Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Commonly used cmd Shortcut Command

2025-01-17 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

Gpedit.msc-- group policy 2. Sndrec32--- tape recorder 3. Nslookup---IP address detector is a command line tool to monitor whether the DNS server in the network can correctly implement domain name resolution. It can be used in Windows NT/2000/XP, but it is not integrated in Windows 98. 4. Explorer--- opens Explorer 5. Logoff--- logout command 6. Shutdown---60 seconds countdown shutdown command 7. Lusrmgr.msc-- native users and groups 8. Services.msc- local service settings 9. Oobe/msoobe / Amure-check whether XP is activated 10. Notepad--- opens notepad 11. Cleanmgr--- garbage collection 12. Net start messenger-- start Messenger Service 13. Compmgmt.msc- computer Management 14. Net stop messenger-- stop Messenger Service 15. Conf---- starts netmeeting 16. Dvdplay---DVD player 17. Charmap--- startup character mapping table 18. Diskmgmt.msc- disk management utility 19. Calc---- startup calculator 20. Dfrg.msc--- disk Defragmenter 21. Chkdsk.exe--Chkdsk disk check 22. Devmgmt.msc- device Manager 23. Regsvr32 / u * .dll-- stops the dll file from running 24. Drwtsn32-- Systems Doctor 25. Rononce-PMurray shuts down for 15 seconds 26. Dxdiag--- checks DirectX message 27. Regedt32--- Registry Editor 28. Msconfig.exe- system configuration Utility 29. Rsop.msc--- Group Policy result set 30. Mem.exe--- shows memory usage 31. Regedit.exe-- registry form 32. Winchat---XP comes with local area network chat 33. Progman--- Program Manager 34. Winmsd--- system information 35. Perfmon.msc-- computer performance monitoring program 36. Winver--- checks Windows version 37. Sfc / scannow-- scan error and recover 38. Taskmgr-- Task Manager (2000/xp/2003 39. Winver--- checks Windows version 40. Wmimgmt.msc-- opens windows Management Architecture (WMI) 41. Wupdmgr---windows update program 42. Wscript---windows script host settings 43. 0. Write---- WordPad 44. Winmsd--- system information 45. Wiaacmgr--- Scanner and camera Wizard 46. Winchat---XP has its own local area network chat 47. Mem.exe--- shows memory usage 48. Msconfig.exe- system configuration Utility 49. Mplayer2--- simple widnows media player 50. Mspaint--- drawing board 51. Mstsc---- remote Desktop connection 52. Mplayer2--- Media player 53. Magnify--- magnifying glass utility 54. Mmc----, open the console 55. Mobsync--- synchronization command 56. Dxdiag--- checks DirectX information 57. Iexpress---*** binding tool, the system comes with 58. Fsmgmt.msc-- shared folder Manager 59. Utilman--- accessibility Manager 60. Diskmgmt.msc- disk management utility 61. Dcomcnfg--- opens system component Services 62. Ddeshare--- opens DDE sharing Settings 63. Osk---- opens the on-screen keyboard 64. Odbcad32---ODBC data Source Manager 65. Oobe/msoobe / aMel-check whether XP is activated or not. Logoff--- logout command 66. Notepad---, open notepad 67. Tool Wizard for nslookup--- Network Management 68. Backup and restore of ntbackup--- system 69. Narrator--- screen "narrator" 70. Ntmsmgr.msc-- Mobile Storage Manager 71. Ntmsoprq.msc- removable storage administrator operation request 72. The netstat-an-- (TC) command checks interface 73. Syncapp--- creates a briefcase 74. Sysedit--- system configuration Editor 75. Sigverif--- file signature verification program 76. Ciadv.msc-- indexing service program 77. Shrpubw--- creates a shared folder 78. Secpol.msc-- Local Security Policy 79. Syskey--- system encryption, once encrypted can not be unlocked, protect the windows xp system double password 80. Services.msc- local service settings 81. Sndvol32--- volume control program 82. Sfc.exe--- system File Checker 83. Sfc / scannow-windows file protection 84. Ciadv.msc-- indexing service program 85. Introduction to tourstart--xp (roaming xp program that appears after installation) 86. Taskmgr--- Task Manager 87. Eventvwr--- event Viewer 88. Eudcedit--- word-making program 89. Compmgmt.msc- computer Management 90. Packager--- object wrapper 91. Perfmon.msc-- computer performance monitoring program 92. Charmap--- startup character mapping table 93. Cliconfg---SQL SERVER client network utility 94. Clipbrd--- Clipboard Viewer 95. Conf---- starts netmeeting 96. Certmgr.msc-- certificate management utility 97. Regsvr32 / u * .dll-- stops the dll file from running 98. Regsvr32 / u zipfldr.dll-- cancels ZIP support 99. The cmd.exe---CMD command prompt is 100. Chkdsk.exe--Chkdsk disk check

Disk operation

Fdisk implied parameter / mbr rebuilds master boot record fdisk / mbr rebuilds master boot record fdisk adds / cmbr parameter after DOS7.0, when multiple physical hard disks are attached, the master boot record of the hard disk that is sorted behind can be reconstructed, for example: fdisk / cmbr 2, the master boot record of the second hard disk can be rewritten. (be very careful when using it to avoid damaging the good hard disk boot record) format parameter: / Q Quick format / u unrecoverable / autotest do not prompt / s to create MS-DOS boot disk format c: / Q / u / autotest

Directory operation

DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] lists directory parameters: / s look up subdirectories / w only show file names / p pages / a show hidden files DIR format.exe / s find the disk's format.exe file and report location MD (MKDIR) [directory name] create directory MKDIR HELLOWORLD create HELLOWORLD directory CD (CHDIR) [directory name ] PS: you can use relative directory or absolute directory to enter the directory CD AA and enter the AA directory under the current folder Cd.. Enter the previous folder cd\ to return to the root directory; cd c:\ windows enter c:\ windows folder RD (RMDIR) [directory name] delete the directory RD HELLOWORLD delete the HELLOWORLD directory

File operation

Delete the directory and its files: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. For example, rmdir c:\ qqdownload/s deletes the qqdownload directory of disk C. Del [directory name or file name] [/ f] [/ s] [/ Q] delete parameters: / f delete read-only files / s delete this directory and all its contents / Q do not confirm that del c:\ del / s / Q automatically deletes the del directory of disk c before deletion. Copy [source file or directory] [destination directory] copy the file copy d:\ pwin98*.* c:\ presetup and copy all the files of pwin98 of disk d to the presetup of disk C. Attrib [parameter] [source file or directory] file attribute operation command, attrib command can list or modify file attributes on disk, including document (A), read-only (R), hidden (H), system (S), for example: attrib-h-r-s io.sys will remove the read-only, hidden and system attributes of the DOS system file io.sys file after executing this command. At this point you will be able to see the io.sys file directly through the dir command. Attrib + h + r + s autoexec.bat will add the above attributes to the automatic batch file.

Memory operation

Debug debug memory parameter-w [filename] write binary file-o [address 1] [address 2] output memory-Q exit exp:o 70 10 [return] o 71 01 [return] 01 [return] Q [return] DOS change the value of the corresponding location where the BIOS password is stored in CMOS by writing 70h/71h PORT to clear the AWARD BIOS password. Debug can also crack the hard disk protection card, etc., but can only be used in pure DOS.

Partition operation

The partition of a disk is generally divided into four partitions. the disk partition is composed of primary partition, extended partition and logical partition. Both PQ and Acronis Disk Director can resize partitions and merge without losing data. In XP systems, if you use PQ,WIN7 systems, you can use Acronis Disk Director to operate basically the same. You can go to online tutorials to have a look. You can resize partitions without reinstalling the system, but it is recommended that you back up the data before adjusting. After all, the operation of the hard disk directly has a certain degree of danger.

Other actions

Net use ipipc$ "" / user: "" establish an empty IPC link

Net use ipipc$ "password" / user: "user name" to establish an IPC non-empty link

Net use h: ipc$ "password" / user: "user name" is mapped to the other party after logging in directly. C: to the local is H:

Net use h: after ipc$ login, map the other party C: to the local H:

Net use ipipc$ / del remove IPC link

Net use h: / del removes the mapping from the other party to the local H:

Net user username password / add establish user

Net user guest / active:yes activate guest user

Net user to see which users there are.

Net user account name View the properties of the account

Net localgroup administrators username / add adds "user" to the administrator to give it administrator privileges

Net start to see which services are enabled

The net start service name enables the service (e.g. net start telnet, net start schedule)

Net stop service name stop a service

Net time target ip to check each other's time

Net time target ip / set sets the local computer time to synchronize with the time of the "target IP" host, plus the parameter / yes to cancel the confirmation message

Net view to see which shares are enabled on the local LAN

Net view ip to check which shares are enabled in each other's local area network.

Net config display system network settings

Net logoff disconnected sharing

Net pause service name pauses a service

Net send ip "text message" sends messages to each other.

Types and information of network connections in use within the net ver LAN

Net share to view locally opened shares

Net share ipc$ enables ipc$ sharing

Net share ipc$ / del delete ipc$ share

Net share c$ / del delete C: share

Net user guest 12345 changes the password to 12345 after logging in with guest.

Net password password change system login password

Netstat-a to check which ports are open, usually netstat-an

Netstat-n to view the network connection of the port, commonly used netstat-an

Netstat-v to view the work in progress

Netstat-p protocol name example: netstat-p tcq/ip to view the usage of a protocol

Netstat-s to view the usage of all protocols in use

If one of the ports of nbtstat-An ip is open, you can check the user name of the last login of the other party.

Tracert-the parameter ip (or computer name) tracks the route (packet), and the parameter "- w digit" is used to set the timeout interval.

Ping ip (or domain name) sends data with a default size of 32 bytes to the other host. The parameter: "- l [space] packet size"; "- n times of data sent"; "- t" refers to ping all the time.

Ping-t-l 65550 ip ping of death (sending files greater than 64K and ping all the time becomes the ping of death)

Ipconfig (winipcfg) is used for windows NT and XP (windows 9598) to view the local ip address. The parameter "/ all" available for ipconfig displays all configuration information.

Tlist-t shows the process in a tree line list (an additional tool for the system, which is not installed by default, in the Support/tools folder of the installation directory)

Kill-F process name plus-F parameter to force the termination of a process (an additional tool for the system, which is not installed by default, is in the Support/tools folder of the installation directory)

After adding the-F parameter to the del-F file name, you can delete read-only files. / AR, / AH, / AS, / AA means to delete read-only, hidden, system, and archived files, respectively. / AMUR, / AMUH, / AMUS, / AMUE A means to delete files other than read-only, hidden, system and archive. For example, "DEL/AR." Deletes all read-only files in the current directory, "DEL/A-S." Deletes all files except system files in the current directory

Del / S / Q directory or use: rmdir / s / Q directory / S to delete the directory and all subdirectories and files under the directory. At the same time, use the parameter / Q to cancel the deletion operation and delete it directly when the system confirms it. (the two commands have the same effect)

Move drive letter path the file name to be moved the path to store the mobile file after the file name is moved, the prompt to confirm the existence of the same file in the mobile directory will be canceled with the parameter / y and will be overwritten directly

Fc one.txt two.txt > 3st.txt compares the two files and outputs the differences to the 3st.txt file. ">" and "> >" are redirect commands.

At id opens a scheduled task that has been registered

At / delete stops all scheduled tasks. With parameter / yes, it stops without confirmation.

At id / delete to stop a registered scheduled task

At views all scheduled tasks

At ip time program name (or a command) / r run a program at a certain time and restart the computer

Finger username @ host to see which users have logged in recently

Telnet ip port is far away and login server, default port is 23

Open ip connects to IP (command after telnet login)

Telnet will enter the local telnet by typing telnet directly on the local machine.

Copy path file name 1 path file name 2 / y copy file 1 to the specified directory as file 2, use the parameter / y to cancel to confirm that you want to rewrite an existing directory file

Copy c:srv.exe ipadmin$ copy the local c:srv.exe to the other party's admin

Copy 1st.jpg/b+2st.txt/a 3st.jpg hides the contents of 2st.txt into 1st.jpg to generate a new 3st.jpg file. Note: 2st.txt file header should be blank in three rows, parameter: / b refers to binary file, / a refers to ASCLL format file.

Copyipadmin$ svv.exe c: or: copyipadmin$. Copy the srv.exe file (all files) under the other party's admini$ share to the local C:

File or directory tree to be copied by xcopy destination address directory name copy file and directory tree, overwrite the same file without prompting with parameter / Y

Use the parameter / e to copy the subdirectories under the directory to the destination address.

Tftp-I own IP (meat machine IP when using meat machine as springboard) get server.exec:server.exe login, download the server.exe of "IP" to the target host c:server.exe parameter:-I means to transfer in binary mode, such as when transferring exe files, if you do not add-I, transfer in ASCII mode (transfer text file mode)

After tftp-I IP put c:server.exe login, upload the local c:server.exe to the host

The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable file feed); defaults to ASCII format transfer (when text files)

Route print shows IP routes, which will mainly show network address Network addres, subnet mask Netmask, gateway address Gateway addres, interface address Interface

Arp looks at and processes the ARP cache. ARP means name resolution and is responsible for parsing an IP into a physical MAC address. Arp-a will display all the information

Start program name or command / max or / min opens a new window and maximizes (minimizes) running a program or command

Mem to view cpu usage

Attrib file name (directory name) view the properties of a file (directory)

Attrib file name-A-R-S-H or + A + R + S + H removes (adds) the archive, read-only, system, hidden attribute of a file, or adds as an attribute with +

Parameters: / Q shows which user the file and directory belong to, / dir C shows the creation time of the file, / dir A shows the time when the file was last accessed, and / TRAV W was last modified.

Date / t, time / t use this parameter, that is, "DATE/T" and "TIME/T" will only display the current date and time, without having to enter a new date and time

Set specifies the environment variable name = the character to assign to the variable sets the environment variable

Set displays all current environment variables

Set p (or other characters) displays all environment variables that currently begin with the character p (or other characters)

Pause pauses the batch program and displays: press any key to continue.

If performs conditional processing in a batch program (see if commands and variables for more instructions)

The goto tag directs the cmd.exe to the tagged line in the batch program (the label must be on a separate line and begin with a colon, for example: ": start" tag)

The call path batch filename calls another batch program from the batch program (see call /? for more instructions)

For executes a specific command on each file in a set of files (see for commands and variables for more instructions)

Echo on or off turns echo on or off. Only use echo without parameters to display the current echo settings.

Echo information displays information on the screen

Echo Information > > pass.txt saves the Information to the pass.txt file

Findstr "Hello" aa.txt looks for the string hello in the aa.txt file

Find a file by find filename

Title title name change CMD window title name

Color color values set the foreground and background colors of the cmd console; 0 = black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = lavender, E = light yellow, F = bright white

Prompt name changes the command prompt displayed by cmd.exe (change C:, D: unified to: EntSky)

Ver displays version information under the DOS window

Winver pops up a window showing version information (memory size, system version, patch version, computer name)

Format drive letter / FS: type format disk, type: FAT, FAT32, NTFS, for example: Format D: / FS:NTFS

Md directory name create directory

Directory replacement file for the replace source file to replace the file

Ren original file name new file name rename file name

Tree displays the directory in a tree structure, and the file names in the folder are listed with the parameter-f

The type file name displays the contents of the text file

More file name displays the output file screen by screen

Command = character to be locked by doskey

Doskey to unlock command = lock command provided for DOS (edit the command line, re-invoke the win2k command, and create a macro). For example: lock dir command: doskey dir=entsky (cannot use doskey dir=dir); unlock: doskey dir=

Taskmgr call-up Task Manager

Chkdsk / F D: check disk D and display status report; add parameter / f and fix errors on disk

Tlntadmn telnt service admn, type tlntadmn, select 3, and then select 8, you can change the telnet service default port 23 to any other port

Exit exits the cmd.exe program or currently, using parameter / B exits the current batch script instead of cmd.exe

The file name of the path path executable sets a path for the executable.

Cmd launches a win2K command interpretation window. Parameters: / eff, / en turn off and enable command extension. For more details, please see cmd /?

Regedit / s registry file name is imported into the registry; parameter / S refers to quiet mode import without any prompt

Regedit / e registry file name export registry

The cacls filename parameter displays or modifies a file access control list (ACL) for NTFS format. Parameters: / D user name: set to deny a user access; / P user name: perm to replace the specified user's access rights; / G user name: perm gives the specified user access rights; Perm can be: n none, R read, W write, C change (write), F full control; for example: cacls D: est.txt / D pub setting d: est.txt deny pub user access.

Cacls filename View the list of access user permissions for the file

REM text content adds annotations to batch files

Netsh view or change local network configuration

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report