Windows 10 Inside Out 3Rd Edition (Ebook PDF) : - Click The Link Below To Download
Windows 10 Inside Out 3Rd Edition (Ebook PDF) : - Click The Link Below To Download
https://ebookluna.com/product/ebook-pdf-new-perspectives-microsoft-
windows-10-introductory-wire-stitched/
ebookluna.com
https://ebookluna.com/download/sql-server-2022-administration-inside-
out-ebook-pdf/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-inside-reporting-3rd-edition-
by-tim-harrower/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-understanding-icd-10-cm-and-
icd-10-pcs-a-worktext-2020-5th-edition/
ebookluna.com
Progress in Heterocyclic Chemistry Volume 29 1st Edition -
eBook PDF
https://ebookluna.com/download/progress-in-heterocyclic-chemistry-
ebook-pdf/
ebookluna.com
https://ebookluna.com/product/tableau-10-complete-reference-ebook-pdf/
ebookluna.com
https://ebookluna.com/download/hands-on-microsoft-windows-
server-2019-mindtap-course-list-ebook-pdf/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-translational-medicine-in-cns-
drug-development-volume-29/
ebookluna.com
https://ebookluna.com/product/ebook-pdf-starting-out-with-java-from-
control-structures-through-data-structures-3rd-edition/
ebookluna.com
Part I
Chapter 1
Chapter 2
PC hardware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Before you start
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Acknowledgments
Cloud connections
The app landscape
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The user experience
Activating Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security and privacy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows as a service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows core features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Who this book is for
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How Windows 10 Setup works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performing a clean install
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Do you need a product key?
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Back up your data and settings
Chapter 3
Chapter 4
Table of Contents
Switching tasks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with fonts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting colors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating Windows 10
Overcoming challenges
Choosing a screen saver
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Settings vs. Control Panel
Moving the taskbar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting pen options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing mouse pointers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing the visual appearance
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Switching between virtual desktops
Pinning people to the taskbar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding toolbars to the taskbar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using and customizing Action Center
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pinning programs to the taskbar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Making other small visual tweaks
Customizing the notification area
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting the desktop background
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a keyboard and mouse in Windows 10
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the order of taskbar buttons
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewing, revisiting, resuming with Timeline
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An overview of the Windows 10 user experience
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the taskbar’s size and appearance
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Taming your mouse or other pointing device
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the taskbar with multiple displays
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing the lock screen and sign-in screen
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting date and time, currency, and other regional options
Using font smoothing to make text easier on the eyes
. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Jump Lists for quick access to documents and folders
. . . . . . . . . . . . . . . . . . . . . .
Personalizing Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Chapter 7
Chapter 5
Chapter 6
Using Maps
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using OneNote
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Skype
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling an app
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Buying an app
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Reviewing history
What’s in a modern app
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Turning Windows features on or off
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and using Calendar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching for places and services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing permissions and other settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choosing how updates are installed
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What you get from Windows Update
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Suspending or removing startup items
Fine-tuning network bandwidth usage
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding or editing contacts with People
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An overview of how Windows 10 update works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terminating a program with Task Manager
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning a program to a specific processor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding technical information about updates
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting default programs and file-type associations
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding detailed information about a program
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing programs and processes with Task Manager
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing, running, and managing desktop applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a nondefault program on a case-by-case basis
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Running desktop applications as an administrator or another user
. . . . . . . . . . . . . .
.
Table of Contents
221
220
220
218
216
216
213
208
208
203
202
201
197
194
193
192
191
190
189
188
186
184
182
182
181
180
178
176
175
173
165
162
158
152
149
147
Managing updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
ix
Chapter 8
Chapter 9
Table of Contents
Music
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using tabs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using libraries
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing with favorites
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Essential customizations
Photos and videos
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing favorites
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending Microsoft Edge
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Privacy and security issues
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Projecting to another screen
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protecting your privacy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing photos with Paint
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating albums and video projects
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xbox and other forms of online entertainment
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the reading list to save links for later
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What’s what (and where) in your user profile
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting media autoplay permissions globally
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing and securing your web credentials
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Photos app to crop and edit pictures
. . . . . . . . . . . . . . . . . . . . . . . . .
Organizing personal data with user profile folders and libraries
. . . . . . . . . . . . . . . . . . . . . . .
Performing screen captures with Snipping Tool and shortcut keys
. . . . . . . . . . . . . . . . . . . .
Managing and troubleshooting add-ons in Internet Explorer
. . . . . . . . . . . . . . . . . . .
289
289
284
284
303
301
298
298
Storage and file management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
293
292
283
281
279
276
Revisiting sites with Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
275
275
272
265
264
262
262
Microsoft Edge and Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
261
261
260
259
259
259
258
253
257
257
251
249
247
244
239
235
227
226
225
225
223
Chapter 10
Managing disk space
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows search
Mastering File Explorer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Shrinking a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching from File Explorer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Purging the Recycle Bin
Filtering folder contents
Syncing files and folders
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with virtual hard disks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Grouping folder contents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restoring files and folders
Sorting a folder’s contents
Using the navigation pane
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cleaning up unneeded files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching for item properties
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What you can do with Cortana
.
Searching by item type or kind
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and using OneDrive
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing existing disks and volumes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using compressed (zipped) folders
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning and changing drive letters
Mapping a volume to an NTFS folder
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Saving searches and clearing search history
Assigning or changing a volume label
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using OneDrive to store, sync, and share files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Permanently wiping all data from a disk
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using multiple criteria for complex searches
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating faster with Quick Access shortcuts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using wildcards and character-mode searches
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How OneDrive and OneDrive for Business work
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recovering lost, damaged, and deleted files and folders
Layouts, previews, and other ways to arrange files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents
379
378
377
377
375
375
374
373
370
365
Monitoring the index and tuning indexer performance . . . . . . . . . . . . . . . . . . . . . . . . .363
361
360
359
358
355
349
Cortana and Windows search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
345
344
342
340
340
340
338
338
341
341
337
337
335
333
332
328
328
326
326
325
324
322
320
318
314
313
312
308
306
306
xi
xii
Part III
Chapter 11
Chapter 12
Chapter 13
Table of Contents
Systeminfo
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a PIN
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wireless security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Hotspot 2.0
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Information
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting an account
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a picture password
Choosing an account type
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Services console
Sharing your PC with other users
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing account settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding a user to your computer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows Hello for biometric sign-ins
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mobile hotspots and other metered connections
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring power options from the command line
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Signing out, switching accounts, or locking your computer
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Resource Monitor to pinpoint performance problems
. . . . . . . . . . . . . . . . . . . . . . . . .
.
Windows Management Instrumentation command-line utility
. . . . . . . . . . . . . . . . .
468
465
464
461
449
447
446
Windows networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
444
428
459
426
426
424
423
422
420
Performance and power management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
457
451
439
437
433
432
428
415
414
410
410
408
406
405
404
403
402
401
400
398
395
393
392
386
384
Managing user accounts, passwords, and credentials . . . . . . . . . . . . . . 383
Managing Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Chapter 14
Night Light
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing USB devices
Sharing a printer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Printers and print queues
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling a driver
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Storage Spaces
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Setting up Bluetooth devices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling and disabling devices
Network troubleshooting tools
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting TCP/IP problems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Updating a device driver manually
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Disabling automatic driver updates
Using Remote Desktop Connection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with mapped network folders
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rolling back to a previous driver version
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing hard disks and other storage devices
Installing Remote Desktop client software
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing disks from the command prompt
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding, configuring, and removing hardware devices
Enabling inbound remote desktop connections
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How device drivers and hardware work together
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting useful information from Device Manager
Connecting to another computer with Remote Desktop
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding and using shared resources on a Windows network
. . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding sharing and security models in Windows
. . . . . . . . . . . . . . . . . . . . . . .
Sharing files, printers, and other resources over a local network
. . . . . . . . . . . . . . . . . . . . . .
Transferring pictures, links, and other items between nearby devices
. . . . . . . . . . . . . . . . .
Table of Contents
520
519
485
483
482
481
477
473
472
472
468
551
550
549
547
544
544
517
516
515
510
Hardware and devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
541
540
535
533
532
528
524
524
531
521
520
507
506
505
497
496
495
495
493
489
491
471
xiii
xiv
Part IV
Chapter 15
Chapter 16
Table of Contents
.
Event Viewer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Memory
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Networking
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up Hyper-V
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Types of events
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with Stop errors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Built-in troubleshooters
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows Error Reporting
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Feedback and diagnostics
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using enhanced session mode
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and using System Restore
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automatic start and stop actions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing settings for a virtual machine
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Isolating the cause of a Stop error
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fine-tuning virtual memory usage
Creating and managing virtual machines
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows 10 backup and recovery options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding, removing, and adjusting virtual disks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with event logs on a remote computer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with Virtual Machine Connection windows
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Reset option to recover from serious problems
. . . . . . . . . . . . . . . . . . . . . . .
Customizing the presentation of tabular data in Event Viewer
. . . . . . . . . . . . . . . . . .
643
640
640
640
635
633
622
Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
For IT professionals and Windows experts . . . . . . . . . . . . . . . . . . . . . 605
560
631
624
621
619
618
617
616
614
612
611
608
602
600
593
591
582
581
578
575
572
571
569
Customizing how Windows handles Stop errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567
567
567
566
565
563
562
559
558
556
555
555
Troubleshooting, backup, and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Chapter 18
Managing apps
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking malware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Securing data
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Intune
Securing devices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Encrypting information
Alternatives to Hyper-V
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking malware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Securing identities
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with checkpoints
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring privacy options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using shared PC mode
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying UAC settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up a kiosk device
Changing policy settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restoring default settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with UAC prompts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What triggers UAC prompts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing the browsing experience
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with detected threats
Securing apps with AppLocker
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
New security features in Windows 10
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring your computer’s security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manually scanning for malware
Using Local Group Policy Editor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing special-purpose computers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Encrypting File System
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing, exporting, and moving VMs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing computers with Group Policy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows Defender Antivirus
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Windows Defender Firewall
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Management tools for enterprise deployments
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking intruders with Windows Defender Firewall
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing app distribution in an organization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Center Configuration Manager (SCCM)
696
Encrypting with BitLocker and BitLocker To Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .694
694
692
692
689
688
687
686
686
686
685
684
683
681
679
677
676
675
671
670
669
669
668
668
665
Windows security and privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
662
661
661
658
658
649
648
646
657
657
657
657
657
656
655
654
652
651
Managing business PCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
xv
Visit https://ebookluna.com
now to explore a diverse
collection of ebooks available
in formats like PDF, EPUB, and
MOBI, compatible with all
devices. Don’t miss the chance
to enjoy exciting offers and
quickly download high-quality
materials in just a few simple
steps!
xvi
Part V
Chapter 19
Chapter 20
Table of Contents
Storage
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Home
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Enterprise
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating tasks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mobile connectivity
Microsoft 365
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Task Scheduler
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing battery life
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Retail and OEM editions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editions for organizations
Starting PowerShell
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enterprise E3 and E5
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro for Workstations
Enterprise LTSB/LTSC
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registry virtualization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing the Windows registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using command symbols
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing the command line
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows 10 and your mobile phone
Registry values and data types
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Microsoft Management Console
Running with elevated privileges
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working in a Command Prompt session
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An introduction to Windows PowerShell
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding additional PowerShell resources
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing and editing with Registry Editor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating registry changes with .reg files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating tasks with Windows Script Host
Understanding the Registry Editor hierarchy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Backing up and restoring parts of the registry
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Monitoring long-term battery life and capacity
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting Command Prompt at a particular folder
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting Command Prompt and running a command
. . . . . . . . . . . . . . . . . . . . . . . .
Using AutoRun to execute commands when Command Prompt starts
. . . . . . . . . .
756
756
756
753
753
755
755
755
754
752
Appendix A Windows 10 editions and licensing options . . . . . . . . . . . . . . . . . . . . . . . . 751
Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
747
746
699
744
743
742
739
Maximizing productivity on a portable PC . . . . . . . . . . . . . . . . . . . . . . . . 739
736
736
735
735
735
734
731
729
728
726
724
723
722
719
708
707
706
703
703
702
702
702
701
701
PowerShell and other advanced management tools . . . . . . . . . . . . . . . . 699
Online help
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Education
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro Education
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Docs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TechNet forums
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Windows roadmap
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting technical support
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Community
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft IT Pro Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Knowledge Base
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editions for educational institutions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Joining the Windows Insider Program
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Online reference material from Microsoft
How the Windows Insider Program works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Free and paid support from Microsoft
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Keeping track of what’s in each preview build
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
779
782
777
777
777
781
780
778
778
778
771
Appendix C Help and support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
768
767
761
759
Appendix B The Windows Insider Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
758
757
757
xvii
About the authors
Ed Bott is an award-winning author and technology journalist who has been researching and
writing about Windows and PC technology, in print and on the internet, for more than two
decades. He has written more than 30 books, all on Windows and Microsoft Office, which in
turn have been translated into dozens of languages and been read worldwide. You can catch up
with Ed’s latest opinions and get hands-on advice at The Ed Bott Report on ZDNet (zdnet.com/
blog/bott). You can also follow his lively and occasionally irreverent Twitter feed (@edbott). Ed
and his wife, Judy, live in northern New Mexico with an adorable English Springer spaniel, Lucy,
who was adopted with the help of English Springer Rescue America (springerrescue.org). She
makes several cameo appearances in this book.
Craig Stinson, an industry journalist since 1981, was editor of Softalk for the IBM Personal
Computer, one of the earliest IBM-PC magazines. He is the author or coauthor of numerous
books about Windows and Microsoft Excel. Craig is an amateur musician and reformed music
critic, having reviewed classical music for various newspapers and trade publications, including
Billboard, the Boston Globe, the Christian Science Monitor, and Musical America. He lives in
Bloomington, Indiana.
xix
Introduction
Microsoft Windows has been around for more than three decades. During that time, it has
grown to become a mainstay of business and personal computing, running on some 1.5 billion
devices worldwide.
The authors of this book began working together in 2001 with the very first title in the Inside
Out series, covering Windows XP. Like many of you, we took a break a few years ago, watching
from the sidelines as Microsoft released Windows 8 and Windows 8.1. We returned for Windows
10 because, quite frankly, we were excited by the possibilities of “Windows as a service.” As we
predicted in the first edition of this book, published shortly after the initial release of Windows
10 in 2015, Windows 10 is evolving rapidly.
That evolution has been a key part of our experience over the past three years, as we researched
and wrote what turned out to be a very significant revision to the original edition and then did a
series of ebook-only updates. This third edition incorporates all that learning and covers the two
editions of Windows 10 released in 2018.
One bedrock fact we’ve discovered over the past three years is that the core features of Win-
dows 10 are familiar and change very slowly. The fundamentals of NTFS security and the reg-
istry, for example, have remained reassuringly consistent throughout many generations of
Windows. But there’s also plenty that’s new in Windows 10, some of it obvious (the new Start
experience) and some not so obvious (Windows Hello).
The challenge of writing a book like this one is that Microsoft keeps updating Windows 10,
releasing new features twice each year instead of every few years, as in the past. To our great
relief, we’ve found that most of the changes in these semi-annual Windows 10 feature updates
are evolutionary, not revolutionary. You might notice small changes in a dialog box or in the
appearance of a feature, but its fundamental workings remain the same as before. Our goal in
this edition is to help you accomplish those familiar tasks using a new set of tools.
xxi
xxii Introduction
Whether you’ve been working with Windows for a few years or a quarter-century, we expect
that you’re comfortable finding your way around the desktop, launching programs, using copy
and paste operations, and finding information in a web browser. We don’t assume that you’re a
hardware tinkerer, hacker, hardcore gamer, or developer.
Part II, “Productivity,” covers the essentials of using and managing Universal Windows Platform
(UWP) apps and desktop programs, with details on built-in productivity tools (including Mail)
and entertainment apps. This section also introduces Microsoft Edge, the new default web
browser. In this section, we explain how to organize your personal data using local drives and
the built-in OneDrive cloud storage service. Finally, we explain how to find those files as well
as answers from the internet, when you need them, using Cortana and Windows 10’s powerful
search tools.
Part III, “Managing Windows 10,” starts with a detailed guide to keeping your user accounts
and devices secure. Additional chapters cover routine maintenance tasks and explore tools and
techniques for measuring and improving your computer’s performance, keeping your network
connections fast and secure, and configuring hardware. The section closes with advice on how
to back up your important files, how to recover quickly from problems, and how to trouble-
shoot issues when they arise.
Part IV, “For IT professionals and Windows experts,” leads off with a chapter about Hyper-V, a
powerful virtualization platform built into Windows 10 Pro and Enterprise editions. Additional
chapters cover advanced tools for managing business networks and the Windows 10 devices
connected to those networks. Windows 10 security gets its own in-depth chapter, and we close
with a look at the unique features available for mobile computing.,
Finally, we provide three appendixes of reference information: a concise look at the differences
between Windows 10 editions, a hands-on guide to the Windows Insider Program, and an over-
view of help and support resources.
Introduction xxiii
Acknowledgments
For this edition we’re once again fortunate to have an expert production team led by Loretta
Yates. Proofreader Karen Davis, compositor Tricia Bronkella, and indexer Cheryl Lenser were
invaluable additions to our team, asking the right questions and offering excellent suggestions
to help smooth away our rough edges. And, as usual, they made it all happen quickly and effi-
ciently, despite all the curveballs that the crazy fast “Windows as a service” development pace
threw our way.
They were joined by a very special team member, Carl Siechert, who was our co-author on every
previous edition but put on the technical editor’s hat for this revision. It was a perfect fit.
And we’ve saved a special tip of the hat to our longtime colleagues Rick and Charlotte Kughen.
This book would never have gotten into your hands without their production magic.
MicrosoftPressStore.com/ Win10InsideOut/errata
If you discover an error that is not already listed, please submit it to us at the same page.
If you need additional support, email Microsoft Press Book Support at:
Please note that product support for Microsoft software and hardware is not offered
through the previous addresses. For help with Microsoft software or hardware, go to
https://support.microsoft.com.
Other documents randomly have
different content
Erection, 130, 131
Eroticism, 272, 332, 333
“Eternal seekers,” 164
“Ethical” will, 337
Etiology, 15, 42
Eulenburg, 281
Eunuchoid, 24
Euripides, 273
Excess of morality, 218
Excitement, 167
Experience, 241, 334, 344
Exposition of Ps.-A. (in dream), 211
Hallucination, 298
Hatred, 152, 233, 263, 273, 285, 300
Havelock Ellis, 20, 22, 27, 56
Healing, 326
Hebbel, 46
Heredity, 13, 20, 29, 32, 42,331, 338
Hermaphroditism, 25, 41
Heterosexual capacity, 175
excitation, 271
longing, 213
period, 291
persons, 223
stimuli, 312
Hirschfeld, 12, 17, 20, 22, 23, 25, 27, 30, 34, 36, 41, 61, 69, 70, 79, 81, 89,
186, 191, 245, 253, 256, 260, 261, 289, 308, 338, 339 passim, 346
Homage, 268
“Homosexual marriage,” 293
House symbolism, 326
Hypnotism, 168, 192
Hypothesis, 35
Hunger, 215, 216
Magic, 221
Male attitude, 296
protest, 335
hero type, 26, 27, 242
Manipulatio cum digito, 87
Mannerism, 94, 95
“Mannish” women, 24
Manual gratification, 123, 135, 257
Marriage, 89, 105, 120
Masculinity, 79
Masochism, 73, 282, 350
Masks, 61, 65, 66, 68, 80, 95
Masturbation, 11, 14 passim, 64, 81, 106, 117, 135, 140, 144, 151, 165, 178,
192, 195, 197, 213, 257, 262, 270, 286, 292, 310, 325
Maupassant, 104
Mayer, E. V., 33
Mediation (through oppos. sex), 62, 67
Membrum virile, 258, 260, 271, 286, 310
Memory, 47, 137, 241, 245, 308, 314
Messalina type, 66, 90, 163, 175, 228
Misogyny, 99, 272, 273
Misophilia, 267
Moebius, 283
Moll, 18 passim, 20, 22
Monosexuality vid. Bisexuality
Mother complex, 213, 339
Imago, 186, 246, 335
Motherly feeling, 161
Mutterschutz, 230
Object, sexual, 11
Obsession, 113, 120
Onanism, vid. Masturbation
Ontogenesis, 45
Orgasm, 74, 82, 184, 263, 267, 281, 293
Outbreak (of H.), 223
Over-compensation, 46
determination, 327
Paranoia, 39, 95
Paraphilia, 58, 146, 156, 268
Parents, 30
Passion, 89, 97, 144
Paul, Jean, 306
Pawlow, 35
Pederasty, 81
Perversion, 69, 102
Pfister, 320, 323, 326
Phallic symbol, 217
Phantasy, 70, 130, 300
Phobias, 68
Piety, 190, 200, 219, 235
Pilz, 349
Platen’s Diary, 290
Plato, 56
Pollution (dream), 212, 227, 313
Polygamic neurosis, 124
tendency, 176
Potentia, 133, 217, 257, 261
Polygamy, 237
Praetorius, Numa, 250, 251
Precocity, 45 passim, 47, 318
Predisposition, 31, 34, 36, 39, 41, 290
Preference for widows, 98
Priapism, 131
Prognosis, 216
Progression, 44
Prostitute, 61, 163, 178, 184, 217, 280, 285, 316
Prostitution, 57, 85, 106, 281
Protection, vid. Defence
Pseudo-Cassanova type, 99
Homosexuality, 24, 25, 247, 308
Pseudonym, choice of, 65
Psychic Homosexuality, 85
Urge, 183
Psycho-Analysis, 26, 27, 39, 47, 70, 109, 150, 158, 172, 190, 202, 225, 241,
244, 248, 268, 284, 300, 312, 328, 338
Psychosis, 58
Puberty, 31, 33, 124, 291, 294
Pursuit, 186, 191
Ulrichs, 36
Unconscious, 35
wish, 209
Undifferentiated, 31
Ungratified libido, 129
Urlind, 30, 78, 284, 297, 333, 341
Urning, 81, 333, 339, 341, 345
Urolagnia, 312
Warning, 260
Weininger, 283, 346
Westphal, 19
Whip (sadism), 265
“Will to power,” 337
Wish, 35, 38, 292, 325, 336
fulfillment, 214
Witches, fear of, 221
Woman, aggressive, 30, 350
“Womanly” men, 24
“World pain,” 334
Worry, 181
Ziemcke, 286
Zwischenstuffen, 25
-theorie, 245
FOOTNOTES:
[1] Hans Blüher: Studien ueber den perversen Charakter. Ztrbl.
f. Psychoanalyse, Oct., 1913.
[2] Neue Studien auf dem Gebiete der Homosexualitaet. Jahrb.
f. Sexuelle Zwischenstuffen, vol. III, Leipzig.
[3] This view of Krafft-Ebing is by no means “antiquated.” It is
still maintained by Stier (Zur Aetiologie des kontraeren
Sexualgefuehls. Monatschrf. f. Psych, u. Neurol., vol. XXXII, 1914)
and very energetically criticised (ibid.) by Hirschfeld and
Burchard. “It is inconceivable,” state the above named authors,
“how Stier can ascribe an etiologic significance to onanism in
connection with homosexuality. Its distribution, ubiquitous—in the
opinion of most specialists, would permit one to hold
masturbation responsible for any other sexual development as
well.” According to Stier, early and long-continued onanism
(especially mutual) is harmful because “it does away with the
feeling of shame in connection with one’s sexual organs and
makes for readier handling even by the uncorrupted adult.”
Fleischmann also finds 33 excessive onanists among 60 inverts
and concludes (Beitr. zur Lehre der kontraeren Sexualempfindung,
Zeitschr. f. d. ges. Neur. u. Psychol., vol. VII, 1911) that “like
alcoholism, masturbation must influence the development of the
perversion.” Many of his patients mentioned the habit in a casual
relation. We know well that the sense of guilt is attached to the
habit of masturbation. But Fleischmann sees in that a proof.
“Onanism plays a role in the development of the sexual
perversion,” he argues, “because it rouses an increased sexual
excitability while the will power is weakened by it at the same
time and there follows a progressive wandering of the sexual
instinct away from the normal sexual aim and object.”
[4] This contention is altogether wrong. I have never seen so
many and such pronounced idealists as among masturbators.
Young artists, poets and musicians in particular often show, I
have found, a strong tendency to masturbation, and this agrees
with the pronounced bisexuality of all artists, which has been
particularly pointed out by Fliess. The youths of this type are
often so delicate and sensitive that they see in the sexual act only
animal brutality and hide their own sexuality from the whole
world. Among masturbators we find the champions of truth, the
over-moralistic preachers, the ethical reformers and dreamers.
[5] Cf., on the other hand, the views of Bloch: “That the
contrary sexual instinct-feeling in itself is not a sign of psychic
degeneration and need not be looked upon at all as morbid, is
shown among others, by the fact that the condition is often
associated with spiritual superiority. As proof we find, among all
nations, men of proven homosexuality, who are the pride of their
respective people as writers, poets, artists, military strategists, or
statesmen. Further proof that the contrary sexual feeling is no
disease and does not necessarily lead to immoral tendencies may
be seen in all the noble qualities of heart which it is capable of
generating, precisely as the heterosexual attraction, such as
courage, self-sacrifice, altruism, artistic feeling, creative energy,
etc., just as it may be responsible also for any of the morbidities
and failings of heterosexual love (jealousy, suicide, murder,
unhappy love with its deleterious effects on mind and body, etc.)”
[6] It was clearly the duty of the new editor of Krafft-Ebing’s
popular work to have recorded therein the author’s latest views.
In his “Neuen Studien auf dem Gebiete der Homosexualitaet,” he
states: “In contrast with the conception that contrary sexuality is
an inborn anomaly, a disorder in the evolution of the sexual
function of monosexuals and of the glandular development of the
sex glands, the conception of ‘morbidity’ is untenable. We may
rather speak in this connection of a malformation and compare
the anomaly with bodily malformations,—for instance, with the
anatomic deviations from the average type. But the concept of a
simultaneous psychopathic state remains a legitimate assumption,
because subjects presenting anatomic as well as functional
deviations from type (stigmata degenerationis), may preserve
good physical health for a time, and may even show points of
superiority.
“At the same time so tremendous a deviation as contrary sexual
feeling must have a far wider influence upon the psyche than
many of the anatomic or functional stigmata of degeneration.
That is the reason why any disturbance in the usual development
of a normal sexual life reflects so commonly in an unfavorable
sense upon the harmonious psychic development of personality.
Victims of contrary sexual feeling often show neuropathic and
psychopathic predispositions, such as, for instance, a tendency to
constitutional neurasthenias and hysteria, milder forms of periodic
psychosis, inhibitions against the unfoldment of psychic energies
(intelligence, moral sense), including moral inferiority, especially
associated with hyper-sexuality, eventually leading to most
serious disorders of the sexual instinct. At any rate, it can be
shown that, relatively speaking, heterosexuals prove greater
cynics about sexual matters than the homosexuals. Also that
other degenerative signs upon the field of sexuality, such as
sadism, masochism, fetichism, etc., are much more commonly
found among the former....”
[7] Die kontraere Sexualempfindung, Symptom eines
neuropatischen (psychopathischen) Zustandes. Arch. f. Psych. u.
Neurol., vol. II, p. 106, 1870.
[8] Handbuch der Sexualwissenschaften (Die
Funktionsstærrungen des Sexuallebens.) Leipzig, Verlag F. C. W.
Vogel, 1912, p. 652.
[9] I find a very interesting observation by Bloch, one which
deserves to be widely circulated: “A final and not unimportant
form of Pseudo-homosexuality is hermaphroditism (das
Zwittertum). It is remarkable that science has concerned itself
only in recent years with the close study of hermaphroditic
conditions which have not received heretofore the attention
warranted by their sociologic bearings and their frequency. It is a
great merit of Neugebauer and of Magnus Hirschfeld that they
have called general attention to these remarkable sexual
Zwischenstufen, intermediary states, and have pointed out their
great practical significance, a matter of which no one has thought
before, as is shown by the significant fact that the new German
civil code has done away with the legal proscriptions of the old
Prussian law concerning the Zwitter (hermaphrodites), upon the
contention that no person is of unknown or unascertainable sex.”
[10] Hirschfeld emphasizes the fact that homosexuality has
nothing to do with organic bisexuality. He states:
“I deem it important to point out this fact: The most extreme
deviation of sexual type approaching the opposite sex, such as
hypertrophy of the clitoris and full facial hair growth in the
female, or hypospadia penis-scrotalis and gynecomasty in the
male are found linked with heterosexuality more often than with
homosexuality.”
[11] English version by J. S. Van Teslaar, in preparation.
[12] Verlag J. F. Bergmann, Wiesbaden, 1913. Vid. note above.
[13] Cf. Dichtung und Neurose, J. F. Bergmann. Authorized
English version by James S. Van Teslaar.
[14] Nervöse Angstzustaende. Die psychische Behandlung der
Epilepsie, 2nd edition, p. 336.
[15] Hirschfeld relates several instances illustrating how
heterosexual potence may be increased by the fires of
homosexual passion: A merchant relates: “I am able to carry out
sexual intercourse with women, only if I keep thinking of the man
who possessed the woman before me.” A young workingman
from Berlin relates: “When I was 17 years of age and I saw
young men of my age pick out sweethearts for themselves I did
the same. Later, as man, it seemed natural to me to get a
woman, although my own inclination had little to do with it. The
physical excitation necessary for the carrying out of the sexual act
I could rouse in myself only by thinking of some male person.
This sort of thing exhausted me and after a time I decided to give
it up. I felt myself strongly attracted to a relative at that time. He
was younger and as I had greater influence over women I helped
him by putting him in touch with some and so we often carried
out coitus together. Seeing him [go at it so hotly] excited me
tremendously and then I carried out coitus without any difficulty.”
The proprietor of a German hotel also relates that, before
intercourse with his wife, he was in the habit of rousing his
passion by kissing his head waiter. This furnished him the
requisite sexual preparedness and as quickly as possible he
hurried to his wife, whose bed was in the next room. Hirschfeld
writes further: “These sketches from life I want to conclude with
the account of a patient who consulted me for sexual
hyperesthesia which in his case was so keen that seeing the
statuettes of naked children ornamenting the Berlin castle bridge
while crossing it was enough to cause erection. He was a
merchant, 42 years of age. In order to obtain potentia coeundi it
was necessary for him not only to think, but also to speak aloud
of some pleasing man, in some such manner: “Did you notice
that servant of the Count’s, who called for a bundle this forenoon,
how did you like him? A neat boy, what? His livery seemed quite
new! Didn’t you think it fitted him a bit too tightly? How old
should you say he was?” Only by carrying on such talk with his
wife, and he had to exercise the greatest ingenuity in order to
cover his object while doing so, was he able to achieve
ejaculation, and to beget children,—he was the father of three.”
[16] Die Transvestiten. Eine Untersuchung ueber den
Erotischen Verkleidungstrieb. Alfred Pulvermacher. Berlin, 1910.
[17] (Cf. Angstzustaende, p. 417. An English translation of this
work is now in course of preparation and will appear shortly.)
[18] English translation by James S. Van Teslaar.
[19] Faust finds this temporarily in his Graetchen. But it is only
an episode and presently he is again restlessly searching until he
finds Helena, the most beautiful of all women. The Flying
Dutchman is released by a woman who remains true to the last in
her love of him. That is the projection of a subjective feeling upon
the woman. He wishes he could find a woman for whom he
would feel a love so dear that it would relieve him. In Ahasuerus
the same problem is glossed over with religious terms as the
problem seen in the Don Juan story as the requital of the all-
highest father. All four must be faithless, they cannot remain true
to one woman.
[20] Once I treated a man who had separated from his wife,
wanted to marry another woman with whom he had fallen in love
and to divorce his wife. In the course of our interviews during
that time this man said repeatedly: “I would not introduce you to
my first wife; you would fall in love with her if I did; no man can
help that.” At once I recognized that the man’s neurotic disorder
reached back to a suppressed love for his wife. In his mind there
rumbled continually sounds which he could not reproduce. He
recalled scraps of melodies which he could not place at all. But
once I was able to get at one such melody. It was a song of
which he did not know the words. When the matter was ferreted
out it was found that the words bore distinctly a reference to his
first wife. The vague melodies permitted his mind to dwell on her
and at the same time to cover from his consciousness the fact
that he could not keep her out of his mind. Here is a
characteristic passage from Eichendorff’s poem:
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.
1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.
• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookluna.com