the standard, bar none.
Like the files on a commercial music CD, .wav files are uncompressed. Because of this, they
sound practically identical to CD audio. Indeed, when you rip a song from a CD with many CD rip-
ping programs, the default result is a .wav file; playing the two back to back reveals no discernable
difference (Media Player rips CD tracks to WMA format, however). Professional recording software
routinely uses WAV as the primary audio format, burning the .wav files directly to CD when the
recording and mastering is completed.
Chapter 14: Playing, Ripping, and Recording Music 221
.wav files use an average bit rate of 1,411.2 Kbps (that is, 1,411.2 bits per one second of audio).
By comparison, the bit rate of MP3 is 128 Kbps, hence the difference in file size.
WMA
As you can probably guess by its name, Windows Media Audio is a Microsoft design and implemen-
tation and was supported at first only by Windows Media Player. When you consider that everyone
running Windows owned Windows Media Player, however, and that ripping CDs using Media
Player reformatted the tracks as .wma files, it’s no surprise that .wma files began to proliferate on the
Net. Indeed, they have, to the extent that many portable MP3 players now support both MP3 and
.wma files, a trend that will not only continue but also grow.
Fortunately for music buffs, WMA provides a genuine alternative to MP3. WMA promises equiv-
alent sound quality to MP3 files (near CD quality in both cases) at half the file size, by using 64-bit
rather than MP3’s standard 128-bit encoding. However, to get equal quality in the real world, you
should use WMA’s 128-bit encoding, at which point WMA sounds at least as good as MP3, but at
which point the file size is significantly larger. That leaves one major advantage to WMA: Because of
its built-in DRM capabilities, and the resultant deals between Microsoft and entertainment compa-
nies, you’re likely to start finding more WMA than MP3 audio files before long.
AIFF
An acronym for Audio Interchange File Format, AIFF does for the Macintosh what WAV does for the
PC. Uncompressed and of the highest quality, AIFF files are synonymous with Mac music and sound.
MP3
As a perfect example of how technology can become an almost overnight standard, with its name (or
at least its acronym) becoming part of everyday language, look no further than MP3. The full name
for the format is actually MPEG-1 Audio Layer 3, but with the possible exception of the engineers of
the Motion Picture Experts Group, nobody calls it that. Today we have MP3 software, portable MP3
players, and MP3 support on standalone CD and DVD players. The MP3 acronym makes the news
regularly because of the fight between the music industry and the zillions of people who convert CD
tracks into MP3 format and trade them over the Internet. MP3 is hot, big time, and shows no sign of
relinquishing its lead.
Actually, MP3 did not spread overnight. Developed by a German research institute, MP3 was
patented way back in 1989, and the Motion Picture Experts Group brought it into its standard a few
years later. So it’s anything but brand new. But only its adoption by Internet users, empowered by
MP3 decoders, brought the format into the mainstream. Then came Napster, whose horribly slow
speed demanded small files, and MP3 became king.
MP3PRO
Developed by Coding Technologies and supported by, among others, Intel, mp3PRO combines MP3
with spectral band replication (SBR) technology. SBR is necessary because in compressing the file to
roughly half the size of standard MP3 files, mp3PRO loses high-frequency sounds. In the mp3PRO
scheme, MP3 technology handles low frequencies, while SBR takes care of the highs. The result is a
music file that sounds as good as — and often better than — the MP3 file itself, but which takes up
less space.
222 PC Magazine — Windows XP Solutions, 2nd Edition
All You Ever Wanted to Know about MP3s but Were Afraid to Ask
The way MP3 works demonstrates how ingenuity can improve the way we experience technology.
This compression technology (like others) works by acknowledging the way human beings filter out
certain sounds or, in fact, can’t hear them at all. Specifically, the human ear doesn’t hear all the
sound available to it; it either cannot pick it up because the volume is too low or the frequency is out
of hearing range, or it effectively blocks the sound by replacing a softer sound with a louder sound.
This replacement process is known in psychoacoustics research as masking, and it provides the
basis for MP3 compression.
Psychoacoustics research studies the limits of the ear’s ability to perceive sounds. Psychoacoustic
software, of which MP3 compression is an example, excludes sound in the audio signal rendered
unnecessary by the fact that we won’t hear it anyway. It’s the principle we encounter in everyday life
when one sound — talking to someone near an airport, for example — gets drowned out by another
sound — like that of an airplane taking off. A pure digital translation of the event leaves both noises
in the signal. A psychoacoustic translation essentially gets rid of the conversation, as much as it can,
because our ears do not perceive it.
MP3 compresses files according to the following process:
1. It removes sounds with frequencies beyond the range of human hearing (roughly 20 Hz to
20+ KHz).
2. It removes sounds too quiet for humans to hear.
3. It removes masked sounds.
With all these sounds removed, the size of the file shrinks by over 10 times. So, that five-minute
song that clocks in at over 50MB as an uncompressed sound file can be less than 5MB with MP3
compression applied. Other audio formats, such as Microsoft’s Windows Media Audio, compress the
data even further, resulting in a file size roughly half of MP3s. The question then becomes one of
sound quality.
MP3 and WMA use lossy compression; the file shrinks through a loss of data. By comparison, CD
music files (CDDA format) and their counterparts — WAV in the Windows world and AIFF in the
Mac world — provide no compression of this kind at all. Lossless compression technology does exist
in the audio world (it’s well known in the digital image world), such as Free Lossless Audio
Compression (FLAC) and Lossless Predictive Audio Compression (LPAC). But because their file sizes
remain high, they haven’t caught on for Internet audio and we don’t cover them here.
To date, the industry hasn’t exactly jumped on the mp3PRO bandwagon because of the ubiquity
of MP3 itself. But mp3PRO provides a full range of DRM encodings and has the full support of
industry giants such as Intel. So, expect this format to start showing up in large quantities. In fact,
Gracenote, the company that maintains the enormous database of music your player accesses when-
ever you put a music CD in your CD-ROM drive, encourages the use of mp3PRO because of the ease
in which song and album information can be encoded into the audio file itself. This support alone
should guarantee the format’s success.
Chapter 14: Playing, Ripping, and Recording Music 223
MP4
Developed in the late 1990s by Global Music One, the MP4 file format offers one significant improve-
ment over the MPEG-4 standard on which the format was based. Specifically, MP4 embeds a player
into the audio file so that people downloading an MP4 file don’t have to worry about whether their
audio software can play the song. The company used this format to distribute audio with its Global
Music Outlet service, but today its focus is on wireless applications. Still, you’ll find MP4 files in vari-
ous locations, and you know you’ll have a player for them.
QUICKTIME
At times, you may come across audio files bearing the .qt or .qt3 extension. These are QuickTime
audio files, designed for play in Apple’s free QuickTime player. But QuickTime isn’t a separate audio
format; in fact, these files bear encodings as AIFF or WAV. Most major audio players recognize these
files as QuickTime files, but if you try to play a .wav file, for instance, and your player tells you it has
an invalid file format, try to play it in QuickTime instead. Often, it works.
MIDI
Unlike all other files listed here, MIDI files contain no audio data at all. Instead, MIDI files, which
bear the .mid extension and are extremely small, contain instructions for your MIDI synthesizer —
either a separate MIDI device (typically a keyboard) or the synthesizer built into most PC sound
cards. Many notebook PCs do not have MIDI synthesis as part of their sound system, so don’t get
frustrated if the MIDI file does not play.
Ogg Vorbis
Originally going by the charming name of Squish, Ogg Vorbis is not the name of a bizarre species in
The Hitchhiker’s Guide to the Galaxy, but rather an audio format designed to provide a money-free,
license-free, and patent-free technology to music creators and collectors alike. The Hitchhiker’s
Guide to the Galaxy notwithstanding, the name Vorbis does come from a book — Terry Pratchett’s
Small Gods — while Ogg comes from the old network sci-fi game Netrek. In the software itself, how-
ever, Vorbis refers to the compression technology, while Ogg refers to the format.
Ogg files have not yet reached the mainstream, at least not as separate music files. But that’s com-
ing. Electronic Arts has used Ogg files in some of its games, as has Epic Games. Record companies
are paying attention as well because, unlike MP3 and WMA, Ogg Vorbis use does not require licens-
ing fees. The primary drawback for music distribution, however, is Ogg Vorbis’s lack of support for
DRM. Whether this changes remains to be seen, especially given the general contempt of the Open
Source community (of which Ogg Vorbis is proudly a part) for anything protection related. But given
that many people claim Ogg Vorbis files sound better than either MP3 or .wma files, and given the
support for Ogg Vorbis in the growing Linux community, surely some form of DRM will happen
before long.
224 PC Magazine — Windows XP Solutions, 2nd Edition
AAC
Short for Advanced Audio Coding, AAC is actually further abbreviated from its full name, MPEG-4
AAC. While three music services have used this format as the basis for protecting and delivering
their content — AT&T, Global Music, and Liquid Audio — AAC has become the single biggest player
in paid music services today as the file format supported by Apple’s famous iTunes. AAC offers
higher quality than MP3 at lower bit rates, and in addition — and this is crucial — it supports a full
range of DRM properties. Apple has also built AAC into its QuickTime software at both the developer
Chapter 14: Playing, Ripping, and Recording Music 225
and end-user level. So for Macintosh systems, it has become, in effect, the standard audio format.
iTunes for Windows also uses ACC files, and portable players in addition to Apple’s iPod have started
to appear that support the AAC format in addition to MP3 and (in most cases) WMA. In numerous
tests, AAC files have outperformed both MP3 and .wma files from the standpoint of sound quality.
Other tests, however, have shown conflicting results, as these kinds of tests tend to do. The fact is
that as iTunes becomes more successful, AAC might very well become the Internet audio standard.
So, keep your eye on it and watch it grow. For the time being, though, MP3 continues with great
strength, and WMA is the format of choice for services such as Napster and MusicMatch.
ATRAC
The file format used by Sony’s MiniDisc players, ATRAC is a lossy compression algorithm with a stan-
dard bit rate of 285.3 Kbps. From a sound quality standpoint, ATRAC and MP3 are remarkably similar.
Those who own MiniDisc players, however, naturally tend to prefer ATRAC, and it tends to perform a
little better than MP3 and WMA in genres such as classical music with its great dynamic range.
Tip
Consider ripping your music to a shared folder so that everyone on your home network has access to it and
so that you have access to it yourself from a different PC (such as when you’re sitting on the deck with your
notebook and your Wi-Fi connection).
226 PC Magazine — Windows XP Solutions, 2nd Edition
The most important item on the Options dialog is the Format drop-down menu. By default,
Media Player gives you a choice of three formats. Select each of them in succession and watch the
Audio Quality slider below the menu to see the differences among the three:
You can add more format types to Media Player’s ripping capabilities through plug-ins. For exam-
ple, if you want to save files in MP3 format (and who doesn’t?), you need MP3 encoder software. On
the Options dialog box, clicking the Learn More About MP3 Format link takes you to the MP3
Chapter 14: Playing, Ripping, and Recording Music 227
Creation Plug-ins section of the Windows Media Plug-in pages on the Web. From here, you can
order one of three plug-ins, each selling for roughly $10. Buy and install it, and the MP3 option
appears in the Format drop-down menu. You can now rip from CD to MP3. However, since most of
today’s audio players play .wma files, and WMA is free, there’s little reason to do so. Only if you
specifically need MP3 format do you need to install an MP3 creator.
To burn songs onto a CD, click the Burn button at the top of Media Player. Figure 14-9 shows the
two-pane window that lets you perform this action, the left side listing the songs you wish to copy
and the right side showing items already on the CD-R or CD-RW. Fill the left side with the songs you
want on the CD (you can copy .wma, MP3, and .wav files) and then press the Start Burn button.
Media Player shows you the progress of the copying and tells you when you can eject the CD.
Copying music to portable audio devices such as MP3 players follows the same process. As long
as Windows recognizes your device as a storage unit, you can copy songs to it. In this case, the Copy
to CD or Device window displays the device on the right-hand side instead of the writable CD. You
simply copy the songs between the two windows.
Now, back to playlists. As useful as your playlists can be when it comes to listening to music on
your computer, they’re even more useful when it comes to burning your own CDs and copying
songs to portable devices such as MP3 players. As Figure 14-10 shows, the drop-down list immedi-
ately below the Start Burn button pane displays your entire Media Library, including any playlists
you’ve created. Choose a playlist from this list, reorder the tracks as you want them, and copy the
228 PC Magazine — Windows XP Solutions, 2nd Edition
playlist to the CD or device. In the case of a portable player, you can develop an entire series of
playlists, rotating them onto your device, depending on your mood or needs. Media Player can
quickly become a central gathering of music, ready to copy to external devices whenever you want.
Tip
When burning music to CDs, you should consider using a burn speed less than the default or the maximum
for your recorder. Although your own mileage will vary, tests have repeatedly shown that burning at 8X
speed, sometimes even 4X, offers the best possibility of a CD that sounds good and lasts a good long time
(most burned CDs eventually start losing the audio data). You can adjust the speed in Media Player before
you begin the burning process.
Summary
Nothing in the entertainment world has felt the personal computing revolution more profoundly than
digital music. Your options for listening to music, copying it, recording it, modifying it, and carrying it
Chapter 14: Playing, Ripping, and Recording Music 229
with you are stronger now than at any time before, and those options continue to expand. It would be
nice if the open-mindedness of record companies would expand accordingly so that they would sign
more acts that offered alternatives to the me-too sameness of so much music today. But perhaps digital
music will help in that regard, as well, giving artists greater access to new and specialized audiences.
Whatever happens, rest assured that your PC will be along for the ride, with Windows offering solid,
useful, and well-featured programs like today’s Windows Media Player. But look past Media Player as
well, to players, rippers, and organizers from other companies. If you’re into music, you’ll want to find
the best possible programs for your needs.
Part IV
Utilities
T he utilities covered here include a range of products that install onto Windows XP and give
you a wealth of creative power. I’ve isolated only the products I’ve actually used (as in all the
other Utilities sections), and I fully realize every one of you might have a preferred product in each
of the major categories. I’ve also tried to stick with programs that clock in at under $100, realizing
that the lower the price, the more likely it is that you’ll give them a try. If you haven’t used some of
those described here, you might want to consider them.
231
232 PC Magazine — Windows XP Solutions, 2nd Edition
tools for editing pictures and comes complete with PhotoImpact Album, a picture sorting and orga-
nizing utility. Roxio’s PhotoSuite 7 (www.roxio.com) is a good, if not spectacular, program on its
own, but as part of the still-inexpensive Easy Media Creator suite, which includes CD and DVD cre-
ation programs, a sound editor, and much more, it’s an excellent deal.
Other worthwhile programs that handle many of these same tasks include Amazing Photo Editor
(www.silvereaglesoft.com), PaintBuster (www.softbusters.com), Picture Trail Photo Editor (www
.picturetrail.com), and Focus Photoeditor (www.new-world-software.com). All of these are well worth
downloading in their trial versions and putting through their photo-editing paces.
Some photo-editing programs remain free. Photobie (www.photobie.com) is one of these, a use-
ful editor although with limited features. FastStone Image Viewer (www.faststone.org) is a decent
editor but excels as an image file converter. Brush Strokes Image Editor (www.pabird.supanet.com/
~pabird/freesoftware/brushstrokes) lets you work at the pixel level effectively. The Gimp (gimp.org)
has long been an image editor of choice for the Linux crowd, and it is equally effective as a free
Windows tool, well worth the downloading and more.
a DVD player to go with their CD player, while Burn4free (www.burn4free.com) offers one of the very
few free DVD burners (burns video as well as data DVDs). DVD Wizard Pro (www.dvdwizardpro.com)
provides a relatively easy interface for copying DVDs (including a good interface for converting VHS
tapes to DVD).
DVD players are numerous, and most have a full array of excellent features. PowerDVD (www.
gocyberlink.com) remains among the most popular, with 16:9 display support and the capability to
deinterlace DVDs for better images. DirectDVD (www.orionstudios.com) looks on screen like a physi-
cal DVD player, and it features superb audio tools to get the best sound from your DVDs. NeoPlayer
(www.mediostream.com) supports the displaying of dual subtitles on the screen as well as the capabil-
ity to stretch audio without pitch distortion, letting you play back scenes in slow motion while still
retaining proper sound and voice.
Part V
Changing the Interface
Chapter 15
Giving Windows a Facelift
Chapter 16
Taking Control of Your Start Menu, Taskbar, and
Folders
Chapter 17
Changing Your Interface from the Control Panel
Chapter 18
Taking Even Greater Control of Your Interface
Part V Utilities
Chapter 15
Giving Windows
a Facelift
W hen you look at the desktop of most PCs running Windows XP, you see almost exactly the
same thing. First to strike the eye is the background image, by default the one labeled Bliss
in the Display Properties dialog box. Next you probably notice the icons, sometimes scattered around
the desktop, other times lined up neatly. At the bottom of the screen resides the Taskbar, with its
dark blue background and its somewhat garish green Start button bearing white text and the famous
pastel Windows logo. Nice sky, nice hill, nice icons, nice Taskbar. But what you need is a desktop and
an interface that are all about you.
Of course, nobody is about to suggest that there’s anything particularly wrong with the default
Windows XP desktop. In fact, the only thing that comes to the fore is the surprising lack of individ-
uality displayed by most of its users. The layout, content, and styles of the desktop are almost infi-
nitely changeable, to the degree that every user’s desktop can look completely different from every
other user’s desktop. For some reason, however, few people seem to make any changes at all to the
default desktop, choosing to stick with the one Microsoft gave them. The surprising part about this
is that customizing your Windows XP desktop makes every bit as much sense as customizing your
office or your study, and this operating system offers numerous ways to make it your own.
This chapter focuses on changing the appearance of the Windows XP interface — colors, screen
resolution, fonts, icons, and more — and on how to organize your desktop to make it more effective.
By the end, you’ll have all you need to create a desktop that suits your needs perfectly, and one that
looks as elegant and organized — or for that matter as chaotic and gaudy — as you wish.
237
238 PC Magazine — Windows XP Solutions, 2nd Edition
still others can simply look different from the way you’d like them to. You owe it to yourself to make
the entire desktop better for you.
In all likelihood, you won’t want to make all the changes outlined in this chapter. But, then again,
you might. The most effective Windows interfaces are those in which the user has explored every
possible alteration and in many cases made every one of those alterations. The interesting part is that
once you make your changes, you’ll probably find everyone else’s desktop somewhat clunky to use.
Caution
By definition, customizing your Windows XP desktop means that it’s no longer the standard version. Many
organizations frown on customization, in fact, because of the potential difficulties it creates for IT personnel
and because moving from one machine to another requires readjustment. Some organizations specifically
disable the capability to make certain changes (as you may discover). Unless you frequently move from
machine to machine, however, it makes more sense to tailor your most frequently used environment to your
own needs. Besides, it doesn’t really take all that long to readjust to the default XP desktop.
Figure 15-1 shows the initial XP desktop in all its uncustomized glory. Prepare to say goodbye to it.
Tip
Turning off the Welcome screen option can provide a significant security benefit in that you can configure it
to force users to type in their usernames and passwords in order to log on to the PC. In addition, unlike the
Welcome screen, the old Logon dialog box does not automatically display the already existing user
accounts. When you use the Welcome screen, by contrast, anyone can simply click one of the user icons
and then attempt to guess the password, and if you haven’t enabled passwords for all accounts (an option in
XP), you make it fairly easy for outsiders simply to force their way in. Of course, some degree of security still
exists, but it’s harder to guess both the username and the password than the password alone.
Figure 15-2: XP’s standard blue Welcome screen greets you with icons for each user account.
240 PC Magazine — Windows XP Solutions, 2nd Edition
But XP’s roots lie in Windows 2000, whose Logon screen looked nothing like Figure 15-2.
Microsoft chose the more colorful desktop screen to make XP more visually appealing — and less
intimidating for newcomers — but the previous Logon screen remains available to you (indeed, if
your PC is part of a network domain, you have no choice: Windows switches to the older Logon
screen automatically). To switch to this screen, do the following:
1. Click Start and then Control Panel to open the Control Panel folder.
2. Double-click the User Accounts icon.
3. Under Pick a Control Panel icon, double-click User Accounts.
4. Under Pick a Task, choose the option Change the Way Users Log On or Off. Figure 15-3
shows the result.
Note
If you uncheck the Welcome screen option, you also automatically disable the fast user switching option.
You can’t use fast user switching with the pre-XP-style Logon screen.
Changing Backgrounds
Windows XP backgrounds consist of images displayed on the desktop (this used to be called wall-
paper). All users can have their own settings and background. XP provides a fairly wide variety of
backgrounds, but if you don’t like any of them, or if you just get bored with them all, you can create
your own. If you’re graphically challenged, the way I am, you can head out onto the Web and down-
load as many as you want from any number of sites. Many are free; otherwise, the site charges a (usu-
ally) small fee.
Backgrounds are images. Some are large images, while others are small image files that combine
to create a background pattern through repetition, called tiling. Figure 15-1 shows the default XP
background called Bliss, (although farmers might very well call it Work, and it’s probably entirely
unblissful for hay fever sufferers). The Bliss background consists quite simply of an image, bliss.bmp
(found in the folder \windows\web\wallpaper), that XP loads every time you log on to that account.
You can find all of XP’s large background images in the same folder. You can see the smaller back-
ground images, from which XP creates its background patterns, in the main \windows folder itself
(look for the BMP files). You can use any small image to create your own background. If you choose
not to tile it, it will simply occupy a small square at the center of the desktop. Figure 15-4 shows the
background named Zapotec, a single image tiled to cover the entire screen.
You can change your background image in two fundamental ways: through the Display Properties
dialog box or by assigning any image you find in My Computer, Windows Explorer, or Internet
Explorer as the desktop. Any popular image type will do, with BMP, JPG, GIF, and PNG being the
most common.
242 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
Whenever you want to see your desktop uncluttered by open program and document windows, click the
Show Desktop icon on the Quick Launch toolbar on the Taskbar (the blue-edged icon is supposed to look like
a desktop blotter — how nineteenth century). This action minimizes all windows; you can restore them all to
their previous state by clicking the Show Desktop icon a second time. If you don’t see the Quick Launch tool-
bar (it’s disabled by default), right-click an empty area of the Taskbar and choose Toolbars and Quick Launch.
Or use Winlogo+D to display the Desktop (and again to restore previously open windows).
Chapter 15: Giving Windows a Facelift 243
With Display Properties open, click the Desktop tab (the Themes tab is discussed a little later in
the section “Saving Your Interface Adjustments as a Theme”). Figure 15-5 shows the result, with the
default Bliss desktop already selected.
Tip
In a nice gesture, XP lets you preview the background before you choose it. The preview area is extremely
useful when choosing all your interface options.
Click each of the icons in the Background area of this dialog box to see which one you want. When
you’ve decided, choose it, and click Apply or OK. Your desktop immediately takes on that image.
Tile: When you choose Tile, you instruct Windows to display multiple copies of the
image, with each copy adjacent to the next, in a pattern of squares or rectangles covering
the screen. You can tile any background image, but Microsoft has designed the pattern
244 PC Magazine — Windows XP Solutions, 2nd Edition
images specifically with tiling in mind, so they fill the screen properly. Each of the full
background images already fills a screen with a resolution of 800 × 600 pixels (the images
are 800 × 600 in size), and tiling has no apparent effect unless you choose a higher resolu-
tion. Once you do, the tiled image results in four adjacent copies of the image across the
screen, as you can see in Figure 15-6.
Stretch: To compensate for the differences in screen resolution, XP provides the Stretch
option. This option dynamically changes the size of the image to match the resolution
you’ve chosen. You can stretch any image in this way, but if the image is small, stretching
it will cause the image to become pixilated; all images consist of pixels, and when you
display a low-resolution image at a higher resolution, the pixels themselves become visible.
XP uses background images specifically suited to stretching (800 × 600 resolution at
96 dpi), something to keep in mind if you want to create your own backgrounds.
Center: As its name suggests, choosing the Center option centers the background image
on the desktop. As you increase the screen resolution, the image stays the same size as
before and, therefore, covers less of the desktop. Choose Center when you have a back-
ground image that neither tiles nor stretches well.
Note
The Sample Pictures folder is actually a shortcut to another folder, located in \Documents and Settings\All
Users\Documents\My Pictures. When XP is installed, it creates a shortcut to this folder in the My Pictures
folder of all user accounts so that all users have access to them.
resolution determines the amount of working area you have on your desktop, to the extent that the
desktop itself effectively changes size. The higher the resolution, the larger the desktop, the more
windows you can have open, and the more you can see inside each window. In order to make this
happen, everything must be smaller to fit the fixed area of the monitor.
Screen resolution is expressed as the number of pixels (short for picture elements — a single dot)
across the display by the number of pixels from top to bottom. A resolution of 640 × 480 (the origi-
nal Windows resolution), therefore, means 640 pixels horizontally by 480 pixels vertically. By com-
parison, today’s graphics cards and monitors routinely support resolutions of 1600 × 1200 pixels,
1920 × 1440 pixels, and even higher. A resolution of 1600 × 1200 packs roughly six times as many
pixels onto the screen as 640 × 480, and 1920 × 1440 gives you close to nine times as many. Because
everything you see on the screen is made up of pixels, the more pixels you crowd into each square
inch of the screen, the denser — and thus the less choppy — the image. The smoothness of images
and fonts depends entirely on the density of the pixels, so a higher resolution means a smoother-
looking desktop.
To see this difference at work, take a look at Figures 15-8, 15-9, and 15-10. All show the same
browser window. They differ, however, in the amount of information available to the user. Figure
15-8, with its resolution of 800 × 600, demonstrates a fully serviceable window. But if you like to
work with numerous programs at the same time, say with multiple windows of a single program or
with programs that function best with multiple interface elements open, a larger monitor with a
higher resolution answers those needs.
Clearly, the screen in Figure 15-10 offers considerably more room than the other two screens. It also
provides more information at a glance — that is, without the need for moving the windows or
scrolling them — than any of the others.
248 PC Magazine — Windows XP Solutions, 2nd Edition
Figure 15-9: The same window at 1024 × 768 resolution (more stuff but smaller).
So, why not always choose a high resolution? Well, for several reasons:
In many cases, it’s harder to read text at higher resolutions. A high resolution on a small
monitor means small fonts in documents, in menus, and throughout all interface elements.
Even on a larger monitor, lower resolutions can be much easier on the eyes than higher
resolutions.
The quality of your monitor helps determine the suitability of resolutions: some monitors
are simply made better than others.
Higher resolutions take more processing power to render, so lesser-powered PCs and
graphics cards will slow down when set to these resolutions. In some cases, a higher-
resolution desktop can even look like it’s flickering.
Only by trial and error can you determine which resolution is correct for your system and your
personal preferences. However, when you first install Windows XP, the operating system chooses the
best resolution for your hardware, a choice you can later change via Display Properties.
Chapter 15: Giving Windows a Facelift 249
1. Open the Control Panel and double-click the Display Properties icon.
2. Click the Settings tab. Notice that this system has two monitors that can be configured
differently.
3. In the area labeled Screen Resolution, move the slider toward the right for a higher resolu-
tion or to the left for a lower resolution. As you move, watch the resolution measurement
below the slider, and watch the view area (the monitor) in the space above. The view area
gives you an idea of how the resolution affects the size and position of the Display
Properties dialog box.
4. Before clicking OK to set the new resolution, click the Advanced button to set the behavior
of XP whenever you change the resolution or color settings. In the compatibility area,
choose one of the three options:
a. Restart the computer before applying the new settings
250 PC Magazine — Windows XP Solutions, 2nd Edition
5. Click OK until you exit the Display Properties dialog, at which point the XP desktop
changes to your chosen resolution.
you’ll definitely notice a visual difference on graphics-rich programs, and even on the basic XP dis-
play. Photographs at 256 colors appear blotchy and at 16 colors downright ugly.
One more recommended change in this area, especially if the monitor seems to bother your eyes:
from the Display Properties Settings tab, click the Advanced button; then choose the Monitor tab.
The choice for Screen refresh rate may already be correct. However, some users find increasing the
refresh rate above 60 hertz better for their eyes (be sure the Hide modes box is checked).
4. Click OK.
5. Launch the program.
When the program starts, XP changes to the color and/or resolution setting you’ve specified. It
retains these settings until you exit the program.
Note that running the program sets the entire XP environment to those temporary specifications,
not just the program itself. If you need to work with two programs with different specifications, you
need to close and reopen the reset program as often as necessary. Still, this feature can come in
extremely handy and tends to be much more convenient than readjusting the entire display.
Tip
If you want to isolate the program even further from all others, check the third option under Display Settings
to disable the visual themes you’ve configured or selected, including changes to menu text, window borders,
and so on. This change, too, lasts only until you close the program.
Tahoma, but you can change it to any font installed in the Fonts folder of the operating system and
any size your system accepts. You can also bold or italicize the font by clicking the appropriate but-
ton beside the icon size menu.
Tip
You can change the size of the icon itself from this dialog box by choosing from the Size drop-down menu
immediately beside the Item menu.
You can choose individual fonts and sizes for the following interface elements:
Active Title Bar: The title of the currently selected window as displayed along the top of
that window.
Icon: The text label of icons on the desktop and in the My Computer and Windows
Explorer folders.
Inactive Title Bar: The titles of all windows except the currently selected window as dis-
played along the top of those windows.
Menu: The text on all menus, including the menus of all programs.
Message Box: The text included in a box containing a system message, including dialog
boxes and warnings.
254 PC Magazine — Windows XP Solutions, 2nd Edition
Palette Title: The title of the small program-specific windows/toolbars known as palettes.
Selected Items: You can assign a separate font and size to the currently selected item in a
list, giving it an even greater distinction from the remaining members of the list.
ToolTip: The explanatory text that appears when you hover the pointer over a button or
icon. Many people appreciate being able to increase the size of this text (or change the font
and color). Unfortunately, we can’t increase the time it lingers on-screen.
Caution
While changing fonts and sizes tailors the appearance of the interface elements however you want them, you
can easily create a fairly ugly-looking system. More important, you can create an interface in which some ele-
ments actually work against other elements. Start by changing one or two of the more obvious fonts — Icon and
Menu, for example — and progress to a completely customized look.
Note
Be careful not to choose a background of precisely the same color as the text, or you won’t be able to see
what you type.
Chapter 15: Giving Windows a Facelift 255
Caption Buttons: The size of the buttons in the title bar of the window that allow you to
minimize, maximize, and close the window.
Desktop: The color of the desktop itself. Background images reside atop the desktop itself.
If you use a background image that fills the whole screen, the only way to see the desktop
color is to shrink the background image (try the Center option) or remove it by choosing
None on the Backgrounds list.
Icon: The size of the icon on the desktop and in XP’s folders.
Icon Spacing (Horizontal): The horizontal spacing between the icons on the desktop and
in XP’s folders. Increasing the size sets the icons at a further width apart from one another;
decreasing the size brings them closer together.
Icon Spacing (Vertical): The vertical distance between the icons on the desktop and in
XP’s folders. Increasing this size moves the icons further apart from each other upward and
downward; decreasing the size brings them closer together.
Note
The closer you move the icons to one another, the greater the chance of abbreviating the icon labels. Moving
them further apart results in your being able to read more or all of the icon labels.
Inactive Title Bar: The thickness and color of the strip along the top of all windows not
currently selected.
Inactive Window Border: The thickness and color of the border surrounding all windows
not currently selected.
Menu: The thickness and color of the bar that acts as a background for the menus at the
top of each window, immediately below the title bar.
Scrollbar: The width of the scrollbar at the right of each window.
Selected Items: The thickness and color of the bar that acts as a background for the cur-
rently selected item in a menu list.
ToolTip: The color of the ToolTips, which appear when you hover the pointer over an
icon or button.
Color: The color of the window itself.
Why change these elements? The reasons, as always, are personal preference and — more
important — usability. You might prefer a wider scrollbar, for example, if you typically have trouble
positioning the pointer inside the scrollbar; you might prefer a narrower one if you decrease the screen
resolution and no longer need the scrollbar’s full width. The same holds true of menus: Increasing the
size of the strip in which the menus reside can help with pointer positioning. Then, too, you might
simply want a different interface experience from time to time.
256 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
You can use themes extremely effectively to build a collection of situational interfaces. If your organization
demands that you create presentations using a particular desktop color, along with specific font sizes and col-
ors for specific elements, you could create such a theme and then store it as a theme called Presentations. You
might create another theme for the most effective use with a newsletter you regularly edit and another for
working on spreadsheets and reports. By creating and storing three separate themes, you can recall the
themes without the need to make individual adjustments each time.
Figure 15-15: ClearType fills in the gaps between pixels, resulting in a display that looks much closer to the
quality of print.
For reasons probably having to do with Microsoft’s seeming paranoia about making changes that
might not work on older PCs, ClearType is turned off by default when you install XP. Having it turned
off is the safe thing to do, of course, because the non-ClearType display has proven its compatibility and
usefulness over the years. But ClearType provides such an improved text display that the interface
should at least offer to switch to it for you, both when you launch XP for the first time and then peri-
odically as you work in the XP environment. As it stands, many people don’t even know the option
exists, when it could significantly assist them. XP confounds the issue even further by making the
option somewhat difficult to find.
To turn on ClearType, double-click the Display icon in Control Panel. Next, click the Appearance
tab. Once there, click the Effects button. In the drop-down list under the option Use the Following
Method to Smooth Edges of Screen Fonts, choose ClearType. Click OK until Display Properties closes.
XP immediately changes your display to reflect the ClearType technology.
Note
All of these options place the icon in the Recycle Bin, where it is available for recall if you later change your
mind. That is, until you empty the Recycle Bin or the system does it for you. Be aware that if the icon is a
shortcut (which runs a program installed elsewhere), deleting that shortcut does not uninstall that program.
To change to an icon-free desktop, right-click an empty area of the desktop, choose the Arrange
Icons By command, and uncheck Show Desktop Icons. The icons remain in place — the command
doesn’t delete them — but you can no longer see them.
Tip
XP provides ways to use your desktop icons even if you’ve opted not to show them on the desktop. Open
Windows Explorer (Winlogo+E) and the Desktop is at the top of the folder list on the left. You can also right-
click an empty area of the Taskbar and choose Toolbars ➝ Desktop. This action places a Desktop button on
the Taskbar, with a clickable arrow as part of that button. Click on the arrow to see the Desktop icons arrayed
in a list. Choosing any one of these icons opens the program or file associated with the icon.
Name: Organizes the icons alphabetically (in descending order only) according to their
names. If you have folder icons on the desktop, XP places these first, also organized
according to their names.
Size: Organizes the icons according to the size of the files they represent. This feature can
be useful, to cite just one example, if you want to sort graphics or video files by size in
order to determine which ones are suitable for including in email or posting to a Web site.
Type: Organizes the icons alphabetically according to the file extension portion of the name
of the files they represent. All program files sort under .exe (nearly all program files in
Windows bear an .exe filename extension), while icons for Web pages are typically sorted
under the extensions .htm, .html, or .asp. Multimedia files are sorted according to the exten-
sions as well, not according to the multimedia categories we would normally recognize.
XP doesn’t sort the icons into graphics files and video files, for example, but rather accord-
ing to their file extensions: .bmp, .gif, and .jpeg (graphics files) are interspersed with .au,
.mp3, .mid, and .wav (audio files) and .avi, .mpeg, and .mov (video).
Modified: Organizes the icons according to the most recent modification date. Use this
option if you want to determine which file you changed most recently, particularly in the
case of similarly named files.
Chapter 15: Giving Windows a Facelift 259
Tip
The System Tray is a great idea, and for purposes such as quick adjustment of display settings it works
superbly. But far too many programs consider themselves more important than they should, placing an icon
on the System Tray when you install them. Some even insist on drawing attention to themselves by flashing
little messages to you throughout your work session. Make your System Tray effective by getting rid of any
icons you don’t regularly use. To do so, open the Preferences or Options dialog box in the associated pro-
gram and locate the command or setting to stop the System Tray icon from appearing.
In the Display Properties dialog box, graphics card enhancements appear as part of the features of
the Settings tab. Open Display Properties, click the Settings tab, and then click the Advanced tab. The
graphics card’s installation process adds more tabs to the top of the Advanced dialog box, reflecting the
features of that particular card. Figure 15-16 shows the Advanced dialog box for an ATI 8500DV card.
As you can see, the dialog box offers numerous tabs, each of which offers a display from which you can
change a variety of settings (such as the choice of Open3D or OpenGL as shown).
Other popular graphics cards provide different configuration options. As one example, the NVIDIA
series of cards, most popular for their GeForce name, offers tabs such as 3Deep and GeForce4 Ti 4200
(the name depending on the actual card in use). 3Deep refers to a feature included with NVIDIA cards
that displays 3-D games with accurate lighting and shading. The GeForce Ti 4200 tab provides a menu
with numerous subwindows, all accessible from the same area of the Display Properties dialog box. The
bulleted list that follows highlights a number of these options in order to demonstrate the wealth of
customization options available through a well-developed graphics card. NVIDIA’s primary competitor
in the graphics card industry.
Tip
As with any dialog box, you can get help with the contents of these windows by clicking the question mark
icon beside the exit icon at the top right of the dialog box and then clicking the item you want to know some-
thing about. Or, you can click the right mouse button over the item and choose What’s This? Well-con-
structed dialog boxes offer such help for all items that appear in the dialog box.
Technical Details: You might very well find the technical details uninteresting, but they
can be of significant use if you’re troubleshooting your system with Technical Support
representatives.
Multiple Monitors: If you attach more than one monitor to your system, you can adjust
the way the configuration works. This feature is important for NVIDIA cards because the
majority of them have built-in dual display capabilities, with two monitor ports on the card.
Image Smoothing: In this window you can choose between displaying your images at the
highest possible quality or, at the other extreme, at the highest possible speed. The other
two sliders, Antialiasing and Anistropic Filtering, provide additional smoothing effects
for images. In each case, the higher the setting, the higher the quality but the slower the
performance.
DVD and Video Adjustments: The Video window lets you configure how your graphics
card plays DVD and other video. If you have more than one monitor, you can choose
which monitor will actually display the video. Numerous other video settings are available
here as well.
Media Center and Desktop Manager: The Desktop Utilities subwindow lets you display
the icon for the NVIDIA Media Center on the System Tray for easy access to all the sub-
menus of the Display Properties dialog box. You can also enable the Desktop Manager
from here, enabling virtual desktops.
Display Rotation: The NVRotate area lets you rotate your screen 90 degrees in either
direction. While this is useful only for monitors that support rotation, you can give your-
self or your colleagues an experience not quickly forgotten by rotating the display and
figuring out how to deal with it.
262 PC Magazine — Windows XP Solutions, 2nd Edition
Other NVIDIA-specific controls let you configure the display settings when running programs that
use Direct3D or OpenGL. These technologies enhance three-dimensionality in displays, but often
they require tweaking in order to function at their best with a specific graphics card and monitor.
Often the program itself performs best with specific settings, and this subwindow lets you establish
those settings.
Many graphics cards install a further set of interface enhancements on the Control Panel. Both ATI
and NVIDIA, the two most popular manufacturers, provide such features. As an example, NVIDIA
installs an icon called NVIDIA nView Desktop Manager in the Control Panel, and double-clicking it
opens the nView Desktop Manager dialog box. Each of the 10 tabs on the resulting dialog box con-
tains a range of features for customizing the XP interface, and taken together — even without the rest
of the customizability discussed throughout this chapter — the features represent enormous interface
possibilities. For example, under the Effects tab of the nVidia Desktop Manager dialog box, you can
change the XP interface so that you activate windows by simply moving the pointer over them, by
making windows transparent when you drag them, and much more.
The list that follows, outlines a few of the most dramatic interface enhancements available through
the nVidia Desktop Manager. Naturally, depending on your hardware, your mileage is likely to vary.
Collapsible windows: A button on the title bar of all windows makes it possible to col-
lapse that window to show only the title bar on the screen.
Virtual desktops: You can establish up to nine virtual desktops, including the ability to
allow programs to run on all desktops or only a single one. Each desktop can have its own
background image.
Shell extensions: You can add a Windows Explorer and My Computer shell extension
that lets you switch among desktops and drag windows from one desktop to another.
Transparent windows when dragging: You can make the window transparent (to the
degree you specify) when you drag it, so that you can see the other windows and accu-
rately place the one you’re dragging.
Transparent Taskbar: Having a transparent Taskbar eliminates the need to hide it if you
want to expand your applications to cover the full length of the screen.
Window colors: Assign a different color to the title bar of each application and its associ-
ated windows for easy identification.
Hot keys: Assign keystroke combinations to actions ranging from locating the cursor
(useful on desktops) to switching desktops and making windows transparent.
Dialog box positioning: On multiple monitor setups, you can center each dialog box on
the monitor its application occupies.
Every one of these features — and the dialog box offers lots more — changes the Windows XP user
interface. Practice by using them one at a time to get used to them, because they really do make a
substantial difference in how you interact with your desktop and your applications.
Chapter 15: Giving Windows a Facelift 263
Summary
With your color, font, and resolution adjustments taken care of, and your icons organized in folders to
help you find your way to the resources you need, you’re well on your way to a personally tailored
Windows XP interface. In Chapter 16, you work with two essential interface elements, the Taskbar and
the Start menu, to move your customization along even further. Chapter 17 takes you into the Control
Panel to perform still more adjustments, while Chapter 18 outlines the remaining major methods for
tailoring the interface: the Accessibility Options and TweakUI. Get through all four chapters, and your
Windows XP interface will never again look like the one straight out of the box.
Chapter 16
Taking Control of
Your Start Menu,
Taskbar, and Folders
F or some people, the icons on the desktop serve as the primary interface for Windows XP. But
for the majority, the main interface consists of two elements that, unlike the desktop (which
gets buried under the open windows), can always remain in full view: the Start menu and the
Taskbar. The Taskbar runs along the bottom of the screen (although you can move it elsewhere) and
contains any number of clickable objects, providing an instant overview of what you’re doing and
what you might wish to do. The Start menu, accessible by simply clicking the Start button at the left of
the Taskbar, gives you access to everything else. Together, these two features give you access to almost
anything you wish to do.
This chapter details the numerous options available for configuring the Taskbar and Start menu.
By the time you’ve explored these options and tried out a number of them on your system, you’ll
have the Taskbar and Start menu set up precisely as you need them.
NOTE
Over the years, Microsoft has gained a reputation as an implementer rather than an innovator of technology.
Put another way, they do really well at taking concepts that are already out there and tailoring them to their
own products. The graphical desktop, for example, saw its origins with Xerox PARC and its first popularity on
Apple’s Macintosh (although Commodore’s Amiga computer had a color GUI before the Macintosh adopted
one), but it has achieved its greatest success — from the standpoint of sheer numbers of users — on the var-
ious versions of Microsoft Windows.
With Windows 95, however, Microsoft might well have contributed the one interface element that will
define its legacy. The Start button seems innocuous enough, but when you consider how it has fundamen-
tally changed the way users access their computers’ capabilities, you can see that adding this button to the
interface was indeed an important moment of innovation. Its implementation remains imperfect, but the con-
cept is dead on. Computers are complex, and without a clear and obvious place to start, most people will
never realize what they can accomplish. So tip a glass to the Start button, and hope that Microsoft makes
even one other usability contribution as strong as this one in the future.
My Documents: The default folder into which Windows expects you to save your data
files. Each user account has its own individual My Documents folder. Note this folder’s
specific location is c:\Documents and Settings\username\My Documents.
My Recent Documents: A list of links to the 15 documents you’ve most recently worked
on. You can’t customize how Windows establishes this list, so it’s a bit limited in useful-
ness. Try pressing Winlogo+R (more about this in a second), and typing the word recent
in the Run box (then press Enter) to open a window on c:\Documents and Settings\
username\Recent, where you’ll find many more shortcuts to recently opened documents.
Try sorting these by date (newest at the top) and View, Details or Thumbnails. Leave this
window open when you shutdown, and it will be there when you start up as a quick way
back to these documents (some will see this as a privacy concern).
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 267
My Pictures: The folder inside My Documents that contains image files. Windows XP
populates this folder with a few pictures by default, and many graphics programs are
configured to use it as the default folder for storing new images.
My Music: The folder inside My Documents that contains music files. Some programs,
including the new Napster 2.0, use the My Music folder by default.
My Computer: A link to the folder called My Computer, from which you can navigate
through all the drives and folders on your system. Clicking the My Computer icon opens
the folder where you can begin navigating among your drives. Right-clicking a drive
reveals several important options, including Explore, which opens Windows Explorer,
and Properties, which opens the System Properties dialog box.
My Network Places: The folder containing icons for computers and folders on your local
area network as well as Web sites on which you’ve recently published documents and FTP
sites to which you’ve recently connected.
Control Panel: The Windows XP Control Panel, from where you can control the behavior
of all aspects of Windows. You may use this often enough to want to try Winlogo+R, con-
trol to open it.
Set Program Access and Defaults: A link to the Set Program Access and Defaults utility,
allowing you to specify the Web browser, email client, and other Internet programs you
wish to use by default.
268 PC Magazine — Windows XP Solutions, 2nd Edition
Printers and Faxes: The Printers and Faxes folder, from which you can add and remove
printers and set up Windows faxing.
Help and Support: The Windows help interface.
Search: A link to the Search folder, from which you can locate files, folders, and other
resources on your system.
Run: A link to the Run dialog box (shown in Figure 16-2), from which you can open a
program or data file without locating the icon. This folder is especially useful for system
programs such as telnet, regedit, and msconfig. You can also open a command prompt
from here with cmd. Be sure to see what happens with each of the following (typed sepa-
rately): recent, sol, calc, and mailto: (that’s a colon right after mailto, no spaces); you’ll
learn others throughout the book. Run keeps a list of recently run commands, which can
be very useful when you want to repeat something (start typing and a list will appear, or
you can click to drop down a list). Convenient and, to some, a privacy concern.
NOTE
Keeping the Pinned Items List at a manageable level accomplishes another useful purpose as well: if you
lower the screen resolution to 1024 x 768 or below, a heavily populated list will display only some of its items,
but all items will be displayed if you keep the list short.
To add an item to the Pinned Items List, right-click that item’s icon and select Pin to Start menu.
You can perform this action on any icon on the Desktop, in a Folder, or on the list of most frequently
used programs (the MFU List, discussed next). Once you pin an item to the Start menu, that item
will no longer appear in the MFU List, no matter how many times you open it. Nor is there any need
to place it in the MFU List, because you have ready access to it among the Pinned Items List.
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 269
If you want to remove an icon from the Pinned Items List, right-click the icon and select Remove
From This List or Delete (doing so will not remove the related program). Once you’ve done so, the
item will begin to appear again on the MFU List as soon as you use it.
Tip
One good use of the Pinned Items List is placing programs that do not otherwise exist inside a folder on the
All Programs menu. For example, if you regularly make use of the Windows Registry Editor, you can make it
readily accessible by using Windows Explorer to navigate to your main Windows folder, right-clicking the file
called regedit.exe, and choosing Pin to Start menu. This technique is even more useful for older programs
(such as still useful shareware programs that don’t require installation) that you cannot simply load via the
Run menu (as you can regedit.exe) and that you must launch from within their folders.
Caution
Working with the Registry Editor is always dangerous. Before changing anything in the registry, use the
System Restore dialog box to set a restore point for your PC and back up your registry itself before proceed-
ing. Indeed, you should avoid editing the registry unless you absolutely have to, but for some purposes it
proves the only useful way of performing the task.
270 PC Magazine — Windows XP Solutions, 2nd Edition
Cross-Reference
The Classic Start menu is covered in greater detail in Chapter 18.
double-clicking the relevant icon in Control Panel). Click the Start Menu tab and then the Customize
button. All options are accessible from the two tabs on this dialog box.
beside the item), you open the submenu associated with that item. You can still click the item if you
wish; you just don’t have to.
To cite a primary example, if you don’t check this option, to see the All Programs menu, you have
to click the Start button and then click the All Programs item. With this option turned on, you can
click the Start button and simply hover on All Programs to summon the menu.
Tip
On desktop computers, enabling hover actions seems like a no-brainer. Why click twice, after all, when you
need only click once? But on notebooks that use a touchpad for a mouse pointer — that is, where you tap the
pad to activate the mouse click — you might very well prefer the feature off. Many users have difficulty with
the touchpad taps, especially when the touchpad software is set to respond extremely sensitively to the
touch of your finger. You can uncheck the Open Submenus option in cases like this.
If you spend significant gobs of your life installing and experimenting with new programs, the
Highlight Newly Installed Programs option will probably appeal to you. When this option is enabled,
Windows does the following:
Highlights (in yellow) the icon for that program’s folder on the All Programs menu.
Highlights (in yellow) the icon for the program itself inside its folder on the All Programs
menu, along with all other launchable elements of the program you have not yet opened.
Places a message on the Start menu alerting you to the fact that you have installed new
programs.
The highlighting and alert message last only until you actually launch the program from the All
Programs menu. Well, actually, they’re supposed to last only that long. Sometimes, however, the high-
lighting hangs around a bit longer, usually until you reboot your computer. Maybe some programs are
just newer than others. . . .
The Recent Documents section of the Advanced tab contains the check box to turn off XP’s listing
of documents you’ve recently opened (it lists them in the My Recent Documents item on the Start
menu). Alternatively, or additionally, you can clear the list of recent documents by clicking the Clear
List button. Why would you want to disable this list? Well, the list can actually be a security or pri-
vacy risk. If you’ve recently worked on a file you don’t want others to see, or if you’ve viewed files
you don’t want other people to know about, turn this feature off. Whether it’s viewing photos, lis-
tening to music, or working on sensitive financial spreadsheets, the My Recent Documents list dis-
plays your activities to anyone who has access to your account. Just remember that even when this is
unchecked, Windows is still storing shortcuts in c:\Documents and Settings\username\Recent.
In addition, in one instance, Scroll Programs, you can specify how the entire All Programs folder
behaves. Why Microsoft placed this single behavior option inside this list is a complete mystery
because nothing else about the list works similarly, but we’re sure it seemed like a good idea to some-
one at some point in the development of the interface. Then again, one other option, Enable drag-
ging and dropping, controls your own behavior rather than the Start menu’s, so clearly this list is an
example of design by committee. Rather like the camel.
Several items offer a simple on or off check box, so you can toggle these items as you see fit:
Enable dragging and dropping: Allows you to drag and drop items around the Start
menu. Leave it on unless you want to ensure that you don’t accidentally move items with
your mouse. This option is on by default.
Favorites menu: Displays a shortcut to the Favorites Menu from My Computer and
Internet Explorer, with the submenu displaying the Favorites themselves. This option is
off by default.
Help and Support: Displays the link to the Help system. This option is on by default.
My Network Places: Displays a link to the My Network Places folder. This option is on by
default.
Printers and Faxes: Displays a link to the Printers and Faxes folder. This option is on by
default.
Run command: Shows a shortcut to the Run command, from which you can launch pro-
grams without having to locate their icons. Uncheck this command if you don’t want peo-
ple to have easy access to such programs as regedit, msconfig, sol, calc, and text-based
Internet programs such as telnet. This option is on by default. Note that even if you
remove Run from the Start Menu, Winlogo+R will still open the Run dialog box.
Scroll Programs: This somewhat confusing option lets you set up the All Programs menu
as a single scrollable column instead of the default multicolumn list. An arrow appears at
the bottom of the menu providing access to the remainder of the list. This option is off by
default, and it is best kept that way for most users.
Set Program Access and Defaults: Displays a link to the Set Program Access and Defaults
utility. This option is on by default thanks to Microsoft’s settlement of its antitrust trial with
the U.S. Department of Justice and is available only with Windows XP Service Pack 1 and
later.
Other items in the list — My Computer, My Documents, My Music, and My Pictures — provide a
set of three radio buttons, letting you decide how you want the items to behave when you add them
to the Start menu. You can choose from the following:
Display as a link: Provides a single item in the menu, with no associated submenu.
Display as a menu: Displays an arrow to the right of the item, providing access to a sub-
menu of items inside the item’s folder.
Don’t display this item: Keeps the item off the Start menu completely.
274 PC Magazine — Windows XP Solutions, 2nd Edition
The final two Start menu items in the list offer their own unique options: You can display Network
Connections as a standard link or as a Connect to menu from which you can connect your PC to net-
work locations or Internet providers. You can also display System Administrative Tools as a folder on
the All Programs menu only, on both the All Programs menu and the Start menu, or not at all.
NOTE
From this point onward, this book assumes that you will have the Taskbar in its default position. Any references
to manipulating the Taskbar, such as resizing it or reordering its toolbars, use the default position as the refer-
ence. If you position your Taskbar elsewhere, please make the necessary adjustments to the instructions. For
example, the “Resizing and Hiding the Taskbar” section a bit later in the chapter instructs you to drag upward to
increase the Taskbar’s size. If you dock the Taskbar at the top of the screen, you’ll have to drag downward; if you
dock it on the right side of the screen, you’ll drag to the left, and so on.
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 275
Figure 16-4: The Taskbar when docked against the side of the screen.
TIP
Docking a toolbar means positioning it against another interface element so that it snaps against that ele-
ment. Most Windows programs offer toolbars you can move from position to position, docking them against
the top, bottom, left, or right sides. Usually, you can choose to float these toolbars instead. A floating toolbar
is detached from all other toolbars, and you can move it freely around the screen as you would any other
window. You cannot float the Taskbar, however. You must dock it against one of the four sides of the screen.
Another part of the Taskbar expands as you work in Windows. When you open a program, the
icon for that program appears on the Taskbar, in the area between the Start button and the System
Tray called the Document Tray. With some programs, such as Microsoft Office XP and 2003, each
open document appears by default as a separate icon on the Document Tray. Clicking an icon in this
area minimizes the document’s window (or restores it if already minimized). Right-clicking an icon
opens a menu with options to Restore, Move, Size, Minimize, Maximize, or Close the document.
Caution
In another example of questionable interface design, you can easily shrink the Windows XP Taskbar to a size
that’s too small to use or even see. If you can’t see your Taskbar, and if it doesn’t pop up when you move the
pointer to the bottom of the screen (as it would with the auto-hide feature turned on), then quite possibly
you’ve shrunk it to its minimum size. This is remarkably easy to do by accident, and remarkably confusing and
irritating when it happens the first time.
To undo the damage, move the pointer to the bottom of the screen until it turns into a double-sided, verti-
cally pointing arrow. Now drag the Taskbar upward until it comes back into view. Once you know about this
issue, it can actually become a useful tool, a method of temporarily hiding the Taskbar when you’re working
with large windows and you need another half-inch of screen real estate. But the first time it happens, it can
be debilitating, especially because we all depend so heavily on the Taskbar. Note to Microsoft: A ToolTip, a
periodic warning, or some other notification would prove extremely useful here.
Caution
Auto-hiding the Taskbar is an incredibly useful feature. Plaudits to Microsoft for including it. But brickbats to
Microsoft for countering its usefulness by forcing the Taskbar to become visible automatically at certain
times. When a program demands your attention — such as when a warning box is open — the Taskbar
unhides itself and highlights the program’s icon until you do what it’s demanding of you. This behavior is
extremely disruptive to your work and should never have seen the light of day. But it did, so be ready for it.
where you click, the context menu offers you different options, but one constant option is the Toolbar’s
submenu, and this option can change the Taskbar greatly.
The Taskbar consists of the Start button, the System Tray, the Document Tray, and one or more
toolbars. The toolbars expand the functionality of the Taskbar, giving it an even more central role in
your customized interface. To add a toolbar, right-click the Taskbar (but not on the Start button),
away from any icons, and choose the Toolbars item. From the resulting submenu, choose the toolbar
you want to add. Figure 16-6 shows an enlarged Taskbar with all standard toolbars open.
Tip
If you can’t seem to find a clickable area of the Taskbar, right-click the clock or enlarge the Taskbar until you
see some empty space.
Figure 16-6: Using all the toolbars can make the Taskbar crowded.
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 279
Address: The Internet Explorer Address bar. This option lets you type Web addresses
(URLs) directly from the Taskbar. The first address you type opens an Internet Explorer
(IE) window; each subsequent address uses the same IE window, replacing the currently
loaded Web page. This Address bar is precisely the same as the one in IE, so it includes
addresses you’ve already visited; as long as you have the auto-fill feature turned on in IE,
the Address bar on the Taskbar presents you with the same auto-fill possibilities.
Language bar: The Language bar from Microsoft Office XP or 2003. This option appears
only if you have installed Office XP or 2003, and even then only if you’ve installed the
Speech elements of those programs. From this bar, you can activate speech commands and
the Handwriting and Drawing applications that are part of the Office suite.
Links: The Internet Explorer Links bar. This option replicates the Links toolbar on your
Internet Explorer browser. Because you can configure the Links bar to give you access to
frequently visited Web pages, displaying this toolbar on the Taskbar lets you access them
from here instead. As you add items to the Links bar in IE, or delete them, the Links bar
on the Taskbar changes to reflect these changes; the reverse holds true as well.
Tip
One benefit to adding the Address and Links toolbars to the Taskbar is that you can turn them off on IE itself,
giving you a larger window in IE for the Web page itself.
Desktop: The Desktop folder. Adding the Desktop folder to the Taskbar gives you easy
access to all your desktop icons. If you’ve chosen to hide your desktop icons, adding this
folder to the Taskbar effectively replaces what you’ve lost. The benefit to using this toolbar
over the Desktop itself is that the toolbar is readily accessible even when windows cover the
desktop. Compare this toolbar with Winlogo+R, desktop and Winlogo+E; each is different.
Tip
If you open the Desktop toolbar on the Taskbar, you can delete the Desktop icon from the Quick Launch bar.
Its entire purpose is to give you access to the icons on the desktop, so the toolbar renders it unnecessary.
Quick Launch: A collection of icons for programs you frequently use. The Quick Launch
bar should be the first you add to the Taskbar. In fact, Microsoft should have placed it on
the Taskbar by default. It really is that useful. When you first install XP, the Quick Launch
bar includes icons for Internet Explorer, Windows Media Player, and the desktop. You can
add icons to the Quick Launch bar by dragging their icons onto it, and you should do so
for any program you use frequently. Because the icons on the Quick Launch bar remain
visible at all times, they’re even more convenient than those on the Start menu; you need
280 PC Magazine — Windows XP Solutions, 2nd Edition
click only once, not twice, to open the program. One program you should consider
adding to the Quick Launch bar immediately is Windows Explorer, the extremely useful
dual-pane file and folder utility. You can find it in All Programs ➝ Accessories. Or use
Winlogo+E anytime for Windows Explorer.
Tip
Many programs automatically add icons to the Quick Launch bar when you install them. You should monitor
Quick Launch regularly and delete any program on it that you don’t use regularly. Like the Pinned Item list on
the Start menu, the Quick Launch bar is far more useful when you keep it efficient, displaying only the items
to which you need ready access.
Tip
The Quick Launch bar gives you quick access to anything you need, not just programs. If you’re currently
working on a project with several data files, for example, you can create shortcuts on the Quick Launch bar
to each of those files so that you can open the file and its associated program with one click of the mouse.
When you’ve finished the project, delete the shortcuts and add new ones reflecting a new project. In other
words, you can use the Quick Launch bar as a primary interface on a day-to-day basis.
View: The View option contains a submenu that lets you choose between large icons and
small icons. By default, XP has small icons toggled on for all toolbars, but you can opt for
large icons if you wish. Keep in mind, however, that increasing the icon size also decreases
the number of icons visible on that toolbar as well as increasing the height of that toolbar
(and thereby reducing screen real estate). Big icons can be kinder to the eyes, though.
Open Folder: Each toolbar is actually an XP folder. This command opens the folder on the
desktop, where you can work with the icons, add others, and do anything else you can do
with a folder. The Desktop toolbar does not contain this option, even though it too is an
XP folder.
Show Text: With this option off, you see only the item’s icon. With it on, you see the icon
along with a text heading (a title, if you will) to the right of the icon. If you know what the
icons mean, you should turn text off, allowing you to display more icons. In the case of the
Links toolbar, however, turning text off may result in a group of identical Internet Explorer
icons, rendering the toolbar meaningless.
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 281
Show Title: Choosing the Show Title option causes the toolbar to display a title at the left
side of the icon group. The Desktop toolbar displays the title Desktop, the Links toolbar
displays the title Links, and so on. Once again, if you can do without the title, as you’ll
probably be able to with the Quick Launch and Address toolbars, you save space by not
having it displayed. But the title can most certainly help, especially on a Taskbar with
numerous toolbars open, so in most cases you should probably keep it on.
Close Toolbar: This option removes the toolbar from the Taskbar. You can also close the
toolbar from the Toolbars option, covered in the next bullet.
Toolbars: The submenu for this option lets you open and close toolbars on the Taskbar.
Checked toolbars are open; unchecked ones are closed.
Cascade Windows: This option causes all open windows to cascade neatly from the top left
to the bottom right of the screen. Figure 16-7 shows the windows cascaded in this manner.
Tile Windows Horizontally: This option arranges all open windows adjacent to each
other across the screen. The tiled windows appear as narrow rectangles two rows across by
as many windows down as XP requires in order to fill the screen.
Tile Windows Vertically: This option arranges all open windows adjacent to each other
down the screen. The tiled windows appear more or less as squares four rows across by as
many windows down as XP requires in order to fill the screen. Figure 16-8 shows the dif-
ference between horizontally and vertically tiled windows.
Tip
The more windows you have open, the less useful horizontal and vertical tiling becomes. These commands
are most useful when you want to compare windows that have similarities to one another — such as two
graphics files or two Web pages — or if you want to keep one or more windows on one side to use as refer-
ences for the window(s) on the other. You may find it useful to minimize or close those windows you don’t
want to tile before tiling. You can also click one Taskbar item and hold the Ctrl key down as you click others,
then right-click one of these to tile the group (or to close all the selected items at once).
Show the Desktop: This command temporarily minimizes all windows, letting you see
the desktop with its icons. Selecting it a second time restores the windows to their original
position. Show the Desktop works exactly the same as the Show Desktop icon on the
Quick Launch bar. You can execute the Show the Desktop command by using Winlogo+D;
repeat to restore the minimized windows.
Task Manager: This option opens the Windows Task Manager, with which you can close
programs and processes manually and get technical details about the current state of your
system.
Cross-Reference
For more on the Task Manager, see Chapter 6.
Lock the Taskbar: This command locks the Taskbar in place. To move it, you must
choose this option again to unlock it.
Properties: This option opens the Taskbar and Start Menu Properties dialog box.
Figure 16-8: Notice the difference in appearance between horizontally tiled windows (top) and
vertically tiled windows (bottom).
284 PC Magazine — Windows XP Solutions, 2nd Edition
To create a new folder, right-click the Taskbar, choose the Toolbars option, and click New Toolbar
at the bottom of the submenu. XP opens the New Toolbar dialog box, from which you can navigate
to the folder of your choice. Highlight the folder, and click OK to add it to the Taskbar.
When you create a toolbar, XP adds the name of that toolbar to the Toolbars submenu accessed by
right-clicking the Taskbar. The menu item, however, lasts only as long as you keep the toolbar open.
As soon as you close it, the Toolbars submenu reverts to its original state.
Tip
You can use the Toolbar creation mechanism to add an empty toolbar that you can populate later with related
items. For example, if you’re a musician, you might decide you need a toolbar containing all your audio-
editing programs and utilities so that you can access these programs without having to locate them in the All
Programs menu or their own folders. To create such a toolbar, open the New Toolbar dialog box, highlight a
location on your PC in which you want to create the associated folder, and click Make New Folder. Name the
folder whatever you want the toolbar to be called (“Recording Tools” in this example), and click OK. The new
toolbar appears on the Taskbar. To populate it with programs and other shortcuts, right-click the toolbar’s
name and select Open Folder. Drag any items you wish into the folder and close it. It now appears on the
Taskbar as a fully functioning toolbar. Or just try dragging and dropping any item onto any toolbar and drag-
ging those items to rearrange them.
Taskbar with precisely the icons you need to work with, and with ready access, through the expan-
sion arrows, to numerous other useful programs, folders, and files.
TIP
Once you get your Taskbar fully organized, set it in place by right-clicking it and choosing Lock the Taskbar.
Doing so prevents you from making accidental changes.
Figure 16-9: Floating your most frequently used toolbars gives you ready access to them.
286 PC Magazine — Windows XP Solutions, 2nd Edition
TIP
If you detach a toolbar containing numerous items, you might need to enlarge the window (by dragging the cor-
ners or the top/bottom) in order to see all the icons. This idea works, but it often makes the toolbar too large. All
such folders automatically create an arrow, at the bottom of the toolbar, that you can click to open the toolbar
further and see all the items. This is one primary reason to create toolbars from frequently used folders. If you
simply open a heavily populated folder on the desktop, you can see all the icons only by scrolling the window. If
you make the folder into a toolbar, XP automatically creates the pop-up arrow for you.
One problem with floating your toolbars is that you can lose them behind other windows. To stop
this from happening, right-click on the toolbar’s title bar and choose Always on Top.
NOTE
You don’t have to float all your toolbars to make them accessible in this way. Instead, float one toolbar — it
doesn’t matter which one — and, when you need the contents of a different toolbar, right-click the toolbar’s
title bar, choose the Toolbars item, and select the toolbar you need. The contents of the floating toolbar
change immediately to reflect the new toolbar’s contents.
Lock the taskbar: This command sets the Taskbar and its current components in place.
You need to uncheck this option, or uncheck Lock the Taskbar in the Taskbar’s context
menu, to alter the Taskbar.
Auto-hide the taskbar: This is the single most useful option on the Taskbar tab of the
Taskbar and Start Menu Properties dialog box. When you check this option, you cause
the Taskbar to disappear from the screen whenever you click another area of the desktop.
The result is more screen real estate to work with, which is especially important if you
have enlarged the Taskbar to add more icons and toolbars. To use the Taskbar, move the
pointer to the bottom of the screen; the Taskbar reappears exactly as you left it.
Keep the taskbar on top of other windows: By default, the Taskbar is always visible
(unless you auto-hide it) at the bottom of the screen. You can slide windows directly
underneath it, and the Taskbar still remains on top. Disabling this option removes this
Chapter 16: Taking Control of Your Start Menu, Taskbar, and Folders 287
characteristic, allowing windows to cover the Taskbar. In my opinion, the auto-hide fea-
ture is far better at achieving more screen real estate than this option, so you’re better
leaving this option checked.
Group similar taskbar buttons: Here’s another option with major significance for the
interface. Without this option checked, if you have several windows open for a specific
program — numerous Web pages in Internet Explorer, for example — the Taskbar displays
them individually in the Document Tray. For example, with several IE windows, several
Word windows, and several Excel windows open at the same time, the items in the
Document Tray quickly become unreadable as the increasing number of open windows
causes the icons to shrink in size. With this option enabled, once you have more than four
instances of the same application open (you can modify this number using TweakUI, as
shown in Chapter 19), Windows groups them all together so that only one icon appears
for that program; you can then access the individual documents belonging to that program
via an arrow at the bottom of the icon. For example, you see only one Internet Explorer
icon, and clicking on that icon reveals a menu of Web pages you have open. Choose one
of them to switch the display to that document. When windows are grouped like this, you
can right-click the button for the group to act on all at once to close or tile that group.
Show Quick Launch: Check this box if you want the highly useful Quick Launch bar to
be visible at all times. I can’t honestly imagine why you wouldn’t.
Show the clock: By default, XP displays a clock in the System Tray on the bottom right of
the Taskbar. The clock can be useful (including as a place to right-click for Taskbar proper-
ties), but if you don’t need it, you can save some real estate by hiding it. Uncheck this
option to do so.
Summary
The Start menu and Taskbar serve the important function of keeping your programs and folders read-
ily available even when windows cover the desktop. They also provide a strong organizational function,
to the extent that tailoring the Start menu, adding toolbars to the Taskbar, and adjusting the compo-
nents of both interface elements according to your liking gives you a truly customized interface.
Chapter 17
Changing Your
Interface from
the Control Panel
S o far, I’ve pointed out a variety of ways to alter the Windows XP interface, by doing everything
from changing the appearance of the entire desktop to tailoring the Start menu and Taskbar in
a seemingly endless variety of ways. But your options for customizing the XP interface are far from
depleted. This chapter outlines the numerous interface elements accessible via the utilities in the
Control Panel, from accessibility enhancements to folder options. The Control Panel offers a wealth
of customization features, and you should examine each utility closely to see what it can do for you.
Folder Views
To open a folder, first open My Computer either from the desktop or the Start menu. When you do
so, you see the contents of the My Computer folder, including the standard XP folders and the drive
icons. Clicking a folder opens that folder so you can see what’s stored inside.
Tip
The fastest way to My Computer: Winlogo+E (for Explorer).
289
290 PC Magazine — Windows XP Solutions, 2nd Edition
When you open a folder, by default you see a view called Tiles with subfolder icons arrayed in
alphabetical order in the top portion of the window, and the files, each with its own relevant icon,
lined up alphabetically below. Figure 17-1 shows a view of a My Documents folder.
This view is not the standard in all folders. In three of the subfolders within My Documents, XP
automatically sets the default view to Thumbnails rather than Tile. These folders, My Pictures, My
Music, and My Videos, use this view to emphasize the multimedia nature of their contents. XP’s fold-
ers are designed to let you see and play multimedia files, and the Thumbnail view shows, to a certain
degree, what each file contains. Figure 17-2 shows the Thumbnails view for the My Pictures folder.
In the case of My Pictures and My Videos, the Thumbnails view lets you see not only a small ver-
sion of each individual picture (in the case of a video file, it’s the video’s opening frame), but a four-
panel visual preview of the pictures inside the subfolders as well. You can see this useful aspect in
Figure 17-2, with each subfolder showing thumbnails of the first four photos inside that folder.
The View menu of each folder shows the views possible for that particular folder. Each view changes
the look of the folder considerably, and each view offers its own advantages and drawbacks. The
Thumbnails view, for example, offers the obvious benefit of letting you see the pictures themselves —
which is much more useful than seeing the filenames — but it also increases the size of the icons,
thereby restricting the number of icons you can access without scrolling.
The following list details the various views and discusses the positives and negatives of each. The
first five are common to all folders, while the rest are specific to certain folders.
Filmstrip: The Filmstrip view (shown in Figure 17-3) arrays your graphics files as a single
row of thumbnails along the bottom of the window, with the currently selected graphic
displayed at a larger size above the row of thumbnails. As you select each graphic, the
larger image in the middle changes accordingly. Below the larger image are tools for moving
through the images and for rotating the selected image either clockwise or counterclockwise.
Thumbnails: The Thumbnails folder uses large icons and therefore lowers the number of
icons viewable without scrolling. But icons that represent pictures or videos show small
previews of those items, so this is an extremely useful view if you need to locate a specific
photo or video. If not, you’re better off with the Tiles view.
Tiles: The icons in the Tiles view are much smaller than those in Thumbnails, allowing you
to see far more of them in a standard-sized window. As you can see in the Tiles view shown
in Figure 17-1, however, you do not see a representation of photos or videos. So, if you need
to work with images or videos, this view can hinder rather than help. The Tiles view does
offer a limited amount of information about each file — its name, size, and type — offering
a compromise between the Thumbnail view and the more information-rich Details view.
292 PC Magazine — Windows XP Solutions, 2nd Edition
Icons: In the Icons view, the icons get smaller still, and only the name of the icon appears
with it. To get additional information about the icon, hover the pointer over it until the
information ToolTip appears (the same holds true for all views). The primary advantage
of this view is its combination of an uncluttered look and the display of numerous icons.
List: The List view shrinks the icons even further. Once again, hover over an icon to get
details about it. List view works well when the folder holds many icons, and you want to
avoid scrolling as much as possible. Because of its usefulness in this regard, the List view
is standard for the Open and Save windows of Microsoft Office and other productivity
programs.
Details: If you want to see extensive information about your files, choose the Details view.
The Details view gives you the same small icons as the List view, but the icons are arrayed
in a single alphabetical column. Beside the icons you get additional columns, each with
a specific type of information about the file on that line. See the sidebar “Adding More
Columns to the Details View” for information on adding more columns.
Chapter 17: Changing Your Interface from the Control Panel 293
Numerous other columns are available from the context menu as well. These include the bit rate of
the audio file, whether the file is protected, and the model of the camera used to capture digital or
video files. If you want to display even more columns, right-click the column bar and select More.
Check whatever boxes you wish in the resulting Choose Details dialog box, and click OK to add them
to the folder.
You can also change the order and the size of the columns. To change the order, click and hold the
title of the column and drag it until the insertion point is where you want to place the column. To
resize it, move the pointer to the separation between two column titles (it turns into a double-arrow),
and drag the column border to make the column the size you want.
294 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
You can sort the contents of your folders in two main ways. In the Details view, you can click the title of each
column to sort the icons according to the data in those columns — alphabetically in the case of Name, in
order of size in the case of Size, and so on. (You can sort in the opposite direction by clicking on the column
title a second time). You can also sort the icons by right-clicking an empty area within the folder and choos-
ing the Arrange Files By option. The submenu gives you a variety of sorting options, including one — Show in
Groups — that sorts the icons according to groupings. The groupings themselves change as you click the
column titles. Clicking Name sorts alphabetically, with one group for each letter of the alphabet, while click-
ing Size organizes into groups with headings such as Zero, Tiny, Small, and Medium. Experiment to get the
grouping you like best.
Tip
If you like the way your current folder looks, you can set all folders to look the same. With the model folder
open, choose Tools ➝ Folder Options and click the View tab. In the Folder Views area at the top of the result-
ing dialog, click the Apply to All Folders button. Presto! You’ve standardized your folders.
Folder Options
The other primary means of changing your folders is the Folder Properties Control Panel applet. To
open it, double-click the Folder Options icon in Control Panel, or click the Tools menu of My
Computer or Windows Explorer and choose Folder Options.
WARNING
As with desktop, font, and virtually all other interface settings, the settings you choose in the Folder Options
dialog box apply only to the current user account. Each user can set these properties individually. It would be
nice if XP restricted certain options to certain user types — such as administrators — but unless you config-
ure the Group Policies (see Chapter 27 for details on how to do so), you can’t stop users from configuring
their folders in a way that might cause damage.
Two areas on the General tab of the Folder Options dialog box are of particular interest. In the
Tasks area, you can choose between the folder style of older Windows versions (User Windows
Classic Folders) and the newer XP style (Show Common Tasks in Folders). The newer style displays
a task pane on the left side of each folder window; you can see this pane in all the figures shown so
far in this chapter. The Browse Folders area lets you choose what happens when you open two or
Chapter 17: Changing Your Interface from the Control Panel 295
more folders in succession. By default, XP replaces the contents of the first folder with the contents
of each one you subsequently open, but you might find it more useful to open each folder as a sepa-
rate window completely.
Note that if you choose to open each folder in its own window, your desktop can become clut-
tered extremely quickly. On the other hand, this option makes copying and moving files between
folders easier to accomplish, because you can place the folders side by side and drag files from one
to the other.
Tip
If you need more than one Explorer window open, right-click a folder name and choose Explore (from the
Folder pane) or Open (from the Task Pane). Alternatively, use Winlogo+E.
Tip
Don’t overlook the task pane when you first start working with XP folders. What actually appears on the task
pane depends on the type of folder you open. My Documents shows a different set of tasks from My Pictures,
and My Music, My Videos, and My Computer are different again. My Computer offers a System Tasks area in
the task pane, while My Documents offers a File and Folder Tasks area that includes such activities as pub-
lishing a file to the Web or emailing it to a recipient. My Pictures shows a Picture Tasks area with actions
such as ordering prints online (using one of three built-in services), and My Music includes commands for
playing all the files in Media Player, copying files to an audio CD, and shopping for music online.
The heart of the Folder Options dialog box is the View tab, from which you exercise the greatest
control over your folders. Figure 17-4 shows this pane, with only part of its lengthy Advanced set-
tings list in view. This list provides a broad range of configuration possibilities, each of which affects
the interface with your folders:
Automatically search for network folders and printers: XP goes out onto the network
every few minutes to locate folders and printers accessible through your local network.
The purpose is to add these items to My Network Places as other network users add them.
Display file size information in folder tips: When you hover over an icon in a folder,
XP displays the size of the file in kilobytes or megabytes in a small tip window.
Display simple folder view in Explorer’s Folders list: This option tells Windows
Explorer to expand the folder listings (in the left pane of Explorer) to show subfolders,
when you click on any folder, then contract that folder when you switch to another.
Without this option, you must click on the plus sign to expand the folder, and clicking
on another folder does not automatically contract it.
296 PC Magazine — Windows XP Solutions, 2nd Edition
Display the contents of system folders: By default, with this option turned off, Windows
displays a warning screen in place of the folder contents when you try to open a folder that
contains files needed by XP itself (such as your primary Windows folder). With this tog-
gled on, XP allows you to see these folders without a warning.
TIP
You should keep the display of the contents of system folders toggled off, even if you’re the only person using
the computer. The warning screen is easy enough to get past (all it takes is a single click), and if it prevents
you from accidentally deleting even one important file over the course of a couple years, it’s worth the extra
few seconds.
Display the full path in the address bar/title bar: XP likes to simplify things, one way
being to shorten the location information (the path) shown in the Address field of each
folder (or the title bar of the file you have open). Turn this option off to display only the
name of the current folder (the default); turn it on to display the full location.
Do not cache thumbnails: The first time you turn on the Thumbnail view for a folder, XP
loads each thumbnail into memory, allowing you to view it, and caches the thumbnails
(retains some of their data in memory) so that, when you return to the folder, the images
take less time to load. Caching can cause a few headaches if you change the contents of the
folder because the cache does not match what’s really there (you have to refresh the folder
in such a case).
Chapter 17: Changing Your Interface from the Control Panel 297
Hidden files and folders: Here, you have the choice whether to show the hidden files and
folders on your system. You can set any file or folder to hidden status by right-clicking the
item, choosing Properties, and checking the Hidden box in the Attributes section on the
General tab of the Properties folder. When you hide a file, you prevent XP from displaying
it in any folder display or via the command line’s DIR command. You can instruct XP to
display the hidden files and folders as a matter of convenience to yourself. If you do so,
the hidden items bear a muted icon color indicating their hidden status.
Hide extensions for known file types: One of the strikes against MS-DOS and Windows
(especially by people accustomed to using the Macintosh) is the use of the file extension,
the characters after the filename that identify the file as belonging to a specific program
(.doc for Word files, .exe for programs, .ppt for PowerPoint files, and so on). With
Windows XP, you can prevent Windows from displaying these extensions, forcing you to
identify files through their associated icons only (the icon reflects the program in which
you created the file). Whether you want to see the extensions is purely a matter of prefer-
ence, so choose as you like.
Note
If the file uses an extension that XP does not recognize, it will display the extension as well as the filename.
Recognition depends on the file association system, which you can see — and set — by clicking the File
Types tab in the Folder Options dialog box. Chapter 19 deals with setting and changing file associations.
Hide protected operating system files: The Folder Options dialog box calls this option
“Recommended,” and you’ll get no argument here. Unless you have a very specific pur-
pose, you do not need to work directly with system files, and keeping them hidden from
view prevents you from accidentally deleting or moving them. Think of this option as an
additional safeguard — hiding the contents of system folders is the other — against damag-
ing your system by altering a critical file.
Launch folder windows in a separate process: This rather obscure feature instructs XP
to load each folder window into a different portion of memory. It’s similar to the option on
the General tab Open Each Folder in its Own Window except that it isolates the folders
from one another for the sake of protection from problems. The feature primarily benefits
developers who might need to experiment with one folder while guaranteeing that others
won’t close down in case another crashes.
Managing pairs of Web pages and folders: You have three options here, all of which are
covered in Chapter 9.
Remember each folder’s view settings: Because you can change the settings of each
folder individually, configuring them according to your needs, you want Windows to
remember what you’ve done so that you don’t have to reconfigure them each time you
reboot. Check this option to have Windows retain the settings.
298 PC Magazine — Windows XP Solutions, 2nd Edition
Restore previous folder windows at logon: Windows XP automatically reloads any fold-
ers you had open on the desktop the last time you logged off, restarted, or shut down.
This option is useful if you constantly work with the same folders, but one of the typical
purposes behind rebooting is starting fresh with a clean desktop and all programs cleared
out of memory, so most users will want to leave this option unchecked. Still, if it helps you
get to work faster, by all means toggle it on. One worthwhile use is to have the My Recent
Documents appear with each boot-up, helping you get up to speed quickly each session.
Show Control Panel in My Computer: This option adds an icon to the Control Panel
in the My Computer folder. Check the option only if you have hidden the Control Panel
from the Start menu and you’ve chosen Windows classic folders on the General tab of the
Folder Options dialog box. In such a case, you have no other Control Panel icon available.
You might consider this procedure if you want to prevent users from opening the Control
Panel and working with its configuration utilities.
Show encrypted or compressed NTFS files in color: When you use an individual
folder’s Properties dialog box to compress the folder (see the “Working with Compressed
Folders” section later in this chapter) or encrypt it using the Encrypting File System
(see Chapter 6), Windows displays the former in blue and the latter in green. You can’t
choose to color one or the other; it’s either both or neither. NTFS stands for NT File
System; Windows XP uses the file system, although modified, begun in Windows NT and
continued through Windows 2000. The other major file system for PCs is FAT32 (and the
older FAT); FAT is short for File Allocation Table, and is far less customizable than NTFS.
Show pop-up description for folder and desktop items: When you hover over an item
on the desktop or in a folder, Windows displays a small pop-up showing details about the
item. You can turn this feature off if you don’t want to see the pop-ups. Some users find
them annoying. Others find them highly useful.
Use simple file sharing: This is another recommended item, and in most cases you
should just leave it on. Chapter 25 covers the differences between simple file sharing and
standard file sharing.
The specialty folders within My Documents — My Pictures, My Music, and My Videos — have
already been configured as templates: Pictures, Music, and Video, respectively. You can’t change
those folders, but you can add your own of each of those types and more to your folder collection.
Once again, customization helps you create a tailored interface.
You can customize these folders in three other ways from the Properties dialog box. If you want to
base all subfolders within this folder on the same folder template, check the Also Apply This
Template to All Subfolders option. Furthermore, at the bottom of the Properties dialog box, you can
choose the folder’s icon by clicking the Change Icon button and scrolling through the resulting icon
collection, as shown in Figure 17-6. (Mind you, it would be nice if Windows would associate spe-
cific icon types with specific template types so that you could give all your Picture folders the same
icon as My Pictures by default, but perhaps that’s asking a bit much.) Finally, you can select a picture
300 PC Magazine — Windows XP Solutions, 2nd Edition
to appear as the thumbnail graphic for the folder by clicking Choose Pictures in the middle of the
dialog box and selecting the picture you want.
Tip
The task pane for each folder depends on the template you assign to that folder. Pictures folders, for exam-
ple, assume the same task pane as My Pictures, complete with the feature for running a slide show based on
the images in the folder.
Compressed (zipped) Folder: This is accessible from within any Folder window.
Compress contents to save space: This is an option in the Advanced Attributes
sub-dialog-box within an individual folder’s Properties dialog box.
Chapter 17: Changing Your Interface from the Control Panel 301
Although these options may sound similar, they’re two different things, as I’ll show in the follow-
ing sections.
Tip
If you use Compressed Folders as a backup system, you should move or copy the compressed folder to
another location. A CD-ROM is perfect, as is a separate hard drive. Failing that, move it to a separate parti-
tion or even a different folder so that you can access it later if you need it.
Once created, a compressed folder works just like any other folder. You can open it and work
with any of the individual files inside it. To make the files fully functional, however, you need to
uncompress them. You can do this manually by copying or moving the file out of the Compressed
Folder into an uncompressed folder, or you can uncompress all of them at once by clicking the
Extract all files item in the Folder Tasks section of the compressed folder’s task pane. This action
launches the Extraction Wizard, the second stage of which appears in Figure 17-7.
By default, the Extraction Wizard creates a folder named for the first file in the compressed folder.
Before compressing, you can change the location of the compressed files by typing a path or clicking
Browse and choosing an existing folder in the resulting Select a Destination dialog box (where you can
also create a new folder). Once you’ve decided on a folder, click Next to uncompress the files into that
folder.
Kudos to Microsoft for the final screen of the dialog box. By checking the Show Extracted Files
option and clicking the Finish button, you instruct Windows to open the folder into which you’ve
extracted the files. While this feature might seem obvious — why force you to navigate to the new
folder? — earlier zip utilities didn’t offer it.
302 PC Magazine — Windows XP Solutions, 2nd Edition
To see how the Extraction Wizard can help, here is an example. On the Web, say you come across a
download called clipart.zip that contains several clip art files. Click the download link from within the
browser to begin the download and save the file to your desktop. When the download is complete,
double-click the icon on the desktop. This action opens the zip file as a compressed folder, where you
click the Extract command to start the Extraction Wizard. Because you don’t want the files scattered all
over your desktop, you click Browse and create a new folder for them. Clicking Next extracts them to
that folder, and clicking Next again opens the folder with the clip art files in full view.
Caution
When you download a zip file from the Web, resist the temptation to choose Open instead of Save when the
download begins. While choosing Open removes a step from the extraction process (you don’t have to open
the zip file separately), it also makes you more vulnerable to virus and other malware (that is, malicious soft-
ware) attacks (such as Trojan horses). To be safe, store the file on your drive, run it through your virus
checker, and then extract the files to a new destination. You might have to configure your virus checker to
scan compressed (zip) files, because not all versions do so automatically. Check the Options or Preferences
dialog box for your antivirus software.
If you install another zip utility on your PC (WinZip is an especially popular one), it will take over
XP’s built-in zip functions. You can still send your files to an XP compressed folder by right-clicking
on them and making the standard choice, but when you double-click on saved zip files, they open in
the new utility instead. Other utilities have many more features than XP’s built-in zip, but it’s up to
you to determine if you need those features. If you don’t, uninstall the new utility to have XP resume
its default functioning.
Chapter 17: Changing Your Interface from the Control Panel 303
You can save even more disk space by compressing an entire hard drive. Open My Computer or
Windows Explorer, right-click the drive’s icon, and choose Properties. At the bottom of the
Properties dialog box is a Compress Drive to Save Disk Space check box. Click OK to start the com-
pression process. You can even compress your primary drive (C:) if you want, although this would
likely slow down your computing experience.
Caution
Disk compression used to be an important tool in maximizing space on your hard drive. Today’s storage methods
and the continually lowering prices of hard drives have rendered compression much less useful, however. In
general, you’re better off not compressing an entire drive or even your most frequently used files and folders.
Compressing them removes some possible features from them — notably the Encrypting File System, which
does not work on compressed files and folders — and doesn’t save you all that much space anyhow.
304 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
In only one other way does the single-click interface take some getting used to. Often, when you save a file
using the Save As dialog box in your program, it’s convenient to click on a previous file to use its name as a
basis. Choosing this file places the name in the Name field, and you simply edit it to give your new file a dif-
ferent name. With the single-click option turned on, you do the same thing by hovering over the previous file,
not clicking it. If you click it, you initiate the Save, which you then have to cancel (in the subsequent warning
dialog box) to avoid overwriting the previous file. Again, this takes a few tries to get right.
Tip
Many keyboards and mice offer special features that you can control using software included with these prod-
ucts. In many cases, the software changes the Mouse and Keyboard dialog boxes, sometimes dramatically. If
you have a mouse with extra buttons or a keyboard with special keys, locate the special software for it either on
floppy disk or CD-ROM, or go to the Support section of the manufacturer’s Web site to see if you can download
the software from there. Here, we deal only with the default Windows XP Mouse and Keyboard dialog boxes.
performs the selection and launches functions while the left button calls up the context menus.
Obviously, the purpose of this option is to increase usability for left-handed users; but if you want to
see how skilled you’ve become at mousing, switch the buttons one day and try to perform some typ-
ical actions. (Switching buttons also makes for a great practical joke, but you didn’t read that here.)
Many PCs sold today include Microsoft’s Intellimouse software. If your PC has this software, the
Mouse dialog displays different options. Again, to configure the mouse, open the Mouse icon from
the Control Panel. From the Buttons tab, as Figure 17-10 shows, you can choose the primary func-
tions for each button and the wheel button. From the Activities tab, you can set the double-click
speed, a useful feature if you’ve been having trouble double-clicking fast enough to open icons
(many users experience this difficulty, so you’re not alone). The ClickLock option at the bottom of
the Activities tab lets you avoid holding the mouse button while dragging (another activity that
causes difficulty for many people).
Also from the Buttons menu, you can set the double-click speed, a useful feature if you’ve been
having trouble double-clicking fast enough to open icons (many users experience this difficulty, so
you’re not alone). In addition, the ClickLock option at the bottom of the dialog lets you avoid hold-
ing the mouse button while dragging (another activity that causes difficulty for many people).
Note
You should choose neither of these last two options if you’ve switched to a singe-click interface, however;
double-click speed is largely irrelevant, and ClickLock does not work.
308 PC Magazine — Windows XP Solutions, 2nd Edition
The Pointers tab (see Figure 17-11) offers a series of mouse pointers for you to choose from so
that you don’t have to put up with the boring flat white ones Windows uses by default. Click on the
Scheme menu to see the list and then on any of the schemes to see what the pointers for that scheme
look like. Click OK to accept the new pointers. You can also place a shadow under the pointer for
aesthetic purposes and to make the pointer easier to see.
On the Pointer Options tab, you can set the speed at which the pointer moves across the screen
when you move the mouse, and you can tell XP whether to hide the pointer while you’re typing.
This option keeps the pointer out of the way while you type, and you need only touch the mouse to
have it reappear.
TIP
Two options on the Pointer Options tab especially suit laptop use. Display pointer trails causes XP to show a
trail behind the pointer as you move the pointer across the screen, thereby preventing the common occur-
rence of losing track of the mouse on a laptop display. Show location of pointer when I press the Ctrl key lets
you use the Ctrl key to find your pointer, again an issue with many laptop users.
On the Wheel tab, you can set what happens when you roll the wheel on a wheel mouse. By
default, rolling the wheel one notch scrolls the active document three lines at a time. You can change
the number of lines to any number from 1 to 100, but keep in mind that scrolling a hundred lines at
Chapter 17: Changing Your Interface from the Control Panel 309
once is practical only on specialty programs and very large screens. You can also set the wheel to
scroll one full screen with each notch.
Note
No, you can’t just move the hands on the clock to change the time. You should be able to, but you can’t. Ask
Microsoft why.
To set your time zone, click the Time Zone tab and choose a time zone from the drop-down menu
at the top of the dialog box. If you live in a time zone with daylight-saving time, click the option
below the map to have Windows change the time automatically on the appropriate date.
Note
No, you can’t just click on the map to select your time zone. You should be able to, but you can’t. Again, ask
Microsoft why.
310 PC Magazine — Windows XP Solutions, 2nd Edition
Figure 17-12 shows the Internet Time tab of the Date and Time Properties dialog box. Here, you can
configure Windows to connect with a time server on the Internet to set the time and date for you. Time
servers are synchronized to the computers of official time setting organizations, so you can be assured
of having the correct time at all times. XP synchronizes with the selected time server once every week.
Summary
The Control Panel gives you what its name suggests — control. Control over your hardware devices,
control over your software programs, control over your network connections, and, just as important,
control over portions of the Windows XP interface. This chapter has demonstrated how to change
the look of the folders and the operation of the primary input devices, the mouse and keyboard.
Chapter 18 concludes the discussion of interface configuration, focusing on accessibility features
and the TweakUI Power Toy.
Chapter 18
A s extensive as your options are for customizing the Windows XP interface — as you’ve seen so
far — you can do even more to tailor your Windows experience to your needs, work habits,
and preferences. This chapter explores ways you can cut down on the Windows interface rather than
adding to it, and shows you how to set accessibility options for people with disabilities, even minor
ones. Finally, the chapter covers the extensive customizability of the Microsoft downloadable
Control Panel applet called Tweak UI, a utility that lets you change a wide variety of interface
options.
311
312 PC Magazine — Windows XP Solutions, 2nd Edition
To make this change, go to the Control Panel and open the Taskbar and Start Menu Properties
Control Panel applet (or right-click the Start button and choose Properties). Click the Start Menu tab,
and then select the Classic Start Menu radio button. Click OK to finalize the change.
The primary difference between the two Start menus is the addition in the new version of the
System Area on the right. In all likelihood, Microsoft designed this component to complement
another new Windows interface option, the icon-free desktop. Many of the items available in the
System Area are traditionally available via desktop icons, so it makes sense to have a Start menu that
acts, to a degree, as a desktop replacement.
Note
Choosing the Classic Start menu for yourself does not change the Start menu in other user accounts. All
users have the choice of the Windows XP Start menu or the Classic version.
Tip
In one particular case, the Category view does work well — at least once you know enough to click the correct
link in the first place. The Performance and Maintenance link (which probably could use a better name) opens
a window that provides access to numerous useful utilities you can adjust to affect system performance and
take full control over your PC. From here, you can work with your hard drives, set power options, and access the
full suite of Administrative Tools. This window shows how the new Control Panel should work — even if the
items don’t quite fit a single category — but it’s probably the only window that does.
Windows 2000 uses an older folder view, one without the task pane. To revert to this view, open
the Folder Options dialog box. On the default tab, General, select the Use Windows Classic Folders
radio button. Click OK, and the task pane disappears.
Caution
Unfortunately, when you revert to the old folder view, you lose some of the new features that Windows XP
offers by default. When looking at a Pictures folder, you no longer have access to the View as a slide show or
Order prints online commands. Furthermore, the Filmstrip option disappears from the View menu; the Filmstrip
view shows the selected image file at a large size in the top two-thirds of the window with the remainder of the
images in a row along the bottom. In a Music folder, you can no longer execute the Play all or Shop for music
online commands. You would think these commands would appear in the main menu or the context menu, but
they do not. Unfortunately, if you want a true Windows 2000–like environment, you have no choice but to go
this route.
You’ll need to turn off two other features if you want a true Windows 2000 environment. First, get
rid of ClearType by opening the Display Properties applet in the Control Panel, clicking the
Chapter 18: Taking Even Greater Control of Your Interface 315
Appearance tab, clicking the Effects button, and choosing Standard in the Use the Following Method
to Smooth the Edge of Screen Fonts menu. Next, open the Taskbar and Start Menu Properties applet
in the Control Panel and, under the Taskbar tab, uncheck the Group Similar Taskbar Buttons check
box. The first change turns off the font smoothing provided by the ClearType technology, whereas the
second forces the Taskbar to display all icons separately instead of combining icons belonging to the
same program (such as all Internet Explorer windows) under one icon with a selection arrow.
Obviously, you don’t have to turn off all new features. You can make the Windows interface look
mostly like the Windows 2000 interface without sacrificing some of the nicer touches, such as
ClearType and button grouping. But, if you want the added features of Windows XP while working fully
within the look and feel of Windows 2000, you’ll have to sacrifice a few of the additions to Windows XP.
Use usual text size for Windows: No change from the default
Use large window titles and menus: Increases the size of the text in the window titles
and on the pull-down menus
Use Microsoft Magnifier and large titles and menus: Increases the size of the text in
window titles and pull-down menus and activates the magnification utility
316 PC Magazine — Windows XP Solutions, 2nd Edition
Caution
Unlike many other wizards, which typically wait until you’ve completed all of their steps before setting your
selections in place, as you make choices in the Accessibility Wizard, your configuration changes immedi-
ately. From a design perspective, the instant changes work well because the person using the Accessibility
Wizard might very well need to activate the alterations in order to complete the wizard, but the instant reac-
tion can be a bit disorienting. You may want to set a restore point with the System Restore utility so that you
can revert to the an earlier configuration if you need to. (See Chapter 6 to learn more about setting a restore
point.)
Clicking Next takes you to the Display Settings stage. Here, you choose from the following
possibilities:
Change the font size: If you didn’t choose to adjust the fonts in the first step of the wiz-
ard, you can do so now.
Switch to a lower screen resolution: This decreases the screen resolution by one major
step. You can also do this manually in the Display Properties dialog box.
Use Microsoft Magnifier: If you didn’t activate the Magnifier earlier, clicking the check
box here activates it immediately.
Disable personalized menus: Personalized menus hide infrequently used menu com-
mands. To access the hidden items, you need to click on the down arrow at the bottom of
the unhidden list. Disabling this feature makes all commands available without the need
for special action.
After selecting these options, the variable section of the Accessibility Wizard comes into play. The
heading titles that follow reproduce the check box labels from this screen of the wizard (see Figure
18-3), and the text under each heading outlines the wizard screens you see if you make that partic-
ular choice.
Click Next to choose the cursor style and color you want — again with the goal of making the
cursor as visible as possible. Clicking Next again gives you the option of changing the blink rate of
the cursor. In the subsequent stage of the wizard, review what you’ve done and then click Finish to
set everything in place.
Note
The settings available in the various sections of the Accessibility Wizard that pertain to sight are subsets of
the options available in the Display Settings dialog box and the Mouse utility in Control Panel. The wizard
makes these choices easier to make with less need to dig through the configuration utilities and windows
elsewhere in XP. However, you may want to use the Control Panel to fine-tune these and related settings.
Tip
You don’t actually need sounds turned on in Windows XP to use the SoundSentry feature. Go into Control
Panel, launch the Sounds and Audio Devices utility, click the Sounds tab, and look at the Sound Schemes
menu. If the menu shows No Sounds, you’re telling XP not to generate sounds, but the SoundSentry feature
continues to flash your title bar, window, or screen.
Clicking Next on the wizard brings you to the ShowSounds dialog box. With this option turned
on, programs with ShowSounds capability display captions for sounds or speech relevant to that
program. The option is useful only if the software designers have programmed the application to
support ShowSounds and developed the captions as part of the package. Because this is hit or miss,
you’ll find that turning ShowSounds on results in an inconsistent interface experience, but, if you
know that the program you bought uses ShowSounds, the feature can help.
After you exit the Accessibility Wizard, you can choose which part of the screen to flash: the
active window’s title bar, the active window itself, or the screen. To make your choice, open the
Accessibility Options dialog box from the Control Panel (use the Start menu or Winlogo+R, control
access.cpl), click the Sound tab, and click the arrow in the Choose the visual warning menu. Make
sure the Use SoundSentry box is checked, and click OK to activate your choice.
Tip
As with other accessibility options, you do not need to be hearing impaired to appreciate SoundSentry and
ShowSounds. In an office with cubicles instead of real doors, the last thing the person besides you wants to
hear is your PC making sounds (to say nothing of speech). The same holds true when you’re working in your
house late at night or in the family room during a quiet movie. Turning these options on at such times can
help.
That’s why the keyboard and mouse options in the Windows XP Accessibility Wizard are so wel-
come and why they should not remain so hopelessly buried. They will assist the physically disabled,
and they will also assist anyone else who has trouble manipulating these two crucial interface com-
ponents. You can do yourself a real favor by trying them out and tailoring them to your own needs.
When setting all options in the mouse and keyboard categories, you should work in conjunction
with the Accessibility Options dialog box (see Figure 18-4) available on the Control Panel
(Winlogo+R, control access.cpl). The Accessibility Wizard turns the options on or off, but you can
configure them further in Accessibility Options.
Caution
One of the reasons Windows XP lets you turn off the shortcuts to these various keyboard options is that it’s
too easy for people who need some of these features to toggle them on accidentally. If you have difficulty
releasing keys after pressing them, for example, you might turn on ToggleKeys by holding Num Lock down for
five seconds without realizing it. On the other hand, the FilterKeys option for ignoring repeated strokes works
completely against your ability to use the shortcut for StickyKeys (five consecutive Shift key presses). Be
careful, in other words, not to counteract your own choices.
StickyKeys
The first stage along the keyboard and mouse path leads to StickyKeys. Essentially, this feature holds
down some important keys for you — specifically, Shift, Ctrl, or Alt. Whenever a command you need
requires a key combination, such as Shift+F12 to save a document or Windows’ popular Alt+Tab
task-switching feature, StickyKeys lets you press the two keys separately rather than together.
StickyKeys takes some getting used to. Here’s an example of how to use it in conjunction with the
Alt+Tab feature in XP:
1. Enable the StickyKeys feature itself, from either the Accessibility Wizard or the Accessibility
Options dialog box. Alternatively, you can press the Shift key five times in a row to activate
StickyKeys. With the former option, StickyKeys remains turned on; with the latter, you
activate it only when you need it.
2. Press the Alt key twice and release it both times. This key, called the modifier key, is the
single most important component to understanding how StickyKeys work. You have to
press the modifier key twice to make the key “stick.” In a word processor, for example,
you normally press the Shift key along with a specific letter key to create an uppercase ver-
sion of that letter. With StickyKeys, you press Shift twice in succession to turn it on. After
which, you press the letter. In such a case, Shift is the modifier key.
3. Press the Tab key once, and release it to reveal the task-switching menu. Press it repeatedly
until you reach the icon for the task you want to bring to the front of the screen. When
you’ve reached that icon, press and release the Alt tab once again. This action turns off the
StickyKeys action and brings the window to the front.
StickyKeys become tricky in cases in which you need to press two modifier keys to perform the
action. In the good old Ctrl+Alt+Delete combination, for example, you must press the Ctrl key twice
to make it stick, followed by the Alt key twice to make it stick, and then the Delete key to bring up
the Windows Task Manager dialog box. You then need to press the Alt key to turn it off and then
press the Ctrl key to turn it off.
You can configure StickyKeys to your preference through the Accessibility Options Control Panel
applet. Open the Accessibility Options applet in the Control Panel, choose the Keyboard tab, and
click the Settings button in the StickyKeys area. Here, you can choose whether to use the shortcut for
enabling StickyKeys (pressing Shift five times in succession), and you can also choose not to require
Chapter 18: Taking Even Greater Control of Your Interface 321
the double pressing of the modifier key to lock it into place. If you turn the double-pressing off,
every time you press a modifier key (including the much used Shift key, as well as Alt or Ctrl), you
will lock it. This will take considerable practice to work with effectively. You can also turn off the
sounds StickyKeys makes when you press a modifier key.
BounceKeys
Press Next on the Accessibility Wizard to move to the next choice, BounceKeys. If you have difficulty
with repeated keystrokes — for example, you tend to hold keys down too long, which creates repeated
characters across the screen — you can turn repeated keystrokes off completely.
Tip
For a quick adjustment to key repetition, open the Keyboard applet in the Control Panel (Winlogo+R, control
keyboard) and decrease the Repeat Rate. That way, the repeat feature is still on, but you have to hold the key
longer to activate it.
ToggleKeys
The wizard next takes you to ToggleKeys, an option in which Windows plays a sound when you
press one of the three keyboard lock keys — Caps Lock, Num Lock, and Scroll Lock. This option is
extremely useful for notebook users. You can turn this feature on by holding down the Num Lock
key for five seconds. The Settings button lets you toggle the shortcut off if you wish.
Extra Help
The final keyboard choice is extra keyboard help in programs that support it. This help is designed
for users who have difficulty using a mouse (or who don’t want to use one) but require extra infor-
mation about using the keyboard in those programs. Each program displays this help system in its
own way, so you’ll have to search for it.
322 PC Magazine — Windows XP Solutions, 2nd Edition
You have further options available on the Mouse tab of the Accessibility Options Control Panel
applet. You can turn on or off the shortcut for using MouseKeys (press the Alt+left Shift+Num Lock
combination; you have to wonder who made that one up), and you can alter the pointer speed. You
can also choose to have MouseKeys available when the Num Lock key is off instead of on. This is a
useful option if you have your computer configured to leave the Num Lock key off when Windows
boots.
The next stage of the wizard lets you choose the cursor you prefer, and the final two stages let you
configure your mouse for right-handed or left-handed use and set the pointer speed as well.
StickyKeys
FilterKeys
ToggleKeys
High Contrast
Click Next to move to the final screen, which asks if you want to establish the current accessibil-
ity options as the default for yourself and other users’ accounts, including new ones. If you click No,
Windows configures only your account with these options.
Chapter 18: Taking Even Greater Control of Your Interface 323
Caution
Microsoft makes it perfectly clear on its Web site that it does not officially support PowerToys. It never has,
and it apparently never will. This means that you install them at your own risk and, if something goes wrong,
you’re on your own to figure out what the problem might be. Then again, you’ve quite likely had precisely the
same experience with fully supported software, so you might not notice much difference. At any rate, before
installing the PowerToys, set a restore point with the System Restore utility so that you can revert to the pre-
installation configuration if you need to. (See Chapter 6 to learn more about setting a restore point.)
GENERAL CHOICES
Clicking the General item reveals an extensive list of configurable options. Most of these choices —
but not all — affect your system’s resources. Unchecking them reduces the amount of system mem-
ory XP uses. All animation options — window animation, ToolTip animation, menu fading, menu
section fading, and so on — fall into this category.
The other choices have different functions. Unchecking Beep On Errors tells Windows not to play
a beep sound whenever errors happen. Unchecking Optimize Hard Disk When Idle stops Windows
from automatically repositioning the files and folders on your hard drive whenever your PC is on but
not in use (you can perform this function manually by using the built-in Defragmentation tool,
which is covered in Chapter 22).
Two submenus are available form the General menu, as discussed in the following two sections.
Focus
One of the problems with Windows XP is its tendency for some programs to take over from other
programs, even when you’re busy working with the original application. This tendency can cause
problems, particularly when the second program steals focus as you’re in the process of pressing a
key that affects the new program. On the Focus submenu you can tell XP to stop doing this as well
as how you want to be informed that a program needs attention: You can have it flash the Taskbar
button continually or a limited number of times.
Alt+Tab
When you press the Alt+Tab combination while working in Windows, the middle of the screen dis-
plays a temporary window that doesn’t have an official name but that should be called the Task
Switcher. By default, the window is three rows by seven columns in size. You can change those dimen-
sions here.
Chapter 18: Taking Even Greater Control of Your Interface 325
Tip
You can replace the Alt+Tab Task Window entirely by installing the Alt+Tab replacement PowerToy, which is
covered in the “Playing with the Rest of the PowerToys” section later in this chapter.
MOUSE CHOICES
You can adjust mouse behavior in numerous ways. From the primary Mouse menu item, you can set
the amount of delay before submenus appear when you hover the pointer over them. At the fastest set-
ting, they appear immediately. At the slowest, they don’t appear at all. In which case, you have to click
the item to reveal the submenu. From this dialog box, you can also adjust the mouse sensitivity — both
the speed at which Windows reads a double-click and the number of pixels you must drag an item
(such as an icon) before Windows performs the drag action. Both choices help you avoid accidental
actions.
Three submenus are available under the Mouse item:
Hover: You hover the mouse when you hold the pointer over an icon or other item.
Changing the hover sensitivity alters the size of the area in which the pointer activates the
hover effect. Increasing or decreasing the hover time changes the number of milliseconds
you must hover the pointer in that defined area before the hover effect kicks in.
Wheel: Here you can set the scrolling options, precisely as you can in the Mouse utility
from the Control Panel.
X-Mouse: Unix users have long been accustomed to the X-Mouse feature in which you
choose a window by simply moving the pointer onto it without the need to click that
window. The X-Mouse option lets you configure Windows XP to work the same way. By
checking the Auto-raise option, you tell Windows not only to select that window when
you move the pointer over it but to bring it to the front of all the other windows as well.
Caution
Using the X-Mouse option takes extensive practice if you’re used to the standard Windows window selec-
tion method. It’s easy to confuse yourself as you move the mouse around the screen. To minimize the impact,
turn on the activation feature first, practice with it for a while, and then choose the Auto-raise option.
EXPLORER CHOICES
By right, the Explorer item in Tweak UI requires a chapter all its own. A huge array of choices appears
in the main dialog and the Explorer subdialogs (see Figure 18-6). Many of which significantly affect the
user experience.
326 PC Magazine — Windows XP Solutions, 2nd Edition
Remove several items from the Start menu — Help and Support, Logoff, and Recent
Documents.
Establish whether you allow Web content on the desktop and, if you have such content, if
you want to lock the content into place and not allow content to be added or removed.
Configure Windows to cover your tracks whenever you log off so that nobody else can see
your document history, the commands you’ve typed into the Start ➝ Run feature, or URLs
you’ve typed into the Address bar of Internet Explorer.
Clear the network history to remove items from My Network Places on exit.
Get rid of the option to view other computers on the local network.
Add an Encyrpt command to the context menu of each file or folder.
Change the interface so that pressing the Tab key in a dialog box menu takes you to the
next item on that menu instead of to the next field of the dialog box.
The following sections explain the things you can modify in the subdialog boxes under Explorer.
With the Thumbnails option, you choose the image quality of thumbnails that appear in your
folders, as well as the size of the thumbnail in pixels. You can pack smaller thumbnails on the screen
or make them larger to really see what they contain.
The other major display task in image folders, Slide Show, is also open to customization here.
Click the Slide Show item and set the time in milliseconds that each image remains on the screen
before switching to the next one.
Command Keys
If your computer has specialized keys for actions such as launching your Web browser or email pro-
gram, for copying and pasting, for controlling volume, and so on, you can customize the action of
each of these buttons through the Command Keys dialog box. From the list of command keys, choose
the appropriate one from the list (not all keyboards support all the listed keys), and click the Change
button.
You can tell Windows to perform the action displayed on the key’s label or to do nothing (thereby
disabling the key). You can also reprogram the key to perform a different action entirely. To do so,
click the radio button labeled Run a Custom Program When the Key Is Pressed and type the path of
the file you want to launch. The dialog box doesn’t include a Browse button, so you need to know
the full path of the item in order to make it work.
Customizations
When you customize your folders, Windows XP requires considerable resources to store and recall
the customized settings as you open the folders. To free up memory, you can restrict the number of
folder settings Windows remembers. The default is 400, but, because most people open only a lim-
ited number of folders as they work, you can cut this number significantly before noticing any dif-
ference. As you work, the folder customization settings drop off the list in the reverse order of how
often you’ve loaded them into memory.
Toolbar Background: Tailor the background of the IE toolbar and/or the Windows
Explorer toolbar by checking the appropriate box and clicking the Change button to
choose the background image you want the toolbar to display.
Search: Develop an easy-to-use search system by creating shortcut names for popular
search engines and then typing the shortcut and the search string in the Address bar. This
eliminates the need to go to the search engine site before searching.
View Source: Change the program that launches when you choose the Source command
in IE’s View menu. By default, this program is Notepad, but there are many more capable
editors.
328 PC Magazine — Windows XP Solutions, 2nd Edition
Small Animation and Large Animation: Choose a new icon displayed in the top-right
corner of each IE window to show that activity is under way. The Windows logo is there
by default, but you can choose an Internet Explorer icon or any other image you want. To
create an animated icon, you must develop a sequence of images 26 pixels square for the
small animation and 38 pixels square for the large.
Image Toolbar: Configure the minimum size of the image that will trigger IE to display
the Pictures toolbar when you hover on that image.
LOGON CHOICES
The final major set of configurations rests with the Logon item and its submenus. In the main dialog
box, you can choose which account names to display on the desktop’s Welcome screen, including
the Administrator account, which is hidden by default.
Caution
By default, Windows XP hides the Administrator account from the Welcome screen. This account is built into
Windows during installation and provides complete control over the system. Even though you can password-
protect the Administrator account, for full security, you should let it remain hidden so that other users don’t
become curious about its function. You can access this account by using the User Accounts utility in the
Control Panel. Here, you can change the way users log on and off by reverting to the Windows 2000 logon
screen and typing the account name and password into the older-style logon dialog box.
Caution
The Autologon option is a really, really bad idea from the standpoint of system security. However, it is conve-
nient if you don’t have those security concerns.
Unread Mail: Change the way the Welcome screen displays the number of unread email
messages waiting for each user. Because this number is substantially useless, you can
uncheck the box and eliminate the notice entirely.
Settings: Change the appearance of the Welcome screen by copying your desktop
settings — fonts, colors, smoothing effects, wallpaper, and more — to make it look like
your desktop.
Screen Saver: Configure the number of seconds the screen saver will allow before prompt-
ing you for your password on the Welcome screen when you touch the mouse or keypad.
Chapter 18: Taking Even Greater Control of Your Interface 329
Alt+Tab Replacement: The taskswitch.exe file replaces the existing Alt+Tab Task Switcher
with a more elaborate version. Figure 18-7 shows the more advanced Task Switcher. The
PowerToys version shows a small thumbnail of the open files as you tab through them. In
addition, clicking an icon immediately brings that window to the front (clicking the stan-
dard Task Switcher causes the utility to disappear).
330 PC Magazine — Windows XP Solutions, 2nd Edition
CD Slide Show Generator: The Slideshow.exe file lets you view the images on a CD as a
slide show.
HTML Slide Show Wizard: The Htmlgen.exe file creates a wizard with which you can put
together slide shows of images for the Web, which is ready for publishing to a site.
Image Resizer: The ImageResizer.exe file gives you a right-click context menu that allows
you to resize images on the fly.
Open Command Window Here: The CmdHere.exe file adds an item to a folder’s right-
click context menu that lets you launch a command window with that folder currently
selected.
Power Calculator: The PowerCalc.exe file gives you a more full-featured calculator than
the one installed by default in XP.
Taskbar Magnifier: The Magnifier.exe file installs an icon on the Taskbar with which you
can magnify a specific portion of the screen.
Virtual Desktop Manager: The Deskman.exe file adds a multiple desktop feature to
Windows XP. You can add folders and icons to each desktop, although you cannot format
each desktop differently as you can in some third-party programs. The Virtual Desktop
Manager is an extremely useful addition to the Windows interface for anyone who works
with numerous open windows that need organization for efficient use of space.
Webcam Timershot: The Timershot.exe file adds a utility that lets you take pictures from
your Webcam at specific intervals. You can save the pictures to any location you like,
including a Web site. This feature is perfect for demonstrating how dull your workday
really is.
Chapter 18: Taking Even Greater Control of Your Interface 331
Summary
With a look at the Tweak UI interface utility, the Accessibility options of Windows XP, and some
methods of getting Windows XP to look and feel more like Windows 2000, this chapter concludes
the discussion of customizing your Windows interface. By this point, you should have a Windows
XP interface that works exactly the way you want it to, as well as the knowledge necessary to con-
tinue to make changes as you need them. The idea is to take control of this complex operating sys-
tem. Chapter 19 extends this idea with a look at installing programs to make your Windows
installation even more your very own.
Part V
Utilities
I f working through Part V hasn’t caused you to spend way more time than you should customiz-
ing your Windows XP desktop, you can find any number of utilities to help you use the rest of
your precious hours. Some of the utilities that let you customize your desktop do nothing more than
make aesthetic changes, while others let you customize the interface more quickly, easily, and effec-
tively to let you change Windows into whatever you want to make it.
333
334 PC Magazine — Windows XP Solutions, 2nd Edition
Virtual Desktop Toolbox (www.r2d2-software.com) is one such utility, allowing for as many desk-
tops as you want, although as with any program, desktops get extremely impractical once you’re past
six or eight. Virtual Desktop Toolbox includes a variety of useful features such as controlling remote
desktops (in conjunction with Windows Remote Desktop). GoScreen (www.goscreen.info) works
similarly, letting you create up to 40 virtual desktops. An interesting approach to virtual desktops is
MaxiVista (www.maxivista.com), which uses the networking features of Windows XP to allow a sec-
ond, third, and fourth PC (that is entirely separate machines) to function as desktop extensions for
the primary PC. You can drag a window from one to the other, and yet (unlike multiple monitor sup-
port on graphics cards) the other PCs can still be running their own programs.
In addition to these two types of utilities, you can download a wealth of themes, screensavers,
icons, and much, much more, turning your Windows desktop into anything you want it to be.
Microsoft itself offers the Plus! SuperPack for Windows, which gives you a good selection of alterna-
tive themes as well as software for creating slideshows and CD/DVD labels, and a few high-resolution
screensavers. Themes are available for download all over the Web. (Do a quick Google search and
you’ll unearth hundreds of them.) You can often find backgrounds, themes, and screensavers on
entertainment sites as well; most new high-profile movies have them, for example. The trick with all
of these utilities is to experiment until you find something that works for you, or until you’ve satis-
fied yourself that you can, in fact, boot your PC into pretty much any environment you want.
Part VI
Installing and Removing Software
and Hardware
Chapter 19
Installing Software
Chapter 20
Removing Software
Chapter 21
Installing Hardware
Chapter 22
Hardware Configuration, Maintenance, and
Troubleshooting
Chapter 23
Speeding Up Windows
Part VI Utilities
Chapter 19
Installing Software
N o matter how many programs you already have for your Windows PC, more await you on
store shelves, on download sites, on CDs and DVDs that come with magazines, and as trial
software on corporate sites. In fact, if you buy a PC with anything less than an 80–120GB hard drive
these days, you stand a very real chance of filling it up with programs alone. This is especially true if
you install extremely large programs (computer games are a major culprit here) or programs
designed to create files that themselves become very large. Video creation software, although it fre-
quently takes up relatively little room on its own (today, less than 100MB constitutes “relatively little
room”), creates files that can quickly overrun a small hard drive. Graphic design programs also pro-
duce files that eat up disk space, primarily because designers, especially professionals, create many
versions of the same data file as the editing progresses.
This chapter outlines typical practices and methods for installing new software and examines
issues such as automatic installation and end-user license agreements.
Cross-Reference
Chapter 6 covers the details of System Restore.
The size of the data files is important when planning the installation of a program. First, before
even starting the installation, check to see that you have enough disk space, especially if you have
only one hard drive with one partition. If you have more than one partition, whether on one hard
339
340 PC Magazine — Windows XP Solutions, 2nd Edition
drive or several, determine on which partition you want the new program to reside. By default,
Windows installers place each program in its own subfolder within the Program Files folder of the
primary hard drive, usually drive C.
Tip
Many programs detect, during the installation process, whether or not you have sufficient disk space. You
can do this yourself by using Windows Explorer (Winlogo+E) and selecting My Computer, then a drive — free
space will show in a pop-up menu, the status bar or in View ➝ Details. Some even give you a summary of the
space available on all your drives as a means of helping you decide the drive on which you wish to perform
the installation. Don’t be afraid to install on a different hard drive, and in a different folder, from the default
locations offered by the installation program. There’s no real reason to have all your programs in the Program
Files folder on your main hard drive; decide for yourself how you want to organize your disk space.
To find a program’s executable file — the file, almost always with an extension of .exe, loads the
program and its associated files and libraries — you can look in that program’s folder within Program
Files. You can launch the program by double-clicking this executable. But in the majority of cases in
Windows, you launch not from the actual program file, but from a desktop or menu shortcut that
does nothing more than tell Windows to locate the file at the specified location and launch it for you.
Shortcuts simply prevent you from having to find the resource yourself.
But you need not install the program where the Windows installer recommends. When you begin
an installation, the program’s installer asks where you want the program to reside. You can type a
path manually or use the Browse button to locate a preferred folder. If you want to install in a non-
default location, before starting the installation you should use Windows Explorer or My Computer
to create a folder specifically for the new program’s data files. Then you can direct the installation to
that folder or, after the installation is complete, use the Properties or Options dialog box in the pro-
gram to assign data files to your new folder.
Planning to install a program includes two other considerations as well:
Know that you may have to reboot your system after or during installation, so it’s a good
idea to save all open documents and close as many open applications as possible. With
earlier versions of Windows, installing almost any program resulted in a restart. With
Windows XP, programs require a reboot somewhat less often, with even major programs,
such as the Microsoft Office System 2003 suite, not forcing a reboot at all.
Plan what to do if the installation routine asks if you want the new program to serve as the
default programs for specific file types. Many programs do precisely this. For example, if
you install a graphics program, during installation a dialog box will almost certainly rec-
ommend that you make the new program the default for graphics files such as JPG, GIF,
TIF, BMP, and more. You should prepare for this question because in many cases the option
does not arise until near or at the very end of the installation. At that point, you’ll simply
want to get the whole thing over with and start clicking Next whenever you see it. It can
be extremely frustrating, however, to discover later that double-clicking on a file on your
desktop or in a folder launches a different program than the one you want.
Chapter 19: Installing Software 341
Note
In some cases, programs you install seem to ask constantly for permission to be the default owner of a given
file type. Web browsers are famous for this, as are media players such as QuickTime and RealPlayer, and
email programs such as Outlook Express. In many cases, the only way to get the program to shut up is to go
into its preferences and disable the nag feature, although some programs offer a check box on the nag
screen itself to let you turn the auto-checking off. During installation, the best bet is usually not to let it take
over the file types it offers to own; instead, make that decision only once you know that you definitely want
this program on your system.
If you grant ownership of a specific file type to a program and you later uninstall that program, ownership
does not automatically revert to the original program. Sometimes, in fact, the only way for the original pro-
gram to retake ownership is to reinstall it. Keep this in mind when making your ownership choices during
installation.
Insert the CD that came with the software package and wait for AutoPlay to start the instal-
lation procedure automatically. More often than not, this will start the installation.
Insert the CD that came with the software package, open My Computer, locate the icon for
the relevant CD-ROM drive, and double-click on that icon to start the installation procedure.
Insert the CD that came with the software package, open My Computer, and locate the
icon for the relevant CD-ROM drive. Right-click it, and choose Explore from the context
menu. In the main window of the resulting Windows Explorer utility, locate the Setup file
(typically called setup.exe but sometimes install.exe), and double-click it.
Insert the CD that came with the software package, open Control Panel, and double-click
the Add or Remove Programs utility (see Figure 19-1). Wait until the list of items appears
in the Currently Installed Programs area (the more you have, the longer it takes for the list
to appear), and then click the Add New Programs item in the Taskbar on the left. Click the
CD or Floppy button; with the CD in the drive, click Next on the Install Program from
Floppy Disk or CD-ROM Wizard. Add or Remove Programs searches these devices for the
installation file.
Tip
You can use Add or Remove Programs even if you don’t have a CD or floppy disk with the installation file. Step
through the process until the wizard tells you to insert the CD-ROM or floppy disk; when it fails to find one,
click Browse on the Run Installation Program dialog box. Manually locate the installation file, and click Finish
to begin installing the program.
Install the program from a downloaded compressed file, as detailed in the following sec-
tion, “Installing from Compressed Files.”
If the downloaded file is a .zip (compressed files) instead of an executable, you’ll need to locate
the .zip file you downloaded from the download site. Double-click the file to open it, and locate the
setup.exe file. You now have two choices:
The most sure-fire process is to click the Extract All Files item in the Folder Tasks area on
the left of the Zip folder (if you don’t see the Task pane on the left, click the Folders button
to display it and then highlight the .zip file). Following the Extraction Wizard, choose a
folder into which to extract the files, or create a new one expressly for this purpose, then
click Next until you reach the Finish button. Click Finish to close the Extraction Wizard
and simultaneously open the folder where the extracted files now reside. Double-click the
setup.exe file from this folder.
If you wish, you can perform the installation directly from the compressed folder by double-
clicking the setup.exe file, but this method can fail because of the compression, and the
process typically takes considerably longer (up to double the amount of time) even if
it does work. The better idea is to extract the files and then, once the installation is com-
plete, delete both the compressed folder and the uncompressed files to reclaim your hard
disk space.
344 PC Magazine — Windows XP Solutions, 2nd Edition
Cross-Reference
To find out more about PowerToys, see Chapter 18.
As the World Wide Web continues to grow, so do the number of ways in which developers, both
beneficent and malevolent, exploit the capability of users to make things happen with a simple
mouse click. ActiveX installation routines provide one significant example of this trend. Microsoft,
Macromedia, and many other major companies make use of ActiveX to simplify installation by pop-
ping up a dialog box when the installation is required (see Figure 19-2).When the browser encoun-
ters a Macromedia Flash object, for example, but the system does not have the correct version of
Flash installed, an ActiveX dialog box asks if you want to install it. At least, you’ll get this question-
ing dialog box if you leave Internet Explorer’s security settings in their default locations. You can
completely override those settings and allow all ActiveX installations to proceed unchecked, but
doing so would allow all sorts of intrusions and malicious code into your machine. So, it’s best to
leave the settings as they are.
Even more installation procedures exist in the Windows XP world. Windows Update provides a
primary example. Although I covered Windows Update in full in Chapter 5, it bears mention here
because its basis lies in new and updated installations. Windows Update provides a means for
Windows XP owners to keep their PCs up to date according to the criteria Microsoft has established.
If you go to the Windows Update site and allow your computer to be scanned, you can select any
updates from the three areas — Critical Updates and Service Packs, Windows, and Driver Updates —
and click the Review and Install Updates link to begin the installation procedure. Figure 19-3 shows
the results of clicking this link: the Install Now button leading to the Microsoft Windows Update dia-
log box in which you accept or reject the license agreement (see the “Inside a license agreement” side-
bar). Clicking the Accept button initiates the installation.
Other programs offer similar means of automatic updating. Probably the most common programs
of this type are virus checkers, which depend on frequently updated definition files — files that con-
tain the details the program needs to recognize each virus — to do their job. Every antivirus program
346 PC Magazine — Windows XP Solutions, 2nd Edition
lets you manually update it either by downloading the virus definition files and applying them to the
program or by connecting to the manufacturer’s site from within the program itself, an easier process
because you don’t have to apply the definition files yourself. Other programs that depend on frequent
file updates for their usefulness, particular security-related programs such as anti-spam, anti-spyware,
anti-malware, and firewall software, all offer similar updating methods. In addition, many programs
provide a feature, typically called Check for Updates, that connects to the manufacturer’s site and
downloads and installs program patches and changes, in some cases replacing the original program
completely and installing a new version from scratch.
If you prefer, you can configure Windows Update and other programs to perform the installations
automatically (see Chapter 5 for details on doing this with Windows Update). In an automatic instal-
lation, a program connects to the Internet and downloads and installs files; all of this activity occurs
in the background and without action on your part. Actually, that’s not quite true — at one point,
either during initial setup or through a separate configuration dialog box, you have to configure the
program to perform this sequence of actions periodically. But once automatic installations are in
place, only when they have occurred do you know they happened. Microsoft’s Windows Update and
Symantec’s Norton AntiVirus, for example, perform either the download or the installation (you can
specify the degree of automation) in the background and inform you, through a small pop-up box,
that they have completed the activity. Other programs use similar techniques.
Continued
348 PC Magazine — Windows XP Solutions, 2nd Edition
You should allow automatic installations only if you are completely confident in the company and
the process. On the other hand, if you purchase a program that requires frequent updates in order to
work effectively, don’t go out of your way to deny it the right to update itself. If you get nailed by a
new virus because you don’t like the idea of your virus checker performing automatic installations,
you end up doing the suffering.
Note
One of the problems with automatic updating is precisely its background operation. Some virus checkers, for
example, check for new definition files whenever you power on your computer. Often this activity slows
down your computer, to the extent that, in the case of Norton Antivirus, you can get frustrated because
Windows responds to your mouse actions so slowly, and you end up clicking numerous icons. A few seconds
later, up pops the Norton notification window, and then an entire series of frustration-driven program
launches. You can stop this behavior only by shutting off the automatic updating feature in Norton AntiVirus,
but do so only if you can remember to perform a manual check for definition files regularly.
Summary
By installing software programs, you (hopefully) add more functionality or entertainment to your
PC. You can install programs that help you get your work done, that keep your system in good
repair, that give you a creative outlet, or that let you fritter away untold numbers of hours in blissful
amusement. Most programs install in much the same way, and they all take advantage of the broad
range of technologies that underlie Windows XP. They provide the building blocks of a Windows
system that works the way you need it to work.
Of course, the counterpart to installing software is removing it, and as you’ll see in the next chap-
ter, Windows XP offers a number of methods to accomplish this task as well.
Chapter 20
Removing Software
Y ou’d think that removing software would be easy — nothing more than a few mouse clicks to
take care of everything. And, to be sure, often a few clicks are all it takes. But, in far too many
situations, uninstalling the software on your system causes more headaches than installing it. In this
sense, you could argue that software is a little like termites and speeding tickets — much easier to get
than to get out of — but software is supposed to be much simpler to deal with. Install, use, uninstall,
done. Nobody wants it to be any more involved than that — with the possible exception of the soft-
ware vendors themselves. But, they’re not in charge. You are.
Back in the days of MS-DOS, uninstalling a program typically meant one thing only. Delete the
folder in which the program’s files resided. Sometimes, but not usually, you had to go to the extreme
of deleting a line or two in the system’s configuration files. However, with the release of Windows
3.x, system files suddenly took on a new importance. Even though program removal remained rela-
tively easy, the need to delete lines manually from the system files (system.ini and win.ini) grew more
important. Installing a program meant adding lines to one or both of these files — sometimes entire
sections in fact — and these lines provided instructions for Windows that, once the programs were
removed, sometimes resulted in system errors. If the program called for Windows to load a specific
file during the boot process, for example, and you deleted the file when you manually deleted that
program’s folder, Windows could stutter or even hang as it started up.
The release of Windows 95 saw the importance of the system files reduced in favor of a new and
more all-encompassing technology: the Windows registry. Less open to manual editing, if only
because its contents are obscure to all but the most technically inclined, the registry has given new
focus to installation and removal. Both actions modify the registry when initiated by a Windows pro-
cedure, and, in some cases, you cannot completely remove a program without editing the registry on
your own. After several months of use, with software actively installed and removed, the registry in
most Windows systems is cluttered with entries no longer relevant to the PC’s operation. Usually
these entries can simply remain in the registry without affecting the performance of Windows, but
they sometimes make a very real and, unfortunately, negative difference.
This chapter shows you how to delete programs from your computer by outlining a variety of
methods and techniques for making sure the job gets done completely.
349
350 PC Magazine — Windows XP Solutions, 2nd Edition
Note
This chapter refers to getting rid of programs by using the following interchangeable terms: uninstall,
remove, and delete.
Caution
See Chapter 4 on backing up your data. If there is any chance you’ll change your mind, be sure that you have
the original program installer.
Figure 20-2 shows this dialog box for a program called Partition Magic 8.0 (from PowerQuest
Corporation). If you want to reinstall the program precisely as you installed it initially, choose Repair.
This option is especially useful if the program has — for any reason — stopped performing the way
it did initially. The Modify option lets you add or remove individual components of this multipart
utility. The Remove option, as its name implies, uninstalls the program from your hard drive by
deleting the files in the program’s folder, associated files in other folders, and registry entries relevant
to that program.
Many uninstallations remove the majority of the files from a program’s folder but not necessarily
all of them. For numerous reasons, among them the use of one of the program’s files at the time you
attempt removal, files can remain in the folder, and the folder can continue to exist on your hard
drive. In some cases, the folder remains in order to hold the data files. The uninstall procedure
assumes (usually correctly) that you want to get rid of the program but not its associated data.
Leaving the data files in place allows you to reinstall the program later and still use these files. Data
files are, after all, the most important files in any program.
Third-Party Uninstallers
You don’t need to restrict yourself to the uninstallation procedures already on your machine. You can
add third-party utilities to help you keep track of programs and their uninstallation demands, and
you can also perform the removals manually.
352 PC Magazine — Windows XP Solutions, 2nd Edition
If you install a great deal of software, you should consider buying and installing one of several utili-
ties designed expressly for this purpose. These utilities can help you locate and get rid of programs
already installed on your system, but they work best when you use them during the installation as well.
Essentially, these programs monitor your PC; as you install programs, they create a database of details
about what the installation actually does.
For example, the database contains complete information about the files installed and their loca-
tions, files replaced and their locations, registry entries created and modified, shortcuts and their
locations, and more. When you want to uninstall the program, you launch this utility instead of (or,
in some cases, in addition to) the Add or Remove Programs utility in Control Panel. The program
reverses all additions and changes originally put in place by that program’s installation process and,
in some cases, asks if you want to remove associated installations as well.
Figure 20-3 displays one of the better known uninstall utilities: Norton CleanSweep. Part of the
Norton SystemWorks suite of utilities, CleanSweep provides a monitoring feature and also lets you
search for programs to uninstall. This figure shows the result of a search for programs on all drives
with a list appearing in the main window. Clicking any of the programs yields a brief description of
the program that helps you decide if you should consider deleting it.
Clicking OK for this file opens the CleanSweep Uninstall Wizard. The first stage of the wizard
asks where you want to store the backup. Immediately, the difference between CleanSweep and Add
or Remove Programs becomes apparent. In addition to removing the program, CleanSweep backs it
up in case you realize you made a mistake and want to reverse the uninstallation.
Furthermore, the rest of the wizard shows the additional power of the program as it asks you if you
want to confirm the deletion of each item. Figure 20-4 shows the result of answering Yes and moving
past the next step. That step contains a View button to let you see (and possibly modify) the list of
items CleanSweep will uninstall along with the main program. The list shows what CleanSweep has
determined it should remove, but you can uncheck items you don’t want removed for whatever
reason. The Links button is an extremely powerful tool. It opens to reveal two lists: one consisting of
Chapter 20: Removing Software 353
programs or files that use the program you have slated for removal and the other showing programs
or files that the currently selected program uses. These lists let you determine if removing the program
might cause a ripple effect by rendering other programs suddenly nonfunctional because they depend
on this one. Click OK and then Finish to remove the program.
Third-party uninstallation utilities typically do more than just help you remove programs. They
also do the following:
Monitor your system cache, your browser cache, history, cookies, and more
Provide an endless amount of information about what’s going on under the hood of
your PC
Help you decide what to keep and what to remove
As you can see, uninstallation utilities are very useful, and most users would do well to have one.
However, for maximum effectiveness, configure their options to have them load automatically with
Windows so that if you begin an installation, the utility is sure to track it. Otherwise, you largely
defeat the purpose of these programs.
Chapter 6 covers the use of the System Restore utility in detail. Here, the important thing to keep in
mind is to be sure to create a restore point whenever you install anything on your PC: hardware and
software alike. The only problem comes when you want to turn back the clock more than one instal-
lation ago. For example, if you install Program A on September 15 and Program B on October 30
and set a restore point before installing each program, restoring your PC to its state on September 15
wipes out the installation you performed on October 30. Because System Restore leaves all data files
entirely intact, as long as you have the installation media or the downloaded file for the software
installed in October, you can reinstall that program.
A single misstep while editing the registry can cause irreparable harm to your Windows XP
system.
Some programs place so many entries into the registry that tracking them all down can
take hours. To find them, expand all items, and look for the name of the vendor and the
name of the program as well as the file type if the program works with a specific data file
extension. In addition, perform a search (Edit ➝ Find) on the vendor and program name
(or on a specific filename if you know of a file used exclusively by that program).
1. Use the System Restore utility to set a restore point for your system in case anything with
this process goes wrong. See Chapter 6 if you need a refresher on setting a restore point.
2. Ensure that you can’t remove the program with Add or Remove Programs by opening the
Add or Remove Programs utility and examining the list. Also look in the Add or Remove
Windows Components list by clicking that button on the utility.
3. Look in the program’s folders for an uninstall utility, such as unwise.exe or an icon with a
filename beginning with Uninst or just Un. Again, if you can do the job this way, you’ll
save yourself time and possible trouble. Assuming that neither step 1 nor 2 gets you any-
where, you can begin the manual removal.
356 PC Magazine — Windows XP Solutions, 2nd Edition
4. Locate the program’s folders and files. Typically, these reside inside the Program Files folder
on your primary Windows drive (usually your C: drive). If you can’t locate the program
because the name doesn’t appear, right-click the program’s icon, and choose Properties to
locate the file this way. Alternatively, you can open the program and choose About to see
who manufactures it and then look in Program Files to see if Windows has stored it in a
folder of that name instead.
5. Examine the folders carefully for data files you created yourself. If you find some files, but
you’re not sure if they’re yours, open the program and use the File Open dialog box to load
the files into memory. In any event, if you find data files and want to keep those data files,
copy or move them into another folder on your hard drive. Sorting files by date may help.
6. Delete the folders containing the program and its files and subfolders. Be careful not to
delete the entire Program Files folder by accident. It’s been done before.
7. Reboot your computer and see if anything fails to work. If you run into problems, open
System Restore and bring the program back by choosing the restore point you created in
step 1.
8. If everything works, edit the registry with the Regedit program. (Click the Start
button, choose Run, type redgedit, and press Enter.) In the Software section called
Chapter 20: Removing Software 357
HKEY_LOCAL_MACHINE, locate the keys for the software you just removed. Programs
are listed by vendor. If you have more than one program from the same manufacturer, drill
down through the items to make sure that you delete only the keys for the program you
want to remove. Right-click each entry, and choose Delete.
9. Perform the same function for the HKEY_CURRENT_USER section of the Registry Editor.
10. Reboot to ensure that everything works. If it doesn’t, use System Restore to turn back the
clock.
11. Open the System Configuration utility (click the Start button, choose Run, type msconfig,
and press Enter), and click the Startup tab. If your program appears in the list, uncheck it,
and click OK until the utility closes.
12. Reboot Windows.
Tip
If you manually remove a program from your PC, the name of the program remains in the Add/Remove
Programs list. You can remove it in two ways. First, if you try to uninstall it, Windows tells you it cannot do so
and asks if you want to remove the name from the list. Click Yes. Second, you can remove the program from
the list by installing the TweakUI PowerToy (see Chapter 18 for details on TweakUI) and using its option to
remove items from the Add/Remove list.
There is actually a third way to manually remove a program — one that the first two methods accomplish
in a friendlier way. Open the registry using the Windows Registry Editor (click Start, choose Run, type regedit
in the Open box, and press Enter) and navigate to the key at HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\Uninstall. Scrolling down this list reveals the names of the programs on the Add or
Remove Programs utility. With the utility open so that you can double-check what you’re doing (the registry
does not offer a particularly user-friendly appearance), right-click in the registry on the items you wish to
remove from the list and choose Delete. The next time you open Add or Remove Programs, you will no longer
see the item.
Summary
When everything behaves as it should, removing software is a piece of cake. Unfortunately, and for
various reasons, perfect behavior isn’t nearly as common as it should be. So, besides the Add or
Remove Programs utility of Windows XP, you may need additional techniques to get the job done.
With the range of proactive through protective techniques covered in this chapter, you should have
very few problems getting rid of programs you don’t want — even those that don’t seem to want to
leave.
Chapter 21
Installing Hardware
E ven a heavily discounted computer in today’s market contains a decent collection of hardware.
You get lots of RAM, a fairly fast processor, a large hard drive, and built-in audio and graphics
capabilities at a reasonably high level. You also get a CD-ROM drive at the very least or — more
frequently now — a CD-RW drive. Moreover, many machines now ship with combo DVD/CD-RW
drives and, increasingly, DVD burners. Most PCs come with several USB 2.0 ports, and many also
have FireWire ports. When you buy one of these machines, you plug it in, boot it up, and glory in
your newfound power.
For a while, anyway.
This chapter covers hardware installation in your Windows XP machine, including physical
installation of the hardware itself and, once you have your new device in place, how to locate and
install the necessary drivers.
Your computer has trouble running that new graphics program you bought, so you decide
you need more system memory and/or a new video card.
You want a second (or third) monitor to increase workspace (XP supports up to 9).
You start running out of disk space, so you decide one of those new whopping hard drives
would solve the problem.
A new printer catches your eye.
You want to start creating video more seriously.
You get a new mobile audio player (such as an iPod) for your birthday.
You want a second mouse, trackball, or pen (XP supports multiples of each).
359
360 PC Magazine — Windows XP Solutions, 2nd Edition
You need more USB connections for all these other devices (or you’re tired of crawling
under your desk to plug in a flash drive — get a USB hub).
You wake up one morning with your sights set on buying yourself a new and faster
processor and then discover that, in order to use it, you have to install an entirely new
motherboard.
All these cases deal with installing hardware, an often intimidating and too often frustrating (even
infuriating) process. Adding software to a computer seems much less complex. Adding software is a
bit like adding the pictures of your latest vacation to your photograph album — the pictures improve
the album, but they don’t fundamentally change it. When you add hardware, you alter the machine
itself — either by appending another device to it (adding external hardware) or popping the hood
and inserting a device inside it. As a result, in addition to the device itself, you need to install a soft-
ware driver, a set of software instructions that tell Windows how to interact with and utilize the
device. In addition, you have to concern yourself with plugging the wires in correctly, not an incon-
siderable point when it comes to installing hardware inside the box (and sometimes a bit tricky even
outside the box).
Nobody really minds plugging in a new printer or scanner and getting it up and running. Add-
ing a new video card, networking card, hard drive, or memory module, however, can make anyone
nervous — and for good reason. When you install software, or external hardware, you have little
chance of actually damaging something. With hardware, you can actually cause physical problems or
even render your computer processor dead.
All of that said, as long as you work even reasonably carefully, don’t let the warnings stop you
from trying. You can improve your PC noticeably by adding new memory, a new hard drive, or a new
video card, and neither one of these tasks takes more than (at most) an hour of your time. In fact,
with some PCs, the most significant challenge for all three might very well be getting the case apart.
Once inside, a bit of planning, a bit of maneuvering, and a bit of gentle persuasion can get the job
done quickly.
Hardware Basics
Computer hardware comes in two basic types: external and internal. Printers, scanners, and digital
cameras are always external devices; system memory (RAM), hard drive controllers, and mother-
boards are always internal. Hard drives themselves, along with CD-RW drives, network cards, and
USB or FireWire adapters, can be either. You will always find it easier to install an external device
than an internal device — primarily because you don’t have to open the computer case.
For this reason, computer vendors have been pushing external devices increasingly over the past
few years. They know that very few users feel comfortable opening their computer cases. With note-
book computers, doing so sometimes even voids the warranty. However, if you ultimately want to
upgrade your computer rather than buy a new one, and if you don’t want to pay your local shop to
do the work for you, you’ll end up getting your hands dirty (figuratively speaking only — computer
cases shouldn’t have any real dirt in them) and opening the case.
Whichever type of device you choose to install, Windows XP handles all hardware installations
according to the same basic principle. You must connect the hardware to the computer, and you
must install a hardware driver to allow Windows to communicate with the new hardware. Without
Chapter 21: Installing Hardware 361
the driver, the hardware does not work. From the operating system’s perspective, it doesn’t even
exist. Where do you get drivers? Three sources, mostly:
The manufacturer: When you buy a new hardware device, the manufacturer includes a
CD or (rarely today) a floppy disk containing a set of drivers or, more typically, the drivers
and other software. A typical scanner package, for example, contains one or more CDs
containing the software drivers, scanning software, and often a full, trial, or limited version
(often called a lite version) of both photo-editing software and optical character recogni-
tion (OCR) software — the latter for converting scanned text documents to word process-
ing files. Buying a portable MP3 audio player gets you the necessary drivers, along with
software to rip songs from music CDs and copy them to the player.
Windows XP: Windows XP ships with hundreds of hardware drivers on the installation
CD and has proven more capable than any other Windows version to date at recognizing
hardware and installing drivers automatically. Sometimes, you might not get the most up-
to-date driver available, but you’ll often be able to use the device minutes after plugging it
in. In fact, this feature of Windows XP has proven one of the most important features of
all. For the first time, even computer novices can buy a hardware device for their computer
and install it with a reasonable degree of confidence, even nonchalance. For users who
have worked with earlier versions of Windows with hardware installations that resembled
arcane cult rituals combined with advanced automobile repair, adding hardware to
Windows XP has proven extremely agreeable. Imagine, you plug it in . . . it works! Oh,
brave new world!
Internet download areas: You can acquire and upgrade software and hardware drivers
from the Internet, which is applicable with newly acquired hardware when you didn’t
receive a driver disk or CD with it (as often happens when you buy a hardware device from
a friend). However, if this is your situation, you should see if you can find the driver on the
Internet. Your first destination should be the manufacturer’s Web site, usually the support or
download section (you might have to drill through product lists to get to it). Failing that,
you can get good results by visiting a paid driver service such as www.drivershq.com or
www.windrivers.com. Other sites, such as www.Driverzone.com, provide links to a wide
range of manufacturer sites for drivers. Windows Update will offer device drivers if it recog-
nizes them upon scanning your PC, but often these aren’t the absolute latest versions. They
are, however, usually very safe.
Actually, it might not prove quite that easy. Especially in the case of devices that connect through
a USB port; read the installation instructions to determine if you should install the driver first or the
device first. Most manufacturers specify that the driver comes first so that Windows can load that
driver automatically when it recognizes the device. If you do not follow this sequence, it could take
you two or three tries to get the hardware device to function.
One other element can come into play with external devices: power supplies. Hardware devices
installed inside the PC draw electrical power from the power supply inside the PC itself. External
devices, with a very few exceptions, require power from an electrical outlet in your building. The
devices come with their own power supplies, and you must plug them into the wall socket or a
power bar (which itself plugs into a wall socket). By itself, this isn’t a problem because the manufac-
turers supply the necessary items. Unfortunately, many manufactures use the type of connection in
which the connectors for the wall socket emerge from the large transformer itself. This results in gar-
gantuan plugs that can make it nearly impossible to plug in even two devices. In fact, some users
have even let the type of connector stand as the final decision point between one piece of hardware
or another when considering the two for purchase.
Tip
If you have a computer with multiple devices installed internally and multiple devices attached externally, con-
sider having an electrician install a separate electrical line for your computing use only. Otherwise, once you
start using all your hardware devices, you might notice power fluctuations, and fluctuations can damage a PC
very quickly. You should also consider using a high-quality surge suppressor (not the $4.95 item that claims to
suppress surges), or, better yet, an uninterruptible power supply (UPS). A good surge suppressor costs $30 or
more, with a good UPS closer to $100. But if they protect you from even one power surge, you will most defi-
nitely not mind having spent the money. UPS hardware goes so far as to keep your computer running when the
power goes out completely, which is long enough for you to shut down all your programs and then the PC itself.
The better UPSs even perform the shutdown for you in case you’re away from the machine.
Take your time: Internal hardware installations seem designed for Murphy’s Law, and
Murphy seems to sit in wait of people who are in a hurry. When everything goes perfectly,
the installation can take as little as five minutes. But you should count on at least an hour
Chapter 21: Installing Hardware 363
for any single piece of hardware you want to install, and entire evenings for more com-
plex jobs.
If you have an important deadline approaching, don’t open your computer case if
you can continue working without doing so: The installation might fail. Worse, it might
render the system unusable or even just wonky. Neither outcome is likely, but you must
remember our friend Murphy.
Be awake and alert: It really does help.
Always power the machine down before beginning and unplug the power cord.
Touch the metal side of the case to discharge static electricity from your hands before
touching anything inside the case: If you have a plastic case, touch something else that’s
metal.
If anything metal falls into the computer (a loose screw, for instance), don’t even
consider turning on the machine until you get it out. If you can’t find it, take every-
thing apart until you do. Otherwise, you can short out your entire system.
Perform one hardware installation at a time: Restart your computer each time to make
sure that everything works. Then, go through the installation procedure all over again for
the next device.
Have a screwdriver, preferably a screwdriver set with two or more sizes of Philips
(star-shaped) heads at hand. You might need flat heads as well.
The process itself depends on what hardware device you want to install. However, before you can
begin, you need a sense of what you’re looking at. The first thing you’re likely to see is a disarray of
cables with one end attached to a device and the other leading to the rectangular circuit board cov-
ering much of the bottom of the case. This board is known as the motherboard, or mainboard.
Ultimately, every hardware device in your PC attaches to this board. Some devices are built into the
board, whereas others connect through wires. You connect others by plugging them into slots placed
at various locations on the board — the processor and RAM modules attach this way, as do, very
often, the video and sound boards, the USB and FireWire ports, and the network cards. However,
manufacturers often build one or more of these devices into the motherboard. At which point, they
take on the term integrated.
RAM modules are long, narrow circuit boards arrayed perpendicularly to the motherboard and
attached to the system in slots, which is usually near one edge of the board (often the edge closest to
the power supply — the large, cube-shaped item to the side of the motherboard). Each end of the
slot has a plastic connector that resembles a clip. To remove the RAM module, you pull the clips
away from the module. To install a module, you press the module into the slot until the clips hold it
in place. Again, see the instructions that came with your specific PC.
At right angles to the back of the PC, you’ll see the peripherals in their slots. Most computers have
two kinds of slots: PCI and AGP. Typically, motherboards have one AGP slot and 3–8 PCI slots. In most
PCs, the AGP slot, which is usually located close to the RAM modules, already contains the video card.
If not, the video system is probably built into the motherboard. You can tell by locating the connector
the monitor is plugged into. On older PCs, your video card might plug into a PCI slot instead, but PCI
364 PC Magazine — Windows XP Solutions, 2nd Edition
video cards have become rare. Unless you have an integrated video system, you can replace the video
board by removing the old one (you must undo the screw holding the card to the case first) and insert-
ing the new one. In the case of integrated video, you can install a video card and either use the two
together in a dual-monitor system or enter the BIOS setup program and disable the onboard video.
Installing any other peripheral card (sound board, network card, or FireWire card) follows much the
same procedure. Find an empty slot or remove an existing board, push the card firmly into the slot,
and attach it to the computer case via the screw and the notch at the board’s top.
To add an internal drive of any kind, you must physically insert the drive into one of the drive bays
(one of several possible openings designed to hold a 3.5-inch or 5.25-inch drive), screw it into place,
and connect at least two cables from the device to the motherboard. The first cable gives the unit
power. Take one of the unused female power connectors (most PCs have two or three available), and
plug it into the power connector at the back of the device. The second cable handles data transfer and
plugs into the back of the drive and onto the controller ports on the motherboard. Use the instructions
that came with your hardware for this procedure. Sometimes, you need to set “jumpers” or pins on the
board, and each device can be different. The procedure is not difficult, but read all instructions thor-
oughly and be prepared to redo it if it doesn’t work correctly the first time you turn on your PC.
With the hardware installed, ensure that all screws are in place and then close the case. Plug in the
power cord and anything else (such as the mouse, keyboard, or monitor) that you might have
unplugged, and power the PC on. Watch the boot sequence to see if the PC has any trouble recog-
nizing any of the new hardware. If it does, reopen the case to make sure you’ve attached everything
correctly.
As Windows boots, it attempts to install the drivers for the newly installed hardware. See the fol-
lowing “Installing Drivers” section.
When Windows finishes loading, use Device Manager to ensure that all new components appear
as part of the system. Chapter 22 covers all the elements of Device Manager. For now, you should
determine if your system displays the correct amount of RAM and the correct hard disk size if you
installed one or both of those devices. If not, reboot your PC once or a few times to let the machine’s
BIOS fully recognize all components and report them correctly. Sometimes, the initial boot doesn’t
do the trick.
Installing Drivers
In an ideal world, Windows XP would take care of all drivers for all hardware so that you could sim-
ply plug the item in, boot your PC, and start working with your new device. Sometimes indeed,
given the large number of drivers included with the Windows XP installation, that’s precisely what
happens. However, brand-new products usually ship with new drivers to allow Windows to use all
the features of that device, and you must install this particular driver for the new hardware to work.
Cross-Reference
For details on installing drivers, see Chapter 22, which covers the issue of locating drivers more specifically
than the general guidelines examined here.
Chapter 21: Installing Hardware 365
Unless your hardware manufacturer specifies when to install the driver, you can install the driver
for your hardware devices at either of these two times:
Before installing the device: With Windows XP running, place the driver installation CD
in the CD drive, and install the driver by launching the Setup file located on the CD. After
completing the installation, connect the device and, either by rebooting or simply waiting,
let Windows recognize the device and load the driver. If no Setup file exists, you must
install or connect the hardware first. You can also use this method if you download the
driver from the Internet.
After installing the device: You should use this method for all internal hardware installa-
tions to ensure that Windows recognizes the hardware properly. Many non-USB printers
also install more easily this way. With the PC powered down, install the device and restart
the computer. As it boots, Windows prompts you for the driver. Put the driver CD in the
CD-ROM drive and either let Windows XP find it on its own (it automatically attempts to
do so) or browse the CD to point Windows to the file it needs to find.
If Windows boots and does not notify you that it has found new hardware, go ahead and try to
use your hardware to see if it works. In some cases, such as mass storage devices — a category into
which Windows XP places external hard drives, digital cameras, hard disk–based audio players, and
more — you might not need the manufacturer’s included driver at all. As long as Windows can use it
without asking, just go along for the ride.
Summary
Some hardware installations proceed flawlessly. Others result in annoyance and headaches.
Windows XP offers the best installation assistance of any Windows version to date, but difficulties
remain. The secret, as difficult as this might seem when you can’t wait to get started with that new
device, is to perform the installation of the device and its driver slowly, methodically, and carefully.
This is especially true for internal installations, but it is true as well for the easier task of adding
external hardware. After all, the goal isn’t just getting hardware that functions but getting hardware
that functions properly. This chapter has focused on installing hardware. Chapter 22 examines the
process of troubleshooting and updating it once you have it installed.
Chapter 22
Hardware
Configuration,
Maintenance, and
Troubleshooting
I deally, once you have installed your hardware, you can use it repeatedly and constantly, never need-
ing to dig into the multitude of Windows XP settings and make changes. Unfortunately, all too
often this ideal falls somewhat short of what actually happens. Sometimes, you have to reconfigure
your hardware. Other times, you must reinstall it in order to get it to work. At still other times, you may
simply want to upgrade the software components to take advantage of new or improved features.
Windows XP offers a host of wizards and dialog boxes to help you work with your hardware’s drivers
and settings, but the most important tool, Device Manager, provides the central focus for this chapter.
Windows XP also contains a number of tools for maintaining your system. Because your hard
drives constitute the single most important hardware component to maintain, this chapter also cov-
ers hard disk maintenance tools. Between Device Manager and the hard drive utilities, you can keep
the hardware on your system humming along smoothly.
367
368 PC Magazine — Windows XP Solutions, 2nd Edition
shows an X, actually in red, which denotes a completely malfunctioning device (in this case, it was
deliberately disabled). The HID-complaint device (HID stands for Human Interface Device — in this
case, a pen tablet) bears a yellow warning icon, indicating that Windows XP detects a problem with the
device (in this case, it was abruptly unplugged). Finally, the Unsupported Device shows a yellow ques-
tion mark, a signal that XP needs additional information in order to have it function properly (in this
case, the device needs a driver, which we will discuss later in this chapter).
Even if a device is flagged in one of these ways, it may not be a real problem if, as far as you can
tell, the device seems to function. If you agree with XP that there is a problem, you might try dis-
connecting the device and reconnecting it. If this doesn’t fix anything, read on.
To open Device Manager, right-click My Computer and choose Properties (or Winlogo+Break).
From the resulting System Properties dialog, click the Hardware tab. In the Device Manager section of
the dialog box, click the Device Manager button. After a brief delay, the Device Manager utility opens.
Your first survey of hardware status takes place immediately, according to the following views:
If all categories display as closed, with no individual devices showing, Device Manager
does not know of any malfunctioning hardware. The device still might not work, but
from the standpoint of Windows XP, it works just fine.
If Windows XP sees any device as malfunctioning, Device Manager opens with that
device’s category automatically expanded to reveal the problem hardware. After upgrading
to Windows XP or installing it for the first time, you should expect one or more devices to
be displayed as nonfunctioning, awaiting drivers.
Chapter 22: Hardware Configuration, Maintenance, and Troubleshooting 369
Tip
If a hardware device stops working completely and you can’t solve the problem in just a few minutes, you
might have a mechanical problem instead of an electronic one. Consider removing the hardware device and
installing it in another PC if one is available. If the hardware still doesn’t work, and you still get no response
from it, you can assume that it has bitten the dust and can be discarded. In the case of expensive hardware
devices such as printers or monitors, you might consider sending it to a repair shop.
370 PC Magazine — Windows XP Solutions, 2nd Edition
Several hardware Properties dialog boxes offer tabs containing settings specific to a particular
device type. For example, communications and parallel ports, which are typically used by modems
and printers, respectively, feature a Port Settings tab leading to a dialog box where you can configure
how that port should operate. Figure 22-4 shows the Communications Port Properties dialog box,
along with the Advanced Settings dialog box, that results from clicking the Advanced tab on the Port
Settings tab. Similarly, opening the Properties sheet for an IDE channel (the motherboard’s connec-
tion to disk drives, including hard disks, CDs and DVDs) provides you with an Advanced Settings
tab in which you can set the DMA mode required by some CD and DVD applications (DMA stands
for Direct Memory Access and can speed up disk connections, if the device supports DMA).
Chapter 22: Hardware Configuration, Maintenance, and Troubleshooting 371
If you experience problems after installing a video driver, or if the driver manufacturer’s Web site
informs you that the driver contains bugs and should be uninstalled, click the Roll Back Driver but-
ton. This highly useful feature offers a one-click method for uninstalling the current driver and rein-
stalling the most recent one, which is typically an excellent solution for misbehaving hardware. Of
course, if the previous driver also caused problems, a complete removal is a better idea. In this latter
case, you can click the Uninstall button.
Note
You can also uninstall some drivers via the Add or Remove Programs utility in Control Panel.
To install a new version of a driver, click the Update Driver button. This launches the Hardware
Update Wizard. Because you are supplying the driver on your own, choose the Install From a List or
a Specific Location (Advanced) option on the Welcome screen and decide whether you want
Windows to search for the driver on the subsequent screen. If you do, help Windows by narrowing
the search. Click the Browse button to locate the folder to which you downloaded the new driver,
and uncheck the option to search removable media.
If you know the driver you want Windows to use for this device, click the Don’t Search radio but-
ton, and click Next. This yields a list of compatible drivers from which you can make your choice. If
you want to search for still more already installed drivers, uncheck the Show Compatible Hardware
option and drill through the Manufacturer and Model lists.
Caution
If you decide to choose a driver manually, pay attention if Windows tells you it won’t work with your hard-
ware. In the vast majority of cases, Windows is absolutely right; you risk negatively affecting your system
performance by going ahead with the installation.
Figure 22-7 shows the location for a different manufacturer. This one required only three
mouse clicks.
4. Click the download link and when the Download dialog box appears, click Save to store
the driver on your hard drive.
5. Navigate to the folder in which you downloaded the driver and read the instructions,
which are often contained in a Readme file. In the case of a zip or .exe file with no other
files, launch the file, extract the files, and proceed from there.
374 PC Magazine — Windows XP Solutions, 2nd Edition
Caution
Many manufacturers offer the most recent hardware drivers in an unfinished state. Called beta drivers, this
software has progressed in the company’s estimation to the point where it invites the public to experiment
with the drivers on their own systems. Unless you want a specific feature on the latest beta drivers, don’t
install a beta driver; until they undergo further testing, you risk malfunctions of various kinds. If you decide to
install them anyway, make absolutely sure that you create a restore point by using the System Restore utility
(described in Chapter 6) so that you can back out of the process if Windows starts misbehaving.
If you click the Continue Anyway button, Windows automatically sets a restore point that you
can use in conjunction with the System Restore utility if the installation causes problems (see Chap-
ter 6) and then proceeds to install the driver.
Even though Microsoft offers no assurances that unsigned drivers will work, if you download the
driver from the Web site of a reputable company, which includes any major hardware manufacturer,
you rarely need to worry about unsigned drivers causing problems for your system. Because
Windows creates the restore point, the worry decreases even more. Generally speaking, you should
feel free to click Continue Anyway if you want the latest driver on your system.
You can change what Windows does when it encounters an unsigned driver during the installa-
tion process. On the Hardware tab of the System Properties dialog box, click the Driver Signing but-
ton and choose one of the following options:
Ignore: Windows lets you install all the unsigned drivers you want — neither informing
you nor warning you. Obviously, you take some chances with this option.
Warn: Windows displays a dialog box each time you begin an unsigned driver installation
that asks if you want to continue. This is the default option.
Block: Windows never asks you about the unsigned driver. Instead, it blocks the installa-
tion, which completely prevents you from installing unsigned drivers.
If you have an Administrator account, you can specify that the selection option apply to all users
on the PC who attempt to install unsigned drivers. To do so, check the Make This Action the System
Default option in the bottom section of the Driver Signing Options dialog box.
1. Open the System Properties dialog box by right-clicking My Computer and choosing
Properties (or pressing Winlogo+Break).
376 PC Magazine — Windows XP Solutions, 2nd Edition
2. Click the Hardware tab and then the Hardware Profiles button.
3. In the Hardware Profiles dialog box (see Figure 22-8), highlight the current profile (called
Profile 1 by default), and click the Copy button. This action creates an identical copy of
the default profile for you to change by excluding specific devices.
4. Highlight the new profiles (labeled Profile 2 by default), and click Rename. Give the profile
a name you’ll remember (renamed to External sound card profile in Figure 22-8). Click
OK to exit the dialog box.
5. Reboot your PC. Watch for the profiles screen, and choose the new profile. Press Enter to
continue the reboot.
6. Open System Properties again, and click the Hardware tab. Click the Hardware Profiles
button, and check to see that the new profile is indeed the current profile. Assuming that it
is, close the dialog box.
7. Click the Device Manager button to open Device Manager.
8. Locate the hardware device you want to exclude from this profile, right-click it, and
choose Properties.
9. At the bottom of the resulting Properties dialog box for that device, click the down arrow
beside the Device Usage menu. Choose the Do Not Use This Device in the Current
Hardware Profile (Disable) option.
10. Click OK to exit this dialog box, and click OK again to exit Device Manager.
11. Reboot your PC, and select this new profile again. This time, Windows boots with that
device disabled.
Chapter 22: Hardware Configuration, Maintenance, and Troubleshooting 377
Tip
You can edit a profile as many times as you like and make it increasingly specific to your needs.
If you decide you no longer need a profile, open the Hardware Profiles dialog box, highlight that
profile, and click the Delete key.
All of these tools are perfectly safe to use. Still, many people back up critical files as the first step
in this routine maintenance (see Chapter 4).
378 PC Magazine — Windows XP Solutions, 2nd Edition
Automatically fix file system errors: This option instructs Windows to make repairs to
the file system if it finds any during the scan. Windows needs to take complete control
over the drive in order to start this process. If the drive is currently in use, Windows asks if
you want to schedule the disk scan for the next time you start the PC. If you don’t say Yes,
the disk check won’t happen at all, so the choice is really between scheduling the scan or
canceling it.
Scan for and attempt recovery of bad sectors: As you use your hard drive, it can develop
bad locations known as bad sectors. Bad sectors tend to spread as Windows tries to write
data to them with the result that your drive eventually slows down and sometimes renders
data writing (such as file saving) difficult or even impossible. If you suspect that your hard
drive contains errors, check this option to allow Windows to locate the errors and block
them off permanently by moving whatever data they contain to a good sector on the disk.
Once again, Windows needs complete control over your hard drive to execute this com-
mand. If the drive is currently in use, a dialog box asks if you want to schedule the repair
for the next time you boot your PC. If you do choose this option, the next time you start
the computer, you will have a few seconds to cancel the scan; if you let it proceed (as you
will probably want to do), be prepared for a wait while it does its job before Windows
loads.
Note that you don’t need to select both options. If you choose the second option, Scan For and
Attempt Recovery of Bad Sectors, Windows automatically enacts the check for file system errors as
well. Consider the bad sector check the complete maintenance package when it comes to repairing
errors on the hard drive.
Properties to open its Properties dialog box. Click the Tools tab and click Defragment Now. In the
resulting Disk Defragmenter utility, highlight the drive in question and click Analyze. Figure 22-10
shows the report provided by Windows with the suggestion that Defragmentation isn’t necessary. It
never hurts to defrag, so you may want to skip Analyze and just go straight to the Defragment button.
Figure 22-11 shows the result of clicking the Defragment button, either on the Report screen or
the main Disk Defragment window. The progress bar at the bottom of the window shows the length
of time remaining while the Estimated Disk Usage After Defragmentation area changes during the
process to reflect the reduced fragmentation visually.
Tip
As with most other types of system utilities, third-party manufacturers such as Symantec and Executive
Software offer improvements on the Defragmentation utility found in Windows XP. Symantec’s venerable
Norton Utilities suite features a fast and fully capable defragmenter called SpeedDisk. Executive Software’s
Diskkeeper gives you an even faster and more powerful utility for this purpose. Whenever you’re dealing
with system enhancement software, it’s a good idea to check what’s available beyond the Windows XP pack-
age itself.
380 PC Magazine — Windows XP Solutions, 2nd Edition
Summary
Windows XP provides a number of tools for ensuring that your hardware works correctly and effi-
ciently. By far, the most significant such tool for the hardware itself is Device Manager; but when it
comes to the proper maintenance of your hard drives, the error-checking and defragmentation tools
can help significantly. You can buy third-party tools with additional options for both error correction
and defrag purposes, and as you get increasingly serious about your system, you should certainly
consider their purchase. But the tools provided in Windows XP itself can help you a great deal. The
trick with disk maintenance is not to forget about it until after the damage has been done. The trick
with Device Manager is to become comfortable using it to check on your hardware and to update
your drivers whenever you install something new or when something old breaks.
Chapter 23
Speeding Up
Windows
A s operating systems go, Windows XP is neither particularly fast nor particularly slow. If you
want pure speed, run good old MS-DOS on that souped-up Pentium IV on your desk; add
Windows 3.1 if you need a graphical shell. If you want something truly slow, try Windows NT Server
on an old notebook. Windows XP lies somewhere in between, with the speed of your processor and
bus systems, hard drive(s), graphics card, and system memory determining how fast it can actually
go. Then again, even the fastest system from a technical hardware standpoint is no good if you’re
clogging your system with unnecessary elements.
This chapter offers nothing fancy, just a set of point-by-point guidelines on how to speed up
Windows XP. I figured the last thing you needed was an extensive amount of text accompanying a
chapter that was about speed, defeating the entire purpose before you even started. So here we go.
Say no to automatic program loads: Without a doubt, the single most time-consuming
part of the startup process, especially for a PC on which you’ve loaded several software
programs since getting the machine in the first place, is the loading of programs con-
figured to launch with Windows itself. The installation sequences of many programs ask
if you want to have the program (or a portion of it) load with the operating system. Most
users simply say yes and let it go at that, thinking it will save time when using the program
381
382 PC Magazine — Windows XP Solutions, 2nd Edition
if it is already at least partially in memory. And that’s true, it will. But this means that these
programs will load even if you don’t intend to work with them. And in many cases, even if
you do plan to use the program, preloading saves no more than a few seconds. It’s far bet-
ter to load them when you need them. In a few cases — but only a very few — preloading
is a good idea. This includes a program that schedules your automatic backups (helping
you not forget to do so) and, most important, antivirus and anti-malware utilities. Other
than that, however, don’t let anything load if you can do without it.
Get rid of automatic program loads: Most of us already have programs auto-loading on
our systems (indeed, PCs ship this way). To make changes, you have a number of options:
■ Most programs that auto-load place an icon on the System Tray on the bottom right
of your screen. You may be able to right-click each of them to access their Options or
Preferences areas; if not, look for the program under the Start menu. Through the pro-
gram’s Options or Preferences, specify that the program is not supposed to load with
Windows. For example, if you open Windows Messenger and choose Options from the
Tools menu, you can prevent WM from auto-loading by clicking the Preferences tab
and unchecking the top option, Run Windows Messenger When Windows Starts. To
make sure it that it doesn’t appear, also uncheck Allow Windows Messenger to Run in
the Background. Presto — it’s gone.
■ If you know a program auto-loads but an icon for it doesn’t appear in the System Tray,
locate the program from the All Programs menu (Start button), open it, and disable
auto-starting from the Options or Preferences dialog area.
■ Under the Start menu ➝ All Programs, you’ll find a submenu called Startup (commonly
called the Startup group). These are shortcuts to programs that load automatically at
startup. Right click Startup on the menu and choose Open. You can either delete these
shortcuts or drag them out of there and onto the Desktop (so you can drag them back
if you change your mind).
■ If you still have programs auto-loading, but you can’t seem to stop them from doing
so, Windows offers a brute force method. Click Start ➝ Run (or Winlogo+R), and type
msconfig in the Open field. Press Enter and the System Configuration Utility loads.
Click the Startup tab, where you can see all the items that load when Windows boots.
Figure 23-1 shows this screen, with check marks beside all the displayed items (there
are more, as the scrollbar on the right clearly shows). To stop a program from auto-
loading, uncheck it in this screen and click OK. Next time Windows starts, a warning
message alerts you to the fact that you have made manual changes to startup. If you’re
not sure if a program should or should not auto-start, examine the Command column
to see if you can figure out what the program actually is; if necessary, search the Web
for an explanation. Many auto-loading programs simply aren’t necessary. Note that
msconfig is a troubleshooting tool that can help you determine what you can live
without loading. The solution will involve one of these other steps.
■ Stop services from running at startup. Windows XP loads numerous services at startup.
Services are components of the operating system that allow specific things to happen: for
example, the Windows Security Center (available with Service Pack 2) is an auto-loading
service, allowing the Security Center to monitor your system immediately upon loading.
Chapter 23: Speeding Up Windows 383
Another one is the Plug and Play service, which allows Windows to recognize devices
when you plug them in. But not all services are necessary, including many that are
installed with third-party software. To view the services installed on your system, open the
Services console by clicking Start ➝ Run (or Winlogo+R), typing services.msc in the Open
field, and pressing Enter. Figure 23-2 shows the result of clicking on a specific service
(Remote Registry in this case) and the explanation that appears in the column on the left.
The Startup Type column shows that it loads automatically. To stop a service from load-
ing automatically, right-click its name and choose Properties. In the Startup Type drop-
down list, choose Manual or Disabled (as Figure 23-3 shows) and click OK. The next
time Windows starts, this service will not start with it.
Add system memory: Everything in Windows XP can be improved if you up the system
RAM to at least 512MB. Most systems today ship with that much; if you don’t have that
much RAM, consider running out to buy some. Even in older machines with slower
processors, system RAM can make a major difference in startup time and the capability to
run programs after startup. If you have a newer machine, 1GB of system RAM will improve
startup speed slightly, but you won’t really notice the difference until you start running
graphics-intensive programs (as long as the programs have been written to take efficient
advantage of the extra RAM). Go with a gigabyte if you can afford it.
Add hard disk space: Like system memory, adding hard disk space doesn’t affect only
startup time — indeed, it affects startup even less than more RAM does. However, ensuring
that you have plenty of free hard drive space means that Windows can more efficiently
swap data in and out of memory and make better use of the system’s virtual memory, that
is, the paging file. This file (adjustable via the Advanced tab on the System Properties dia-
log box) operates as system RAM from Windows’ perspective, but, in fact, is hard disk
space allocated for that purpose. Windows uses it, even during initial startup, to swap data
in and out of memory more quickly.
Increase system memory and hard disk space: These are covered in the two bullets in
the preceding section. The fact is that there is no substitute for increasing memory and
disk space; the last thing you want is for Windows to start choking on too little disk space.
So, be sure you have several gigabytes (yep, gigabytes) freely available — especially on the
drive on which Windows itself is installed. If your available disk space ever falls below
one 1GB on your Windows drive, you can expect significant delays.
Upgrade your graphics card: Today’s computer environments are increasingly graphics-
intensive, and you need the hardware to do the job properly. If you bought your PC more
than a couple years ago, its graphics subsystem is quite likely inadequate for recent pro-
grams. Graphics cards take much of the burden of graphics processing away from your
PC’s main processor. And the more memory and speed your graphics card has, the faster
the graphics processing. Buy the best graphics card you can afford, focusing on the mem-
ory available on the card and the purposes for which you intend to use the card. For
example, if you need to work with graphics programs, buy a card designed primarily for
that purpose. If you want to play games, buy a card designed specifically for games. And
so on. Consider a new graphics card that supports two monitors (or leave the old card in
for another monitor; XP support up to nine monitors). You might find, however, that the
graphics card you buy is actually better than your system can handle. This may be true
especially if, for example, it’s designed for AGP 4x but you have only an older AGP 2x
peripheral slot available.
Upgrade your PC’s guts: You don’t need to buy a whole new PC to get a major perfor-
mance boost. Many computer shops offer upgrades; they take your PC and keep what
you want (such as the hard drives), replacing the motherboard, processor, and possibly
the system RAM with newer and faster components. You can do all of this yourself, but it’s
tedious, time-consuming, and rather intimidating (it’s also fun, in its own way). A trusted
shop can do it much more quickly and often nearly as cheaply as you can do it yourself.
You come out with a much more capable PC, and you’ll notice the speed difference
immediately.
Shut down unnecessary programs: It’s so easy to switch from program to program, using
the Windows Alt+Tab key combination or the Windows Taskbar, that we tend to forget
how many programs we have loaded. This is especially true of programs that load multiple
386 PC Magazine — Windows XP Solutions, 2nd Edition
Windows — Microsoft Office programs, for example — and the greatest culprit, Internet
Explorer. Pay attention to how many windows you have open, and start closing them
when you don’t need them. Conversely, if you open and close a particular program such as
email or a browser repeatedly throughout the day, consider just minimizing it to save the
time opening and closing take. In particular, get rid of Internet Explorer windows that load
without your knowledge (usually they’re ads, and often they appear last on the Alt+Tab
window), and any that have animation or other multimedia displayed, including high-res
graphics. All of that stuff takes system memory and clogs Windows with irrelevance. In
fact, if you don’t need graphics showing at all for the work you’re currently doing, toggle
them off in the Internet Options dialog box (accessible from Control Panel).
Shut down auto-loaded programs: Even if you don’t stop programs from auto-loading
with Windows itself (see “From Zero to Sixty” at the beginning of this chapter), you should
close any programs that have automatically loaded that you don’t currently need. For
example, if you don’t need Windows Messenger, shut it down. The same goes for items
such as the QuickTime quick-start utility, the Microsoft Office quick-start utility, and much
more. Check your System Tray to find out what’s running.
Get rid of eye candy: This item is somewhat related to doing away with graphics in
Internet Explorer. You can help your system’s speed by dispensing with other memory-
hogging graphics. In particular, some people don’t need the system running at 32-bit color
(versus 24-bit or 16-bit; you’ll never want lower than that) and a high screen resolution
(less than 800 width by 600 height in pixels will ruin your Web experience). Open the
Display Properties dialog box from Control Panel (or Winlogo+R, control desk.cpl, click
the Settings tab, and drop Screen resolution or Color quality one step (test these sepa-
rately); apply the change. While there, click the Appearance tab, click the Effects button,
and then uncheck the boxes for the transition effect, showing shadows under menus, and
showing window contents while dragging. Your computer is now faster because it’s some-
what less visually stunning and demands less of your graphics card (the better your card,
the less useful some of these tweaks are).
Shut the PC off manually: I’m dealing with this first because more and more people tell
me it’s what they do. They press the Power button on their computer cases, holding it in
for six seconds or so if necessary, and stop the PC without letting Windows go through its
Chapter 23: Speeding Up Windows 387
shutdown procedure. Furthermore, these people never seem to have problems with their
systems (or at least they don’t call me about them). So yes, this is one way, and unques-
tionably the fastest way, to power off. But the shutdown process closes services one by one,
and allows a specific number of seconds (20 by default) for background applications to
close themselves. During a normal shutdown, you’ll be prompted to save files you haven’t
already saved; you’ll lose those in an abrupt power off. So, the safest shutdown is one in
which you do not go for the brute force power cut off.
Shut down your backgrounds apps more quickly: You can change the time Windows
allows background programs to shut themselves down. To do so, you need to edit the reg-
istry (as always, back up your registry before doing so, and be extremely careful). Click
Start ➝ Run, type regedit in the Open field, and press Enter. With Regedit open, in the
left-hand pane expand the HKEY_CURRENT_USER entry by clicking the plus sign beside
it. Then expand the Control Panel entry and, within it, the Desktop entry. In the main
panel (see Figure 23-4), locate the key called WaitToKillAppTimeout. Double-click and
change the default value (20000) to half or even one-quarter this figure. This changes the
time allowed for shutdown of background Windows applications from 20 seconds to 10
seconds or less. Most apps will shutdown in this time period with no difficulty.
Figure 23-4: Editing the Registry to restrict the time allowed for background apps to shut down.
388 PC Magazine — Windows XP Solutions, 2nd Edition
Hibernate: In many cases, there’s no need to shut down at all. Instead, you can set your
PC to enter hibernation state automatically whenever you leave it for any length of time
or go into hibernation mode when you press the Power button for only a second or so
(instead of the 4–6 seconds it takes to shut down the machine entirely). By default,
Hibernation is disabled on older machines but enabled on newer ones. You can check
the status and change the setting, if necessary, by opening the Control Panel and double-
clicking the Power Options icon (or Winlogo+R, control powercfg.cpl). Click the
Hibernation tab, and make sure that there is a check mark in the Enable Hibernation
box (shown in Figure 23-5). If there is no Hibernation tab, Windows doesn’t support
Hibernation on your machine. With Hibernation enabled, Windows stores everything that
is open in a giant file so that when you next start up, not only will the PC take less time
to come to life, but your workspace will also be precisely as you left it — every program,
every window. It takes far less time to Hibernate than shut down and far less time to start
from Hibernation than normal shutdown. If Hibernation is enabled, you can hibernate
several different ways: when you shut down, on the screen that shows Standby, Turn
off or Restart, hold the Shift key down and Standby morphs into Hibernate. Or use
Ctrl+Alt+Delete to bring up the Task Manager and use the Shutdown menu. Also on the
Power Options dialog box, under the Advanced tab, you can specify that the PC is to enter
Standby mode rather than shutting itself down when you press the Power button. You can
exit Standby mode simply by moving your mouse. Desktop users rarely need Standby (it
may save battery power for laptop users). The crucial difference between Standby and
Hibernation is that in Standby the machine is still on (and a power failure may cause you
to lose data); in Hibernation, the machine is really off.
Summary
That’s it. You now have a faster Windows. So, go use it for a while before coming back to read Chap-
ter 24, where you learn about adding users, groups, and permissions to your Windows environment.
Part VI
Utilities
A n enormous variety of utilities fit into the category of tasks outlined in Part VI. Here, I provide
a short write-up of some of the more popular, all of which I’ve used recently to varying
degrees of effectiveness. Most of the utilities here assume that there’s something about your Windows
installation you’re not especially happy with and that you have added features that Microsoft has
deemed unnecessary or has simply neglected to avoid legal problems.
Uninstallers
Obviously, the Add/Remove Programs utility in Control Panel handles installation and uninstallation
of programs, as do uninstallers included with the programs themselves. However, not all uninstalla-
tions are complete; files remain behind, program keys remain in the registry, and files such as DLLs
(Direct Link Libraries) stay in the Windows folder. Uninstallers attempt to do a better job, removing
all traces, not just merely the necessary ones.
Advanced Uninstaller Pro ( innovative-sol.com) demonstrates how these programs tend to work. It
keeps complete track of the programs you install on your PC, not only the files installed or changed by
the software but also the registry settings and any other details caused by the installation. It comes with
a database of well over 4000 programs, scans your system to see which of these programs are already
installed, and makes them available for uninstallation as well. When you uninstall a program, Advanced
Uninstaller cleans out every trace of the installation, including desktop and tray shortcuts. Other very
good programs that perform these same functions include Uninstall Plus (www.uninstallplus.com),
Ashampoo Uninstaller (www.ashampoo.com), and WUninstaller (www.wuninstaller.com), each of
which keeps track of what’s been installed and lets you completely delete programs you no longer want.
If you want full recovery from installation, consider one of these.
registry keys work together (and therefore which ones you should manipulate if you’re trying to
unload a specific program). Nor does it give you any hints about what the registry keys actually do.
Registry Mechanic (www.pctools.com) is basically a registry cleaner. It scans your hard drive and
removes registry entries that refer to nothing (and therefore are probably left in the registry from a
program you’ve since uninstalled), and it repairs invalid registry entries to help guard against system
problems. It also backs up anything it does change, so that the change can be reversed if the system
starts misbehaving as a result of the clean-up. WinASO Registry Optimizer (www.winaso.com) per-
forms many of the same tasks and walks you through a system tune-up to help you see what registry
entries are causing problems. Registry Repair Pro (www.pc-test.net) works similarly to both of these
programs, offering a strong graphical interface to help you decide what entries you want repaired.
On a somewhat different track, several programs help you repair your system. Norton SystemWorks
(www.symantec.com) comes with System Doctor and Norton WinDoctor, which together help you
determine where your system is encountering problems and how to tune your system so that the prob-
lems disappear. Error Nuker (www.errornuker.com) is designed to locate system errors caused by
incorrect registry entries, functioning much like the registry checkers mentioned previously. PC Doc
Pro (www.neurosoftcorp.com) includes a free online scanner and then, if you discover numerous errors
in the registry, you can download it and correct them. RegRestore PC Tuneup (www.maxionsoftware.
com) is another such program and discovers and repairs many of the same errors.
W indows XP offers a new approach among popular Windows versions for creating and
maintaining user accounts. Windows 2000 and Windows NT featured a similar approach,
in user properties if not in the user creation interface. But consumer versions of Windows —
Windows 9x/Me — all provided a much less professional user creation and management system. In
these consumer versions, users can log on to create their own look and feel for the PC, along with a
few other niceties, such as a separate inbox for Outlook Express and a separate Favorites folder in
Internet Explorer. But these user accounts are not truly distinct from one another from a security
perspective. For one thing, you can log on to Windows 9x/Me without using a username at all, by
clicking Cancel at the logon screen — obviously an insecure situation and an impossible feat with
Windows NT/2000 and Windows XP. The difference nowadays is that Windows XP ships with all
PCs, so everybody buying a Windows PC is working with an operating system that provides full sep-
aration between users; each user must have an individual user account (whether an individual one
or a guest account) in order to log on.
This chapter covers the different types of accounts available in Windows XP and shows you how
to add new user accounts by using both the Control Panel and the Computer Management Tool, dis-
able and delete accounts, create and modify passwords, and switch from one account to another. The
chapter also covers the creation and management of user groups.
395
396 PC Magazine — Windows XP Solutions, 2nd Edition
Sharing can cause problems, after all. With different people accessing a single machine with a
shared user account, files get deleted, documents get overwritten, and folders get rearranged. Even
the carefully constructed interface can take a beating because everybody using the PC wants differ-
ent colors, different icon locations, different toolbars, and different defaults. Password-protected user
accounts provide numerous conveniences, including a consistency from day to day that promotes
greater productivity.
As with virtually all computer systems, however, one type of account takes precedence over all
others: the Computer Administrator account (commonly abbreviated to just Administrator). Anyone
with an Administrator-level account on a Windows XP system has complete control over the entire
PC, with full access to the resources of all other accounts, including other Administrators. As a user
with an individual account, it’s important to remember that your files and resources are not com-
pletely private; the only user with this degree of privacy is the person holding the Administrator
account on a single-Administrator system.
Caution
Even when you make an Administrator’s folders private (see Chapter 25), other Administrators can gain
access either by adjusting the permissions settings using the standard file-sharing method (also described in
Chapter 25) or by removing the password from that person’s account.
If your PC has limited hard disk space, you might understandably be concerned about the effect of
multiple accounts on storage. Each account, when created, occupies only about 5MB of your hard disk.
Unless you have been seriously pushing the limit of your storage capacity (in which case Windows XP
itself will have problems with day-to-day activity), don’t hesitate to add new users for that reason.
Even if your system has only one user, you may find a value in Start ➝ Log Off (or Winlogo+L).
Using this to log off will leave your system with the Welcome screen showing. When you return, you
won’t have to wait the full time a complete system start would take but, if you use a password, you’ve
made it harder for someone else to use your machine.
If your system does have multiple users, you may find a use in Fast User Switching. Using Start ➝
Log Off (or Winlogo+L), Fast User Switching lets you switch between users without first logging off.
Perhaps two family members share a machine and your spouse needs access to his or her files right
this minute. With Fast User Switching, you make the switch and then switch back to find all your
stuff still up and running. Be sure to save any open files before you try this.
Figure 24-1: The User Accounts utility for creating and managing users.
1. Choose Start ➝ Control Panel and open the User Accounts utility (or Winlogo+R, control
userpasswords).
2. Click the Create a New Account item.
3. Type a name for the account, and click Next.
4. Select the appropriate account type. Figure 24-2 shows the selection screen.
5. Click the Create Account button. Windows creates the new account and adds it to the
User Accounts dialog box.
Note
The name that you give to the account appears on both the Welcome screen and the Start menu.
398 PC Magazine — Windows XP Solutions, 2nd Edition
1. Choose Start ➝ Control Panel and open the User Accounts utility.
2. Click the account for which you would like to add a password.
3. Click the Create a Password option.
4. In the appropriate fields (see Figure 24-3), type the password and then confirm that
password by retyping it.
5. If you want to, type a phrase or word to use as a password hint. For example, if you
typed Buffy1Slayer as your password, you may want to type best show ever as your
password hint.
6. When you’re finished, click the Create Password button.
Note
Password hints are visible to everyone who uses the computer, so try not to make your password hints so
obvious that others can guess your password. If you suspect someone has guessed your password, change
it immediately! In fact, change it regularly whether or not you suspect that anyone has figured it out.
Chapter 24: Adding Users and Groups to Your System 399
Caution
Figure 24-3 spells out, at the top of the dialog box, the danger of applying passwords to other people’s
accounts. If that person has already created and stored passwords to use in Web sites or has saved Internet
certificates, they will no longer be available after you add a password. The same holds true for user-
encrypted files or folders that use the Encrypting File System. To avoid the problem, have the user create the
password and simultaneously produce a password reset disk by opening the User Accounts utility and click-
ing the Prevent a Forgotten Password item in the Related Tasks area. The password reset disk stores the
information necessary to enter the account with full access to encrypted information and other passwords.
Be sure to keep all password reset disks safe, however; they allow anyone to access the user’s account
without knowing the password.
If you want to change a password, open the User Accounts utility and choose the Change My
Password option. If you change a password and leave the field blank, Windows does not ask you for
a password when logging on.
When you add a user account, some important things happen. Primarily, Windows creates a
folder, named identically to the username, inside the Documents and Settings folder on your main
Windows drive (C: by default). Inside that user’s main folder Windows places the folders outlined in
the list that follows. Note again that each user has this folder group; this structure allows Windows
400 PC Magazine — Windows XP Solutions, 2nd Edition
to keep each user’s data separate and, through the creation of passwords and the setting of permis-
sions, private. Windows creates these folders within each user folder:
Tip
When you instruct a privacy utility to erase the cookies on your system, it deletes the entries in the Cookies
subfolder. You can do so yourself by navigating to this folder and deleting all or some of them manually.
Desktop: Shortcuts on the desktop. Having separate Desktop folders for each user allows
all users to have their own customized desktop.
Favorites: Favorites stored in Internet Explorer. Again, all users have their own individ-
ual favorites, allowing the Favorites menu to display different Web locations as each user
logs on.
Local Settings: More application data, as well as the History file (in Internet Explorer) and
Temporary files. Microsoft Outlook stores your email files (PST files) inside Local Settings\
Application Data\Microsoft\Outlook.
My Documents (or the username may appear instead of My): The document space for
that user, including subfolders My Pictures, My Music, My Videos, and My Received Files.
My Received Files is the default folder for the Save As dialog in Microsoft programs and
others.
My Recent Documents: Shortcuts for recently opened or saved files (accessible from the
Start menu). For quick access to this folder, use Winlogo+R, recent. This is much more
useful than the Start menu’s paltry list. Try sorting these shortcuts by date and using
View ➝ Arrange ➝ Show in groups.
NetHood: Shortcuts to network resources as displayed in My Network Places.
PrintHood: Items in printer folders.
SendTo: Items in the SendTo menu accessible by right-clicking inside a folder. SendTo is
a way to copy, move, or open a file. You may want to remove shortcuts from this folder for
destinations or programs you never use; you may also want to add shortcuts to programs
you do frequently use to open more than one type of file (a shortcut to Notepad can be
very handy for opening all kinds of files, for example).
Chapter 24: Adding Users and Groups to Your System 401
In addition to creating individual folders for that user, Windows creates icons for shared pro-
grams. For example, if you have Microsoft Word installed on your PC, when you create a user account
you also create the capability for that user to use the Word program. Windows places an icon for that
program in the All Programs menu.
Windows XP offers four types of user accounts: Computer Administrator, Limited, Standard, and
Guest. Most users, however, encounter only the first two of these types, with the Standard account
restricted to PCs configured as members of a networked domain and with the Guest account dis-
abled by default during the initial Windows XP installation.
This last item comes with a restriction: Computer Administrators can change their own account
types from Administrator to Limited or Standard only if at least one other Computer Administrator
account exists. That is, you can’t have a Windows XP system without an Administrator. To that end,
during installation Windows creates a Computer Administrator account bearing the username
Administrator. In fact, when the setup process asks you for a password for the main account, this is
the account it is referring to. By default, Windows does not display the primary Administrator
account on the Welcome screen, and many users, indeed, don’t even know it exists.
In other words, when you install Windows XP, you automatically create two accounts: the hidden
Administrator account and the account Windows asks you to create during the installation. Computer
manufacturers sometimes rename the automatic Administrator account, but the principle remains the
same. You can eliminate all user accounts except the original Administrator account if you like, but in
that case you can no longer log in from the Welcome screen unless you use the Tweak UI utility (see
Chapter 18) to show the original Administrator account on the Welcome screen.
402 PC Magazine — Windows XP Solutions, 2nd Edition
Limited Accounts
Limited accounts enable users to perform basic functions, such as the following:
When configuring Windows XP for new users, you should establish Limited accounts unless you
have a specific reason to add another Administrator account. The primary reason for giving users
Administrator privileges is to allow them to install their own software, which they usually cannot do
with Limited account privileges. In a business setting, you will rarely want to do this; in such a case
controlling the software on the system becomes critical, and you can establish a policy of, for exam-
ple, one Administrator account per PC.
On a home system, it can be impractical to disallow software installation because of the tendency
of many users to buy or download new software and install it. Unless you want to make yourself
available, as the person with the Administrator account, every time someone in the family wants to
install a new program (and for antivirus and anti-spyware purposes that’s not a bad idea, just incon-
venient), you should consider giving at least one other person Administrator status. (Besides, some-
times in a home environment it’s much harder to explain to someone why they can’t have full access;
statements about lack of trust often produce behavior such as pouting.)
What Windows XP needs in a typical household environment, of course, is another account type,
one halfway between Administrator and Limited. In fact, that’s what the Standard account type pro-
vides, but you can establish it only on a networked domain. That said, some programs install just
fine with a Limited account. So, by all means try the installation before changing the account type.
Standard Accounts
If you have a networked domain, you can create Standard accounts. These accounts provide pre-
cisely the same degree of control as a Limited account, with one primary exception: the capability to
install and remove software. They cannot do so in a way that would affect a holder of a Computer
Administrator account, so they could not uninstall a program such as Microsoft Word, which ties
itself to all user accounts (including Administrators) on installation. They can, however, install pro-
grams that do not alter such settings, as is the case with older programs such as shareware versions
of graphics software (Paint Shop Pro 4 and earlier, for example) and Internet utilities (such as WS-
FTP). In addition, installation wizards designed with Windows XP in mind frequently ask if you
want the software available for all users or just the current user; choosing the latter option prevents
it from affecting other user accounts.
Guest Account
As you’ve probably already determined, the Guest account provides access to anyone who does
not have a regular account. Guest account holders have no access to settings of any kind or to
Chapter 24: Adding Users and Groups to Your System 403
password-protected files, but they can use multiuser software and — the reason for this account
type’s existence — the Internet.
By default, the Guest account is turned off when you install Windows XP. To turn it on, open the
User Accounts utility in the Control Panel and click the Guest icon in the Or Pick an Account to
Change section. You then see the screen shown in Figure 24-4.
Tip
Before enabling the Guest account, be sure to establish passwords for all other user accounts on the sys-
tem. By doing so, you prevent anyone who is using the Guest account from accessing files and folders in
password-protected areas such as each user’s My Documents folder.
MMC), consists of a hierarchical organization of utilities in the leftmost pane, known as the console
tree. Details about the selected utility appear in the rightmost pane. Because the console tree lists var-
ious administrative functions in a single window, the tool makes it faster for you to create or modify
user accounts. With this convenience, however, comes a rise in potential confusion and even dam-
age: the former because you have far more choices available to you, the latter because you have
access to powerful, system-changing tools from the MMC. For adding and maintaining users
and groups, however, and for system management in general, you might quickly find the MMC
indispensable.
XP Home Users will be perplexed to find they have MMC and the Computer Management con-
sole, but are not allowed to use the User setup snap-in (as Microsoft calls it). The following steps
largely apply to XP Professional users. However, both XP Home and Pro users can access some of
these features through Winlogo+R, control passwords2 (yes, that’s a 2 at the end; control passwords
without a 2 bring up the Users Control Panel).
Follow these steps to add a new user with the Computer Management tool:
4. In the System Tools tree, click the + symbol to open the Local Users and Groups tree.
5. Right-click the Users folder and choose New User.
6. In the New User dialog box (see Figure 24-6), type the user information in the appropriate
fields.
Password Options
When you create a new user account with the Computer Management tool, you can choose from
three different password options:
User must change password at next logon: When the user next logs on to the PC, a dia-
log box appears, requiring the change of password. The user has no choice in the matter;
the logon will not continue until the change is made. An administrator might use this to
assign you a temporary password that you are required to replace with your own choice.
User cannot change password: You set the password and give it to the user, who cannot
change it afterward.
Password never expires: Using the MMC, you can configure each account in numerous
ways, including a password expiration date. To keep your system secure, establish a fairly
frequent change of passwords. Checking the Password Never Expires item, however, sets
the password for good.
406 PC Magazine — Windows XP Solutions, 2nd Edition
Note
Remember that a good password should be difficult for anyone besides the owner to use. Avoid passwords
based on the names of pets, spouses, or any other kind of personal information, and also avoid passwords
that spell real words. For the best possible password security, create a password at least eight characters in
length, with at least one number, one letter, and one other type of symbol (such as punctuation). Split multi-
syllabic passwords at unexpected places with unexpected characters, and do not use easily identifiable
number strings such as 4567. It’s also a good idea to change your password at least once a month.
Disabling Accounts
If you want to prevent specific users from accessing their accounts, you can disable that account.
When you disable an account, you do not delete the information associated with that account; you
simply hide the account information. Disabled accounts are not displayed on the Welcome page.
Follow these steps to disable a user account:
Figure 24-7: Choices to make when deleting an account. The popup for the
Keep Files button reminds you these files will be saved to the desktop of the
current user (in a folder with the name of the deleted user).
Power Users: Have most administrator privileges and can run legacy applications and cer-
tified applications
Remote Desktop Users: Have permissions to remotely log on to the computer
Replicator: Can replicate files in a specific domain
Users: Can run certified applications but cannot make systemwide changes or work with
most legacy applications
Debugger Users: Can debug processes on the computer, both locally and remotely
HelpServicesGroup: Are part of the Microsoft Help and Support Center (Remote
Assistance)
6. Click the Member Of tab to see the current group assignments for that user; then click the
Add button to establish the new assignment.
7. Ensure that Group is selected in the object type field and the specific computer or domain
is selected in the location field.
8. If you know the name of the group to which you want to add the user, type it in the text
field at the bottom of the page and click OK.
9. If you do not know the name of the group to which you want to add the user, click the
Advanced button and then click the Find Now button. A list of all the different groups is
displayed in the bottom portion of the page (see Figure 24-9). Select a group name, and
then click the OK button to add that user to the selected group.
10. Click the OK button when you’re finished.
Tip
To select multiple groups, hold down the Ctrl key on your keyboard and select the various groups to which
you want to add the user.
410 PC Magazine — Windows XP Solutions, 2nd Edition
Summary
Creating separate accounts for each user on a single PC solves a great many problems, ranging from
privacy and security to the much more mundane issue of unintentional modification or deletion of
data files. Even on a single user PC, however, you might well find that an extra account or two comes
in handy. For example, if you use your PC to experiment with software, create a separate Computer
Administrator account solely for that purpose. If you play games, you can make an addictive game
inaccessible from your main account, which can prove a blessing when it comes to productivity.
Even though you can gain access simply by switching users, sometimes merely having to do that is
enough to keep yourself away from it.
Chapter 25
Controlling User
Access with
Permissions
by Neil Randall and Michelle MacLean
W indows XP user accounts work effectively as a tool for privacy and security only if you
segregate each user’s files and folders. In some programs, you can do so with a password
generated specifically for that program’s data files. For example, you can password-protect your
Microsoft Outlook data, forcing users (including yourself) to type a password completely separate
from your Windows password in order to view your email messages, calendar, contact information,
and everything else you’ve created in Outlook. To protect your files on a systemwide basis, however,
you need a systemwide method of denying access, something that Windows XP provides in its pro-
cedures for making files private and for setting file and folder permissions.
This chapter covers the methods for making your Windows XP files and folders inaccessible or
only partly accessible to other users of the PC and to those accessing your PC over the local network.
In this chapter, you learn how to make folders private, set folder permissions, work with security
options, and gain access to protected files and folders.
Note
File-sharing and permissions features on a Windows XP system function only on hard drives formatted with
the NTFS file system. Drives formatted in FAT or FAT32, the file systems used by Windows 9x/Me (and by
many users of Windows 2000 and Windows XP) do not have these capabilities. For that reason alone, you
should seriously consider converting all your drives to NTFS once you’ve decided to use Windows XP and
not go back to earlier versions of Windows.
411
412 PC Magazine — Windows XP Solutions, 2nd Edition
5. Click OK or Apply to make the change. The process can take a few minutes if you have a
system with many hundreds of files.
Tip
To launch Windows Explorer quickly, you can press and hold down the Windows Logo key and press the let-
ter E. The Windows Logo key is the one with an image of the Microsoft “Windows “flag” and is usually
located in the lower left-hand corner of the keyboard, between the Ctrl and Alt keys (on North American
keyboards).
The difference between the Simple and Standard File Sharing becomes apparent when you exam-
ine the Properties dialog box for any folder. Figures 25-2 and 25-3 show the Properties dialog box
for the same folder. In Figure 25-2, Simple File Sharing is on, while in Figure 25-3 it is off. Turning
off Simple File Sharing adds the Security tab to the dialog box and provides a significantly changed
Shared tab. Between these two tabs, you have extensive control over file and folder permissions. If
you run Windows XP Professional in a network setting with several users, this is the method you
should use to restrict access to resources; in fact, Windows disables the Simple File Sharing feature
entirely on computers networked through a domain.
Level 1: If you make either My Documents or one of its subfolders private, you prevent
access to all other users, including those with Computer Administrator account types.
Anyone trying to access the folder receives the dialog box shown in Figure 25-4.
Chapter 25: Controlling User Access with Permissions 415
Caution
Even though no other user can directly access the private folder, your files and folders still aren’t safe from
other users’ eyes. Anyone with a Computer Administrator account can change the password of any other
accounts on the system (including those of other Computer Administrators) and gain access to those files.
Somewhat astonishingly, Computer Administrators can even change the password of the initial Administrator
account and gain access to files and settings. Once again, be careful to whom you give Administrator
privileges.
Level 2: When you create an account of any type, that account’s My Documents folder
and all its subfolders assume a Level 2 privacy setting. Only the owner of the account,
along with all Computer Administrator account holders, can access the folders. Holders of
Limited accounts cannot access them at all. This is a primary reason for giving all users
(except a single Administrator) Limited accounts; they automatically cannot look at each
other’s My Documents folders.
Level 3: The third level really has nothing to do with setting folder permissions or making
them private. It pertains, instead, to the Shared Documents folder on the PC, which
Windows automatically restricts to users of that PC. Administrators have full control over
the files in Shared Documents, while holders of Limited accounts can read the documents
but not write to or delete them. Shared Documents serves precisely the purpose its name
suggests: it lets everybody on a multiuser PC share files.
Level 4: The bottom half of Figure 25-2 shows the Network Sharing and Security area of
the Properties dialog box for the selected folder (that is, not just the Shared Documents
folder from Level 3). If you check the Share This Folder on the Network option, you estab-
lish Level 4 privacy. This setting allows users on the network to read the files but not mod-
ify them.
Level 5: If you check both the Share This Folder on the Network and Allow Network
Users to Change My Files options, you establish the weakest privacy, Level 5. This level
functions essentially as an open invitation to anyone to read and change your files, so use
it carefully if at all.
416 PC Magazine — Windows XP Solutions, 2nd Edition
In addition, the first time you create a password for your account (from within the User Accounts
utility in Control Panel), you can set your entire My Documents folder to Private status. After adding
a password, the User Accounts Wizard offers a button with the option to make the folders private
(see Figure 25-5). Click the button and then OK to render everything in My Documents private.
If, at any time, you want to remove the privacy on your files, open the Properties dialog box for
that folder and uncheck the Make This Folder Private option.
Chapter 25: Controlling User Access with Permissions 417
Caution
You should consider unchecking the privacy option for your own folders if you decide to reinstall Windows
XP but keep the files from the initial installation available. On a new installation, you will not have access to
private folders because you are not actually a user on that system. Nor can you access the User Accounts
dialog boxes in order to change passwords. See the “Gaining Access to Protected Files and Folders” section
later in this chapter for information on gaining access to restricted folders.
6. Click the Add button to apply permissions to a group or user that does not appear in the
Group or usernames list, and then type the name of the group or user that you want to
apply permissions to. Alternatively, you can select the name of the user or group in the
Group or usernames list.
7. Select the appropriate check boxes to grant that user or group the capability to perform the
actions described, or clear the check boxes to prevent the selected user or group from per-
forming the actions described.
8. Click OK when you’re finished.
use. Unlike the Sharing tab of the Simple File Sharing dialog box, it does not allow you to restrict
access to users on the same PC as the shared folders themselves. To perform those functions, click
the Security tab. A blizzard of initially confusing options allows you to control precisely which user
on your PC, as well as users logging in to your PC locally or remotely via technologies that simulate
local use (such as Virtual Private Networking and Remote Desktop), can access which resources.
If you’re just getting started working with these concepts, you can make life relatively easy by con-
figuring your PC with Simple File Sharing and then switching to Standard File Sharing when you’re
ready to make more precise distinctions in user access. When you make the switch, Windows retains
the permissions established with Simple File Sharing, and you need only fine-tune from there.
To see this switch in action, examine Figures 25-6 and 25-7. Figure 25-6 shows the Security tab
for a folder in the My Documents folder of an Administrator’s account. Only two users have access:
the user and the default System account (System has access to all accounts). As the Permissions list
demonstrates, the user has Allow permissions for everything in the account and Deny permissions
for nothing. This means that the user can do anything allowed to the files in those folders, including
read, write, list contents, and execute programs. You can tell that this folder belongs to a user with a
Computer Administrator account because users in the Administrators group, which is made up of
other Administrators, do not have permission to do anything in the folder.
By comparison, Figure 25-7 shows a folder in the My Documents folder of a Limited account.
Here, three users are listed: the user, the System, and the Administrators group. By definition, as dis-
cussed earlier in this chapter, Limited accounts are controlled by the user, but all Computer
Administrators have access. This screen shot clearly demonstrates that principle.
Chapter 25: Controlling User Access with Permissions 419
modify the folder and even delete it. You can also grant Change permissions to a specific user,
enabling that user to modify the folder; or Read permissions, allowing the user to read the contents
of that folder. Generally, network administrators grant Read permissions to large groups of users and
Change permissions only to those authorized to make changes to the folder or its documents. Only
network administrators get Full Control of the resource, and only selected administrators at that.
Allowing Full Control to large numbers of people can cause a wide range of obvious problems.
Caution
If you grant a specific user or group Full Control permissions to a folder, that user or group can delete any
files in that folder regardless of the permissions protecting the files.
Follow these steps to set Share permissions on a folder accessed over the network:
Note
Deny permissions take precedence over Allow permissions. When you set Deny permissions for a specific
user who belongs to two groups — one that is allowed a permission and another that is denied the same
permission — then the user is denied that permission.
Chapter 25: Controlling User Access with Permissions 421
Caching Files
Enabling the features in Windows XP that allow users to work with offline files provides a means for
users to create and change files in a folder as if they were online, with the same file and folder per-
missions in place, and then have Windows synchronize any changes with the network versions of
the files when the users go back online. This might be useful to a laptop user who connects to the
network for only a limited time but needs to work on files stored on the network.
The Windows XP Offline Files feature creates a data cache on each user’s hard drive. In this cache,
Windows stores any files shared over the network that have been configured as offline files. The
Caching button gives you control over the behavior of these cached files, with the three cache set-
tings shown in Figure 25-9:
Manual caching of documents: Users can specify which files from a network folder they
want to be able to work with when offline. The manual setting, the default for shared fold-
ers, instructs Windows to cache only those specific documents.
Automatic caching of documents: This setting caches all documents in the shared folder
whether or not the user specified them for this purpose. If the shared folder contains a
more recent copy of the document, the cached version is automatically deleted and replaced
by the newer version. Only files the user has opened online can become available offline
using this setting.
422 PC Magazine — Windows XP Solutions, 2nd Edition
1. Navigate to the shared folder for which you would like to enable caching.
2. Right-click on the folder, and then choose Sharing and Security.
3. Select the Sharing tab.
4. If the folder is not already being shared, select the Share This Folder radio button.
5. Click the Caching button.
6. Check the Allow Caching of Files in This Shared Folder check box.
7. Select the type of cache setting you want to apply to the shared folder from the Setting
drop-down list, and click OK.
10. Select the Owner tab (see Figure 25-12), and click your username in the Change Owner
To window.
Chapter 25: Controlling User Access with Permissions 425
11. Check the Replace Owner on Subcontainers and Objects check box immediately below
the window to apply the changes to the folder and subfolders; then click Apply to take
ownership.
You should now be able to access the folder. Open My Computer or Windows Explorer, locate the
folder, and copy the files you need from it.
Summary
Setting permissions enables you to establish who has access to which resources on your PC. For pri-
vacy, security, and even legal reasons, it might well be the most important Windows XP configuration
you perform. Unlimited access can quickly lead to abuse or innocent, but nevertheless destructive,
carelessness. Fortunately, Windows XP provides you with a variety of means to control access, and
this chapter has covered several important ones. For further details on controlling your system, turn
to Chapter 27 to explore Group Policies. For details on locating, migrating, and accessing user data,
see Chapter 26.
Chapter 26
Locating and
Migrating User Data
by Neil Randall and Michelle MacLean
Scenario #1: You’ve purchased a new PC with all the latest bells and whistles.
Windows XP Professional hums along nicely; you’ve spent numerous hours per-
forming mandatory testing on the subwoofers, the digital camcorder, the DVD
burner, and all those other essential items. You’ve updated the virus definition
files and added everything that Windows Update has to offer. Everything seems
ready to go. Only one problem: your documents, work files, and email are still
sitting on the old machine.
Scenario #2: You’ve finally committed the time necessary to perform that long-
awaited backup — the one you should have been doing regularly but somehow
never managed to get around to. You fire up your backup software, step through
its wizard, and suddenly realize that backing up your nearly full 80GB hard
drive will require more than 100 CDs and roughly a gazillion hours. Backing up
to a DVD burner would improve the picture, but you’d still need 15–20 discs.
So, you decide to back up only your most important files: word processing
documents, spreadsheet files, scanned photos, edited videos, and, of course,
your email. Your backup software lets you choose this kind of limited backup,
but you quickly discover that these files are scattered all over your PC. You can
find some, but not all. And you don’t want to complete the whole thing only to
launch Internet Explorer and realize that all your favorites have disappeared
because you’ve forgotten to back up the appropriate folder.
In both scenarios, you need to know where your user data resides. In the case of user-created doc-
uments, you probably won’t have to look far for the answer because users tend to save files in three
major locations:
427
428 PC Magazine — Windows XP Solutions, 2nd Edition
By default, most Microsoft software and increasing numbers of third-party software use My
Documents for this purpose, with the software frequently creating a subfolder to segregate the files
belonging to that specific program. For several reasons, though, some of them having to do with
Chaper 26: Locating and Migrating User Data 429
old habits dying hard, many users create separate folders in which they store all — or at least the
majority — of the data files they produce.
For other user data, however, you often need to look harder. Simply put, it could be almost any-
where. This chapter examines the most likely places to find folders, files, and other items you want
to make sure you save when it comes to moving data from one Windows XP installation to another.
Note
This chapter discusses some files and folders that Windows hides by default. To navigate to the folders, you
must first make them accessible. To unhide hidden files and folders, open My Computer and choose Folder
Options from the Tools menu. Click the View tab in the Folder Options dialog box, and scroll to find the Hidden
Files and Folders item. Click to check the Show Hidden Files and Folders radio button, and click OK. When you
return to the folder you were viewing, all files and folders — including hidden ones — now appear. If you don’t
enable this feature, you could easily miss a folder that the user, for whatever reason, has designated as hidden.
The first step in migrating user data from one Windows XP system to another is to copy the files
from that user’s Documents and Settings subfolder from the old Windows XP installation to the new.
If the new installation resides on a different partition of the same computer as the old one, your job
is quite easy. As long as you have access to the user’s folder (see Chapter 25 if you do not), simply use
Windows Explorer to display your old and new user folders and copy the files from the former to the
latter.
Caution
To avoid all possible problems, refrain from copying subfolders created by Windows in case the folder has been
tied to your user account by the system-created Security Identifier (SID). The SID controls the full working of
your main folder inside Documents and Settings to the extent that copying the old Documents and Settings\
UserName folder from the old machine to the new might result in an inability to work with the Windows XP pri-
vacy and security settings in that folder. Leave the original folder where it was, and copy the files instead.
430 PC Magazine — Windows XP Solutions, 2nd Edition
If the new installation resides on a different machine, the task doesn’t change but the time needed
to complete it increases. Copying data between machines always takes longer than copying it from
hard drive to hard drive inside the same machine. An external USB hard drive or a network connec-
tion can make this much easier.
Data files for productivity programs such as word processors, spreadsheets, graphics soft-
ware, presentation software, database — anything not saved to the user’s My Documents
folder but rather in a separate data folder.
Back up data files, copies of other data files, with the backup folders possibly containing
additional documents.
Data files saved in the same folder as the program that created them or to a subfolder of
that program — which means searching the Program Files folder on the old Windows
installation as well as any other folder to which programs are installed.
Documents of any kind bearing CD keys, registration codes, and anything else required to
reinstall programs.
Downloads of programs no longer available, at least in the version the user prefers — older
shareware programs, for example, or software for which the user has a registration key and
does not wish to upgrade.
Address books (and email) from email programs or any other type of program.
Documents containing personal information including insurance policy numbers, student
numbers, logon information for other sites, and so on.
Files to which other documents make reference, in the form of a hyperlink or a Direct
Data Exchange (DDE) object. If an important Word document contains an embedded
Excel spreadsheet object, for example, and the actual spreadsheet resides in another folder,
you must find both to keep the document complete.
Web site files, in the case of software, such as Macromedia Dreamweaver or Microsoft
FrontPage, that synchronizes files between the remote server and the local machine —
otherwise the synchronization process must be recreated, an often lengthy procedure.
Chaper 26: Locating and Migrating User Data 431
Temp files for software that creates these files as a means of recovering the main files.
Word is a classic example: It saves the main file, with the most recent changes you’ve
made, plus a Temp file that contains the changes immediately following the Save action.
You often have to search for these files, but you should do so for the best possible backup.
Files that track progress in games — hey, if the person has spent 200 hours getting to a cer-
tain point in the game, you don’t want her spending another 200 getting back to the same
point.
1. Open your email program and locate the option that allows you to configure preferences
or data files. In Microsoft Outlook, choose Tools ➝ Options, and click the Mail Setup tab.
Click the Data Files button, and then double-click the Personal Folders item in the result-
ing Outlook Data Files dialog box. This action reveals the properties dialog box for that
data file (see Figure 26-1), with the path name for the data file displayed in the Filename
field.
Tip
To see the full filename in the Outlook properties dialog box, click inside the Filename field and use the
arrows to move right and left.
2. Using My Computer or Windows Explorer, navigate to the folder and examine the way in
which your email program stores your mail. Figure 26-2 shows a folder containing Outlook
Express mail files, each in DBX format. As you add folders, Outlook Express adds DBX
files for each of those folders. Some email programs store messages as running text files;
others, such as Outlook Express, as small databases.
3. Copy the files and folders containing the email to the new Windows installation. Be sure to
copy subfolders as well, in case they also contain relevant files.
432 PC Magazine — Windows XP Solutions, 2nd Edition
4. In the new Windows installation, open the email program and determine how to import
files from other locations. Perform these actions, keeping in mind where you stored the
copied files and folders from the old installation. For example, Figure 26-3 shows the
Import Personal Folders dialog box in Outlook. Migrating from one Outlook-enabled PC
to another requires this kind of importing in order to rebuild the user’s previous mailboxes
and folders.
Note
Outlook Express stores its email data in the following folder within Windows XP:
C:\Documents and Settings\username\Local Settings\Application Data\Identities\IdentityNumber.
Outlook stores its email data in the following folder:
C:\Documents and Settings\username\Local Settings\Microsoft\Outlook.
Also inside each user’s main Documents and Settings folder is the Cookies folder. Here, Windows
stores the cookies Internet Explorer has accepted while the user navigated the Web. When you visit
a Web site, information is saved on your hard disk so that the Web site remembers your information
the next time you visit that Web site. Because each request for a Web page is independent of all other
requests, the Web page server has no memory of what pages it has previously sent to your computer.
Cookies, the term for small files used by Internet sites to keep track of user preferences and informa-
tion, have developed a reputation as being dangerous from a security standpoint. In fact, they’re
quite harmless. Still, you can prevent users from using their stored cookies by not migrating them to
the new PC, keeping in mind that they will begin to collect cookies again as soon as they launch
Internet Explorer (unless you’ve configured Internet Explorer not to allow cookies).
Even a Cookies folder that’s only a few months old is likely to have hundreds or even thousands
of cookie files in it (see Figure 26-4). Quite simply, these things proliferate. If you open a cookie file,
however (which you can do in the Windows built-in text editor, Notepad), don’t expect to make
much sense of it. They contain code for the server to use, and typically the only detail you’ll get by
reading the file is the name of the organization that generated the cookie in the first place. Because
cookies tend to store such information directly in their name, however, opening the file serves no
real purpose.
Tip
If you don’t want other users who access the computer to see a trail of the Web sites you have visited, it’s not
a bad idea to clean out your list of cookies on a fairly regular basis. You can do so using the Internet Options
dialog box available in Internet Explorer and in Control Panel or by opening your Cookies folder and getting
rid of cookies whose names provide too much information about your Web navigation habits.
In the cases of both favorites and cookies, migrating data is considered optional by many; that is,
you don’t need them even if you may want them. Certainly that’s true of the Cookies folder, but some
users want to keep their cookies for a variety of reasons, many of them legitimate. Favorites are a dif-
ferent story, however. If you’ve spent numerous hours — weeks and months, in fact — building up a
list of favorites that let you work more effectively and locate the information you need, you should,
by all means, migrate the Favorites folder. Actually, you don’t need to migrate the entire folder at all.
As long as you store the Favorites files somewhere, you merely have to copy them to the Favorites
folder of the new installation to make full use of them again.
Note
The major problem with Direct Cable Connection is the fact that very few people have an appropriate serial
cable. You can get one at your local electronics store (and some computer stores), but unless you’re a com-
puter veteran with many years’ service (in olden times, collecting a variety of cables simply came with the
computing territory), you are unlikely to have one sitting around.
436 PC Magazine — Windows XP Solutions, 2nd Edition
Figure 26-5 shows the first stage of the Files and Settings Transfer Wizard. The Old computer
represents the PC that currently holds the desired files and settings, whereas the New computer rep-
resents the PC to which you want to transfer these files and settings. You begin by running the wiz-
ard on the Old computer to gather the files and settings you want. Any PC running Windows 95 or
later can act as the Old computer. But in order to perform this step with anything other than a
Windows XP machine, you need to use the Windows XP installation CD (which contains the pro-
gram for older Windows versions to use) or run the wizard first as the New computer and create a
floppy disk with the Transfer Wizard for the Old computer.
Next, decide among the four transfer methods: Direct Cable, Home or Small Office network,
Floppy Drive or Other Removable Drive, or Other (removable drive or network drive). Using Other,
you can store files and settings on any location on your PC, making them ready for transfer to the
new machine. With this choice made, the wizard asks what items you want to transfer. As Figure
26-6 shows, you can transfer only settings or only files, or you can combine them. To be precise
about your choices, check the Let Me Select a Custom List of Files and Settings box, or simply let the
wizard decide for itself.
The wizard divides the possible transfer items into three main sections:
Settings: The settings of your existing programs and configurations, ranging from Windows
accessibility settings and the settings in the Display Properties dialog box to settings for
Outlook Express, Windows Media Player, and your networks.
Specific folders: The folders that contain your preferences, such as Desktop, Favorites, My
Pictures, and more. Keep in mind that transferring My Pictures and My Documents could
result in a very large amount of data, given the size of some graphics and document files.
File types: A huge array of file types, everything from PDF to JPG. Again, because of the
size of many of these file types, the transfer might be huge.
Chaper 26: Locating and Migrating User Data 437
With your choices made, the wizard compiles information about the settings and files you’ve
selected. Depending on those choices, this process could take several minutes or longer, even on a
fast computer. Figure 26-7 shows the last stage of the wizard on the Old computer, instructing you
to move to the new one and perform the transfer.
On the New computer, run the wizard again, instructing it where to find the stored files and set-
tings, and watch as it applies the data to the new PC. Your migration is complete.
438 PC Magazine — Windows XP Solutions, 2nd Edition
Summary
All users change computers at some point. When they do, they sometimes experience the problems
of setting everything up anew. Careful migration of user data, however, can help speed the transition,
and in some cases only migration makes the transition possible at all. Ultimately, to migrate user data
you must copy files and folders, and to copy them you must locate them; both processes can take a
great deal of time. You can help yourself by performing regular backups of your important files and
by investing in data-imaging software (also called ghosting software), designed specifically to let you
back up your installation completely and restore it on the new PC exactly as it was. Most likely, you’ll
find yourself using several migration methods as you move from PC to PC, and getting used to all of
them can only be a good idea.
Chapter 27
Configuring
Group Policies
by Neil Randall and Michelle MacLean
O ut of the box, Windows XP provides wide-ranging flexibility in how users can configure the
operating system’s many options, in effect allowing them to build their own personalized
interfaces. Sometimes, however, this much flexibility hinders rather than helps usability and pro-
ductivity. If you are in charge of an office full of 10 PCs or more (and certainly once that number rises
to 50 or more), standardizing the PCs starts to make a great deal of sense. For one thing, training
becomes easier because everyone sees the same desktop and works with the same interface. Also,
helping users with day-to-day PC-based activities and problems becomes easier because the people
designated to give this help (whether or not you have an official help desk) don’t have to spend the
first 15–30 minutes figuring out how each user has configured the various elements of the interface.
Windows XP Professional (not the Home edition) contains precisely the tool you need to stan-
dardize the interface and other elements of the user experience: the Group Policy Editor. This tool
enables you to assign specific properties to specific users and specific PCs, configuring them the way
you want them to look and function. This chapter takes you through the process of installing the
Group Policy Editor and working with it to achieve the standardization results you want.
439
440 PC Magazine — Windows XP Solutions, 2nd Edition
4. On the Standalone tab of the Add/Remove Snap-in dialog box, click the Add button.
5. Scroll down the list of snap-ins until you see Group Policy (see Figure 27-1). Select it, and
click the Add button.
6. The resulting Group Policy Wizard shows the Local Computer as the object of the Group
Policy. If you want to set a Group Policy on a different computer, click the Browse button
and locate the other computer on the network. This chapter assumes you want to work
with the local PC, so simply click Finish.
7. With Local Computer Policy now displayed under the Standalone tab of the Add/Remove
Snap-in dialog box, click OK. The Console Root window now shows the policy (or poli-
cies) you’ve added.
If you need to set Group Policy for more than one computer, add them at the same time by
repeating the procedure starting with step 5 in this list, locating the networked PC, and clicking
Add. Figure 27-2 shows the result of adding two computers to the Group Policy Editor.
Chapter 27: Configuring Group Policies 441
Configuring Policies
You can establish and revise your Group Policies either directly from the Management Console or
from a separately loaded Group Policy Editor application. To open the separate editor, choose
Start ➝ Run and type gpedit.msc in the Open field. Press the Enter key to launch the program. The
two show the same information, so we work with it in this chapter primarily because the separate
editor is dedicated to Group Policy configuration only. Feel free, however, to edit Group Policies
whichever way you want.
As Figure 27-3 shows, the editor is divided into three main areas: the Folders pane on the left, the
Details pane on the right, and, between the two of them, the Help pane. You can get rid of the Help
pane by clicking the Standard tab at the bottom of the window, but for the first set of users you’ll
undoubtedly find the Help pane worth leaving visible. Whenever you click on an item in the Details
pane, the Help pane offers either a brief description only — when you click on a folder — or a
much lengthier description — when you click on a nonfolder item. The nonfolder items are called
policies and are phrased in a way that reflects that terminology.
442 PC Magazine — Windows XP Solutions, 2nd Edition
Look at the example in Figure 27-3. The Remove and Prevent Access to the Shut Down Command
policy located in the User Configuration\Administrative Templates\Start Menu and Taskbar folder lets
you alter the Windows user interface so that clicking on the Start button no longer reveals the Turn Off
Computer icon (see Figure 27-4), thereby preventing users from shutting Windows down. As the Help
pane explains, setting this policy also disables the Shut Down button on the Windows Task Manager,
the dialog box that appears when you press Ctrl+Alt+Delete (or select Task Manager from the menu by
right-clicking the Taskbar). The full text of the Help pane shows the usefulness of the explanations,
hence the suggestion to keep the pane open. Even without it being open, you can access the Help text
(and in somewhat more readable form) by double-clicking on the policy and clicking the Explain but-
ton. But the Help pane works well when moving through the list policy by policy, trying to determine
which one does what you want.
When you find a policy you want to configure, double-click it (or right-click and choose
Properties) to open its Properties dialog box. As Figure 27-5 demonstrates, this dialog box shows the
name of the policy at the top (and in the title bar) and offers the options Not Configured, Enabled,
and Disabled. The bottom of the dialog box displays a field labeled Support On, which briefly out-
lines the Windows versions (or client software within Windows) that support this policy setting. For
example, the majority of the Start menu and Taskbar policies require At least Windows 2000 while
the policies in the Terminal Services folder state At least Microsoft Windows XP Terminal
Services.
Chapter 27: Configuring Group Policies 443
Figure 27-4: The Start menu without all of its shutdown capabilities.
Configuring a policy means making changes to the Windows registry. These three options change
the registry as follows:
Not Configured: No changes to the registry. The option retains the default behavior as
established with the initial Windows installation.
Enabled: The registry changes to show that the policy has been toggled on.
Disabled: The registry changes to show that the policy has been toggled off.
For many policies, those are the only possibilities. However, in numerous other cases, the Properties
dialog allows additional settings, depending on the function of the feature to which it refers. In fact,
you can look at the Group Policy Editor as a graphical interface that lets you dig into the registry with-
out actually opening it and trying to figure out what goes where (the Registry Editor — regedit — can
be brutally user hostile).
Figure 27-6 shows a more elaborate Properties dialog box that’s designed to control the behavior
of the user’s PC when it disconnects, for whatever reason, from the network server on which it
depends. Clicking the Enabled button gives you access to the drop-down menu in the middle win-
dow with an explanation of each choice. Other customized Properties dialog boxes in the Network
window let you specify options for activity logging, determine which files and folders are always
available offline, and set the number of seconds between each appearance of the balloon that
reminds users about the status of offline files and folders. Again, each of these changes alters an entry
in the registry.
Still other Properties dialog boxes offer an entirely different kind of interface. Instead of the Not
Configured, Enabled, and Disabled radio buttons, these interfaces give you a range of options specif-
ically relevant to the object you want to change. To cite two typical examples, you can use the
Important URLs Properties dialog box to configure the Web pages your employees will open when
they click the Home button, the Search button, and the Help ➝ Online Support menu item in their
browsers (see Figure 27-7). Similarly, a customized interface appears when you open the Properties
dialog box for Browser Toolbar Customizations. Here, you can customize the background image for
the Internet Explorer toolbar and even add custom toolbar buttons. When you choose to add a but-
ton, a secondary dialog box appears in which you set the caption for the button as well as the script
or program file defining the button’s action (so that the button actually does something). You must
also specify the color and grayscale icons for that button so that Internet Explorer can display the
button properly.
3. Site policy
4. Local PC policy
In other words, the higher up the chain you set the policy, the greater the chance it has of taking
effect. If you modify a policy at the domain level, every PC on that domain adheres to it, even if a
conflicting policy is set on a local PC. If you set the Internet Explorer home page to one URL for all
users on the local machine, for instance, and Joe in the corporate office changes that policy for the
entire organizational unit, Joe’s URL wins. If you change the home page after that, your changes take
effect temporarily, but only until the next time the Group Policy settings are refreshed. By default,
refreshes occur every 5 minutes on a domain controller and every 90 minutes on a server or work-
station. In practical terms, therefore, and assuming that you have nothing better to do with your day,
you can keep changing the Group Policy settings immediately after each refresh and enjoy a few
minutes of boundless freedom.
This hierarchy means, quite simply, that if you want to apply a policy, you should determine the
level at which you want to configure it. Practically, of course, you might not have any choice; your
level of IT permission in the organization dictates what you can actually accomplish with policy
modifications. Yet even if you have charge over only a small office network, you need to consider the
effect of configuring a policy. Do you want a policy setting to apply to a specific machine, for exam-
ple, or to all the machines on the network?
Tip
If you modify the Group Policy settings for an office network, be sure to explain to employees what they’ll find
different from before and how to work with the changes. Many people find any changes to their PCs discon-
certing and possibly even stress-inducing; you can lessen this reaction by letting them know exactly what to
expect when they log on. You might very well still get complaints (because that’s what people do about com-
puters), but complaints are much easier to deal with if you’ve already addressed those complaints in a
proactive way.
Enforce password history: Sets the number of passwords that Windows remembers for
each user. When changing passwords, the user cannot reuse a password before creating
this number of unique passwords. This setting prevents the time-honored and security-
destroying method advanced by users over the decades of switching between two pass-
words when the system forces a password change. The default setting is 0.
Maximum password age: Sets the maximum number of days that each new password
remains in effect before it must be changed. The default setting is 42. (Honest, that’s what
it says! One wonders if the Microsoft programmers had the fabled computer Deep
Thought in mind when designing this option.)
Minimum password age: Sets the minimum number of days that each new password
remains in effect before the user can change it. This setting represents another way of
defeating time-honored and security-destroying user practices, this time changing a pass-
word and then changing it right back again. The default setting is 0 (see Figure 27-8).
Minimum password length: Sets the minimum number of characters in each password.
The number can be anything between 0 and 14, with 0 meaning that users require no
password at all — obviously not a good idea. The default setting is 0.
Password must meet complexity requirements: The greatest bugaboo of computer
security is still, after all the ink that’s been spent on it, bad passwords. Many people use
their street name, a family member’s name, a pet’s name, or even just their own first name
because they want to make the password easy to remember. But if a password is easy
for a user to remember, it’s also easy for an intruder to crack. So, the Group Policy system
includes a built-in password complexity feature that you can enable if you want better
passwords. This policy forces users to create passwords with the following requirements.
Combined with the minimum password age policy, these requirements result is passwords
that are substantially more difficult to crack:
448 PC Magazine — Windows XP Solutions, 2nd Edition
Clearly, a password policy that includes complexity, history, and minimum and maximum aging
results in a consistent use of passwords that should do their job well. Furthermore, while these poli-
cies might seem restrictive, most users fully recognize the need for strong password protection.
Indeed, most also realize that they should change their passwords regularly, just as they know they
should back up their data files regularly. Sometimes, it’s a good idea to have computers enforcing
good ideas.
Removes the Folder Options menu item from the Tools menu: The Folder Options dia-
log box offers control over many options, including displaying hidden files, turning on
Simple File Sharing, and associating file types with specific programs. This policy removes
the item from the Tools menu in Windows Explorer and My Computer (and indeed from
any folder), and it also removes it from Control Panel window.
Remove the Search Button from Windows Explorer: Deletes the Search button from
the toolbar of all folders. Enabling this policy has no effect on the Search button in
Internet Explorer or the Search item on the Start Menu. You can remove the latter, how-
ever, by enabling one of the policies in the Start menu and Taskbar area of the Group
Policy Editor.
Remove Windows Explorer’s default context menu: Eliminates the menu that appears
when you right-click on an object.
Hide these specified drives in My Computer: Causes the icons for the specified drive
combination to disappear from My Computer, Windows Explorer, and the Open and Save
dialog boxes. You can still access these drives via methods such as typing the path in the
Address field of an open folder. Figure 27-9 shows the dialog box for this policy.
Remove Security tab: Gets rid of the Security tab from the Properties menu of an object
(such as a folder or drive) in Windows Explorer or My Computer. Enabling this policy
prevents users from changing security settings for that object and also from seeing the
Chapter 27: Configuring Group Policies 449
list of users with access to that object. Because the Security tab does not appear on these
dialog boxes when Simple File Sharing has been toggled on, the policy has no effect in that
instance.
Making any one of these changes alters the way in which users of your PC or network interact
with Windows. Change them all, and you create significant differences. But if your company policies
require specific methods of interaction, by all means make the necessary changes.
450 PC Magazine — Windows XP Solutions, 2nd Edition
Caution
Before making any changes to the Windows Explorer policies, run some usability tests to ensure that you
don’t lose in productivity what you hope to gain in security. You can run formal tests in a usability testing lab,
but you can also design your own tests quite easily. A good method of testing is to determine several tasks
your users typically perform and observe them on a modified PC (without assisting them) while they perform
these tasks. Listen to what they have to say, and assess the policy changes accordingly. And remember that
you’re testing the interface, not the users; if they have trouble performing a task because their computer
functions differently, don’t make the common testing mistake of placing blame on the user, especially if more
than one person encounters the same difficulties.
Summary
The Group Policy Editor gives you an enormous degree of control over how each user’s PC functions,
looks, and behaves. When combined with all other aspects of user restrictions and permissions, poli-
cies help you ensure that nobody has access to resources they shouldn’t and that the resources they
can access are the resources deemed appropriate by the organization. With consistent interfaces and
consistent interactions, training becomes more streamlined and assistance more immediate. Of
course, if you get carried away with configuring policies you also run the risk of becoming restrictive
to the point of limiting the users’ ability to actually get anything accomplished, so be sure to test your
changes thoroughly.
Part VII
Utilities
I n this section, you take a look at some of the utilities available for working with user accounts and
for increasing your account security even more than Windows does. These utilities are useful pri-
marily for business users, but there’s certainly no reason you can’t use some of them on a home system
if you need that additional security. However, if you’re using Windows XP Home Edition, by far the
most valuable single step you can take, before trying anything else, is to upgrade to XP Professional.
451
452 PC Magazine — Windows XP Solutions, 2nd Edition
password-protected any documents in any of these programs, or email data files in the case of the
two Outlooks, these utilities can recover those passwords for you. They’re extremely handy for gain-
ing access to documents you might have forgotten about, but obviously they make the password
protection for these programs rather suspect. In fact, numerous password recovery programs are
available for Microsoft Office products, so you can rest assured that Microsoft hasn’t provided a par-
ticularly secure password environment.
Planning Your
Network
Y our Windows XP machine works very well as a standalone PC, but it begins to show its true
potential when you make it part of a network. Whether that network consists of the two PCs
you use at home or dozens of machines in an office, the network expands the computing experience,
with shared resources providing a main focal point of computing activity from the moment the net-
work exists.
With each successive version of Windows, connecting PCs to a network has become easier. Even
so, Windows XP raises the standard considerably, to the degree that, after setting up the necessary
hardware, developing a network typically takes only a few mouse clicks. Furthermore, sharing an
Internet connection with Windows XP is not only easy to implement, it’s also expected. This is an
operating system built for networks. Even so, you can’t just plug one computer into another (well,
you can with an unusual cross-over cable); networks involve more than that.
This chapter outlines the major considerations in planning a small network. Chapter 29 covers
the various methods of establishing that network. By the time you’ve finished both chapters, you’ll
have a good grasp of what a network entails, what to do with one, and how to set one up.
Why Plan?
Many Windows networks, especially in small offices and many homes, undergo almost no planning
at all. People buy new computers as needed, using them as independent workstations until the real-
ities of sharing files, printers, and the Internet kick in. Then someone figures out that everyone could
work more efficiently if they combined their computers into a network, to share printers, an Internet
connection, and files such as those for photos and music. So the hookups begin. Within a short
while, the network is in place, with everybody more or less trained on at least a few of the functions
networking provides.
Even a small network can benefit from planning, however. By determining in advance the ele-
ments you need, you also figure out what you might not need. For example, perhaps you have
decided that you do not need wireless network access. But in observing your employees, you dis-
cover that they frequently hold impromptu design sessions with their laptop computers in the
455
456 PC Magazine — Windows XP Solutions, 2nd Edition
lunchroom. So, you might want to reconsider your decision, providing wireless access as a way to
encourage this type of productive impromptu meeting. Similarly, perhaps you currently have small
printers for each employee. But in observing them, you find that only two or three people use their
printers extensively. So, you might consider setting up a single networked printer for the others to
share.
store files to be shared among the other peers? You can connect the primary printer to it and share it
as well. You might even consider buying a large hard drive for it (160MB or so) and using it as the
networked backup store. Technically, the machine remains a peer, rather than a server, but for all
intents and purposes it functions as a server. (See Chapter 29 for details on setting up a peer-to-peer
local area network — LAN).
Next, you look at different technologies for connecting machine to a network. As you read on,
keep in mind that much of the discussion applies to either client-server or peer-to-peer networks.
Ethernet Networks
Most wired LANS (still the most common network type) use the tried-and-true technology known as
Ethernet. Now approaching its 33-year anniversary, Ethernet has developed into a high-speed, ubiqui-
tous network architecture that provides endless flexibility and easy connectivity. Part of the reason for
its success has been its inclusion as a primary network type in all operating systems, with even con-
sumer level OSs such as Windows 95 and low-end Macintoshes supporting Ethernet right out of the
box. Today, virtually all PCs ship with built-in Ethernet ports, ready for connection to an Ethernet LAN.
A number of speeds of Ethernet connectivity (measured in megabits per second — Mbps) are avail-
able today. The following are the most common. Over three decades, Ethernet has gotten markedly
faster. Three speeds are common today. Many devices support more than one of these speeds:
10 Mbps (10Base-T): The original Ethernet, and still the maximum speed for Internet
connections except for the most expensive high-speed variety. If you have a 10-Mbps
Ethernet card in your PC and you upgrade to a 100-Mbps version, you will notice no
difference in the speed of data transfer over the Internet.
100 Mbps (100Base-T): The most popular speed for office LANs. It is often combined on
a single card with 10Base-T, resulting in the designation 10/100.
1000 Mbps (Gigabit Ethernet): The most recent, widely available enhancement to
Ethernet, providing 1GB per second transfer speeds. With prices for Gigabit Ethernet
cards coming down, you might even consider building your network such that all PCs
have one, although for most networks 100-Mbps Ethernet remains more than sufficient.
At this speed, however, the PC itself becomes a bottleneck because the card can take data
faster than the PC can provide it.
we all do our Internet work. Having no wires means having mobility, and for the computer industry at
this stage in its history, mobility is one of the biggest buzzwords of all.
Following are a few facts about wired versus wireless networks:
Wired network connections represent the fastest possible means of transferring data from
one computer to another. At some point in the future, after physical connections reach
their theoretical limits for performing data transfer functions, wireless connections might
catch up, but for now, the difference in speed remains profound.
On a small peer-to-peer network, and even on many larger ones, few activities actually
require the speeds available with even a 100-Mbps network card, let alone the capabilities
of today’s Gigabit Ethernet speeds. Except when transferring extremely large files, few
users will notice the difference between a wired and wireless network.
Wireless networks offer the convenience of mobility, untethering employees and home
users from their desks and enabling them to take their notebook PCs into any room for
any purpose. Furthermore, with a wireless network, you eliminate the aggravation of
stringing, hiding, and replacing wires, a special convenience in a home office or an office
in an older building.
Wired networks offer much greater reliability than wireless networks because wires
connect more consistently and lose connections less frequently than wireless systems.
Furthermore, wireless appliances do not interfere with a wired signal. Wires can be fairly
easily located above a false ceiling, which also provides benefits in soundproofing in an
open concept office.
Wireless networks pose a greater security concern because information is being broadcast
over the air. It is far easier to tap into a wireless network undetected than into a wired one;
people often do this just to use someone else’s Internet connection. Unfortunately, to make
wireless devices easier to connect, default settings are often the least secure.
Unquestionably, wireless networks have gained glory recently, with coffee shops and burger joints
(okay, restaurants) offering Wi-Fi access to customers who want to eat, drink, and get on the Internet
all at the same time. Many university campuses have installed an array of wireless networks to let
students access the Internet while doing research in an empty classroom or the library (and appar-
ently for engaging in instant messaging sessions with their friends during lectures). Corporations
have begun to espouse wireless networks as a means of providing always-on, always-available
Internet access to employees in any office or conference room and even to clients waiting in the
foyer. And wireless networks have become popular in home networks as well, getting rid of that
unsightly cable hanging out the back of the laptop computer in the family room and allowing, finally,
even the deck and the bathroom to become places of work.
Windows XP offers built-in support for wireless networking. Most wireless network adapters
released today automatically interact with the operating system, allowing Windows to search the air-
waves for available networks using the IEEE 802.11b or 802.11g protocols. If it finds the necessary
signal, it connects to the network immediately, establishing itself as a client in an infrastructure net-
work or a peer in an ad-hoc network.
Chapter 28: Planning Your Network 459
Note
Some network adapter Properties dialogs term ad-hoc networks peer-to-peer. Technically correct, the term
nevertheless suffers from being indistinguishable from the prevailing uses of the term peer-to-peer in tradi-
tionally describing non-server–based wired networking, and more recently to describe non-server–based
Internet connectivity.
Ad-hoc wireless networks appeal for two main reasons: they cost less than a network with an
access point, and they can be set up quickly and easily. By contrast, they have two significant disad-
vantages: the inability to connect to a larger wired network and a greater difficulty in sharing an
Internet connection. This latter difficulty is a function of the Internet Connection Sharing features
built into Windows XP. Although ad-hoc networks are not overly challenging to set up, they don’t
come close to the ease of setting up a cable/DSL router or an access point (the details of which are
covered in the next chapter), nor do they have the later convenience that comes with such a setup.
As with all wireless networking connections, getting an ad-hoc network functioning depends on
how you configure the settings. Follow these steps to configure the network successfully:
Note
Different wireless adapters have different properties and settings dialog boxes. If you have trouble connect-
ing, make sure the SSID names are identical, and also look in the configuration dialogs for a channel number
setting. Set the channels on all connecting PCs to the same number to allow them to connect.
Access points can communicate with other access points, so you can daisy-chain them
together for greater wireless range.
Access points can bridge with wired networks to provide you with access to both (see the
next section).
Access points can remain powered on at all times, allowing you to connect whenever you
want. By comparison, if you turn off the host machine in an ad-hoc network, the network
ceases to exist until you turn it back on.
Access points are frequently built into Ethernet routers to provide both a multi-PC wired
connector and a wireless station.
Access points can share an Internet connection with all wireless adapters attached to it
without requiring the setup of the Internet Connection Sharing feature of Windows XP.
Access points give you built-in encryption technology, helping you make your wireless
network as secure as possible.
The only disadvantages of access points are the cost — they add at least an extra $100 or more to
even a small network’s cost — and, in some cases, the difficulty in configuration and management.
Typically, you configure an access point through a browser-based utility such as the one shown in
Figure 28-1. At times it becomes difficult to access the settings, at which point you might need to
reset the access point and start the setup all over again. As access points develop, though, these
inconveniences become increasingly rare. Even more importantly, if you have any concerns about
security (which you should) and expandability (which you will), then by all means go for a network
based on access points.
Chapter 28: Planning Your Network 461
When you have your wireless network up and running, the crucial element becomes the strength
of the signal. The properties or settings dialog boxes of all wireless adapters show the quality of the
setting; even at low setting, the network tends to work at least close to the same speed as at high set-
ting. You can lose the setting completely, though, if something blocks the signal, and these blockages
can come from items ranging from walls and ceilings to books, coffee mugs, and even people. As you
set up your network, experiment with both the placement of the access points and the settings of the
antennae for the best possible signals you can achieve. And try to minimize the number of floors
between the access points and the network adapters. You’ll also have to work the signal around con-
crete walls, office partitions, and other similar blockages.
Figure 28-2: The network bridge appears at the bottom of the window.
Summary
With the network planned and the hardware in place, you need only to connect the PCs to make it
work. Chapter 29 looks at the details of getting the PCs working together to share information and
resources.
Even with your network up and running, however, you’ll probably find it necessary to continue
planning. If you need to add PCs to the network, for example, use that occasion as a reason to recon-
sider the entire network, adding routers and access points to accommodate even further growth.
Think about upgrading network printers, fax devices, and other shared equipment as new technolo-
gies emerge that suit your particular needs. As your need for shared resources grows, so will your
network.
Chapter 29
C hapter 28 covered network basics and the planning of networks. This chapter steps you
through the process of connecting PCs through a small workgroup. The process begins with
a single Windows XP desktop PC and a direct Internet connection and ends with two Windows XP
machines sharing a broadband Internet connection, a shared documents folder, and a printer — all
across a hybrid wired/wireless network with the capacity for extensive expansion. The wonderful
thing about networks, after all, is that once you’ve established them, you can just keep adding to
them; and Windows XP makes it remarkably easy to do so.
Beginnings: A PC and an
Internet Connection
This chapter takes you through a scenario. In it, you’re the owner of a one-person business, which
(because it’s you, of course) begins to succeed to the point where you have to add one employee,
then another, and so on. This discussion is just as relevant to a home with different machines in var-
ious rooms.
You start out with a single computer that connects to the Internet through a DSL or Cable broad-
band connection. As the sole employee of the business, you need nothing besides your PC and
Internet connection. You conduct business primarily from your two-room office and meet your
clients at their locations rather than your own. But then your business picks up, and you hire your
first employee. This person, too, requires a PC with an Internet connection. You decide to buy a
notebook, to save room and to provide the greatest possible flexibility.
The desktop PC has an internal Ethernet card (sometimes called a NIC, network interface card),
with a category-5 Ethernet cable running from the Ethernet port on the network adapter to the
Ethernet port on the DSL modem. The notebook sports a built-in Ethernet adapter, and your first
idea is to share the Internet connection between the two PCs using the Internet Connection Sharing
system built into Windows XP. You do your homework, however, and realize that you will achieve
better expandability and numerous other conveniences by purchasing a four-port cable/DSL router
465
466 PC Magazine — Windows XP Solutions, 2nd Edition
that will let you connect the two PCs in a LAN and share the Internet connection seamlessly. The
greatest single benefit of the router at this stage in the growth of the network is that you don’t have
to leave your PC turned on for your employee to have access to the Internet. With the Internet
Connection Sharing feature and without the router, this is precisely what you would have to do.
Other configurations exist as well. As Ethernet has gotten faster, Gigabit Ethernet capabilities
have become more popular. And as wireless technology has improved, the venerable 802.11b has
begun to fade away. The point here, for your business, is that you need to make a choice between a
cable/DSL router with an access point or without. If you can afford the few extra dollars for the
access point, by all means get it. You don’t lose any wired capabilities (unless you choose an access
point with only one port), and you gain the capability, either now or in the future, to add wireless
devices to your network. These devices can include notebook PCs, PDAs, 802.11x-enabled tele-
phones, and even game consoles.
Even with some exceptionally good bargains on four-port routers without access points, you
decide to plan for expansion and spring for a router with four 10/100-Mbps Ethernet ports and an
802.11g access point. Even if you could find an 802.11b version, there’s no point bothering with it.
802.11g has become the standard (besides, g supports older b devices, if any turn up).
For various reasons, you decide to go with the well-known LinkSys brand name, purchasing their
AirPlus Xtreme High-Speed DI-624 wireless router. Like numerous other products from other rep-
utable companies, the DI-624 gives you the Ethernet and Wi-Fi connectivity you need for the net-
work. Then, because you got a good deal, you purchase a Microsoft MN-720 Wireless Notebook
Adapter. This card gives you 802.11g wireless connections at a good price.
Chapter 29: Connecting Your PCs in a Small Workgroup 467
With new products in hand for under a couple of hundred dollars, you’re ready to give the con-
nections a go.
Tip
The port into which you plug the Ethernet cable from the broadband modem goes by several different names,
depending on the router manufacturer’s preference. Typical examples include Cable/DSL, Broadband, and To
Modem.
With the router powered on and connected to the PC, it’s time to test the connection by opening
the configuration utility. Doing so requires a Web browser and the IP address of the router itself. The
router’s manual includes the IP address needed to access the utility, but to make sure that you have
access to this information whenever you need it, write it down elsewhere (on paper) and also store it
in a text file on your PC. Once past the first two components of the IP number, always 192.168 to
designate locally reserved IPs, the remainder of the four-part number differs from manufacturer to
manufacturer. Some routers use the address 192.168.1.1, others 192.168.2.1. Some insist on a sig-
nificantly more esoteric number altogether. D-Link uses 192.168.0.1 for its broadband routers, and
this is the one you type now (the http:// prefix can be omitted, but even today browsers sometimes
respond with it more quickly if you include it).
Figure 29-1 shows the opening screen of the DI-624 configuration interface. As with all such
tools, the first task is to type a username and password. A router always has a default password
(Linksys routers sensibly use admin for their default), but for the sake of security you should always
create one for yourself. These things can be hacked.
The router installation has passed the first test. Because the configuration pages appeared, the PC
and the router have established communication. On to the Internet.
1. Locate the Internet connection settings section or page on your router’s configuration pages.
2. For cable modems, choose the Dynamic IP option to receive an IP address from the ISP.
For DSL modems, choose the PPPoE option because you need to connect to the ISP
servers using a username and password.
3. If your ISP requires a Host or Service name, enter that name in the appropriate location on
the configuration screen. If you’re not sure, leave this blank.
4. If you connect via DSL, fill in the username and password in the appropriate fields. You
can also typically set the number of seconds of idle time allowed before automatic dis-
connection and whether or not you want the router to connect on demand — that is, as
soon as it sees a request for the Internet.
5. If you connect via DSL, locate the Connect button and click it to make sure that it will
perform the connection.
6. With the configuration utility still open, launch another browser window and navigate the
Web. In addition, check your email. If everything works, close the configuration utility,
saving the settings.
Chapter 29: Connecting Your PCs in a Small Workgroup 469
Tip
Despite the recent proliferation of broadband routers, many cable and DSL service providers refuse to pro-
vide technical assistance for their users when they connect through one of these devices. If you have trou-
ble with your Internet connection, you should disconnect the router and plug the broadband modem directly
into the PC as it was before and attempt a connection before calling the ISP.
Figure 29-2 shows the completed configuration screen for the Wide Area Networking settings of
the DI-624 configuration interface, complete with the necessary PPPoE settings.
After you’ve connected to the Internet, go back to the information page and examine your Internet
settings. You’ll notice two things. First, the router has acquired an IP number from the ISP. Second,
your PC has a local IP address provided by the router’s built-in DHCP server (see Figure 29-3). The
Dynamic Host Configuration Protocol takes a single IP number from an ISP and shares this number
among all the devices connected to the router. DHCP provides the basis of Internet Connection
Sharing built into Windows XP, and the same technology allows you to share a single Internet con-
nection among several computers from a router as well. The magic of Internet Connection Sharing lies
in the ability of the DHCP server to keep track of which machine made each request so that the
response can find its way to the originating PC.
Tip
You can tell in two different ways when you’ve successfully established communication between the wire-
less adapter and the access point. First, you should be able to access the Internet from the PC on which
you’ve installed the wireless adapter. Second, you should be able to call up the router’s configuration
screens. If you can do the latter but not the former, recheck your Internet connections.
Click Next on the wizard until you reach the third screen, where you decide whether to share the
Internet connection. Check the default radio button (Yes), and click Next again. The next screen asks
if you want Windows to determine the appropriate network connections. Here, too, the answer
should be Yes unless you have a reason to disallow specific network bridging processes from occur-
ring. Typically, you want all available connections bridged on a small LAN. On the subsequent
screen, type a description for your PC and verify the computer name; then click Next and choose a
name for the workgroup. HOME or OFFICE are the names that Microsoft suggests here, but like the
computer description on the previous screen, this name can be whatever you want.
Figure 29-5 shows the final stage of the wizard, a summation of all the choices. Click Next to
begin the process of creating the network. When you’ve finished, open My Network Places to see if
you can see the other PCs on the LAN. Then open My Network Places on each PC and determine if
they can see your PC as well. If not, run the Network Setup Wizard on each PC until all computers
can see each other.
Tip
After creating the network, the wizard asks if you want to create a network diskette. If you plan to include
any Windows 95, Windows 98, or Windows Millennium Edition PCs on your network, create the diskette and
run the setup wizard as instructed on those PCs. Earlier versions of Windows need this help to partake in a
Windows XP network.
Chapter 29: Connecting Your PCs in a Small Workgroup 473
Caution
Sharing files and folders can cause problems if those resources contain sensitive data. Part of planning your
network consists of deciding precisely what you can safely share and, for each resource, which users can
safely share it. Some folders can safely be shared among all network users, while you might grant access for
another folder to only two people. For details on sharing resources on both a single PC and over the network,
see Chapter 25.
The final task for this small network lies in sharing a printer among the PCs. Open the Printers
and Faxes folder on the PC to which the printer is attached. Right-click the printer’s icon and choose
Sharing. A Properties dialog box opens with a Sharing tab. Click the radio button labeled Share This
Printer, and give the printer a recognizable name (or use the name Windows supplies). Click OK to
share the printer across the LAN. Before doing so, if your network contains PCs running other ver-
sions of Windows besides Windows XP, click the Additional Drivers button and select the operating
system for which you want to install drivers (see Figure 29-6).
You can wait for your shared printer to be discovered by the network (it takes awhile) or you can
go to other computers on the network and use Add a Printer. Use the network printer option.
Finally, print a document or a test page from each of the PCs sharing the printer to make sure that
the printer works from each one.
Summary
Peer-to-peer networks form the backbone of many small businesses and also add valuable conve-
nience and enhanced productivity for home users. Although not especially difficult to set up, creat-
ing a peer-to-peer network may require both patience and careful attention to details. You want to
ensure that you share folders and so forth properly, maintaining security while aiding the activities of
users working with the various resources on the network. A peer-to-peer network can save you
money by letting you share hardware such as printers, backup drives, and Internet connections, and
it can save you aggravation by letting users gain access to a document or other resource without hav-
ing to sit down at another PC and work from there. Using the Internet-sharing capabilities of a
router, the wireless capabilities of an access point in conjunction with Windows XP, and the ease of
LAN creation provided by the Network Setup Wizard, you can have a fully functioning hybrid
wired/wireless LAN up and running in only a short time.
Chapter 30
Using Windows XP
as an Internet Server
W indows XP contains several built-in Internet server functions. Although you won’t want to
bet your company’s future on using Windows XP as your primary server environment,
you can most certainly configure this OS as a decent low-level server for specific purposes, including
one major function: hosting Web sites. To build a full Internet server environment, you should look
to Windows Server 2003 or the Small Business Server 2003. But for small office and home office use,
as well as for developmental and experimental purposes, Windows XP works well.
Windows XP includes two server types of particular interest for these purposes: File Transfer ser-
vices (FTP) and Web services (HTTP, HyperText Transfer Protocol). These FTP and HTTP services
(known to some as daemons, from Unix) provide the highly useful services of hosting downloading
(and uploading) sites and Web sites. This chapter focuses on installing and configuring these two
server types.
What is a Server?
In the computing world, two major types of networking dominate: peer-to-peer and client-server.
You can tell the difference between the two by their names. In a peer-to-peer network, each
computer has equal status; each computer makes requests of other computers and has requests
made of it. The much-discussed MP3 file-sharing systems, such as Kazaa and Morpheus, as well as
fascinating projects such as the extraterrestrial life-seeking SETI home initiative, work with peer-to-
peer architectures. By contrast, the World Wide Web, like the vast majority of Internet technologies,
operates as a client-server architecture. In a client-server arrangement, one computer contains data
that it makes available to computers that connect to it and request that data. The computer with the
data is the server; the computers connecting to it are the clients.
A simple restaurant analogy might help make this point. When you take your family to a restaurant,
you are the clients. The person who comes to your table to take your order and then brings you your
food is the server (waiters and waitresses in traditional terminology). The clients make requests of
the server who processes the request, and, a few minutes or a couple hours later (depending on
how posh the restaurant is), delivers the food. Each server serves a relatively defined number of
clients. In a large restaurant, several servers are at work, each serving a certain number of clients.
Continued 475
476 PC Magazine — Windows XP Solutions, 2nd Edition
Note
To use Windows XP as a server with Microsoft’s own server software, you need Windows XP Professional,
not Windows XP Home Edition. You can purchase server software for other Windows environments (as well
as for Windows XP) from third-party vendors.
procedure, you need your Windows XP installation CD (or access to the installation files, if you
copied them to your hard drive).
Figure 30-1: The Windows components dialog box and the IIS dialog box.
478 PC Magazine — Windows XP Solutions, 2nd Edition
To configure any of these services, right-click on the item and choose Properties. As Figure 30-3
demonstrates, the Properties dialog box provides information that includes the name of the service,
its description, the path to its program file, and the service’s status. The status area contains one of
two notifications: Started or Stopped.
If the service is currently Stopped, you can start it by clicking the Start button.
If the service is currently Started, you can stop it with the Stop button.
In both cases, however, you change the status only until you reboot Windows XP. When you do
so, the service reverts to its default Startup mode.
To change the Startup mode, use the drop-down list beside the Startup Type label. You have three
options:
Automatic: This option starts the service automatically whenever you start your computer.
If you plan to use the service frequently, and if you do not have access to the server
machine at all times (if it’s in a remote location, for example), choose Automatic to ensure
the service is running when you need it.
Manual: A user or another service — one that depends on this service — can start the ser-
vice when required. The service remains Stopped until that time, however, including when
Windows boots.
480 PC Magazine — Windows XP Solutions, 2nd Edition
Disabled: This option disables the service entirely. If another service requires this service
in order to start, it will not start. To start the service, an Administrator must first change
the mode to Manual or Automatic.
Be careful about changing the Startup type. If a service is disabled, a dependent service or pro-
gram cannot start (see the Dependencies tab under Properties for more guidance). Remember what
you change here in case you have to change it back.
To configure the remainder of the items available in the Service Properties dialog box, see the spe-
cific sections on Web services and FTP services later in this chapter.
Caution
Stop your services, and even disable them, if you do not intend to use them. Your services invite traffic from
the Internet, and if you leave them on, you will almost certainly get traffic you don’t want. Intruders have long
targeted unused but open server software, and you will become a target if you leave this situation unat-
tended. It really is that bad.
1. From the Control Panel, choose Windows Firewall (or Winlogo+R, control firewall.cpl).
2. Click the Advanced tab.
3. Under Network Connection Settings, click the Settings button.
4. In the Services tab of the Advanced Settings dialog box, check the services whose traffic
you want to allow. In the case of this chapter, check Web Server (HTTP) and FTP Server.
5. As you make each selection, Windows displays the Service Settings dialog box for that
service. Figure 30-4 shows the Service Settings dialog box for the FTP service, with the
name of the host PC the only possible modification.
Do not randomly choose a name; the name or IP address must match the name or IP of the
computer on which the server software resides along with the files you want it to serve. In
most cases, simply accept the default and press OK. When you’ve finished, the Advanced
Settings dialog box will contained two checked services, as shown in Figure 30-5.
Chapter 30: Using Windows XP as an Internet Server 481
In the case of third-party firewalls, such as those included in broadband routers, open your
router’s configuration utility (usually a Web-based utility — see your product manual) and navigate
to the area in which you can allow specific types of traffic or open specific ports. In the case of Web
traffic, you must open port 80; for FTP traffic, port 21.
Serving Up a Web
With all the preliminaries out of the way, you can begin setting up your Web. First, start the Web
server — if it’s not already started — by opening the Services utility, double-clicking on the World
Wide Web Services item, and clicking the Start button. You now have a Web server running.
482 PC Magazine — Windows XP Solutions, 2nd Edition
Note
This chapter discusses setting up a Web server on a local machine only. For that reason, it will use the Web
address http://localhost and the FTP address ftp://localhost. Localhost refers to the machine at which you
are currently logged on; if you prefer, you can use the localhost numeric IP, 127.0.0.1. The procedures for set-
ting up a Web site on a public server are the same as those used here, but the varieties of public and private
IP addresses are too broad for this book to cover. Moreover, establishing a localhost server is a common
practice for testing purposes. One other note here: If your computer already has its own dedicated IP
address (you can check by opening a command box and entering ipconfig at the prompt), your localhost
server and your public server are one and the same. In other words, whatever you put on your site and can
access via http://localhost or http://127.0.0.1 (or, indeed, http://computername), anyone on the Web who
knows your IP address can also see.
To see the server, open your Web browser, and enter one of the following in the address bar:
http://localhost
http://127.0.0.1
http://computername (replace computername with the network name of your PC)
Any of these addresses leads to the same place: the Web site on your local PC. When you first
view it, your browser loads the default home page, as shown in Figure 30-6. Until you alter the con-
tents of the home page, this page is displayed whenever you access your site.
From this point on, you can create whatever content you like in your Web site. This book does
not cover the creation of Web content because for even reasonably decent coverage the topic requires
a book of at least the same size. The following steps, however, will get you started with basic Web
site creation:
change the default location by configuring Internet Information Services (covered immedi-
ately following this list). The Read permissions extended to the Inetpub folder do not extend
to the rest of the PC.
Note
For more information on Web design, a couple of good books are Web Design For Dummies by Lisa Lopuck or
the HTML 4 Bible, 2nd Edition, by Bryan Pfaffenberger and Bill Karow (both published by Wiley).
You can set the specifics of your Web site, and create additional sites, by using the Computer
Management utility in Administrative Tools. Open Control Panel, click Performance and
Maintenance, and open Administrative Tools. Open the Computer Management tool (or Winlogo+R,
compmgmt.msc) and expand the Services and Applications item in the leftmost pane, and then
expand Internet Information Services, Web Sites, and Default Web Site in that order. As Figure 30-7
shows, you can now see the files and folders that constitute the default site. Note that you can get
just the Internet Information Services tools by using Winlogo+R, inetmgr.
Figure 30-6: The default home page for your new Web site.
484 PC Magazine — Windows XP Solutions, 2nd Edition
You can edit the properties of the Web site by right-clicking on the Default Web Site folder in the
leftmost pane and choosing Properties. Figure 30-8 shows the first screen of the multitabbed
Properties dialog box. You can change the Description and assign a new IP Address from here, and
you can alter the port if you want to do so. You can also set the number of seconds after which any
idle connections automatically disconnect and whether you want to enable the technology known as
HTTP Keep-Alive (whereby the Web browser can signal the server to keep the connection open).
Finally, you can decide whether to create a log file for your server. A log file is always a good idea
because you can track usage and errors. Clicking the Properties button in the Enable Logging area
lets you schedule the log and configure it in numerous ways, including the specific server activities
you wish to capture.
Tip
Assigning a nonstandard port number to your Web site renders it inaccessible to anyone who does not know
the port number. For this reason, you can use this technique effectively in creating an internal or private site,
giving the URL with the port number to those you want to visit it. If you do so, the port number appears after
the base URL, in the form http://www.mycompany.com:pn (replace pn with the port number).
Chapter 30: Using Windows XP as an Internet Server 485
Each of the other tabs in the Properties dialog box offers its own selection of configurable ele-
ments. On the Home Directory tab, for example, you can choose if the content for the site should
come from a specific directory on the local PC, from a network share, or from a remote Web server
to which this site connects through a redirection command. In other words, you can configure the
Web site to take material from another folder or machine entirely, an excellent technique for the sake
of managing the site and developing security. Remember that C:\Inetpub\wwwroot automatically han-
dles access privileges. If you change the Home Directory, you will need permissions for that folder
(and you may be prompted to login); this is why most users are best served by leaving the default
and putting their Web site files in that default folder.
Under the Documents tab, you can establish which document serves as the default document,
listing a number of them in the order you choose (the Web server can serve the document according
to the characteristics of the connecting browser). While most of you won’t need this, someone work-
ing with PHP (P HyperText Preprocessor, a Web development scripting language), might add the
PHP extension to the list (as well as PHP services, a topic beyond this coverage). Each file within the
Web site has its own similar but smaller Properties dialog box, complete with a supplementary dia-
log box to set security issues such as whether the page requires a password for access.
Obviously, configuring a Web site can become extremely technical, and as the scope and purpose
of the site grow, so must your attention to these details. The good news, though, is that the default
Web site works perfectly well without configuring it at all. Add the content you want and make it
available to others; or just test it for yourself, and you needn’t go any further unless you are a profes-
sional Web developer.
486 PC Magazine — Windows XP Solutions, 2nd Edition
Note
If you want to establish a Web server for access from outside your network, you should acquire a dedicated
IP number. To get one, contact your ISP and explain your needs. Most ISPs offer business services and can
set you up with a dedicated, unique number, along with the full control necessary to set up your own range
of servers. You’ll probably pay an additional monthly fee for the dedicated address.
1. Open the Computer Management tool from the Administrative Options utility in Control
Panel.
2. Expand the Services and Applications item in the leftmost pane by clicking on the plus
(+) sign.
3. Expand the FTP Sites folder.
4. Right-click on the Default FTP Site item and choose Properties.
5. In the resulting Properties dialog box, click the Security Accounts tab (see Figure 30-9).
6. Uncheck the Allow Anonymous Connections item at the top of the dialog and click the Yes
button on the Internet Service Manager warning box that appears. You have now turned
off the anonymous access feature.
When a user logs in to your FTP site, the FTP service automatically grants him or her access to a
specific folder and to only that folder and its subfolders. Click the Home Directory tab on the FTP
Sites Properties dialog box to configure that folder. For maximum control and maximum security,
you should create a new folder (using My Computer or Windows Explorer), copy any shareable files
into that folder, and then establish that folder as your FTP default using this Properties sheet. Click
the Browse button and search for the folder to establish it as the site directory (ideally, the folder is
on a partition or hard drive different from Windows XP and your most important data folders). Now,
when anyone connects to the site via FTP, he or she has access to that folder for uploading and down-
loading but to no other folder on your system.
Chapter 30: Using Windows XP as an Internet Server 487
Tip
With anonymous access disabled, only people with user accounts on your Windows XP machine can access
the FTP site. If you want to grant access to more users, you can create a separate user account for FTP pur-
poses only, giving that account name and password to anyone you want. Add this account using the User
Accounts utility in Control Panel.
To access your FTP site, use a dedicated FTP client program (you can find many that can be
downloaded from the Internet). If you don’t have such a program, use your Web browser. You can
access your default FTP site by opening your Web browser and typing the following in the address
bar: ftp://username@localhost or ftp://[email protected] — replacing username with the name
of your Windows XP user account for that computer. Windows responds with a Password box. After
successfully logging in with your password, you can copy files to and from the browser window.
Summary
In addition to using your Windows XP Professional installation as a Web server and FTP server, you
can purchase or download software to make it into a mail server, file server, application server, and
more. All these possibilities require additional configuration, and few functions with as little effort
on your part as Web and FTP servers. With HTTP services to host a Web site, publicly or locally, and
FTP services to transfer files to and from another Windows XP machine quickly and easily, you’ve
already made good use of the operating system’s server features.
Part VIII
Utilities
H ere, you look at software available to make your Windows XP machine into an Internet
server. Chapter 30 covers a few of the tools available in Windows XP itself, but you’ll find a
far wider range of choices if you move into third-party offerings instead.
489
490 PC Magazine — Windows XP Solutions, 2nd Edition
A number of easy-to-use FTP servers are available, perhaps the easiest being, well, Quick & Easy
FTP Server (www.pablosoftwaresolutions.com). You set up your FTP server using the built-in wizard,
and you can add users and folders anytime you want through the graphical interface environment.
Each user is assigned a home folder and permissions in that folder and other folders to download,
upload, delete, create directories, and so on. Each user can also have a disk quota for storage and for
data transfers. GlobalScape (www.cuteftp.com), the maker of the well-known FTP client CuteFTP, has
a server of its own — Secure FTP Server — with a somewhat less user-friendly graphical interface, but
with a wide range of administrative options for its virtual disk system and a direct linkage to Windows
XP user accounts (optional but useful) to help you create your FTP accounts.
If you want a tiny FTP server, in the sense that is uses as little system memory as you’re likely to
find anywhere, give Xlight FTP Server (www.xlightftpd.com) a try. This server offers a clearly
designed graphical interface and incorporates features such as SSL (Secure Sockets Layer) and
remote database connectivity. TurboSoft’s Turbo FTP (www.turboftp.com) also features these proto-
cols, provides firewall and proxy server support, and in an interesting feature, allows automatic
updates of any files copied or saved to the user’s home folder, obviating the need to connect to the
FTP site for uploading purposes.
Mail Servers
Windows XP does not include mail server software. If you want an email server, you have to install a
Linux box and activate one of its built-in servers, or use a third-party product designed for Windows.
Ability Mail Server (www.code-crafters.com) provides support for all major Internet mail proto-
cols, including SMTP (Simple Mail Transport Protocol), POP3 (Post Office Protocol version 3),
IMAP4 (Internet Message Access Protocol), and LDAP (Lightweight Directory Access Protocol). It
also offers strong 128-bit security, built-in virus protection, built-in spam protection, filtering of mail
content, and the use of mailing lists. MailMax (www.smartmax.com) offers similar features along
with extensive user mailbox configurations for full control over your mail system’s users. Ipswitch’s
well-known iMail Server (www.ipswitch.com), highly regarded over the last several years, has now
been packaged with a number of other server programs in the Ipswitch Collaboration Suite. In addi-
tion to its established email server, the suite offers email collaboration services, instant messaging
services with built-in security, workgroup collaboration features such as shared calendars and con-
tacts, and spam and virus protection.
Part IX
Appendixes
Appendix A
Installing Windows XP
Appendix B
Reinstalling Windows XP
Appendix A
Installing
Windows XP
I f you’ve never installed an operating system before, you can rest assured that no matter how
complex the process seems with Windows XP, it doesn’t hold a candle to the confusion and the
sheer number of possible problems engendered by Windows installations of the past. Installing
Windows 95 meant figuring out a way to get the CD-ROM drive working with the setup procedure
using a start-up floppy disk, or, for the truly patient, installing the OS from roughly 20 floppy disks,
one of which (usually in the #15– #17 range) would almost certainly malfunction and stop the instal-
lation cold. Windows 98 solved some of the CD-ROM problems, but as with Windows 95, finding
and installing hardware drivers tended to bog things down. Windows 2000 proved itself the most
stable Microsoft OS release until (and some still argue including) Windows XP. But for desktop users, it
suffered from compatibility problems with both hardware and software. Windows Millennium Edition
took the first real step toward recognizing hardware during the installation, but mysteriously it still
often failed to make that hardware function until you found the drivers.
Windows XP, from its initial release, pointed to the future of OS installation, recognizing a wide
range of hardware and configuring itself to take advantage of each individual PC. It’s not perfect, but
it has demonstrated that pain-free Windows installations might actually occur one day.
No two PCs are identical (well, few that you’ll likely deal with as a home user anyway), so the num-
ber of possible installation scenarios is high. This chapter outlines a range of scenarios and steps you
through the process of installing Windows XP. The next appendix is about reinstalling Windows XP.
493
494 PC Magazine — Windows XP Solutions, 2nd Edition
Installation Scenarios
The one size fits all mantra does not apply to operating system installation, although manufacturers
have started doing everything in their power to try to force it to fit. The fact remains, however, that
different users have different needs, and a successful installation depends on whether the outcome
satisfies those needs. Here are some installation scenarios reflecting several possible situations.
1. On the first blue screen, choose the To Set Up Windows XP Now, Press ENTER option and
press the Enter key.
2. On the next screen, press the F8 key on your keyboard to accept the Windows XP
Licensing Agreement.
3. Work begins on the third blue screen. Setup lists your PC’s hard drives and the partitions
on each of them. Because this scenario assumes a single-drive system, only one hard drive
appears. Because the hard drive is new, it has either one partition only or nothing but
unpartitioned space. Either way, because the scenario assumes that you have no data on
the drive you want to save, you should start from scratch. If you have an existing partition,
proceed to step 4; if you have only unpartitioned space, proceed to step 5.
Note
You have probably heard the phrase formatting the hard drive, sometimes in a negative way because format-
ting a drive wipes out existing data. In fact, however, formatting works on partitions, not drives. For a hard
drive to be useful, it needs partitioning first and formatting next.
4. Delete the existing partition by highlighting it and pressing the D key on your keyboard.
Windows responds by asking if you want to proceed with the deletion. Confirm the dele-
tion by pressing the L key. The partition is now gone, replaced by unpartitioned space.
496 PC Magazine — Windows XP Solutions, 2nd Edition
5. Highlight the unpartitioned space, and press either Enter or the C key. Pressing the Enter
key instructs Windows to use the entire hard drive for the installation, with your entire
hard drive serving as a single partition. Pressing C tells Windows that you want to divide
your hard drive into more than one partition. If you have a large hard drive (over 60GB),
you should consider creating more than one partition. This gives you a partition to use in
case your Windows installation stops working, as a backup partition away from the main
partition, or for future installation of a second instance of Windows XP or a different oper-
ating system entirely (such as Linux) in a dual-boot system. If you press the Enter key,
proceed to step 7. If you press the C key, go to step 6.
6. By default, Windows configures itself to use the entire hard drive for a single partition,
exactly as if you had pressed the Enter key in step 5 instead of C. To give yourself the
versatility partitions offer, you may want to divide the hard drive into two or more parti-
tions. At this stage, however, you need define only one partition and leave enough unfor-
matted space to use later (including immediately after Windows has finished installing).
Jot down the number currently displayed in the partition size area (so that you remember
the default), and chop that number in half, one-third, or two-thirds — any size you like.
For example, on a 60GB hard drive, you could create a 30GB partition for Windows and
leave the other 30GB as unformatted space. Create the partition now by entering the size
you want for the first partition in the space provided. This first partition is called the pri-
mary partition (C:); others are known as extended partitions (D:, and so on.). You don’t
have to use more than one single full-sized partition.
Note
The partitioning screen uses megabytes rather than gigabytes as its measure. When specifying the size of
the partitions, create a 30GB drive by typing the number 30000 because 1GB equals (roughly) 1000MB.
Actually, 1GB equals 1024MB, so the numbers never work out quite evenly; but at this level, working in 1000s
is fine. For a 40GB drive, type 40000.
7. When you have finished creating your partitions, Windows returns you to the partition
selection screen. Highlight the partition you have just created (it shows up first in the list),
and press Enter to instruct Windows to install itself on that partition.
8. You now arrive at the formatting screen. Here, Windows asks you how you want to format
your partition. To take full advantage of the advanced file-sharing and user permissions
features of Windows XP and to have a far more secure PC, choose the Format The Partition
Using the NTFS File System option. To speed up the process, select the Quick option,
which takes much less time but (in theory at least) can run into difficulties. Reports of
such difficulties are few and far between, so save yourself some time and use the Quick
format.
9. On the next three screens, wait while Setup formats the partition, copies the setup files
from the installation CD to your hard drive, and reboots your computer.
Appendix A: Installing Windows XP 497
10. After the reboot, the graphical Setup program appears. Stay by your computer for the first
part of the graphical installation because Setup requires your interaction in the following
stages of installation:
a. After approximately five minutes, the Regional and Language Options dialog box
appears. You can keep the defaults, which depend on where you bought the software
(U.S. English and a U.S. English keyboard layout for U.S. purchases), or click Customize
for the standards and formats or Details for the keyboard and change the defaults.
Assuming that you want to keep them as they are, click Next.
b. Shortly afterward, the Personalize Your Software dialog box appears. Type in your name
and organization. Windows specifies no formats for either, so type in whatever you
want here, and click Next.
c. Immediately afterward, the dialog box titled Your Product Key appears. You can find the
product key on the back of the CD case. Type it in carefully and click Next; if Setup
says you’ve made a mistake (as it does with stunning regularity), compare the original
with what you’ve typed and make the necessary changes. If you don’t have a product
key, you cannot continue the installation. Once Setup accepts it, click Next.
Tip
You don’t have to use uppercase letters when entering the product key; the letters on the product key printed
on the CD case are uppercase for clarity only.
d. Shortly afterward you enter the product key, the Computer Name and Administrator
Password dialog box appears. You can name your computer whatever you want: DELL
SYSTEM, WORK MACHINE, THE OSBOURNES’ PC, SUPERBEAST, or just plain
JOHNNY. It’s your choice. Next, type in a password for the primary Administrator
account, the one named, in fact, Administrator. Write this password down for safe-
keeping, but keep it safe from prying eyes. With the Administrator account, you have
virtually full control over the PC. Make the password something that only you could
possibly know, and include numbers and punctuation characters if you feel that you
can remember them. When you’ve finished, click Next.
e. Immediately after you enter your password, the Date and Time Settings dialog box
appears. Set the date and time here, and specify which time zone you are in. If you live
in an area with daylight-saving time, click the appropriate check box. Then click Next.
f. At this point, Setup seems to be doing well on its own, and the temptation to go have
lunch often becomes irresistible. Resist it, however. After four or five minutes Setup
displays the Network Settings dialog box, asking if you want typical settings or custom
settings. Unless you have a local area network that you now want to configure, always
stick with the default typical settings, and click Next. Why Microsoft did not design this
dialog box to accept the typical settings after a specified time, five minutes perhaps, is
mystifying. Many users have left their PCs after configuring the Date and Time Settings
498 PC Magazine — Windows XP Solutions, 2nd Edition
dialog box. When they return an hour or so later, assuming that Setup has been com-
pleted, they discover the Network Settings dialog box waiting stupidly for them to click
Next and proceed with the remaining 30–50 minutes of the installation.
g. From this point on, Setup takes whatever time it needs to complete the installation. At
the end of the process, Setup reboots your PC and Windows is launched for the first
time. Setup’s final task is to ask your permission to adjust your screen resolution (click
OK), after which the desktop appears with its bright photograph and the Start menu
open for action. You have to wade through Windows asking if you want a tour of the
operating system (just say Yes, or it will never go away) and if you want to set up a
.NET Passport account (for use with Hotmail, Windows Messenger, and an increasing
number of Microsoft-based services). This is your choice entirely.
Caution
Windows starts numbering hard drives with 0 (zero), not 1. The primary hard drive is Disk 0, the second Disk 1,
and so forth. The partition containing C:\, therefore, is almost always located on Disk 0. Keep this in mind when
determining the partition on which to install Windows.
To upgrade from your existing Windows version, assuming that you have the correct Windows
XP edition according to the table, follow these steps:
1. With your current version of Windows running, place the Windows XP installation CD in
the CD-ROM drive.
2. When the Welcome screen appears, click the Install Windows XP option. If the Welcome
screen does not appear on its own, use My Computer or Windows Explorer to navigate to
your CD drive and double-click the Setup program.
3. In a few seconds, the Welcome to Windows Setup screen appears. In the Installation Type
menu, make sure the Upgrade (Recommended) option is selected. Click Next to continue.
4. On the resulting License Agreement screen, click the I Accept This Agreement radio button
and click Next.
5. Follow steps 10(c) through 10(g) in the numbered list under Scenario 1 earlier in this
chapter.
When this process has finished, you have a new version of Windows. Try it out to ensure that
everything works: your programs, especially non-Microsoft programs and older programs, and your
hardware, especially very old or extremely new hardware. In either case, if the items do not function
properly, head for the Web sites of the product manufacturers and download and install patches and
drivers as required.
If you’ve upgraded from Windows 98 or Windows Me, you can upgrade further by changing the
file system from the current FAT or FAT32 to NTFS, the native file system of Windows XP. NTFS
gives you several security advantages over FAT32. You will be able to convert to NTFS anytime after
the installation. Search Windows Help (Winlogo+F1) for “convert FAT to NTFS.”
and Windows 3.1 up through Windows XP itself), by performing a new installation (called a clean
install) instead of an upgrade, you end up with both Windows versions available for use. You must,
however, install each version on a separate hard disk partition; this is one of the reasons I suggest in
step 6 under Scenario 1 that you leave unpartitioned space available for other uses. When you boot
your PC, Microsoft’s boot manager presents you with a list of operating systems to choose from. You
simply move the cursor to the one you want and press Enter to launch it.
Why would anybody want two operating systems or more? First of all, if you enjoy computers,
having two OSs can be just plain fun. More important, if all the software and hardware on your cur-
rent operating system works flawlessly, you can leave that OS in place while you install Windows XP
and get everything up and running equally well on it (anyone with numerous games installed will be
particularly grateful for this because some games work better on older Windows versions). You can
also move to other operating systems if one of them fails to load. Finally, Windows XP creates a new
installation faster than an upgrade installation — in fact, frequently over twice as fast. If you have the
disk space, why not?
As long as you have room on your hard disk for a second partition, creating a dual-boot system is
remarkably easy. Just follow steps 1–6 in the numbered list in Scenario 1. In step 6, choose the
unformatted space item and create a new partition here. Format it as an NTFS partition, and instruct
Setup to install Windows on it. Continue the process until Setup has been completed, and then
reboot to see the Microsoft boot manager screen. Choose the operating system you want to run, pre-
sumably Windows XP, and press Enter to load it.
If you’re reading closely, you’ll note that in the previous upgrade scenario, I said you can convert
from FAT to NTFS anytime. That’s true, and it is appropriate in an upgrade without formatting. In
this case, you’re formatting the partition and might as well use NTFS from the start.
If you have only one partition on your drive, you need to create another. Unfortunately, Windows
Setup will not let you do so, and neither will Windows itself. You can either install a second hard
drive and create the partition on it, or purchase disk-partitioning software such as PowerQuest’s
Partition Magic or V Communications’ Partition Commander. These utilities let you resize a partition
(as long as it’s not completely full of data) in a manner known as nondestructive, meaning that you
lose no data. With your current partition decreased in size, you now have unformatted space to work
with, and you can continue your Windows XP installation at that point.
Note
PCs on which you can boot to two or more operating system installations are typically called dual-boot sys-
tems, but by all rights they should be known as multiboot systems. There’s nothing whatsoever stopping you
from building a PC that allows you to boot into Windows 98, Windows 2000, two installations of Windows XP
Home, three installations of Windows XP Professional, and at least one version of Linux. As long as you have
enough hard disk space, and as long as you’ve created enough partitions, go to it. In fact, having more than
one installation of an OS offers an excellent way to test new hardware and software, especially prerelease
software (beta versions).
Appendix A: Installing Windows XP 501
Order the SP2 CD: Microsoft will ship you (free) a CD with Service Pack 2 on it. In this
case, disconnect your PC from the Internet and install Windows XP; then install SP2
from the new CD. Only then should you connect to the Internet in order to register and
validate your copy of XP. You can order the CD by going to Microsoft’s Windows page
(www.microsoft.com/windows) and following the links to the security page and the Service
Pack downloads. At the time of this writing, the order page was http://www.microsoft.com/
windowsxp/downloads/updates/sp2/cdorder/en_us/default.mspx.
Download SP2 and burn a CD: If you have access to a second PC, preferably one that
already has SP2 installed (or one that runs an OS other than Windows), this method can
work. You can download the SP2 file from the Windows Update site without actually
installing it. Do so, and then burn this 266MB file to a CD. Take the CD to the PC on
which you want to install SP2, perform a virus check on the file, and then launch it by
double-clicking it in My Computer.
Buy a new copy of Windows XP: If you’re financially flush, you might want to purchase a
recently manufactured copy of Windows XP that already contains SP2. Check on the box
to ensure that it does; otherwise, you’re right back where you started. Actually, this method
is a very good one if you plan to upgrade from Windows XP Home to Windows XP
Professional because it gives you everything you need in one package.
Summary
The installation process for Windows XP offers one of the best ways to get to know your way around
computers. If you can put a second partition on your system (ask for two partitions when you order
the system from your vendor), you can repeat the installation as often as you want on the second
502 PC Magazine — Windows XP Solutions, 2nd Edition
partition without affecting the original installation. By doing so, you become experienced at installing
your OS, to the degree that working with the secondary partitions becomes second nature and per-
forming installations for friends and colleagues becomes possible. You also get used to the process of
searching for and installing software patches and hardware drivers, something that, again, gives you
a way of helping others with their system problems.
Do you need to do all this work? No, of course not. Windows XP runs just fine, as you already
know. But enhancing your knowledge of how your system works gives you a set of skills that are not
only helpful to others but also valuable in the employment marketplace. Keep upgrading this knowl-
edge, and you might find yourself taking over IT duties at very small offices (where people routinely
wear multiple hats) or doing training sessions for other employees. Of course, you also end up get-
ting phone calls from friends and neighbors who have managed to mangle their Windows systems to
the point of nonfunctionality, but this, too, can have its rewards. You might, for instance, get the
snow shoveled out of your driveway come winter. It certainly worked for this author.
Appendix B
Reinstalling
Windows XP
S ometimes, the fastest and most effective way to deal with problems in Windows XP is to rein-
stall the operating system. But reinstalling it requires preparation. Performing the actual rein-
stallation isn’t difficult at all — just pop in the CD, let Setup begin, and walk your way through the
steps. But you can save yourself a great deal of time and prevent possible disaster by performing a
number of additional tasks before you begin.
One point here, however. This chapter assumes that you want to reinstall Windows XP and preserve
your existing data. If you want to start over with a completely clean slate and you have no need to save
any current data, your life gets much easier: just pop in the Windows XP installation CD, tell it to refor-
mat your hard drives, and let it do its thing (see Appendix A for details, including what to do about
Service Pack 2). When the purpose of the reinstallation is to come away with a functioning operating
system in which you can make use of your existing data, the task becomes significantly more arduous.
You can perform the reinstallation in one of two ways, depending entirely on your needs and your
intended result:
In-Place Reinstallation: Also called a repair install, this method installs Windows XP
on the same partition and in the same folder as the original, in effect functioning as an
upgrade. In the process, it overwrites numerous folders and files and overwrites the origi-
nal installation. Although it does not necessarily overwrite the Documents and Settings
folder, it creates a new one and can render the old one inaccessible. Have a backup of at
least your data, if not the entire system (see Chapter 4).
Clean Reinstallation: Doing this to a system with a single partition involves wiping that
partition clean; be certain you have a working backup of all your latest data (an external
hard drive is very handy here). An alternative method involves preserving the existing data
on one drive partition and installing Windows XP to a separate partition, but if you don’t
already have these partitions set up, you risk losing any data you haven’t backed up. In
effect, this counts as a reinstallation only because you’re using the same installation CD
and product activation code. Functionally, the method results in a completely new installa-
tion to which you can restore the data stored on the original partition.
503
504 PC Magazine — Windows XP Solutions, 2nd Edition
For the best performance results, choose a clean reinstallation by formatting the hard drive. You
will lose everything on that drive (that’s what makes it “clean”). Before you begin, see Chapter 4 on
backups and make certain you have tested restoring data from that backup; this is a case where a full
backup of the entire computer may make sense.
Caution
If you have installed Windows XP service packs, you might have difficulties with compatibility if you perform
an in-place reinstallation with the original (pre-service pack) CD. If you purchased Windows XP recently, the
installation CD likely already contains the most recent service pack(s).
However, if you don’t have Service Pack 2 on CD, you may want to order it before you proceed with this chap-
ter (see Chapter 1 about SP 2). Having the SP2 CD (or a copy of XP so new that it has SP2 included) will save
you a lot of time you will otherwise spend at the Windows Update Web site.
Caution
Do not reinstall Windows XP to correct problems with third-party programs, Documents and Settings folders,
or other data locations. In the case of programs, uninstall them and reinstall them, using the Add or Remove
Programs utility in the Control Panel. In the case of problems with a user’s folders in Documents and Settings,
create a new account with a similar name (acceptable to the user), copy the old files and folders to the new
account’s folders, and see if the problems continue. If not, you can then delete the original account, reboot,
create a new account with the original name, and copy the files and folders into that account.
In-place reinstalls come in two forms: Update and Repair. Of these two, Update is the most
straightforward because it installs from inside Windows (that is, Windows must be working at least
well enough to allow you to perform tasks in it). But in both, the principle is the same.
Note
You cannot perform a reinstallation from Safe Mode.
Appendix B: Reinstalling Windows XP 505
1. If you can access your folders, back up all important files and folders to another hard
drive, another partition on your main Windows hard drive, a network drive, or removable
media such as CD, DVD, tape, or floppy disks.
2. If you can access Add or Remove Programs, for maximum compatibility consider removing
any Windows XP service packs you have installed. You can find these service packs in the
Add or Remove Programs utility in the Control Panel. Scroll toward the bottom of the list
until you see Windows XP Hotfixes with an SP1 or SP3 in parentheses. Uninstalling the
service pack elements can help but doing so takes a long time.
3. Place your Windows XP installation CD in your CD or DVD drive and wait for the opening
screen. Choose the Install Windows XP option.
Caution
If you have installed the Linux operating system on your computer in a dual-boot or multiboot arrangement, and
you use one of the two Linux bootloader programs — LILO or GRUB — to select your operating system when
your PC boots, you have an additional consideration. Installing Windows XP deletes the Linux bootloader and
renders Linux inaccessible unless you’ve made a boot floppy for your Linux installation. If you do not have such
a disk, stop the installation, boot into Linux, use its utilities to create a boot floppy, and then continue reinstalling
Windows. After installing Windows, you’ll have to restore the Linux bootloader using the boot floppy.
4. Wait for the second installation screen to appear (it can take several seconds), and choose
the Upgrade option in the Installation Type drop-down menu. Click Next to continue, and
follow the Setup Wizard from here. Within 30–60 minutes, you have replaced Windows.
5. Spend some time with your PC to ensure that everything works: Documents and Settings
files, programs, and so on. One thing you do lose with any such upgrade is the capability
to use the restore points you established with the System Restore utility. You can, however,
start creating new restore points immediately (indeed, Windows already has).
6. Before performing any other functions, install your antivirus software, and then to ensure
maximum security, install SP2 from the CD. Once you have SP2 safely installed, you can
launch Windows Update (see Chapter 5) to install all other critical and optional updates.
Caution
Remember, you run a considerable security risk if you go online with your newly reinstalled Windows XP
before you have installed SP2. And your safest bet for installing SP2 is to order the free CD from Microsoft
and install from the CD. In the time it takes to install and run Windows XP the first time, download SP2, and
perform the upgrade, your PC can be hacked to the extent that you end up with a compromised system even
with SP2 installed.
506 PC Magazine — Windows XP Solutions, 2nd Edition
1. Turn on your computer and immediately insert the Windows XP Installation CD into the
CD or DVD drive. Wait for the Welcome to Setup screen to appear in all its white-text-on-
blue-background, old-style glory.
2. Select the To Set Up Windows XP Now, Press ENTER option by pressing the Enter key.
Caution
Even though you’re performing a Repair Install, do not select the To Repair a Windows XP Installation using
Recovery Console, press R option. The Recovery Console offers specialized tools for various types of repair,
and it won’t help you here.
3. At the subsequent screen (the End-User License Agreement), press the F8 key.
4. At this stage, Setup searches for existing installations of Windows XP. When it locates your
installation (the one that no longer works properly), it identifies it by the hard drive letter
and primary folder (usually C:\WINDOWS). If you have more than one installation on a
dual-boot or multiboot drive, choose the one you want to repair by using the arrow keys
to scroll the list. If Windows does not find an existing version, continuing the installation
will destroy all the files on the selected hard disk. Be careful.
5. When you’ve selected the installation you want to fix, press R. Windows begins copying
files, and you can sit back and watch the reinstallation take place, entering the CD key
when required, along with other interactions.
6. When Windows completes its tasks, and before performing any other functions, install
SP2, then install your antivirus software and then launch Windows Update (see Chapter 5)
to install the latest service packs and all other critical and optional updates.
7. Test your reinstalled Windows.
One thing you’ll notice immediately when you reinstall: Windows runs more smoothly, snaps to
attention, and loads far more quickly. The trick then is to avoid installing everything you put on the
last version, leaving yourself with a less cluttered system in general.
Tip
Reinstallation is useful in a related way. If you have two good-sized hard drive partitions (20–30GB each),
why not install Windows XP twice, once on each partition (Appendix A covers the details surrounding dual-
booting or multibooting)? This way, you can establish one installation as a work version and the other as
more of an entertainment version. Not only do you keep some tempting entertainment programs away from
yourself when you’re working, but you also have a place to test programs without committing them to the pri-
mary version.
Note
Like all good computers, Windows starts numbering at 0 (zero), not 1. The primary partition, C:, is located on
Disk 0, not Disk 1. If you’ve traveled to England and used their elevators — uh, lifts — you’ll feel quite at home
with this numbering system.
Ideally, you’ll have enough free space (roughly 15–20GB minimum, although you actually need
less) for a fresh XP installation. If you own a disk-partitioning package such as PowerQuest’s
Partition Magic or V Communications’ Partition Commander, you can resize the current partitions to
create this space. Otherwise, you’ll have to delete — or at least reformat — a current partition to cre-
ate the necessary room. If you have only one partition, you cannot use the clean reinstallation
method without also wiping out data, which you can restore from a backup after the clean installa-
tion. The best arrangement is to buy and install a second hard drive (external USB will work great).
A second hard drive automatically gives you another.
508 PC Magazine — Windows XP Solutions, 2nd Edition
1. Turn on your computer, and immediately insert the Windows XP Installation CD into the
CD or DVD drive. Wait for the Welcome to Setup screen to appear.
2. Select the To Set Up Windows XP Now, Press ENTER option by pressing the Enter key.
3. At the subsequent screen (the End-User License Agreement), press the F8 key.
4. At this stage, Setup searches for existing installations of Windows XP. When it locates your
installation (the one that no longer works properly), it identifies it by the hard drive letter
and primary folder (usually C:\WINDOWS). Because you want a clean reinstallation,
however, ignore the first bullet point, which refers to repairing the selected installation,
and choose the To Continue Installing a Fresh Copy of Windows XP Without Repairing,
Press ESC option. After pressing the Escape key, Windows proceeds with the installation,
as covered in Appendix A. Your primary step is to ensure that you choose the correct
partition on which to locate the installation. Again, see Appendix A for details.
5. When Windows completes its tasks, before performing any other functions, install SP2
from CD, then install your antivirus software, and then launch Windows Update (see
Chapter 5) to install the latest service packs and all other critical and optional updates.
6. Test your reinstalled Windows program.
Product Activation
When you install Windows XP, you must activate it using Microsoft’s anti-piracy technology: Product
Activation. If you reformat the hard drive and reinstall Windows, you must activate it again. If you
reinstall it on a drive you have not formatted, you need to reactivate it only if you have changed
numerous other hardware components of your system.
Windows examines 10 different hardware components, ranging from the CPU to hard drives to
network and video cards, and creates a unique identifier for your machine upon activation. If you
change the hardware components significantly and reinstall Windows, you will need to reactivate it.
The term significantly means changing 6 of the 10 hardware items, although even this isn’t strictly
adhered to. Furthermore, you can change any single component as often as you want, and it still
counts as only one change.
On reinstallation, if you require reactivation, try to do so over the Internet. If your request is con-
fused, the Product Activation Wizard provides a telephone number along with a lengthy numeric
code. Call the number, and punch in the code when so instructed by the automated attendant. In the
vast majority of cases, the activation will proceed without incident. If not, and if you do, in fact, have
a pirated version of Windows XP, you will probably have to buy a legal copy.
510 PC Magazine — Windows XP Solutions, 2nd Edition
Tip
Windows XP stores its activation database file, wpa.dbl, as well as its counterpart, wpa.bak, in the folder
c:\windows\system32. You can avoid reactivation when reinstalling Windows on the same PC by copying
these two files to a disk, performing the reinstallation, navigating to c:\windows\system32, copying the
copied files over the new files, and then rebooting.
Summary
Reinstalling Windows is sometimes necessary, sometimes just a good idea, and always time-
consuming. But as long as you plan your reinstallation, you should experience a minimum of difficul-
ties. Moreover, once you’ve completed the task once, the next time you’ll find it considerably easier and
almost completely stress-free (or as much as anything computer-related can be). In subsequent rein-
stallations, simply keep in mind that your two purposes are a Windows installation that works the way
it should and full access to all the programs and data files you had on your system before.
Index
A antivirus utilities, 21–24, 47–48
Application Data folder, 400
AAC files, 223–225
ASF (Advanced System Format), 182
access points, 460–462
ATRAC files, 225
accessibility options
audio tracks and Windows Movie Maker, 193
Accessibility Wizard, 315–322
Automated System Recovery Wizard, 95–96
administrative options, 322
automatic caching
for blindness or difficulty seeing things on screen,
of documents, 421, 422
316–317
of programs, 422
BounceKeys, 321
automatic installations, 346, 348
Control Panel, 315
automatic Internet connections, 118–119
for deafness or difficulty hearing sounds on
automatic program loads, changing, 381–383
computer, 317–318
automatic updates, 3, 70, 73–74
display settings, 316
AVI (Audio Video Interleaved), 182
extra keyboard help option, 321
FilterKeys, 321
for input devices, 318–322 B
keyboard options, 318–321 background applications, shutting down, 387
mouse options, 322 backgrounds
overview, 315–316 Center option, 244
SlowKeys, 321 customization of, 241–246
StickyKeys, 320–321 disappearance of background image, preventing, 246
text size, 315 Display Properties used to choose, 242–245
ToggleKeys, 321 images for, choosing your own, 245
Accessibility Wizard, 315–322 overview, 241
account utilities, 452 photo program, acquiring background image
ActiveX installations, 345 from, 245
Add or Remove Programs utility used for software previewing, 243
removal, 350–351 Stretch option, 244
additional programs installed by Kazaa, 42 Tile option, 243–244
ad-hoc networks, 459 Web, acquiring background image from, 245
administrative options, 322 Backup Operators group, 407
Administrators group, 407 Backup Utility
Advanced Appearance dialog box, 242–255 Automated System Recovery Wizard, 95–96
Advanced Attributes dialog box used to compress copy only backup, 61
folders, 303 daily backup, 61
Advanced System Format (ASF), 182 differential backup, 61
adware, 33–40 incremental backup, 61
AIFF files, 221 installation, 59
alerts, 12 normal backup, 61
Allow permissions, 420 options for, 59–62
alternative browser utilities, 161–162 overview, 59
anti-spyware utilities, 35–40, 48–49 using, 59–63
511
512 Index
Internet download areas, driver obtained from, 361 installation. See also hardware installation; software
mainboard, 363 installation
manufacturer, driver obtained from, 361 Backup Utility, 59
motherboard, 363 of Group Policy Editor, 439–440
overview, 359–361 Norton AntiVirus (NAV), 25
RAM modules, 363 PowerToys, 323
surge suppressors, 362 of security patches, 75
uninterruptible power supply (UPS), 362 of Service Pack 2 (SP2), 5–6
Windows XP, driver obtained from, 361 installation of Windows XP
Help and Support utility, 268 dual-boot system, 493–494, 499–500
hibernation mode, 388 formatting hard drive, 496
hierarchy of group policies, 445–446 Linux, on system with, 493–494
high priority updates, 70 multiple-drive PC with new primary drive,
highlighting new programs on Start menu, removing, 344 installation on, 498
high-speed access, 110 new computer or hard drive, installation on,
History list, controlling, 139 495–498
home directory, 485 overview, 493
host computer, 148 partitioning hard drive, 495–496
Hotmail account used with Outlook Express (OE), 128 primary boot device, setting Windows XP
HTML Slide Show Wizard, 330 installation CD as, 494
HTTP (HyperText Transfer Protocol) services, scenarios for, 495–500
installation of, 477 Service Pack 2 and, 501
hybrid wired/wireless networks, 462 upgrading a previous Windows version, 498–499
interface elements, 254–256
I internal devices
icon-free desktop, 257–258 installation of, 362–364
icons upgrading, 385
arranging, 258–259 Internet connection
automatic program loads, icons for, 382 automatic connections, 118–119
in Taskbar, hiding, 287 BPL access, 112
ICQ chat sessions, erasing, 40 broadband access, 110
identity theft, 141 broadband wireless access, 111
IE. See Internet Explorer cable access, 110–111, 117
IIS (Internet Information Services), installation of, cost of, 112
476–477 dialup connection, 109–110, 113–114
images. See also pictures DSL connection, 110, 114–117
for backgrounds, choosing your own, 245 high-speed access, 110
scanning, 176–178 IP addresses, 109
IMAP (Internet Message Access Protocol), 476 methods for, 109–112
incremental backup, 61 OC3 access, 111
.inf files, installing programs from, 344 overview, 109
infrastructure networks, 460–462 proxy servers, 119
in-place reinstallation, 503, 504–506 registry and, 119–121
input devices, 318–322 routers and, 116–118, 467–469
continued
518 Index
Norton AntiVirus (NAV) continued Save copy of sent messages in the “Sent Items”
Manual Scan feature, 30 folder option, 129
Options dialog box, 29–31 Send and receive messages at startup option, 129
overview, 24–26, 47 Send messages immediately option, 130
Script Blocking feature, 30 Service Pack 2 (SP2), improvements with, 8
Threat Detection Categories dialog box, 31 settings, 129–130
Trojan horse protection, 30, 31 Store Folder option, 130
Norton CleanSweep used for software removal, 352–353
Norton Ghost, 104–105 P
notebooks paging files, 93–95
power cord use for notebook PC and parasitic viruses, 18
pre-installation of Service Pack 2 (SP2), 5 partitioning hard drive, 495–496
single-click interface and, 305 passwords
with wireless adapter, 470–474 adding, 398–399
ntbtlog.txt file, 91 changing, 405–406
number of users, limiting, 419–422 Computer Management tool and, 405–406
NVIDIA configuration options, 261–262 customization of Windows XP, 239
expiration of, 405
O options for, 405–406
Object Desktop, 333 policies, 446–448
OC3 access, 111 utilities, 163, 451–452
OCR software and digital scanners, 178–179 peer-to-peer networks, 456–457, 475–476
OE. See Outlook Express persistent cookies, 139
old Windows Start menu, reverting to, 270, 311–312 photo editors/graphics programs, 231–232
organizational unit policy, 445 photo program, acquiring background image from, 245
Outlook Express (OE) pictures
Block images and other external content in HTML editing pictures, 172–173
email option, 130 filenames associated with pictures, 169
Check for new messages every xx minutes Microsoft Office Picture Manager used to edit
option, 129 pictures, 173
configuring, 129–130 Microsoft Paint used to edit pictures, 172
downloads, protection from, 8 Photo Editor used to edit pictures, 173
Empty messages from “Deleted Items” folder on printing pictures, 174
exit option, 130 publishing pictures, 175–176
Fonts option, 129 third-party software for working with photographs,
Get Digital ID option, 130 179–180
Hotmail account used with, 128 transferring pictures from camera to computer,
Identities feature, 127–128 169–171
Make Default option, 129 viewing pictures, 168–170
MSN account used with, 128 ping, 134
new identity, setting up, 127 Pinned Items List, 268–269
newsgroups and, 130–132 playing music, 210–225
Options dialog box, 129–130 playlists, 218–219, 227–228
overview, 126–127 Point-to-Point Protocol over Ethernet (PPPoE), 467
Receipts option, 129 policy on remote control, 158
Index 521
polymorphic viruses, 20
R
POP3 (Post Office Protocol 3), 476
radio interference and wireless networks, 461
popups, blocking, 8, 137–138
RAM modules, 363
port numbers, 484
Read permissions, 420
Power Users group, 408
RealAudio files, 223
PowerToys
RealPlayer, 232
CD Slide Show Generator, 330
recent documents, erasing information on, 40
HTML Slide Show Wizard, 330
recent documents list, disabling, 272
Image Resizer, 330
Recycle Bin, 63–65
installation, 323
Regedit, 119, 391–392
Open Command Window Here, 330
region and language setting collected by Windows
overview, 323
Update, 69
Power Calculator, 330
registry
Taskbar Magnifier, 330
backups, 85
Tweak UI, 323–329
editing, 85
Virtual Desktop Manager, 330
and Internet connection, 119–121
Webcam Timershot, 330
Registry Editor, 269
PPPoE (Point-to-Point Protocol over Ethernet), 467
reinstallation of Windows XP
primary boot device, setting Windows XP installation
clean reinstallation, 503–504, 506–509
CD as, 494
in-place reinstallation, 503, 504–506
Printers and Faxes folder, 268
overview, 503–504
PrintHood folder, 400
Product Activation, 500
privacy
repair install, 503, 504–506
and Internet Explorer (IE) version 6, 138–143
Remote Assistance
Simple File Sharing and privacy levels, 414–415
through firewalls, 155
Windows Update and, 68–69
multiple monitors and, 158
private key, 97
through NAT devices, 155–157
Product Activation, 500
overview, 152–153
product identification collected by Windows
policy on remote control and, 158
Update, 69
Remote Desktop compared, 147
product key collected by Windows Update, 69
starting, 154
program associations in IE, changing, 143–146
using, 153–154
program virus, 18
Remote Desktop
programs and drivers, preparation for reinstalling, 508
Bitmap caching option, 150
protected files and folders, gaining access to, 423–425
client computer, 149
proxy servers
controlling computer, 148
bypassing, 142
customization of, 150–151
and Internet connection, 119
Desktop background option, 150
public key, 97
through firewalls, 155
pulling content, 186
host computer, 148
pushing content, 186
Linux, accessing Remote Desktop from, 151
Menu and window animation option, 150
Q multiple monitors and, 158
QuickTime, 183, 223, 232 continued
522 Index