Boyce The book you need to succeed! Get the most out of Windows 7 with this complete guide Whether you’re new to Windows or moving from XP or Vista, this comprehensive book from a Microsoft expert will get you thoroughly up to speed on the much-anticipated new Windows 7. Covering all three parts of the new platform—the core OS, Windows Live Essentials, and Windows Live Services—this step-by- step guide is packed with practical techniques and tips. Get set up, manage files, blog, add Bluetooth, build a home network, and more. • Set up user accounts, security, parental controls, and printing • Get quick access to your programs with new Jump lists • Explore Windows Live Services such as Desktop Gadgets Gallery and Hotmail • Make movies, play music, share photos, and more with Windows Live Essentials • Manage files, understand metadata, and conduct power searches • Sync your hardware devices and performance tune everything • Keep track of your favorite Internet content with Web Slices • Create a home network or share files with HomeGroup Jim Boyce has been a Microsoft MVP, and has authored or coauthored over 50 books and hundreds of articles and white papers on computer topics including Windows, Windows Server, Office applications, and programming. He regularly contributes to several online sites and publications. Jim Boyce Shelving Category: COMPUTERS / Operating Systems / Microsoft Windows Reader Level: Beginning to Advanced $39.99 USA $47.99 Canada www.wiley.com/compbooks Personalize your new Windows 7 desktop Manage all hardware devices with one tool Easily share media across different computers Windows ® 7 Windows ® 7 Windows ® 7 Bible Jim Boyce Wiley Publishing, Inc. Windows® 7 Bible Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2009 by Jim Boyce Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-50909-8 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organi- zation or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or rec- ommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services please contact our Customer Care Department within the United States at (877) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be avail- able in electronic books. Library of Congress Control Number: 2009933373 Trademarks: Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Windows is a registered trademark of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc. is not associated with any product or vendor men- tioned in this book. About the Author Jim Boyce has authored and co-authored over 50 books on computers and technology covering operating systems, applications, and programming topics. He has been a frequent contributor to Microsoft.com, techrepublic.com, and other online publications. Jim has written for a number of print publications including Windows IT Pro, WINDOWS Magazine, InfoWorld, and others, and was a Contributing Editor and columnist for WINDOWS Magazine. Today, Jim is a Sr. Practice Manager for ACS, a premier provider of business process outsourcing and information technology services, where he leads a collaboration team providing collaboration services and development for multiple customers and over 30,000 users. Credits Executive Editor Carol Long Project Editor Kenyon Brown Technical Editor Todd Meister Production Editor Kathleen Wisor Copy Editors Susan Christophersen Kim Cofer Editorial Director Robyn B. Siesky Editorial Manager Mary Beth Wakefield Production Manager Tim Tate Vice President and Executive Group Publisher Richard Swadley Vice President and Executive Publisher Barry Pruett Associate Publisher Jim Minatel Project Coordinator, Cover Lynsey Stanford Proofreaders Kristy Eldredge, Word One Scott Klemp, Word One Jen Larsen, Word One Indexer Robert Swanson Cover Image Joyce Haughey Cover Designer Michael E. Trent A revision of an existing book is much different from a project started from scratch, in large part because the final result builds on the work of the previous author. So, first and foremost, I’d like to express my appreciation to Alan Simpson for all of his efforts in creating the body of work that the Windows 7 Bible is built upon. With such a short project timeline, having a solid foun- dation was critical. I’d also like to thank Rob Tidrow, Nathan Kuhn, and Tyler Regas for their help, particularly at the last minute, in pulling together content for the book so we could complete the project on time. I also want to recognize Carol Long and Carole McClendon for bringing me this opportunity. Finally, I offer my appreciation and thanks to the editorial team for their help in pulling together this project: Kenyon Brown, Todd Meister, Kathleen Wisor, Susan Christophersen, and Kim Cofer. It was a great experience. v Introduction ...................................................................................................................................xliii Part I: Getting Started, Getting Secure . . . . . . . . . . . . . . . . . . . . .1 Chapter 1: What’s New in Windows 7 .............................................................................................3 Chapter 2: Getting Around .............................................................................................................17 Chapter 3: Sharing and Securing with User Accounts ...................................................................57 Chapter 4: Parental Controls and Family Safety ............................................................................89 Chapter 5: Help, Support, and Troubleshooting ............................................................................99 Chapter 6: Troubleshooting Startup Problems .............................................................................111 Part II: Batten Down the Security Hatches . . . . . . . . . . . . . . . .115 Chapter 7: Blocking Hackers with Windows Firewall .................................................................117 Chapter 8: Conquering Malicious Software ..................................................................................131 Chapter 9: Automatic Updates as Security ...................................................................................145 Part III: Personalizing Windows 7 . . . . . . . . . . . . . . . . . . . . . . . 153 Chapter 10: Personalizing Your Work Environment ...................................................................155 Chapter 11: Ease of Access, Speech, and Language .....................................................................209 Chapter 12: Transferring Files from Another Computer .............................................................249 Chapter 13: Customizing Startup Options ...................................................................................261 Chapter 14: Using Windows 7 Programs and Accessories ..........................................................275 Chapter 15: Troubleshooting Customization Problems ...............................................................307 Part IV: Using the Internet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .315 Chapter 16: Using Internet Explorer ............................................................................................317 Chapter 17: Blogging with Writer ................................................................................................373 Chapter 18: Using Windows Live Mail ........................................................................................399 Chapter 19: Chatting and Texting with Windows Live Messenger .............................................489 Chapter 20: Beyond E-Mail and the Web ....................................................................................501 Chapter 21: Managing Names and Addresses ..............................................................................531 Chapter 22: Troubleshooting Internet Problems ..........................................................................543 Part V: Pictures, Music, and Movies . . . . . . . . . . . . . . . . . . . . . 551 Chapter 23: Working with Pictures ..............................................................................................553 Chapter 24: Making Music with Media Player .............................................................................597 Chapter 25: DVD, Video, and More .............................................................................................647 Chapter 26: Fun with Media Center .............................................................................................661 Chapter 27: Troubleshooting Multimedia ....................................................................................679 vii Contents at a Glance Part VI: Managing Files and Folders . . . . . . . . . . . . . . . . . . . . . 683 Chapter 28: Understanding Drives, Folders, and Files ................................................................685 Chapter 29: Managing Files and Folders ......................................................................................739 Chapter 30: Searching for Files and Messages on Your Computer .............................................767 Chapter 31: Metadata and Power Searches ..................................................................................783 Chapter 32: Using CDs and DVDs ...............................................................................................805 Chapter 33: Protecting Your Files .................................................................................................831 Chapter 34: Troubleshooting Files and Folders ...........................................................................851 Part VII: Printing, Faxing, and Scanning . . . . . . . . . . . . . . . . . .857 Chapter 35: Installing and Managing Printers ..............................................................................859 Chapter 36: Printing Documents and Screenshots .......................................................................873 Chapter 37: Managing Print Jobs ..................................................................................................881 Chapter 38: Faxing and Scanning .................................................................................................891 Chapter 39: Troubleshooting Printing and Faxing .......................................................................909 Part VIII: Installing and Removing Programs . . . . . . . . . . . . . 915 Chapter 40: Installing and Upgrading Programs ..........................................................................917 Chapter 41: Getting Older Programs to Run ................................................................................927 Chapter 42: Repairing and Removing Programs ..........................................................................937 Chapter 43: Setting Default Programs ..........................................................................................945 Chapter 44: Managing Programs and Processes ...........................................................................957 Chapter 45: Troubleshooting Software Problems .........................................................................971 Part IX: Hardware and Performance Tuning . . . . . . . . . . . . . . 983 Chapter 46: Installing and Removing Hardware ..........................................................................985 Chapter 47: Using Wireless Bluetooth Devices ..........................................................................1009 Chapter 48: Syncing Devices ......................................................................................................1023 Chapter 49: Performance Tuning Your System ..........................................................................1037 Chapter 50: Troubleshooting Hardware and Performance ........................................................1069 Part X: Networking and Sharing . . . . . . . . . . . . . . . . . . . . . . . .1077 Chapter 51: Creating a Home Network ......................................................................................1079 Chapter 52: Sharing Resources on a Network ...........................................................................1099 Chapter 53: Using Shared Resources ..........................................................................................1117 Chapter 54: Troubleshooting Networks .....................................................................................1131 Part XI: Appendixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1141 Appendix A: Upgrading to Windows 7 ......................................................................................1143 Appendix B: Installing Windows 7 on a New System ...............................................................1147 Appendix C: Universal Shortcut Keys ........................................................................................1151 Index ............................................................................................................................................1161 viii Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xliii Part I: Getting Started, Getting Secure 1 Chapter 1: What’s New in Windows 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Taskbar and Full-Screen Improvements .................................................................................3 Jump Lists ................................................................................................................................5 New Ways to Work in Windows ............................................................................................5 Internet Explorer 8 ..................................................................................................................6 Instant search .................................................................................................................6 Web slices ......................................................................................................................6 Accelerators ....................................................................................................................6 Better navigation ............................................................................................................7 InPrivate browsing .........................................................................................................8 Other new IE features ...................................................................................................9 Windows Live ..........................................................................................................................9 Better Device Management ....................................................................................................10 Homegroup ............................................................................................................................11 Performance and Battery Life ................................................................................................12 Look and Feel ........................................................................................................................12 Troubleshooting and Alerts ...................................................................................................13 Music and Video Sharing ......................................................................................................14 . . . and More ..........................................................................................................................15 Wrap-Up ................................................................................................................................15 Chapter 2: Getting Around . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Terminology for Things You Do ...........................................................................................17 Mouse terminology ......................................................................................................18 Point ..................................................................................................................18 Click ..................................................................................................................18 Double-click ......................................................................................................18 Right-click ..........................................................................................................18 Drag ...................................................................................................................19 Keyboard terminology .................................................................................................19 Tab, Enter, and Spacebar ..................................................................................19 If in doubt, Escape key out ...............................................................................20 ix Contents The Help key (F1) .............................................................................................20 The Key ......................................................................................................20 Shift, Ctrl, and Alt .............................................................................................20 Shortcut keys .....................................................................................................20 Logging In ..............................................................................................................................21 What’s on the Desktop ..........................................................................................................22 Using the Start Menu ............................................................................................................23 The right side of the Start menu .................................................................................24 The Start menu Search box .........................................................................................26 The Power button ........................................................................................................27 Using Jump Lists ...................................................................................................................29 Using the Windows Desktop ................................................................................................30 About desktop icons ....................................................................................................30 Arranging desktop icons .............................................................................................32 Running Programs .................................................................................................................33 The active window ......................................................................................................35 Switching among open programs ...............................................................................35 Switching with taskbar buttons ........................................................................35 Switching with the keyboard ............................................................................35 Switching with Flip 3D .....................................................................................36 Arranging program windows ......................................................................................37 Sizing program windows .............................................................................................39 Maximize a program window ...........................................................................39 Minimize a program window ............................................................................41 Size at will .........................................................................................................41 Moving a program window .........................................................................................44 Moving and sizing from the keyboard ........................................................................44 Closing a Program .................................................................................................................45 Using the Notification Area ...................................................................................................46 Showing/hiding notification icons ..............................................................................47 Responding to notification messages ..........................................................................48 Using scroll bars ..........................................................................................................49 Using Back and Forward buttons ...............................................................................50 The Getting Started Item .......................................................................................................52 Quick Help for Getting Started .............................................................................................53 Logging Off, Shutting Down .................................................................................................54 Stuff You Can Do with a Computer .....................................................................................54 Wrap-Up ................................................................................................................................55 Chapter 3: Sharing and Securing with User Accounts . . . . . . . . . . . . . . 57 Logging In and Out of User Accounts ..................................................................................57 Where am I now? ........................................................................................................58 Logging out of an account ..........................................................................................58 Creating Strong Passwords ....................................................................................................60 Remembering passwords .............................................................................................61 x Contents Devising a password hint ............................................................................................62 Types of User Accounts .........................................................................................................62 The built-in Administrator account ............................................................................62 Administrative user accounts ......................................................................................63 Standard accounts .......................................................................................................63 Guest account ..............................................................................................................63 Creating and Managing User Accounts .................................................................................64 Creating a user account ...............................................................................................65 Changing user accounts ..............................................................................................66 Changing a user account type .....................................................................................67 Password-protecting an account .................................................................................67 Changing the account picture .....................................................................................69 Changing the account name .......................................................................................69 Enabling or disabling the Guest account ....................................................................70 Navigating through user account pages ......................................................................70 Creating a Password Reset Disk ............................................................................................71 Using the password reset disk ....................................................................................72 Cracking into standard user accounts ........................................................................72 Deleting User Accounts .........................................................................................................73 Using User Accounts .............................................................................................................74 Understanding User Account Control (UAC) .............................................................75 Privilege escalation in administrative accounts ...........................................................77 Turning UAC on and off .............................................................................................78 Running Programs as Administrator .....................................................................................80 Add the Built-in Administrator Account to the Login Screen ..............................................81 Stop Entering Password on Lockout .....................................................................................81 Advanced Security Tools .......................................................................................................82 About Windows CardSpace ..................................................................................................82 Using Credential Manager .....................................................................................................83 Managing Profile Properties and Environment Variables .....................................................86 Linking Online IDs with Windows Accounts .......................................................................86 Wrap-Up ................................................................................................................................88 Chapter 4: Parental Controls and Family Safety . . . . . . . . . . . . . . . . . . . 89 Before You Get Started ..........................................................................................................89 Using the Built-In Parental Controls .....................................................................................90 Getting to the Parental Controls Page .........................................................................90 Setting time limits .......................................................................................................90 Controlling game play .................................................................................................91 Blocking and allowing programs ................................................................................93 Using Parental Controls from Windows Live .......................................................................94 Defining Web restrictions ...........................................................................................95 Get Web sites working ................................................................................................96 Viewing User Activity Reports ..............................................................................................97 Wrap-Up ................................................................................................................................98 xi Contents Chapter 5: Help, Support, and Troubleshooting . . . . . . . . . . . . . . . . . . 99 Introducing Help and Support ..............................................................................................99 Navigating Help .........................................................................................................101 Using the Search box ................................................................................................103 Online Help and Offline Help ..................................................................................103 Help from People ................................................................................................................104 Remote assistance ......................................................................................................105 Windows communities .............................................................................................105 Microsoft customer support ......................................................................................107 Troubleshooting ...................................................................................................................108 Wrap-Up ..............................................................................................................................109 Chapter 6: Troubleshooting Startup Problems . . . . . . . . . . . . . . . . . . . 111 The Computer Won’t Start ..................................................................................................111 Non-System Disk or Disk Error message .................................................................111 Computer starts but mouse and keyboard don’t work ............................................112 Computer keeps trying to start but never gets there ...............................................112 Screen turns blue during startup and then stops .....................................................112 Computer Takes Too Long to Start ....................................................................................112 Restore system files to an earlier time ......................................................................113 Repair Install Windows 7 ..........................................................................................113 The instruction manual that came with your computer ..........................................113 Resources in this book ..............................................................................................113 Resources in Windows Help .....................................................................................114 Online resources ........................................................................................................114 Programs Won’t Start ..........................................................................................................114 Part II: Batten Down the Security Hatches 115 Chapter 7: Blocking Hackers with Windows Firewall . . . . . . . . . . . . . . 117 How Firewalls Work ...........................................................................................................117 What a firewall doesn’t protect against ....................................................................118 Introducing Action Center ..................................................................................................119 Turning Windows Firewall on or off ........................................................................119 Making Exceptions to Firewall Protection ..........................................................................121 Manually configuring firewall exceptions (allowed programs) ................................121 Adding a program exception ....................................................................................123 Disabling, changing, and deleting exceptions ..........................................................124 Advanced Firewall Configuration .......................................................................................125 Open the Windows Firewall with Advanced Security icon .....................................125 Changing Firewall Profile Properties ........................................................................126 Firewall alerts, unicast responses, local administrator control ......................126 Security Logging ..............................................................................................126 Customizing IPsec settings ..............................................................................127 xii Contents Inbound and Outbound Rules ..................................................................................128 Wrap-Up ..............................................................................................................................129 Chapter 8: Conquering Malicious Software . . . . . . . . . . . . . . . . . . . . . 131 Types of Malware ................................................................................................................131 Viruses and worms ....................................................................................................131 Spyware and adware .................................................................................................132 Trojan horses and rootkits ........................................................................................132 Conquering Spyware with Windows Defender ..................................................................132 Opening Windows Defender ....................................................................................133 Removing spyware from your computer ..................................................................133 Doing a quick scan ..........................................................................................135 Doing a custom scan .......................................................................................135 Automatic scanning .........................................................................................135 Preventing spyware .........................................................................................137 Excluding files and folders ..............................................................................138 Advanced and Administrator configuration options ......................................138 Disallowing allowed programs ..................................................................................138 Joining the SpyNet community .................................................................................139 Windows Defender Web site ....................................................................................139 Using Antivirus Software .....................................................................................................140 Virus protection .........................................................................................................141 Antivirus and Action Center .....................................................................................142 User Account Control and Malware ...................................................................................143 The Malicious Software Removal Tool ...............................................................................143 Wrap-Up ..............................................................................................................................144 Chapter 9: Automatic Updates as Security . . . . . . . . . . . . . . . . . . . . . . 145 Understanding Automatic Updates .....................................................................................145 Updates versus upgrades ...........................................................................................146 Why updates are important ......................................................................................146 Enabling Automatic Updates ...............................................................................................146 Managing Updates ...............................................................................................................147 Managing optional updates .......................................................................................147 Change how updates work .......................................................................................149 Reviewing and removing updates .............................................................................150 Thwarting Exploits with DEP .............................................................................................150 Wrap-Up ..............................................................................................................................152 Part III: Personalizing Windows 7 153 Chapter 10: Personalizing Your Work Environment . . . . . . . . . . . . . . . 155 Using the Personalization Page ...........................................................................................155 Choosing a theme ......................................................................................................156 Personalizing your desktop background ..................................................................159 xiii