
Microsoft Windows XP Networking Inside Out
.pdf
Table of Contents |
|
Planning for the Future . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 291 |
Installing the Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 291 |
Setting Up the Workgroup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 294 |
Configuring Other Windows XP Computers . . . . . . . . . . . . . . . . . |
. 298 |
Configuring Computers Running Earlier Windows Versions . . . . . |
. 298 |
Configuring Network Clients Manually . . . . . . . . . . . . . . . . . . . . |
. 299 |
Changing the IP Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 300 |
Using Internet Connection Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 301 |
How ICS Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 302 |
Managing ICS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 303 |
Changing ICS Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 307 |
Common Workgroup Problems and Solutions . . . . . . . . . . . . . . . . . . . . |
. 308 |
Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 308 |
Windows 95 Clients Cannot Connect . . . . . . . . . . . . . . . . . . . . . . |
. 309 |
Manually Assigned Static IP |
|
Addresses Cause Conflicts or Access Problems . . . . . . . . . . . . . . |
. 309 |
The ICS Host Does Not Work . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 309 |
Internet Usage with ICS Is Slow . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 310 |
A Client Can Connect to Other Network |
|
Clients, But None Can Connect to Him . . . . . . . . . . . . . . . . . . . . |
. 310 |
ICS Clients Cannot Autodial an AOL Connection . . . . . . . . . . . . |
. 310 |
Chapter 11 |
|
Understanding Domain Connectivity |
311 |
Understanding Active Directory Domains . . . . . . . . . . . . . . . . . . . . . . . |
. 311 |
Running Windows XP Professional in a Domain Environment . . . . . . . . |
. 321 |
Joining a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 322 |
Joining a Domain with Wizard Help . . . . . . . . . . . . . . . . . . . . . . . |
. 323 |
Joining a Domain Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 327 |
Logging On to a Windows Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 328 |
Ensuring That You Have Logged On to the Domain . . . . . . . . . . . . . . . |
. 330 |
Surveying Windows XP Changes in a Domain Setting . . . . . . . . . . . . . |
. 330 |
Start Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 330 |
Ctrl+Alt+Delete . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 331 |
User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 331 |
Internet Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 335 |
Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 335 |
Finding Domain Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 336 |
Browsing for Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 337 |
Searching Active Directory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 337 |
Creating a Network Place or Mapping a Network Drive . . . . . . . |
. 339 |
Using the UNC Path or HTTP Address . . . . . . . . . . . . . . . . . . . . . |
. 343 |
Leaving a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 344 |
Accessing Domain Resources from Windows XP Home Edition . . . . . . |
. 344 |
x

Table of Contents |
|
Chapter 12 |
|
Solving Connectivity Problems |
345 |
Using Command-line Tools Included in Windows XP . . . . . . . . . . . . . |
. . 345 |
Using Ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 346 |
Using Tracert . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 351 |
Using PathPing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 352 |
Using Ipconfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 354 |
Using Netstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 355 |
Using Nbtstat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 356 |
Running Additional Network Support Tools . . . . . . . . . . . . . . . . . . . . . |
. . 356 |
Running Network Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 356 |
Using Windows Support Tools . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 359 |
Finding Helpful Utilities on the Internet . . . . . . . . . . . . . . . . . . . . . . . |
. . 363 |
Ping Plotter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 363 |
VisualRoute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 364 |
NetPerSec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 364 |
Troubleshooting Network Connections . . . . . . . . . . . . . . . . . . . . . . . . |
. . 366 |
A Philosophy of Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . |
. . 366 |
Solving Common Network Connection Problems . . . . . . . . . . . . |
. . 367 |
Part 4 |
|
Network Resources |
371 |
Chapter 13 |
|
Selecting a File System |
373 |
Understanding FAT32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 373 |
Understanding NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 376 |
newfeature! |
|
New NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 378 |
Exploring NTFS Features in Windows XP . . . . . . . . . . . . . . . . . . . . . . |
. . 380 |
Dynamic Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 380 |
Change Journal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 383 |
NTFS Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 383 |
File Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 384 |
File and Folder Access Control List . . . . . . . . . . . . . . . . . . . . . . |
. . 385 |
Indexing Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 385 |
Sparse File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 386 |
Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 386 |
Volume Mount Points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 387 |
Distributed Link Tracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 387 |
Multiple Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 387 |
Selecting a File System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 388 |
Configuring NTFS Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 389 |
Converting a Disk to NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 389 |
xi

Table of Contents
Enabling Disk Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
Enabling Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
Enabling Disk Quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Mounting a Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
Chapter 14 |
|
Understanding Resource |
|
Sharing and NTFS Security |
397 |
Understanding Network Resource Access . . . . . . . . . . . . . . . . . . . . . . |
. . 398 |
Sharing Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 400 |
Sharing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 400 |
Sharing the Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 400 |
Assigning Printer Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 402 |
Connecting to a Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 406 |
Managing the Shared Printer . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 407 |
Sharing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 419 |
Sharing Resources with Simple File Sharing Enabled . . . . . . . . . . |
. 419 |
Managing Permissions with Simple File Sharing Disabled . . . . . . |
. 426 |
Removing Simple File Sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 426 |
Assigning Share and NTFS Permissions . . . . . . . . . . . . . . . . . . . . |
. 427 |
Managing Shares with Network Tools . . . . . . . . . . . . . . . . . . . . . |
. 429 |
Solving Common Problems with Network Shares . . . . . . . . . . . . . |
. 433 |
Configuring NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 433 |
Setting Advanced NTFS Permissions . . . . . . . . . . . . . . . . . . . . . . |
. 437 |
Checking an Account’s Effective Permissions . . . . . . . . . . . . . . . . |
. 438 |
Exploring Scenarios to Troubleshoot NTFS Permissions . . . . . . . . . |
. 441 |
Chapter 15 |
|
Making Files Available Offline |
449 |
Enabling the Offline Files Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 450 |
Configuring Offline Files Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 452 |
Making a File or Folder Available Offline . . . . . . . . . . . . . . . . . . . . . . . |
. 453 |
Using Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 455 |
Synchronizing Offline Files and Folders . . . . . . . . . . . . . . . . . . . . . . . . |
. 457 |
Setting Synchronization Options . . . . . . . . . . . . . . . . . . . . . . . . . |
. 459 |
Stop Using an Offline File or Folder . . . . . . . . . . . . . . . . . . . . . . . |
. 463 |
Managing Caching Options on the Server . . . . . . . . . . . . . . . . . . . . . . |
. 463 |
Handling Network Disconnections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 464 |
Troubleshooting Offline Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 466 |
Using Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 467 |
Creating a Briefcase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 467 |
Synchronizing Files with Briefcase . . . . . . . . . . . . . . . . . . . . . . . . |
. 469 |
Choosing Between Briefcase and Offline Files . . . . . . . . . . . . . . . . . . . |
. 469 |
xii

Table of Contents |
|
Part 5 |
|
Advanced Networking |
471 |
Chapter 16 |
|
Remote Desktop and Remote Assistance |
473 |
newfeature! |
|
Exploring Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 473 |
Enabling Remote Desktop on the Host Computer . . . . . . . . . . . |
. . 475 |
Using Remote Desktop over a Dial-up Connection . . . . . . . . . . |
. . 477 |
Using Remote Desktop over the Internet/Firewall . . . . . . . . . . . |
. . 477 |
Using Remote Desktop Through a Remote Access Server . . . . . |
. . 479 |
Configuring the Client Computer . . . . . . . . . . . . . . . . . . . . . . . . |
. . 480 |
Logging On Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 486 |
Generating a Remote Desktop |
|
Session with Microsoft Internet Explorer . . . . . . . . . . . . . . . . . . |
. . 487 |
Choosing Remote Desktop Options . . . . . . . . . . . . . . . . . . . . . . |
. . 490 |
Remote Desktop and Group Policy . . . . . . . . . . . . . . . . . . . . . . . |
. . 494 |
newfeature!
Exploring Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 Using Remote Assistance Through Firewalls . . . . . . . . . . . . . . . . . . 496 Enabling Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 498 Requesting Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . 499 Using Remote Assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501
Chapter 17 |
|
Remote Access and |
|
Virtual Private Networking |
503 |
Using Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 504 |
Configuring Remote Access Connections . . . . . . . . . . . . . . . . . . |
. . 504 |
Configuring Remote Access Security . . . . . . . . . . . . . . . . . . . . . |
. . 506 |
Allowing Clients to Dial in to Your Computer . . . . . . . . . . . . . . . . |
. 510 |
Understanding Virtual Private Networking . . . . . . . . . . . . . . . . . . . . . . |
. 513 |
Creating a Connection to a VPN Server . . . . . . . . . . . . . . . . . . . . |
. 515 |
Configuring Windows XP to Act as a VPN Server . . . . . . . . . . . . |
. 516 |
Chapter 18 |
|
Interconnectivity with Other Systems |
519 |
Connecting with Windows XP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519 Supported Networking Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Supported Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 Connecting Windows XP and Novell NetWare . . . . . . . . . . . . . . . . . . . . 523 Configuring Client Service for NetWare . . . . . . . . . . . . . . . . . . . . . 525 Interconnecting Windows XP and UNIX/Linux . . . . . . . . . . . . . . . . . . . . 526
xiii

Table of Contents |
|
Installing Print Services for UNIX . . . . . . . . . . . . . . . . . . . . . . . |
. . . 526 |
Microsoft Windows Services for UNIX . . . . . . . . . . . . . . . . . . . |
. . . 527 |
Connecting Windows XP to Apple Macintosh Systems . . . . . . . . . . . . |
. . 529 |
Connecting Windows and Mac OS X Using Samba . . . . . . . . . . |
. . 529 |
Macintosh File Services for Windows 2000 Server . . . . . . . . . . . |
. . 530 |
Chapter 19 |
|
Wireless Networking |
531 |
Getting to Know Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . |
. . 531 |
Why Wireless Networks Are Important . . . . . . . . . . . . . . . . . . . |
. . 532 |
Types of Wireless Networking . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 533 |
Wireless Networks Supported by Windows XP . . . . . . . . . . . . . . |
. . 535 |
How Infrared and Wi-Fi Work . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 536 |
Wireless Networking Hardware . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 539 |
Selecting a Wireless Network Topology . . . . . . . . . . . . . . . . . . . |
. . 540 |
Understanding Wireless Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 542 |
Setting Up Your Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 544 |
Setting Up an Infrared Wireless Network . . . . . . . . . . . . . . . . . . |
. . 544 |
Setting Up a Wi-Fi Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 551 |
Chapter 20 |
|
Maintaining Network Security |
557 |
Examining Windows Security History . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 558 |
Understanding Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 560 |
Understanding Network-initiated Threats . . . . . . . . . . . . . . . . . . |
. . 560 |
Understanding Local Security Threats . . . . . . . . . . . . . . . . . . . . |
. . 564 |
Protecting Windows XP from Security Threats . . . . . . . . . . . . . . . . . . |
. . 566 |
Using a Firewall for Protection from Network-initiated Threats |
. . . 566 |
Inbound vs. Outbound Firewalls . . . . . . . . . . . . . . . . . . . . . . . . |
. . 568 |
TCP/IP Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 569 |
Detecting Windows XP Security Issues . . . . . . . . . . . . . . . . . . . . |
. . 572 |
Keeping Software Up to Date . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 573 |
Removing Unneeded Services . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 574 |
Securing IIS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 577 |
Using Netstat to Observe IP Connections . . . . . . . . . . . . . . . . . |
. . 584 |
Configuring Network Shares . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 585 |
Securing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 585 |
Securing Remote Access Connections . . . . . . . . . . . . . . . . . . . . |
. . 586 |
Securing Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 588 |
Protecting Windows XP from Viruses . . . . . . . . . . . . . . . . . . . . . |
. . 590 |
Coping with E-mail Security Threats . . . . . . . . . . . . . . . . . . . . . |
. . 591 |
Detecting Trojan Horse Applications . . . . . . . . . . . . . . . . . . . . . . |
. . 591 |
Using Internet Explorer Safely . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 592 |
xiv

Table of Contents |
|
Using Administrative Privileges . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 593 |
Protecting Files Using NTFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 593 |
Auditing Logon Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 593 |
Auditing File System Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 594 |
Managing EFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. 595 |
Chapter 21 |
|
Monitoring Windows XP |
|
Network Performance |
597 |
Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Understanding Bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Detecting Bottlenecks with Windows XP Command-line Tools . . . . 599 Using Windows Task Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Using the Performance Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 603
Part 6 |
|
Appendix |
611 |
Appendix A |
|
Windows XP Service Pack 1 |
613 |
Default Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . |
. . 613 |
Glossary |
617 |
Index to Troubleshooting Topics |
629 |
Index |
631 |
xv
This page intentionally left blank
Acknowledgments
I would like to thank Alex Blanton for giving me the opportunity to write this book, and a big thanks also goes to Aileen Wrothwell for her guidance. A special thanks goes to David Dalan for his extra help and Jim Causey for bringing it all together. Thanks to Curtis Philips for a great technical review. Also, thanks to my agent, Margot Maley Hutchison, for her work on my behalf. Lastly and as always, thanks to my wife and children for their support.
— Curt Simmons
First and foremost, I’d like to thank Aileen Wrothwell and Curtis Philips for being such a fantastic team to work with. With a flair for both technical issues and the written word, Curt is the most amazing technical editor I’ve ever had the pleasure of working with.
Aileen is a complete joy to work for — fun, intelligent, and supportive. I’ve never had so much fun while writing. Thanks also to Alex Blanton and to Danielle Bird for giving me the opportunity to work on this project.
I’d also like to make a special mention of my friend and boss, Mark Lynch. If he hadn’t given me a shot all those years ago, my life and career would be nothing like they are today. Thanks for the continued support, and for everything.
Thanks also to my good friends Steve Hood, Ken Rawlings, Daniel Orrego, Ryan Hartman, Tina Golini, and especially Jennifer Dover for being there for me always, through thick and thin. Thanks to my mom, dad, and brother David for always being there too, and for everything else. My cat Miranda has also been supportive, understanding, and loving throughout this period, knowing when I needed a lap cat and when I just needed to be left to my thoughts. Meow. A final thanks to Stew, Chad, Joe (and Joe), Mary, Fitz, Brent, Kenny, P. Kevin, Matt, Art, Erica, Julie, Tom, Greg, Stacey, and everyone else who makes my life so pleasant.
— James F. Causey
The following members of the Microsoft community contributed their knowledge and expertise to reviewing the book’s content:
Tom Fout, Joseph Davies, Dennis Morgan, Ethan Zoller, Igor Kostic, Kenny Richards, Anton Krantz, Rob Trace, Ricardo Stern, Matt Powell, Jason Garms, Josh Rice, Ross Carter, Greg Gille, Sanjay Anand, Stewart Tansley, Avronil Bhattacharjee, Mihai Costea, Brian Aust, Brian Dewey, Jeffrey Saathoff, and Leon Braginski.
xvii
This page intentionally left blank
We’d Like to Hear from You!
Our goal at Microsoft Press is to create books that help you find the information you need to get the most out of your software.
The INSIDE OUT series was created with you in mind. As part of an effort to ensure that we’re creating the best, most useful books we can, we talked to our customers and asked them to tell us what they need from a Microsoft Press series. Help us continue to help you. Let us know what you like about this book and what we can do to make it better. When you write, please include the title and author of this book in your e-mail, as well as your name and contact information. We look forward to hearing from you.
How to Reach Us
E-mail: nsideout@microsoft.com
Mail: Inside Out Series Editor
Microsoft Press
One Microsoft Way
Redmond, WA 98052
Note: Unfortunately, we can’t provide support for any software problems you might experience. Please go to http://support.microsoft.com for help with any software issues.
xix