List of Figures

List of Figures

Chapter 1: Introducing Windows Vista

Figure 1-1: The Welcome Center
Figure 1-2: The System console
Figure 1-3: Changing the product key
Figure 1-4: The User Account Control dialog box

Chapter 2: Working with Windows Vista

Figure 2-1: The taskbar in Windows Vista
Figure 2-2: Working with Windows Flip view
Figure 2-3: Working with Windows Flip 3D view
Figure 2-4: The system clock
Figure 2-5: The Start menu
Figure 2-6: Control Panel

Chapter 3: Managing Information

Figure 3-1: The desktop, with Windows Sidebar and gadgets
Figure 3-2: The Sidebar Properties dialog box
Figure 3-3: The Add Gadgets dialog box
Figure 3-4: Using Windows Explorer
Figure 3-5: The Address bar in Windows Explorer
Figure 3-6: The taskbar in Windows Explorer
Figure 3-7: The Searches folder
Figure 3-8: The Properties dialog box

Chapter 4: Using Internet Explorer 7

Figure 4-1: The new interface in Internet Explorer 7
Figure 4-2: The Classic Menu and the standard toolbar in Internet Explorer 7
Figure 4-3: The Address bar in Internet Explorer 7
Figure 4-4: The Manage Add-Ons dialog box
Figure 4-5: Configuring security levels and zone options in Internet Explorer
Figure 4-6: A Web privacy report
Figure 4-7: Viewing and setting the privacy level

Chapter 5: Collaborating, Connecting, and Sharing

Figure 5-1: Using Windows Mail for e-mail and newsgroups
Figure 5-2: The Internet Connection Wizard
Figure 5-3: The Newsgroup Subscriptions dialog box
Figure 5-4: The Contacts window
Figure 5-5: Using color-coding in Windows Calendar to differentiate between one person’s appointments and tasks and another’s
Figure 5-6: The Windows Calendar main toolbar
Figure 5-7: Working with appointments in Windows Calendar
Figure 5-8: Working with tasks in Windows Calendar
Figure 5-9: Entering the publishing information for the calendar
Figure 5-10: Subscribing to a published calendar
Figure 5-11: Using Windows Shared View

Chapter 6: Managing Programs and Multimedia

Figure 6-1: Viewing startup programs in Software Explorer
Figure 6-2: Viewing running programs in Software Explorer
Figure 6-3: Viewing network-connected programs in Software Explorer
Figure 6-4: Working with installed programs
Figure 6-5: Configuring default programs and related settings
Figure 6-6: Configuring default programs and related settings
Figure 6-7: Turning Windows features on or off
Figure 6-8: Configuring Windows Media Player for the first time
Figure 6-9: Using Windows Media Player 11
Figure 6-10: The Navigation toolbar in Windows Media Player 11
Figure 6-11: The Address toolbar in Windows Media Player 11
Figure 6-12: The Controls toolbar in Windows Media Player 11
Figure 6-13: Using Windows Movie Maker
Figure 6-14: Using Windows Photo Gallery
Figure 6-15: The Navigation toolbar in Windows Photo Gallery
Figure 6-16: The Controls toolbar in Windows Photo Gallery

Chapter 7: Working with Laptops and Tablet PCs

Figure 7-1: Selecting a power plan
Figure 7-2: Configuring power plan options
Figure 7-3: Setting Power Button and Password Protection On Wakeup options
Figure 7-4: Setting pen tap options
Figure 7-5: Setting visual feedback options
Figure 7-6: Setting pen flick options
Figure 7-7: Using Windows Mobility Center
Figure 7-8: Specifying how to connect to the projector
Figure 7-9: Specifying the project address and password
Figure 7-10: Using Input Panel in writing pad mode
Figure 7-11: Using Snipping Tool in New Snip mode
Figure 7-12: Using Snipping Tool in Edit mode
Figure 7-13: Using Sticky Notes
Figure 7-14: Using Windows Journal
Figure 7-15: Copying handwriting as text

Chapter 8: Improving Accessibility

Figure 8-1: The Ease Of Access Center in Control Panel
Figure 8-2: Configuring Magnifier
Figure 8-3: The On-Screen Keyboard
Figure 8-4: Using Microsoft Narrator
Figure 8-5: The Welcome To Speech Recognition page
Figure 8-6: The Select Microphone page
Figure 8-7: The Adjust The Microphone Volume page
Figure 8-8: The Improve Speech Recognition Accuracy page

Chapter 9: Protecting User Accounts and Using Parental Controls

Figure 9-1: The shield icon indicates tasks that require administrator privileges
Figure 9-2: Marking an application to always run elevated
Figure 9-3: Disabling Admin Approval Mode
Figure 9-4: Accessing parental controls
Figure 9-5: Viewing and setting the games rating system to use
Figure 9-6: Setting general notifications
Figure 9-7: Enabling and configuring parental controls
Figure 9-8: Setting Web restrictions
Figure 9-9: Setting time limits
Figure 9-10: Setting game controls
Figure 9-11: Setting application restrictions
Figure 9-12: Viewing activity reports

Chapter 10: Protecting Your Computer

Figure 10-1: Using the Startup And Recovery dialog box to configure basic startup options
Figure 10-2: Using the System Configuration utility to configure advanced startup options
Figure 10-3: Using the NAP Client Configuration console to manage NAP
Figure 10-4: Enforcing NAP when DHCP is used
Figure 10-5: Using the Local Security Settings console to manage Audit Policy
Figure 10-6: Using the Local Security Settings console to manage User Rights Assignment policies
Figure 10-7: Using the Local Security Settings console to manage Security Options

Chapter 11: Protecting Your Data

Figure 11-1: Managing the TPM by using the Trusted Platform Module Management console
Figure 11-2: The Turn On BitLocker Drive Encryption wizard
Figure 11-3: The Save The Recovery Key As A Password page
Figure 11-4: The Save The Recovery Key On A USB Device page
Figure 11-5: The Create A Startup Key For Added Security page
Figure 11-6: The Encrypt The Selected Disk Volume page

Chapter 12: Networking Your Computer

Figure 12-1: Network Center shows that you are connected to a network that in turn has connectivity to the Internet.
Figure 12-2: Network Center shows that you are not connected to a network or the Internet.
Figure 12-3: The Windows Networks Diagnostics Tool offers step-by-step advice.
Figure 12-4: Connecting to a new network
Figure 12-5: The Personalize Settings dialog box
Figure 12-6: Using Network List
Figure 12-7: Using Network Map
Figure 12-8: Using Network Connections

Chapter 13: Securing Your Network Connection

Figure 13-1: Using Windows Security Center
Figure 13-2: Getting firewall recommendations
Figure 13-3: Getting antivirus recommendations
Figure 13-4: Getting antispyware recommendations
Figure 13-5: The Windows Firewall dialog box
Figure 13-6: Configuring exceptions in the Windows Firewall dialog box
Figure 13-7: Enabling security logging
Figure 13-8: Configuring allowed types of control messages
Figure 13-9: Windows Firewall With Advanced Security
Figure 13-10: Setting the firewall state
Figure 13-11: Setting the firewall behavior
Figure 13-12: Setting the logging options
Figure 13-13: Setting IPSec options
Figure 13-14: Viewing the currently defined inbound rules
Figure 13-15: Configuring inbound rules
Figure 13-16: Viewing the currently defined outbound rules
Figure 13-17: The Rule Type page
Figure 13-18: Viewing status in Windows Defender
Figure 13-19: Configuring general settings in Windows Defender
Figure 13-20: Performing a scan using Windows Defender
Figure 13-21: Selecting the drives and folders to scan

Chapter 14: Supporting Windows Vista

Figure 14-1: The Group Policy Management Console
Figure 14-2: The Windows Memory Diagnostics Tool
Figure 14-3: The Problem Reports And Solutions dialog box
Figure 14-4: The Windows Help And Support console
Figure 14-5: The Remote Assistance Wizard
Figure 14-6: Configuring Remote Assistance
Figure 14-7: Configuring Windows Update
Figure 14-8: Checking for updates
Figure 14-9: Viewing the update history
Figure 14-10: All services have recovery policy.
Figure 14-11: The Event Viewer
Figure 14-12: Creating a cross-log view
Figure 14-13: Using Task Scheduler
Figure 14-14: Creating a new task
Figure 14-15: Using triggers with scheduled tasks
Figure 14-16: Associating actions with scheduled tasks
Figure 14-17: Viewing a computer’s performance details and rating
Figure 14-18: Using the Windows Performance Diagnostic console
Figure 14-19: Using Reliability Monitor
Figure 14-20: Working with System Protection
Figure 14-21: Using Windows Backup

Chapter 15: Deploying Windows Vista

Figure 15-1: Starting Windows Easy Transfer