0% found this document useful (0 votes)
114 views56 pages

Windows 10 Inside Out 3Rd Edition (Ebook PDF) : - Click The Link Below To Download

Uploaded by

aayadzeney
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
114 views56 pages

Windows 10 Inside Out 3Rd Edition (Ebook PDF) : - Click The Link Below To Download

Uploaded by

aayadzeney
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 56

Visit https://ebookluna.

com to download the full version and


explore more ebooks

Windows 10 Inside Out 3rd Edition (eBook PDF)

_____ Click the link below to download _____


https://ebookluna.com/product/windows-10-inside-
out-3rd-edition-ebook-pdf/

Explore and download more ebooks at ebookluna.com


Here are some recommended products that might interest you.
You can download now and explore!

(eBook PDF) New Perspectives Microsoft Windows 10:


Introductory, Wire Stitched

https://ebookluna.com/product/ebook-pdf-new-perspectives-microsoft-
windows-10-introductory-wire-stitched/

ebookluna.com

SQL Server 2022 Administration Inside Out 1st Edition


Randolph West - eBook PDF

https://ebookluna.com/download/sql-server-2022-administration-inside-
out-ebook-pdf/

ebookluna.com

(eBook PDF) Inside Reporting 3rd Edition by Tim Harrower

https://ebookluna.com/product/ebook-pdf-inside-reporting-3rd-edition-
by-tim-harrower/

ebookluna.com

(eBook PDF) Understanding ICD-10-CM and ICD-10-PCS: A


Worktext - 2020 5th Edition

https://ebookluna.com/product/ebook-pdf-understanding-icd-10-cm-and-
icd-10-pcs-a-worktext-2020-5th-edition/

ebookluna.com
Progress in Heterocyclic Chemistry Volume 29 1st Edition -
eBook PDF

https://ebookluna.com/download/progress-in-heterocyclic-chemistry-
ebook-pdf/

ebookluna.com

Tableau 10 Complete Reference (eBook PDF)

https://ebookluna.com/product/tableau-10-complete-reference-ebook-pdf/

ebookluna.com

Hands-On Microsoft Windows Server 2019 (MindTap Course


List) 3rd Edition Jason Eckert - eBook PDF

https://ebookluna.com/download/hands-on-microsoft-windows-
server-2019-mindtap-course-list-ebook-pdf/

ebookluna.com

(eBook PDF) Translational Medicine in CNS Drug


Development, Volume 29

https://ebookluna.com/product/ebook-pdf-translational-medicine-in-cns-
drug-development-volume-29/

ebookluna.com

(eBook PDF) Starting Out with Java: From Control


Structures through Data Structures 3rd Edition

https://ebookluna.com/product/ebook-pdf-starting-out-with-java-from-
control-structures-through-data-structures-3rd-edition/

ebookluna.com


Part I

Chapter 1

Chapter 2
PC hardware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Before you start
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Acknowledgments

Cloud connections
The app landscape
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The user experience

Activating Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security and privacy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows as a service
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows core features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Who this book is for

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How Windows 10 Setup works
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Performing a clean install

Managing digital licenses


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Errata, updates, & book support
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring a multi-boot system
Windows licensing options
How this book is organized

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Do you need a product key?
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Back up your data and settings

Performing an edition upgrade


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choose your installation method
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents

Troubleshooting activation problems


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Download or create installation media
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Product activation and corporate licensing
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Check for potential compatibility problems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Upgrading from an earlier Windows version
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
Managing Windows activation from the command prompt
. . . . . . . . . . . . . . . . . . . . .
vii
Tweaking and tuning your Windows 10 installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
63
62
62
58
57
55
54
52
51
44
39
37
36
31
30
29
28
Installing, configuring, and deploying Windows 10 . . . . . . . . . . . . . . . . . 27
24
23
17
16
12
8
4
What you need to know about Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . 3
Windows 10 essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
xxix
xxix
xxviii
xxvii
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxvii
viii

Chapter 3

Chapter 4
Table of Contents

Switching tasks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with fonts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting colors
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating Windows 10

Overcoming challenges
Choosing a screen saver
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Settings vs. Control Panel
Moving the taskbar

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting pen options

Fine-tuning visual options


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Personalizing with themes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring desktop icons
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting sounds for events
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Making text easier to read
Using the Touch Keyboard
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Windows Ink workspace
Using and customizing Start

Managing and arranging windows


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using and customizing the taskbar

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing mouse pointers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing the visual appearance
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Switching between virtual desktops
Pinning people to the taskbar

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding toolbars to the taskbar

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using and customizing Action Center

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pinning programs to the taskbar

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Making other small visual tweaks
Customizing the notification area

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Selecting the desktop background

Eliminating distractions with Focus Assist


Using alternative keyboard layouts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows 10 on a touchscreen device
Customizing the Quick Actions panel

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a keyboard and mouse in Windows 10
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the order of taskbar buttons

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reviewing, revisiting, resuming with Timeline

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An overview of the Windows 10 user experience

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing the taskbar’s size and appearance

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Taming your mouse or other pointing device
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the taskbar with multiple displays

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Customizing the lock screen and sign-in screen
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting date and time, currency, and other regional options
Using font smoothing to make text easier on the eyes
. . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Jump Lists for quick access to documents and folders

. . . . . . . . . . . . . . . . . . . . . .
Personalizing Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117

Syncing your settings between computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145


142
138
137
134
133
133
130
131
126
126
124
122
118
118
117
116
115
114
113
112
108
107
106
104
102
98
98
95
94
Customizing notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
91
89
88
87
86
86
86
83
82
81
81
78
72
71
69
Using Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Part II

Chapter 7
Chapter 5

Chapter 6

Using Maps
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using OneNote
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Skype
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling an app
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Buying an app
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Reviewing history
What’s in a modern app

Resetting a modern app


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting directions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Servicing channels

Setting AutoPlay options


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing Microsoft Store
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mail, Calendar, and People
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Windows Update

Managing startup programs


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and using Mail
Apps included with Windows 10
Deferring and delaying updates

Managing line-of-business apps


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting update problems

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Turning Windows features on or off
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and using Calendar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching for places and services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing permissions and other settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choosing how updates are installed

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What you get from Windows Update

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Suspending or removing startup items
Fine-tuning network bandwidth usage

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding or editing contacts with People
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An overview of how Windows 10 update works

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Terminating a program with Task Manager
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning a program to a specific processor
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding technical information about updates

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting default programs and file-type associations
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding detailed information about a program
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing programs and processes with Task Manager
.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing, running, and managing desktop applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a nondefault program on a case-by-case basis
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Running desktop applications as an administrator or another user

. . . . . . . . . . . . . .
.
Table of Contents

Using and managing built-in Windows apps . . . . . . . . . . . . . . . . . . . . . . 207


Installing and configuring modern apps and desktop apps . . . . . . . . . 171
Productivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

221
220
220
218
216
216
213
208
208
203
202
201
197
194
193
192
191
190
189
188
186
184
182
182
181
180
178
176
175
173
165
162
158
152
149
147
Managing updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
ix

Dealing with compatibility issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188


157
Choosing when updates are installed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
155
153
x

Chapter 8

Chapter 9
Table of Contents

Music

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using tabs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using libraries
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing with favorites
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Essential customizations
Photos and videos

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing favorites
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending Microsoft Edge
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Privacy and security issues
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Projecting to another screen

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protecting your privacy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing photos with Paint

Controlling Flash content


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing through history
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Specifying your default browser

Making text easier to read


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting around in Microsoft Edge
Displaying the Favorites bar
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Music, photos, movies, and games

Reading ebooks in Microsoft Edge


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Reading View in Microsoft Edge

Relocating personal data folders


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Downloading maps for offline use

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating albums and video projects

Syncing favorites and other settings


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Choosing the light theme or the dark

Changing the default search provider


Sharing maps and creating reminders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Xbox and other forms of online entertainment

Customizing your start and home pages

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the reading list to save links for later
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What’s what (and where) in your user profile
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting media autoplay permissions globally
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing and securing your web credentials
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Photos app to crop and edit pictures

Configuring security zones in Internet Explorer


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating with the Start page and address bar

Annotating Microsoft Edge pages and PDF files


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Watching movies, recorded TV shows, and video clips

. . . . . . . . . . . . . . . . . . . . . . . . .
Organizing personal data with user profile folders and libraries
. . . . . . . . . . . . . . . . . . . . . . .
Performing screen captures with Snipping Tool and shortcut keys

. . . . . . . . . . . . . . . . . . . .
Managing and troubleshooting add-ons in Internet Explorer
. . . . . . . . . . . . . . . . . . .
289
289
284
284

303
301
298
298
Storage and file management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
293
292
283
281
279
276
Revisiting sites with Timeline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276
275
275
272
265
264
262
262
Microsoft Edge and Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

261
261
260
259
259
259
258
253

257
257
251
249
247
244
239
235
227
226
225
225
223
Chapter 10
Managing disk space
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows search
Mastering File Explorer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Shrinking a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Extending a volume
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching from File Explorer
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Purging the Recycle Bin
Filtering folder contents
Syncing files and folders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with virtual hard disks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Grouping folder contents

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restoring files and folders
Sorting a folder’s contents
Using the navigation pane

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Cleaning up unneeded files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Searching for item properties
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What you can do with Cortana
.
Searching by item type or kind
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up and using OneDrive

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing existing disks and volumes

Changing the scope of a search


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing default save locations

Searching nonindexed locations


Advanced search tools and techniques
Converting a FAT32 disk to NTFS
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Cortana in Microsoft Edge
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring the Windows search index
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing file properties and metadata
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Sharing OneDrive files and folders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using compressed (zipped) folders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning and changing drive letters
Mapping a volume to an NTFS folder
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Saving searches and clearing search history
Assigning or changing a volume label
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using OneDrive to store, sync, and share files

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Permanently wiping all data from a disk

Which files and folders are in the index?


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring Cortana and search options
Sorting, filtering, and grouping in File Explorer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using multiple criteria for complex searches
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Navigating faster with Quick Access shortcuts

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using wildcards and character-mode searches
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How OneDrive and OneDrive for Business work

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recovering lost, damaged, and deleted files and folders
Layouts, previews, and other ways to arrange files

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents

379
378
377
377
375
375
374
373
370
365
Monitoring the index and tuning indexer performance . . . . . . . . . . . . . . . . . . . . . . . . .363
361
360
359
358
355
349
Cortana and Windows search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
345
344
342
340
340
340
338
338

341
341
337
337
335
333
332
328
328
326
326
325
324
322
320
318
314
313
312
308
306
306
xi
xii

Part III

Chapter 11

Chapter 12

Chapter 13
Table of Contents

Systeminfo
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a PIN
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Wireless security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Hotspot 2.0
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Information
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Deleting an account

Using Dynamic Lock . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .


Configuring services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TCP/IP configuration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Permissions and rights

Setting the network location


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing the sign-in process

.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a picture password
Choosing an account type

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Services console
Sharing your PC with other users
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing account settings

Connecting to a wireless network


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows 10 networking essentials
Viewing details about your system

Network management tools


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting and stopping services
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting or changing a password
Creating and managing user accounts

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding a user to your computer

Introducing access control in Windows


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connecting to a hidden network
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
User accounts and security groups

Power management on desktop systems


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restricting use with assigned access
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Checking the status of your network
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring performance with Task Manager
Managing services from Task Manager
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Controlling your family’s computer access

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows Hello for biometric sign-ins

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mobile hotspots and other metered connections
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring power options from the command line
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Signing out, switching accounts, or locking your computer

. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Resource Monitor to pinpoint performance problems
. . . . . . . . . . . . . . . . . . . . . . . . .
.
Windows Management Instrumentation command-line utility

. . . . . . . . . . . . . . . . .
468
465
464
461
449
447
446
Windows networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
444
428

459
426
426
424
423
422
420
Performance and power management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419

457
451
439
437
433
432
428
415
414
410
410
408
406
405
404
403
402
401
400
398
395
393
392
386
384
Managing user accounts, passwords, and credentials . . . . . . . . . . . . . . 383
Managing Windows 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Chapter 14

Night Light
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing USB devices
Sharing a printer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Printers and print queues
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Uninstalling a driver
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Storage Spaces
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Setting up Bluetooth devices

Using multiple displays


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing display settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up a new hard disk
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Updating and uninstalling drivers

Running Disk Management


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting network problems

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enabling and disabling devices
Network troubleshooting tools

Working with solid-state drives


Using the Remote Desktop app

Speakers, microphones, and headsets


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Connecting to a network printer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Troubleshooting TCP/IP problems

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Updating a device driver manually
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Disabling automatic driver updates
Using Remote Desktop Connection

Adjusting advanced device settings


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Installing a new Plug and Play device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring displays and graphics adapters
Configuring your network for sharing

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with mapped network folders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Rolling back to a previous driver version

Controlling scaling on high-DPI displays


Sharing files and folders from any folder

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing hard disks and other storage devices
Installing Remote Desktop client software

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing disks from the command prompt
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding, configuring, and removing hardware devices
Enabling inbound remote desktop connections

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
How device drivers and hardware work together

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting useful information from Device Manager
Connecting to another computer with Remote Desktop

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding and using shared resources on a Windows network

. . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding sharing and security models in Windows

. . . . . . . . . . . . . . . . . . . . . . .
Sharing files, printers, and other resources over a local network

. . . . . . . . . . . . . . . . . . . . . .
Transferring pictures, links, and other items between nearby devices

. . . . . . . . . . . . . . . . .
Table of Contents

520
519
485
483
482
481
477
473
472
472
468

551
550
549
547
544
544
517
516
515
510
Hardware and devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505

541
540
535
533
532
528
524
524

531
521
520
507
506
505
497
496
495
495
493
489
491
471
xiii
xiv

Part IV
Chapter 15

Chapter 16
Table of Contents

.
Event Viewer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Memory
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Networking
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up Hyper-V
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Types of events

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with Stop errors

Using Hyper-V Manager


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reliability Monitor

Checking disks for errors


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Running a virtual machine
Machine generation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What’s in a Stop error

What’s in a virtual machine?


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a recovery drive
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Filtering the log display

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Built-in troubleshooters

Troubleshooting in Safe Mode


Viewing logs and events

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows Error Reporting

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Feedback and diagnostics

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using enhanced session mode
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring and using System Restore
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automatic start and stop actions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing settings for a virtual machine
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Isolating the cause of a Stop error

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Fine-tuning virtual memory usage
Creating and managing virtual machines
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows 10 backup and recovery options

Storage controllers and virtual disks


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Windows 7 Backup program
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the New Virtual Machine Wizard
Getting started with Hyper-V on Windows 10
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting to know your troubleshooting toolkit

Rolling back to a previous restore point


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Quick Create to configure a new VM
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using File History to protect files and folders

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Adding, removing, and adjusting virtual disks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with event logs on a remote computer

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with Virtual Machine Connection windows
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Reset option to recover from serious problems

. . . . . . . . . . . . . . . . . . . . . . .
Customizing the presentation of tabular data in Event Viewer

. . . . . . . . . . . . . . . . . .
643
640
640
640
635
633
622
Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607
For IT professionals and Windows experts . . . . . . . . . . . . . . . . . . . . . 605
560

631
624
621
619
618
617
616
614
612
611
608
602
600
593
591
582
581
578
575
572
571
569
Customizing how Windows handles Stop errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .567
567
567
566
565
563
562
559
558
556
555
555
Troubleshooting, backup, and recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . 555

Advanced security options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .639


Chapter 17

Chapter 18
Managing apps
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking malware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Securing data
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Intune

Securing devices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Encrypting information
Alternatives to Hyper-V

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking malware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Securing identities
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working with checkpoints

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Configuring privacy options
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using shared PC mode
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Modifying UAC settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Setting up a kiosk device
Changing policy settings

Understanding security threats


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using a domain-based network

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Restoring default settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with UAC prompts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
What triggers UAC prompts
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing the browsing experience
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Dealing with detected threats
Securing apps with AppLocker

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
New security features in Windows 10
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Monitoring your computer’s security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Manually scanning for malware
Using Local Group Policy Editor

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing special-purpose computers
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using the Encrypting File System
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Importing, exporting, and moving VMs

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing computers with Group Policy

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Windows Defender Antivirus
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing Windows Defender Firewall
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Management tools for enterprise deployments

Windows Server Update Services (WSUS)

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking intruders with Windows Defender Firewall
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing app distribution in an organization

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
System Center Configuration Manager (SCCM)

Preventing unsafe actions with User Account Control


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Blocking ransomware with controlled folder access
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Stopping unknown or malicious programs with SmartScreen
. . . . . . . . . . . . . . . . . . . . . . . . .
Advanced tools for managing Windows Defender Firewall
. . . . . . . . . . . . . . . . . . . . .
Using Windows Defender Firewall with different network types
. . . . . . . . . . . . . . . .
Table of Contents

696
Encrypting with BitLocker and BitLocker To Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .694
694
692
692
689
688
687
686
686
686
685
684
683
681
679
677
676
675
671
670
669
669
668
668
665
Windows security and privacy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 665
662
661
661
658
658
649
648
646

657
657
657
657
657
656
655
654
652
651
Managing business PCs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
xv
Visit https://ebookluna.com
now to explore a diverse
collection of ebooks available
in formats like PDF, EPUB, and
MOBI, compatible with all
devices. Don’t miss the chance
to enjoy exciting offers and
quickly download high-quality
materials in just a few simple
steps!
xvi

Part V
Chapter 19

Chapter 20
Table of Contents

Storage
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Home
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Enterprise
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating tasks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Mobile connectivity

Microsoft 365
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Task Scheduler
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Managing battery life
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Retail and OEM editions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editions for organizations
Starting PowerShell

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Enterprise E3 and E5
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro for Workstations

Enterprise LTSB/LTSC
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Registry virtualization
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing the Windows registry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using command symbols

Scripting with PowerShell

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editing the command line

Windows 10 editions at a glance


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Interacting with PowerShell
Command Prompt or PowerShell?

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Windows 10 and your mobile phone
Registry values and data types
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Using Microsoft Management Console
Running with elevated privileges

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Working in a Command Prompt session

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
An introduction to Windows PowerShell

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Finding additional PowerShell resources

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Browsing and editing with Registry Editor

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating registry changes with .reg files

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating tasks with Windows Script Host
Understanding the Registry Editor hierarchy

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Backing up and restoring parts of the registry

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Monitoring long-term battery life and capacity
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting Command Prompt at a particular folder

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Starting Command Prompt and running a command

Battery Saver and other power management options


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Automating command sequences with batch programs

. . . . . . . . . . . . . . . . . . . . . . . .
Using AutoRun to execute commands when Command Prompt starts

. . . . . . . . . .
756
756
756
753
753

755
755
755
754
752
Appendix A Windows 10 editions and licensing options . . . . . . . . . . . . . . . . . . . . . . . . 751
Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749
747
746
699

744
743
742
739
Maximizing productivity on a portable PC . . . . . . . . . . . . . . . . . . . . . . . . 739
736
736
735
735
735
734
731
729
728
726
724
723
722
719
708
707
706
703
703
702
702
702
701
701
PowerShell and other advanced management tools . . . . . . . . . . . . . . . . 699
Online help
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Education

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Pro Education

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Docs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
TechNet forums
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
The Windows roadmap
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Getting technical support
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Community
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft IT Pro Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Microsoft Knowledge Base

Microsoft Virtual Academy


. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Submitting and tracking feedback

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Editions for educational institutions

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Joining the Windows Insider Program

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
Online reference material from Microsoft
How the Windows Insider Program works

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Free and paid support from Microsoft
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Keeping track of what’s in each preview build

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Table of Contents

Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 785
779

782
777
777
777

781
780
778
778
778
771
Appendix C Help and support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771
768
767
761
759
Appendix B The Windows Insider Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759
758
757
757
xvii
About the authors
Ed Bott is an award-winning author and technology journalist who has been researching and
writing about Windows and PC technology, in print and on the internet, for more than two
decades. He has written more than 30 books, all on Windows and Microsoft Office, which in
turn have been translated into dozens of languages and been read worldwide. You can catch up
with Ed’s latest opinions and get hands-on advice at The Ed Bott Report on ZDNet (zdnet.com/
blog/bott). You can also follow his lively and occasionally irreverent Twitter feed (@edbott). Ed
and his wife, Judy, live in northern New Mexico with an adorable English Springer spaniel, Lucy,
who was adopted with the help of English Springer Rescue America (springerrescue.org). She
makes several cameo appearances in this book.

Craig Stinson, an industry journalist since 1981, was editor of Softalk for the IBM Personal
Computer, one of the earliest IBM-PC magazines. He is the author or coauthor of numerous
books about Windows and Microsoft Excel. Craig is an amateur musician and reformed music
critic, having reviewed classical music for various newspapers and trade publications, including
Billboard, the Boston Globe, the Christian Science Monitor, and Musical America. He lives in
Bloomington, Indiana.

xix

Introduction
Microsoft Windows has been around for more than three decades. During that time, it has
grown to become a mainstay of business and personal computing, running on some 1.5 billion
devices worldwide.

The authors of this book began working together in 2001 with the very first title in the Inside
Out series, covering Windows XP. Like many of you, we took a break a few years ago, watching
from the sidelines as Microsoft released Windows 8 and Windows 8.1. We returned for Windows
10 because, quite frankly, we were excited by the possibilities of “Windows as a service.” As we
predicted in the first edition of this book, published shortly after the initial release of Windows
10 in 2015, Windows 10 is evolving rapidly.

That evolution has been a key part of our experience over the past three years, as we researched
and wrote what turned out to be a very significant revision to the original edition and then did a
series of ebook-only updates. This third edition incorporates all that learning and covers the two
editions of Windows 10 released in 2018.

One bedrock fact we’ve discovered over the past three years is that the core features of Win-
dows 10 are familiar and change very slowly. The fundamentals of NTFS security and the reg-
istry, for example, have remained reassuringly consistent throughout many generations of
Windows. But there’s also plenty that’s new in Windows 10, some of it obvious (the new Start
experience) and some not so obvious (Windows Hello).

The challenge of writing a book like this one is that Microsoft keeps updating Windows 10,
releasing new features twice each year instead of every few years, as in the past. To our great
relief, we’ve found that most of the changes in these semi-annual Windows 10 feature updates
are evolutionary, not revolutionary. You might notice small changes in a dialog box or in the
appearance of a feature, but its fundamental workings remain the same as before. Our goal in
this edition is to help you accomplish those familiar tasks using a new set of tools.

Who this book is for


This book offers a well-rounded look at the features most people use in Windows. It serves as
an excellent starting point for anyone who wants a better understanding of how the central
features in Windows 10 work. If you’re a Windows expert-in-training, or if your day job involves
IT responsibilities, or if you’re the designated computer specialist managing computers and
networks in a home or small business, you’ll discover many sections we wrote just for you. And if
you consider yourself a Windows enthusiast—well, we hope you’ll find enough fun and interest-
ing tidbits to hold your attention because, after all, we’re unabashed enthusiasts ourselves.

xxi

xxii Introduction

Assumptions about you


This book was written for people who have some experience with Windows and are comfort-
able with and even curious about the technical details of what makes Windows work. It touches
only briefly on some of the basic topics that you’ll find covered in more detail elsewhere. (For
people who require a more basic introduction, we recommend other Microsoft Press titles, such
as Windows 10 Step by Step or Windows 10 Plain & Simple.)

Whether you’ve been working with Windows for a few years or a quarter-century, we expect
that you’re comfortable finding your way around the desktop, launching programs, using copy
and paste operations, and finding information in a web browser. We don’t assume that you’re a
hardware tinkerer, hacker, hardcore gamer, or developer.

How this book is organized


Part I, “Windows 10 essentials,” offers an overview of what’s new in this version, along with
details on installing, configuring, and personalizing Windows 10. For this edition, we’ve added
a brand-new chapter covering the tools and techniques for managing Windows security and
feature updates.

Part II, “Productivity,” covers the essentials of using and managing Universal Windows Platform
(UWP) apps and desktop programs, with details on built-in productivity tools (including Mail)
and entertainment apps. This section also introduces Microsoft Edge, the new default web
browser. In this section, we explain how to organize your personal data using local drives and
the built-in OneDrive cloud storage service. Finally, we explain how to find those files as well
as answers from the internet, when you need them, using Cortana and Windows 10’s powerful
search tools.

Part III, “Managing Windows 10,” starts with a detailed guide to keeping your user accounts
and devices secure. Additional chapters cover routine maintenance tasks and explore tools and
techniques for measuring and improving your computer’s performance, keeping your network
connections fast and secure, and configuring hardware. The section closes with advice on how
to back up your important files, how to recover quickly from problems, and how to trouble-
shoot issues when they arise.

Part IV, “For IT professionals and Windows experts,” leads off with a chapter about Hyper-V, a
powerful virtualization platform built into Windows 10 Pro and Enterprise editions. Additional
chapters cover advanced tools for managing business networks and the Windows 10 devices
connected to those networks. Windows 10 security gets its own in-depth chapter, and we close
with a look at the unique features available for mobile computing.,

Finally, we provide three appendixes of reference information: a concise look at the differences
between Windows 10 editions, a hands-on guide to the Windows Insider Program, and an over-
view of help and support resources.
Introduction xxiii

Acknowledgments
For this edition we’re once again fortunate to have an expert production team led by Loretta
Yates. Proofreader Karen Davis, compositor Tricia Bronkella, and indexer Cheryl Lenser were
invaluable additions to our team, asking the right questions and offering excellent suggestions
to help smooth away our rough edges. And, as usual, they made it all happen quickly and effi-
ciently, despite all the curveballs that the crazy fast “Windows as a service” development pace
threw our way.

They were joined by a very special team member, Carl Siechert, who was our co-author on every
previous edition but put on the technical editor’s hat for this revision. It was a perfect fit.

And we’ve saved a special tip of the hat to our longtime colleagues Rick and Charlotte Kughen.
This book would never have gotten into your hands without their production magic.

Errata, updates, & book support


We’ve made every effort to ensure the accuracy of this book and its companion content. You
can access updates to this book—in the form of a list of submitted errata and their related
corrections—at:

MicrosoftPressStore.com/ Win10InsideOut/errata

If you discover an error that is not already listed, please submit it to us at the same page.

If you need additional support, email Microsoft Press Book Support at:

[email protected].

Please note that product support for Microsoft software and hardware is not offered
through the previous addresses. For help with Microsoft software or hardware, go to
https://support.microsoft.com.
Other documents randomly have
different content
Erection, 130, 131
Eroticism, 272, 332, 333
“Eternal seekers,” 164
“Ethical” will, 337
Etiology, 15, 42
Eulenburg, 281
Eunuchoid, 24
Euripides, 273
Excess of morality, 218
Excitement, 167
Experience, 241, 334, 344
Exposition of Ps.-A. (in dream), 211

Factors, psychic, 35, 42


Falsehood, 27
Family life, 331
Fancies, 147, 149, 224, 270
Father, 148, 303, 335
Faust, 163, 164
Fear of immoral deed, 198
marriage, 323
sexual partner, 273
syphilis, 95
tuberculosis, 91
woman, 272
Feeling, 25, 315
Fellatio, 153, 313
Fetichism, 243, 305
Fiction, neurotic, 335
Fire symbolism, 211
First impressions, 306, 312
Fixation, 54, 110, 191, 217, 224, 225, 328
Flagellation, 266, 267
Fleischmann, 12, 268, 284
Fliess, 14
Flight, 90, 181, 191, 209, 235
Fore-pleasure, 56
Form of intercourse, 63
Foot fetichism, 111
“Flying Dutchman,” 100, 163, 164
Freedom, 237
Freimark, H., 222, 243
Frenssen, 64
Freud, S., 28, 39, 42, 53, 56, 57, 90, 209, 227, 236, 314, 346
Friendship, 272, 332
Frigidity, 74
Fuchs, A., 12

Gastric disorder, 192, 215


Genetic factors, 246
Genital glands, 31
“Genuine” Don Juan, 218
Homosexual, 260
Gerontophilia, 61, 107, 224
Grandeur, 159
Gratification, 90, 107
“without guilt,” 212
“Great historic mission,” 163
Greeks, 40
Grillparzer, 80
Gonorrhea, 142, 168, 282, 286, 288
Gynandry, 24

Hallucination, 298
Hatred, 152, 233, 263, 273, 285, 300
Havelock Ellis, 20, 22, 27, 56
Healing, 326
Hebbel, 46
Heredity, 13, 20, 29, 32, 42,331, 338
Hermaphroditism, 25, 41
Heterosexual capacity, 175
excitation, 271
longing, 213
period, 291
persons, 223
stimuli, 312
Hirschfeld, 12, 17, 20, 22, 23, 25, 27, 30, 34, 36, 41, 61, 69, 70, 79, 81, 89,
186, 191, 245, 253, 256, 260, 261, 289, 308, 338, 339 passim, 346
Homage, 268
“Homosexual marriage,” 293
House symbolism, 326
Hypnotism, 168, 192
Hypothesis, 35
Hunger, 215, 216

Ideal, 55, 56, 129, 231, 332, 333


Identification, 35, 160, 161, 314, 328, 336
Imago, 246, 303
Impotence, psychic, 67, 260, 262, 317
Impulse, 131
Inborn, 20, 23, 41, 72, 80, 245
Incest, 96, 163, 201, 207, 210, 217, 224
Indifference, 33, 54, 244, 272, 289
Inebriety, vid. Alcoholism
Infantilism, 63, 145, 154, 162, 222, 269
Infatuation, 160, 162
Infection, 282, 284, 292
Inferiority, feeling of, 212, 336
Influence, maternal, 342
Inhibition, 49, 108, 176, 184, 187, 190, 200, 207, 213, 233, 236, 238, 242,
244, 260, 262, 274
Initiation, 202
Insanity, 248
Instability, 29
Instinct, 28, 44, 48, 311
“Instrumentum Diaboli,” 291
“Intermediate Sex,” 89, 245
Interpretation (dreams), 209, 325
Intoxication, psychic, 154, 158
Inversion, 69, 129
Isolation, 23

Jealousy, 188, 254, 259, 296, 299


Joint suicide, 63
Judgment-attitude, 333
Juliusburger, O., 254
Krafft-Ebing, 11, 12, 13 passim, 17, 22, 42, 48, 89, 227, 252, 256, 281, 282,
293, 296, 312, 315, 343
Kiernan, 41

Language of Dreams, 185


Late homosexuality, 89, 110, 227, 317, 319, 336
Latent, 13, 26, 57 passim, 63, 67, 79, 100, 109, 124, 172, 184, 250, 281
Libido, 56, 57, 72, 78, 88, 90, 103, 164, 252 passim
Locum tenens, 259
Lombroso, 41, 45
Loneliness, 177
Longing, 162
Love dreams, 292
excitation, 310
frenzy, 291
hunger, 130
Lesbian, 280
physical, 332
Platonic, 313
preparedness, 154
prostitute, 61
spiritual, 16, 332
Lure, 234

Magic, 221
Male attitude, 296
protest, 335
hero type, 26, 27, 242
Manipulatio cum digito, 87
Mannerism, 94, 95
“Mannish” women, 24
Manual gratification, 123, 135, 257
Marriage, 89, 105, 120
Masculinity, 79
Masochism, 73, 282, 350
Masks, 61, 65, 66, 68, 80, 95
Masturbation, 11, 14 passim, 64, 81, 106, 117, 135, 140, 144, 151, 165, 178,
192, 195, 197, 213, 257, 262, 270, 286, 292, 310, 325
Maupassant, 104
Mayer, E. V., 33
Mediation (through oppos. sex), 62, 67
Membrum virile, 258, 260, 271, 286, 310
Memory, 47, 137, 241, 245, 308, 314
Messalina type, 66, 90, 163, 175, 228
Misogyny, 99, 272, 273
Misophilia, 267
Moebius, 283
Moll, 18 passim, 20, 22
Monosexuality vid. Bisexuality
Mother complex, 213, 339
Imago, 186, 246, 335
Motherly feeling, 161
Mutterschutz, 230

Naecke, 20, 184, 269


Narcissism, 102, 227
“Natural” life, 333
Nausea, 226, 230, 236, 290, 303
Necrophilia, 131
Nervousness, 257, 286
“Neuropathic” constitution, 294
Neurosis, 17, 22, 27 passim, 41 passim, 45, 48, 55, 58, 96, 106, 122, 145,
215, 223, 237, 305, 324
Nietzsche, 334
Nutrition, 216
Nymphomania, 163

Object, sexual, 11
Obsession, 113, 120
Onanism, vid. Masturbation
Ontogenesis, 45
Orgasm, 74, 82, 184, 263, 267, 281, 293
Outbreak (of H.), 223
Over-compensation, 46
determination, 327

Paranoia, 39, 95
Paraphilia, 58, 146, 156, 268
Parents, 30
Passion, 89, 97, 144
Paul, Jean, 306
Pawlow, 35
Pederasty, 81
Perversion, 69, 102
Pfister, 320, 323, 326
Phallic symbol, 217
Phantasy, 70, 130, 300
Phobias, 68
Piety, 190, 200, 219, 235
Pilz, 349
Platen’s Diary, 290
Plato, 56
Pollution (dream), 212, 227, 313
Polygamic neurosis, 124
tendency, 176
Potentia, 133, 217, 257, 261
Polygamy, 237
Praetorius, Numa, 250, 251
Precocity, 45 passim, 47, 318
Predisposition, 31, 34, 36, 39, 41, 290
Preference for widows, 98
Priapism, 131
Prognosis, 216
Progression, 44
Prostitute, 61, 163, 178, 184, 217, 280, 285, 316
Prostitution, 57, 85, 106, 281
Protection, vid. Defence
Pseudo-Cassanova type, 99
Homosexuality, 24, 25, 247, 308
Pseudonym, choice of, 65
Psychic Homosexuality, 85
Urge, 183
Psycho-Analysis, 26, 27, 39, 47, 70, 109, 150, 158, 172, 190, 202, 225, 241,
244, 248, 268, 284, 300, 312, 328, 338
Psychosis, 58
Puberty, 31, 33, 124, 291, 294
Pursuit, 186, 191

Quest for sexual object, 164, 172


father, 312
Questionnaire, 255 passim, 348

Rationalization, 72, 247


Reality, 60
Recessive type, 45
Regression, 236
Relations, Platonic, 177
Religion, 218, 237
Religio-Sexual motives, 222
Remorse, 167, 214
Repetition, 327
Repression, 28, 39 passim, 43, 47, 49, 70, 225, 243, 271, 272, 315, 325
Reproach, 207
Research, sexual, 12
Resistance, 145, 153, 238, 245
Retif de la Bretonne, 99, 100, 111
Retrogression, 41, 45, 331
Retrospective tendency, 334
Revenge, 154, 168, 207
Reversed love, 152
Right and Left (symbolism), 130
Roemer, V., 32
Rôle of family, 172
Rousseau, 95
Sade, Marquis de, 283
Sadger, 245, 314, 337, 346
Sadism, 49, 131, 263, 272, 274
Satyriasis, 131 passim, 152, 154, 160, 250
Schmitz, O. A. H., 98, 100, 124
Schopenhauer, 283
Scorn, 218, 319
Secret pride, 213
Seduction, 99, 101, 160, 167, 253, 268, 285, 312
Sensuality, 165
Sexual object, 98, 103
Shakespeare, 46
Shyness, 177, 302, 310
Sister, attitude towards, 169
Imago, 223
Situs Inversus, 82, 84, 284
Starvation, 215
Stekel, 48
Stier, 12
Strindberg, 283
Struggle, 236
Sublimation, 39, 40, 49, 130, 271
Substitution, 187, 211
Succubus, 71, 161
Suicide, 105
Suppressed instincts, 96
Suspicion, 149
Symbol, 60, 81, 91, 129, 145, 211, 323
Symptomatic acts, 129
Syphilidophobia, vid. Fear of syphilis
Tarnovsky, 246, 247
Taste, 97
Temptation, 147, 164, 196
Tendency, 55, 89, 176
prospective, 222
Tension, sexual, 32
Therapy, 244
“Third” sex, 24
Timidity, 345
Touch, 252
Traits, male and female, 73, 94, 124
neurotic, 96
Transference, 88, 111, 153, 211
Transitional types, 103, 175
Transvestite, 69, 70, 336
Trauma, 23, 42, 119, 172, 196, 236, 238, 293, 297, 302, 305, 309, 320, 326,
327

Ulrichs, 36
Unconscious, 35
wish, 209
Undifferentiated, 31
Ungratified libido, 129
Urlind, 30, 78, 284, 297, 333, 341
Urning, 81, 333, 339, 341, 345
Urolagnia, 312

Van Teslaar, 44, 46


Variation, biologic, 20
Virchow, 20
Virgo intacta, 154
Virility, 100, 125
Vita Sexualis, 73, 145, 178, 270, 287, 300, 321
Vomiting, symptomatic, 199, 230

Warning, 260
Weininger, 283, 346
Westphal, 19
Whip (sadism), 265
“Will to power,” 337
Wish, 35, 38, 292, 325, 336
fulfillment, 214
Witches, fear of, 221
Woman, aggressive, 30, 350
“Womanly” men, 24
“World pain,” 334
Worry, 181
Ziemcke, 286
Zwischenstuffen, 25

-theorie, 245
FOOTNOTES:
[1] Hans Blüher: Studien ueber den perversen Charakter. Ztrbl.
f. Psychoanalyse, Oct., 1913.
[2] Neue Studien auf dem Gebiete der Homosexualitaet. Jahrb.
f. Sexuelle Zwischenstuffen, vol. III, Leipzig.
[3] This view of Krafft-Ebing is by no means “antiquated.” It is
still maintained by Stier (Zur Aetiologie des kontraeren
Sexualgefuehls. Monatschrf. f. Psych, u. Neurol., vol. XXXII, 1914)
and very energetically criticised (ibid.) by Hirschfeld and
Burchard. “It is inconceivable,” state the above named authors,
“how Stier can ascribe an etiologic significance to onanism in
connection with homosexuality. Its distribution, ubiquitous—in the
opinion of most specialists, would permit one to hold
masturbation responsible for any other sexual development as
well.” According to Stier, early and long-continued onanism
(especially mutual) is harmful because “it does away with the
feeling of shame in connection with one’s sexual organs and
makes for readier handling even by the uncorrupted adult.”
Fleischmann also finds 33 excessive onanists among 60 inverts
and concludes (Beitr. zur Lehre der kontraeren Sexualempfindung,
Zeitschr. f. d. ges. Neur. u. Psychol., vol. VII, 1911) that “like
alcoholism, masturbation must influence the development of the
perversion.” Many of his patients mentioned the habit in a casual
relation. We know well that the sense of guilt is attached to the
habit of masturbation. But Fleischmann sees in that a proof.
“Onanism plays a role in the development of the sexual
perversion,” he argues, “because it rouses an increased sexual
excitability while the will power is weakened by it at the same
time and there follows a progressive wandering of the sexual
instinct away from the normal sexual aim and object.”
[4] This contention is altogether wrong. I have never seen so
many and such pronounced idealists as among masturbators.
Young artists, poets and musicians in particular often show, I
have found, a strong tendency to masturbation, and this agrees
with the pronounced bisexuality of all artists, which has been
particularly pointed out by Fliess. The youths of this type are
often so delicate and sensitive that they see in the sexual act only
animal brutality and hide their own sexuality from the whole
world. Among masturbators we find the champions of truth, the
over-moralistic preachers, the ethical reformers and dreamers.
[5] Cf., on the other hand, the views of Bloch: “That the
contrary sexual instinct-feeling in itself is not a sign of psychic
degeneration and need not be looked upon at all as morbid, is
shown among others, by the fact that the condition is often
associated with spiritual superiority. As proof we find, among all
nations, men of proven homosexuality, who are the pride of their
respective people as writers, poets, artists, military strategists, or
statesmen. Further proof that the contrary sexual feeling is no
disease and does not necessarily lead to immoral tendencies may
be seen in all the noble qualities of heart which it is capable of
generating, precisely as the heterosexual attraction, such as
courage, self-sacrifice, altruism, artistic feeling, creative energy,
etc., just as it may be responsible also for any of the morbidities
and failings of heterosexual love (jealousy, suicide, murder,
unhappy love with its deleterious effects on mind and body, etc.)”
[6] It was clearly the duty of the new editor of Krafft-Ebing’s
popular work to have recorded therein the author’s latest views.
In his “Neuen Studien auf dem Gebiete der Homosexualitaet,” he
states: “In contrast with the conception that contrary sexuality is
an inborn anomaly, a disorder in the evolution of the sexual
function of monosexuals and of the glandular development of the
sex glands, the conception of ‘morbidity’ is untenable. We may
rather speak in this connection of a malformation and compare
the anomaly with bodily malformations,—for instance, with the
anatomic deviations from the average type. But the concept of a
simultaneous psychopathic state remains a legitimate assumption,
because subjects presenting anatomic as well as functional
deviations from type (stigmata degenerationis), may preserve
good physical health for a time, and may even show points of
superiority.
“At the same time so tremendous a deviation as contrary sexual
feeling must have a far wider influence upon the psyche than
many of the anatomic or functional stigmata of degeneration.
That is the reason why any disturbance in the usual development
of a normal sexual life reflects so commonly in an unfavorable
sense upon the harmonious psychic development of personality.
Victims of contrary sexual feeling often show neuropathic and
psychopathic predispositions, such as, for instance, a tendency to
constitutional neurasthenias and hysteria, milder forms of periodic
psychosis, inhibitions against the unfoldment of psychic energies
(intelligence, moral sense), including moral inferiority, especially
associated with hyper-sexuality, eventually leading to most
serious disorders of the sexual instinct. At any rate, it can be
shown that, relatively speaking, heterosexuals prove greater
cynics about sexual matters than the homosexuals. Also that
other degenerative signs upon the field of sexuality, such as
sadism, masochism, fetichism, etc., are much more commonly
found among the former....”
[7] Die kontraere Sexualempfindung, Symptom eines
neuropatischen (psychopathischen) Zustandes. Arch. f. Psych. u.
Neurol., vol. II, p. 106, 1870.
[8] Handbuch der Sexualwissenschaften (Die
Funktionsstærrungen des Sexuallebens.) Leipzig, Verlag F. C. W.
Vogel, 1912, p. 652.
[9] I find a very interesting observation by Bloch, one which
deserves to be widely circulated: “A final and not unimportant
form of Pseudo-homosexuality is hermaphroditism (das
Zwittertum). It is remarkable that science has concerned itself
only in recent years with the close study of hermaphroditic
conditions which have not received heretofore the attention
warranted by their sociologic bearings and their frequency. It is a
great merit of Neugebauer and of Magnus Hirschfeld that they
have called general attention to these remarkable sexual
Zwischenstufen, intermediary states, and have pointed out their
great practical significance, a matter of which no one has thought
before, as is shown by the significant fact that the new German
civil code has done away with the legal proscriptions of the old
Prussian law concerning the Zwitter (hermaphrodites), upon the
contention that no person is of unknown or unascertainable sex.”
[10] Hirschfeld emphasizes the fact that homosexuality has
nothing to do with organic bisexuality. He states:
“I deem it important to point out this fact: The most extreme
deviation of sexual type approaching the opposite sex, such as
hypertrophy of the clitoris and full facial hair growth in the
female, or hypospadia penis-scrotalis and gynecomasty in the
male are found linked with heterosexuality more often than with
homosexuality.”
[11] English version by J. S. Van Teslaar, in preparation.
[12] Verlag J. F. Bergmann, Wiesbaden, 1913. Vid. note above.
[13] Cf. Dichtung und Neurose, J. F. Bergmann. Authorized
English version by James S. Van Teslaar.
[14] Nervöse Angstzustaende. Die psychische Behandlung der
Epilepsie, 2nd edition, p. 336.
[15] Hirschfeld relates several instances illustrating how
heterosexual potence may be increased by the fires of
homosexual passion: A merchant relates: “I am able to carry out
sexual intercourse with women, only if I keep thinking of the man
who possessed the woman before me.” A young workingman
from Berlin relates: “When I was 17 years of age and I saw
young men of my age pick out sweethearts for themselves I did
the same. Later, as man, it seemed natural to me to get a
woman, although my own inclination had little to do with it. The
physical excitation necessary for the carrying out of the sexual act
I could rouse in myself only by thinking of some male person.
This sort of thing exhausted me and after a time I decided to give
it up. I felt myself strongly attracted to a relative at that time. He
was younger and as I had greater influence over women I helped
him by putting him in touch with some and so we often carried
out coitus together. Seeing him [go at it so hotly] excited me
tremendously and then I carried out coitus without any difficulty.”
The proprietor of a German hotel also relates that, before
intercourse with his wife, he was in the habit of rousing his
passion by kissing his head waiter. This furnished him the
requisite sexual preparedness and as quickly as possible he
hurried to his wife, whose bed was in the next room. Hirschfeld
writes further: “These sketches from life I want to conclude with
the account of a patient who consulted me for sexual
hyperesthesia which in his case was so keen that seeing the
statuettes of naked children ornamenting the Berlin castle bridge
while crossing it was enough to cause erection. He was a
merchant, 42 years of age. In order to obtain potentia coeundi it
was necessary for him not only to think, but also to speak aloud
of some pleasing man, in some such manner: “Did you notice
that servant of the Count’s, who called for a bundle this forenoon,
how did you like him? A neat boy, what? His livery seemed quite
new! Didn’t you think it fitted him a bit too tightly? How old
should you say he was?” Only by carrying on such talk with his
wife, and he had to exercise the greatest ingenuity in order to
cover his object while doing so, was he able to achieve
ejaculation, and to beget children,—he was the father of three.”
[16] Die Transvestiten. Eine Untersuchung ueber den
Erotischen Verkleidungstrieb. Alfred Pulvermacher. Berlin, 1910.
[17] (Cf. Angstzustaende, p. 417. An English translation of this
work is now in course of preparation and will appear shortly.)
[18] English translation by James S. Van Teslaar.
[19] Faust finds this temporarily in his Graetchen. But it is only
an episode and presently he is again restlessly searching until he
finds Helena, the most beautiful of all women. The Flying
Dutchman is released by a woman who remains true to the last in
her love of him. That is the projection of a subjective feeling upon
the woman. He wishes he could find a woman for whom he
would feel a love so dear that it would relieve him. In Ahasuerus
the same problem is glossed over with religious terms as the
problem seen in the Don Juan story as the requital of the all-
highest father. All four must be faithless, they cannot remain true
to one woman.
[20] Once I treated a man who had separated from his wife,
wanted to marry another woman with whom he had fallen in love
and to divorce his wife. In the course of our interviews during
that time this man said repeatedly: “I would not introduce you to
my first wife; you would fall in love with her if I did; no man can
help that.” At once I recognized that the man’s neurotic disorder
reached back to a suppressed love for his wife. In his mind there
rumbled continually sounds which he could not reproduce. He
recalled scraps of melodies which he could not place at all. But
once I was able to get at one such melody. It was a song of
which he did not know the words. When the matter was ferreted
out it was found that the words bore distinctly a reference to his
first wife. The vague melodies permitted his mind to dwell on her
and at the same time to cover from his consciousness the fact
that he could not keep her out of his mind. Here is a
characteristic passage from Eichendorff’s poem:

Ich kam von Walde hernieder,


Da stand noch das alte Haus;
Mein Liebchen schaute wieder
Wie einst zum Fenster hinaus—

Sie hat einen andern genommen—


Ich war draussen in Schlacht und Krieg—
Nun ist alles anders gekommen:—
Ich wollt es war wieder Krieg....
These verses represent a summary of his great conflict.
[21] Cf. chapter entitled, Der Pechvogel, in: Das Liebe Ich.
Verlag Otto Salle, Berlin.
[22] Der Traum als feinstes Reagens fuer die Art des Sexuellen
Empfindens. Monatschr. f. Kriminalpsychologie, 1905, and other
contributions.
[23] If homosexuals had only homosexual dreams, as Naecke
maintains, the fact would stand as a strong proof against my
conception that all men, including the homosexuals, are bisexual.
But as a matter of fact genuine homosexuals often have
heterosexual dreams if one cares to look into the subject
carefully. Hirschfeld, through a questionnaire, found that among
100 homosexuals, 13 per cent. dreamed all sorts of heterosexual
situations. Analytical investigation of their dream life would lift the
13 per cent. fully to one hundred per cent. The heterosexual
dreams are associated with anxiety feelings in many cases. They
dream that they are married and find themselves impotent, so
that they are confronted with the compulsion of carrying out
heterosexual intercourse. We find here one more confirmation of
the fact that the dream releases all the excitations repressed from
consciousness through the day.
[24] Correction of detail after first report of the dream.
[25] Cf. Hans Freimark, Das Sexuelle Moment in der religiösen
Exstase, Zeitschf. f. Religionsphilosophie, vol. II, No. 17; also, Das
Hexenproblem, Die Neue Generation, vol. VIII; and Sexuelle
Besessenheit ibid., vol. IX.
[26] The following statement of Hans Freimark on the
Züchtbarkeit der Homosexualität displays excellent insight into
human nature: “It does not require much psychology to note that
some persons are particularly impressed by and interested in
whatever popular belief ascribes as particularly characteristic of
homosexuality. Repression against homosexual deeds is in itself
almost invincible. But that which is considered the very essence
of homosexuality acts apart and frequently does so in a sense far
from proper. It is enough to induce young men who have no
other claim to distinctions to try to imitate these ‘singular doings’
and they become finally interested in the acts.... Once the pose is
assumed, it becomes part of reality, and then contact with the
homosexual circle contributes not a little towards strengthening
the attitude. Such an influence, naturally, is possible only among
young people. But the young are the ones who generally raise the
problem at all. It has been assumed that in view of the constancy
of the instinct, such a complete shifting from one sex to the
opposite is most unlikely. But since all investigators admit a
certain period of indifference, and since it is admitted further that
during that period the individual may abandon himself to an
eroticism contrary to the form adopted finally, the possibility
cannot be excluded that weak characters may be turned away
from their original developmental goal.”
[27] “The flight to homosexuality is the result of repulsing the
incest phantasy.” Nervöse Angstzustände, 1st ed., 1908, p. 311. A
translation of the latest edition of this work is in preparation and
will appear shortly.
[28] Berlin, 1886. Verl. Aug. Hirschwald.
[29] 3rd Ser., vol. XXXI, 1906.
[30] Alkohol und Homosexualität. Wiener klinische
Wochenschrift, 1913, No. 3.
[31] Krafft-Ebing also mentions a young man who carried out
his first homosexual aggression under the influence of alcohol. A
man who previous to that time had successful intercourse with
prostitutes while intoxicated grabbed hold of his friend’s genitals,
they masturbated ... and since that time he is homosexual.
[32] Zur Psychologie des Alkoholismus, Zentralbl. f.
Psychoanalyse u. Psychotherapie, vol. III, p. 1.
[33] Interesting is also the case of a high school teacher whose
feelings were predominantly homosexual during the stage of
depression and heterosexual during the stage of exaltation
induced by the addiction to morphine (Hirschfeld). There are
persons who live a double, alternating existence: homosexual and
heterosexual. Their conduct suggests that they are persons
continually in search of a bisexual ideal. Krafft-Ebing also
describes a hysterical (Jahrbuch f. Sexuelle Zwischenstufen, vol.
III) who is attracted to men each time that her neurosis improves
after a sojourn at a sanitarium, while during the height of her
trouble she is homosexual. What does this mean but that the
heterosexual cravings are repressed during her neurosis! For
notwithstanding her extensive homosexual gratifications she has
become a victim of severe hysteria while every time she improves
she feels the love for man.
[34] Cf. author’s contribution, Die psychische Impotenz des
Mannes. Zeitschr. f. Sexualwissenschaft, 1916.
[35] Beiträge zur Lehre von der konträren Sexualempfindung,
Zeitschr. f. Psychol, u. Neurol., vol. VII, 1911.
[36] Alkohol und Homosexualität. Allg. Zeitschr. f. Psychol. und
gerichtl. Medizin, vol. LXVIII.
[37] It is not true that homosexuals are exposed to no dangers
of infection. I have examined a homosexual druggist who
acquired in Venice a serious gonorrhea of the anus. He confessed
to me that he had infected other men, because the thought of
having fallen himself a victim made him angry. But on the whole
infections are not so frequent an occurrence as during
heterosexual intercourse, which is what would be expected,
considering that copulatio analis is relatively rare.
[38] I must also emphasize that the first homosexual activity
often takes place in the twenties, if we omit from consideration
the mutual gratifications between boys and between girls which—
with but very few exceptions—are found to occur during the
childhood of all persons. Between small children (4-8 years of
age) homosexual activity is very common, then in many cases a
period of latency seems to set in. During the period from the 10th
to the 15th year nearly every boy passes through homosexual
love (either purely platonic or grossly sexual). After the onset of
puberty there are numerous variations: persons who later
become homosexual continue heterosexual activity, try all sorts of
experiments and then withdraw into homosexuality in
consequence of some unpleasant heterosexual experience
(infection, claim of parenthood, etc.) or on account of impotence.
[39] As is well known Bloch has endeavored to show that
Schopenhauer’s antifeminism and pessimism are traceable to
syphilitic infection acquired during youth.
[40] Beiträge zur Lehre der kontraeren Geschlechtsempfindung.
Zeitschrift f. d. ges. Neurol. u. Pathologie, 1911.
[41] Zur Entstehung sexueller Perversitäten und ihrer
Beurteilung vor Gericht. Archiv f. Psychiatrie, vol. LI, 1913.
[42] We shall see later that this attitude is due to the fact that
these persons fix their whole heterosexual psychic eroticism upon
the immediate members of their family. Heterosexual men in this
situation often experience merely physical gratification during
intercourse with prostitutes; with the other type of women they
are wholly impotent.
[43] The following statement of Hirschfeld’s illustrates this point
(l.c., p. 315): “An urning, writer,—unus e multis—writes me: ‘The
homosexual inclination developed in me in spite of the fact that
the first sexual aggression was of a heterosexual character—a
nursemaid seduced me—in spite of the fact that through training
from childhood on I was taught to look at the female sex and my
reading of literature showed me that woman was the object of
love.’” I add: this tendency developed because the first sexual
experience was associated with disgust on his part and because
the domineering of woman led him to hate that sex.
[44] Die Darstellung der Neurose in Traums. Zentralblatt f.
Psychoanalyse. vol. III, p. 26.
[45] In a novel which is an autobiography and a confession at
the same time, the hero relates that during his first visit to the
brothel he had to think of his mother. (Erlebnisse des Zoeglings
Taxil. Wiener Verlag.) This book is interesting also because it
describes accurately the homosexual practices in a school of
cadets. The fact that young boys are impelled to think of their
mother when visiting the brothel for the first time is often the
cause of total impotence. Cf. Weininger: Geschlecht u. Charakter,
chapter: Mutter u. Dirne. The work has been translated into
English.
*** END OF THE PROJECT GUTENBERG EBOOK BI-SEXUAL LOVE;
THE HOMOSEXUAL NEUROSIS ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States
copyright in these works, so the Foundation (and you!) can copy
and distribute it in the United States without permission and
without paying copyright royalties. Special rules, set forth in the
General Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree
to abide by all the terms of this agreement, you must cease
using and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project Gutenberg™
works in compliance with the terms of this agreement for
keeping the Project Gutenberg™ name associated with the
work. You can easily comply with the terms of this agreement
by keeping this work in the same format with its attached full
Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and
with almost no restrictions whatsoever. You may copy it,
give it away or re-use it under the terms of the Project
Gutenberg License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country
where you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of
the copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute


this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must,
at no additional cost, fee or expense to the user, provide a copy,
a means of exporting a copy, or a means of obtaining a copy
upon request, of the work in its original “Plain Vanilla ASCII” or
other form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite these
efforts, Project Gutenberg™ electronic works, and the medium
on which they may be stored, may contain “Defects,” such as,
but not limited to, incomplete, inaccurate or corrupt data,
transcription errors, a copyright or other intellectual property
infringement, a defective or damaged disk or other medium, a
computer virus, or computer codes that damage or cannot be
read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except


for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU AGREE
THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT
LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT
EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE
THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY
DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE
TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL,
PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE
NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person
or entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you
do or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

ebookluna.com

You might also like