Windows2000 advanced skills

xiaoxiao2021-03-06  48

Transferred from the Internet, http://www.netxeyes.com/ A post in the upper cloth hair, the content is good, turn over.

1. Install the WIN2K-free serial number method 1: In the process of installing the Windows2000, you want to enter the registration number during the installation of Windows2000. In order to make the installation more convenient, you can enter the registration number during the installation process. Copy the installation file to the hard disk, open the setupp.ini under the i386 directory, change the number behind the PID to 51837270, then you will ask you to enter the serial number again during the entire installation process. Method 2: After all of the contents are all deleted, then rewrite the following information: [PID] PID = "42144270" EXTRADATA = 62706A776C7766637274CE52597B39 -------------------------------------------------------------------------------------------------------------------------------- ------------------------ 2, using the command line format installed with the answer file to start using the floppy disk, use the WinNT.exe to implement an unrecognized installation: WinNT. EXE /U: D: / I386 / T: C: Enter the operating system, use Winnt32.exe installation new system to implement an unrecognized installation: WinNT32.exe / u: d: / setup. TXT / S: D: / I386 / TEMPDRIVE: C: Using CD Startup Implementation No answer: a, create a reply file named Winnt.sif, and put its related files into a floppy disk or Enter the i386 directory in the installation disc of Windows 2000 / XP. b, start the computer with a 2000 CD to implement an automatic installation process without answering. The floppy disk is automatically called in the floppy disk or the response file in the CD I386 Winnt.SIF. / syspart: drive_letter indicates that you can copy the installation boot file to a hard drive and mark the hard disk as an activity, and then install the disk on other computers. When the computer is started, it will automatically start the next phase of the installation. However, you must always use the / tempDrive parameter and / syspart parameter. On the computer running Windows NT 4.0, Windows 2000 or Windows XP, you can use the / syspart option to start Winnt32. The computer running Windows 95, Windows 98 or Windows ME cannot use this option. This parameter can only be valid when running Winnt32.exe. Special key name and effect: key name: repartition key value: YES | no Specifies whether to restrict and format the client first primary disc (formatted to NTFS system). This is only valid when using the Windows 2000 CD to start a computer for unattended installation. Key Name: ExtendoemPartition key value: 0 | 1 Allow installation to establish expansion partition -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ----------------- 3, how to dimension system files in Windows 2000, such as Windows 2000 reports that your system file is replaced or deleted? This is from time to time. Question, you can use the system file protection program in Windows 2000 to recover. In Windows 2000, the SFC command is useful for maintaining the entire system file. The specific approach is: In the "Start" / "Run", enter "SFC / ScanNow" to scan the system file and fix it. The SFC command statement is as follows: sfc [/ scannow] [/ scan "[/ scanboot] [/ cazcel] [/ enable] [/ purgecache] [/ cachesize = x] [/ quiet]. Where: / scannow immediately scans all protected system files. / scanon scans all protected system files once. / ScanBoot Scans all protected system files each time you start. / Cancel cancels the scan of all suspended protected system files.

/ enable enables Windows file protection for normal operation. / PurgeCache Clears the file cache and immediately scans all protected system files. / cachesize = x Set the file cache size. / Quiet does not prompt users to replace all incorrect file versions. You can choose to use these commands as needed. -------------------------------------------------- --------------- 4, the wonderful installation of environment variables in Windows 2000 installed Windows 2000 Professional version, the C disk is still installed is WinodWS 98, while WinodWS 2000 is installed on the E disk (application software It is installed under Windows 98). Try to open some software without installation, find that Visual FoxPro 6, VC , WPS 2000 and other software can be used directly, WinziP8.0 and other software enter the registration number, Photoshop and other software open, pop up a series The dialog box shows the following information: The following dynamic link library PfPick cannot be found. DLL and the formulated path: D / program files / adobe / photoshop5.0cs / winnt / system32 / winnt / system / winnt / winnt / system32 / wbem, but all the way to click "OK", can still be opened. Can you not let these dialogs appear? This involves the environment variable settings for Windows 2000. Although Windows 98 also has environmental variables in the registry, but there is no easy modification of Windows 2000. Analyze the contents of the above dialogs, the first is the software installation path, the rest is the system directory, the last one is the path setting of the environment variable. Then look up the dynamic link library file PFPICK. The DLL location is found in the system directory. Thus, open the control panel, double-click System, select Environment Variables in "Advanced", you can see two dialogs, "User Variables" above, set up a temporary variable, used to store temporary files The following is "System Variable", set some system parameters, we need to modify this "path" path here, write:% systemroot% / system32% systemroot%% systemroot% / system32 / wbem We only need In the back, add some statements: "C / Windows C / Windows / System C / Windows / System32", then restart your computer, double click Photoshp5.0c. When Exe, you will find that there is no previous dialog box listed. Later, some other software, like ACDSEE, Foxmail, OICQ, SoniQue, Jet-Audio, etc. can also be used directly, Dreamweaver, Firework, Flash4, Cumeftp Enter the registration code, and Netants will pop up the dialog box, display "MSIPCSV.EXE unable to locate the program, input point getProcessFlags on dynamic link library kernel32.dll".

No matter if you press "OK", you can also open because your system does not delete what information, so your operating system is still safe. -------------------------------------------------- ---------- 5, delete NTFS partitions? If you want to delete an NTFS partition, use the Windows 2000 CD to start your computer to enter the installer, delete the partition, or use fdisk, but fdisk does not delete the NTFS partition in the extended partition, which can be used as the following Debug method: Debug a 10 MOV AX, 0201 MOV BX, 0100 MOV CX, 0001 MOV DX, 0080 INT 13 INT 20 g = 10 f 2CE 2DD 00 A 10 MOV AX, 0301 G = 10 ing (DUG ?? Depressed ING ~~~~~) -------------------------------------------------- ---------------------------------------------- 6, how Delete Win2000's default management sharing (C $, D $, etc.)? After win2000 is installed, you can create some hidden shares, you can check them in CMD. There are a lot of articles on IPC intrusion on the Internet, I believe that everyone must be unfamiliar with it. To prohibit these sharing, open administrative tools> Computer Management> Shared Folders> Share Press the right button on the appropriate shared folder, point to stop sharing, but the machine will be restarted, these shares will be reopened again. If you want to ban the default sharing of% Driveletter% $, you can click on the following position of the registry HKEY_LOCAL_MACHINE ////// currentcontrolSet // Services // LanmanServer // Parameters New Name: AutoShareserver Type: REG_DWORD Value: 0 If you want to ban ADMIN $ default sharing, you can click on the following location of the registry HKEY_LOCAL_MACHINE // system // lantcontrolSet // Services // LanManserver // Parameters New Name: Autosharewks Type: REG_DWORD Value: 0 Default Shared Directory Path and Function: C $ D $ E $ E $ The root directory of each partition. In the Win2000 Pro version, only the Administrator and Backup Operators group members can be connected, and the Win2000 Server version Server OperatROS group can also be connected to these shared directories, and the shared directory for the ADMIN $% systemRoot% remote management. Its path will always point to the Win2000 installation path, such as C: / Winnt. FAX $ In Win2000 Server, Fax $ will arrive when Fax client is sent. IPC $ empty. IPC $ sharing provides the ability to log in to the system.

Netlogon This shared NET Login service for Windows 2000 servers is processed when dealing with login domain requests. Print $% systemroot% / system32 / spool / drivers user remote management printer ---------------------------------------------------------------- ------------------------------------------- 7, how to get Win2000 start When the VGA mode is directly entered in NT4.0, after installing the operating system, the VGA mode will appear, and Win2000 is not, you can add a parameter / basevideo in the boot.ini file, as follows: [boot loadinger ] Timeout = 30 default = MULTI (0) Disk (0) RDisk (0) partition (1) / Winnt [Operating Systems] Multi (0) Disk (0) RDisk (0) Partition (1) / Winnt = "Microsoft Windows 2000 Server "/ FastDetect / Basevideo ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- ------------------ 8, what is the use of the hiberfil.sys file under Windows 2000 roots? This file is terrible but deletes it. You must have used the sleep function inside "Power Management" in a certain period. In fact, whether it is sleep, or the STD we have said before, the principle is the same: When the information is saved in this file, restore it back when the Windows 2000 is restarted, and the size of this file is Is equal to your physical memory capacity. Be sure to delete it, the method only one: cancel sleep function. -------------------------------------------------- -------- 9, solve the problem of small memory installation Windows 2000 If memory is less than 64MB machine, you need to install Windows2000, but in the default, you must have 64MB of memory to install Windows 2000 Server, however, you can bypass This restriction is over. First copy the Windows 2000 I386 installation directory to your local / network drive. Edit the file i386 TXTSETUP.SIF (extension is SIF!) File. Search RequiredMemory. Edit this line, let you change the minimum memory, but before you change, you must fully realize that you have made everything! EG: RequiredMemory = 66584576. save document. Install as usual. Everything OK ... (this method is not suitable for installation with Winnt32.exe, but only is installed with WinNT.exe.) --------------------- -------------------------------------------------- 10 Microsoft's Windows 2000 Recovery Console If you use the Windows2000 recovery console, administrators can access 2000 systems from command dialog, replace corrupted files, start and terminate service. When installed, it will add an option to the start menu.

Start the system to the Windows2000 inserting installation CD to the I386 directory from the command line to the I386 directory, type: c: /> Winnt32 / cmdcons Click the "OK" file on the confirmation information bar to be copied to the computer, start Add new items in the menu C: / cmdcons/bootsect.dat= "Microsoft Windows 2000 Command Console" / cmdcons Complete the information bar, click "OK" to restart your computer, "Microsoft Windows 2000 Command Console" is selected, start Windows2000 to Command line mode. The system will ask the 2000 installation and its administrator password you want to fix. When you enter your password, you can type commands, such as taking disable to terminate the service, DiskPart to create and delete many other commands such as partitions. Just type HELP can list a list of all commands. You can also hit the console directly from the installation CD. From the disc boot system (if your motherboard supports the optical drive start), select Repair and type C to fix it. If you rename the administrator account, the console can still use it, unless you delete the administrator account. However, the repair console is temporarily unable to work in the domain. -------------------------------------------------- 11. Driver.cab's problem In the C: / Winnt / Driver Cache / i386 directory, there is a compressed file for Driver.cab, a size of approximately 50MB. Surrounded by Windows 2000 built-in drivers, the advantage of establishing this file is that if the system configuration changes, if new peripherals, etc., Windows 2000 can automatically extract the corresponding drivers from the file. Install without the user inserting the Windows 2000 disc. This is a good feature, but for the hard disk space, it is preferred to insert the CD every time in exchange for hard disk space! What's more, for most users, do not change the system of the system. Everyone deletes the driver.cab file as much as possible, releases 50MB of hard disk space. -------------------------------------------- 12, Windows 2000 Server Installing the NIC as a consideration of the route: At present, the current operating system, such as NetWare, Windows NT Server 4.0, and Windows 2000 Server, usually only supports a route connection of 4 network cards. If more than 4 network cards, excess network cards will not have routing functions, that is, users connected to the network card cannot communicate with users connected to another 4 network cards. So, the number of network cards installed in a server should not exceed 4. -------------------------------------------------- ---- 13, how to join ordinary users into the administrators group in the case of the working group? If you have a normal user account, there is a very simple method to get NT Administrator account: first rename the Logon.SCR under WinntSystem32 to the logon.old backup and rename usrmgr.exe to logon.scr and then restart Logon. SCR is the program loaded at startup. After restarting, there will be no previous login password input interface, but the user manager has permission to add himself to the Administrator group.

(Xiao Shuai has not done) ------------------------------------------- -------- 14, how to integrate Windows 2000 Service Pack 3 into the WINDOWS 2000 installation disk so that the installed Windows 2000 integrates Service Pack 3, don't have you installed it alone? 1. Download Windows 2000 SP3 from the website, decompress the service package into a directory C: / W2KSP3 through the w2ksp3.exe -x command; 2. Copy the Windows 2000 source installation file to the hard disk C: / w2kinstall (Copy of the entire disc in this directory); 3. Run the update.exe -s: c: / w2kinstall; 4 in C: / W2KSP3 / I386 / update, you can install Windows 2000 through C: / W2kinstall To integrate WINDOWS 2000, it is not necessary to install it separately. Update's parameters are as follows: Update [-u] [- f] [- n] [- o] [- z] [- q] [- l] [- s:

] -u unattend mode -f Forcing other applications When shutdown - N Don't rewrite the OEM file-z 不 o o 不 不 o 不 安 模式 模式 模式 模式 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成 完成S: Integrate the service pack file to Note: 1, the above operation must be completed in Windows 2000, if you do this under other Windows systems, you will receive an error prompt. 2, here, after this installed Windows 2000 has a small problem, if you run SFC / Scannow Check the protected system file, the program will need you to insert the "Windows 2000 Service Pack3" CD, this will be a problem. Because the CD we make this seems to do not meet the standard, that is, you can't check the protected system files. So you have to think about it again. 3. This has been recorded into an optical disk after the installation file is recorded. -------------------------------------------------- - 15, the hard disk partition can be hidden by modifying the key value in the registry. Start the Registry Editor, find "HKEY_CURRENT_USER \Software\ Microsoft \Windows \currentversion \ Policies Hyxplorer", "Newly built a binary key value" Nodrives "in the registry. When the key value corresponding to "NODRIVES" is 01000000, the drive A; the key value is 02000000, the drive B; the key value is 04000000, hiding the drive C ... found the law? Suppose you want to hide the drive letter, ranked n in English letters, then convert 2 (n-1) (N-1) (N-1) to 16-based, this value corresponds to the drive letter to be hidden.

For example, if you want to hide the G disk, G in the English alphabet of 7, 2 is equal to 64, convert the 64 to 16 into 40 So "NODRIVES" is: "40 00 00" - -------------------------------------------------- ----- 16. After you remove unwanted component Windows 2000 installation is complete after Windows 2000, you will find that some components (such as components in the attachment) are all installed. For components that general users do not use, such as accessories, code conversion, etc. can be deleted. If you want to delete these unwanted components in Windows 98, you can open the Control Panel, Click to Add / Remove Programs. "Icon, select and delete in the Add / Delete Windows Components tab. However, in Windows 2000, it is not possible to delete this method because there is no such components in the Add / Remove Windows Component list. Is there a way to add these components in the Add / Remove Programs list? ---- Introduction to a method that can add these components in the Add / Remove Windows Components list, then remove these unnecessary components, the specific steps are as follows. ----1. Double-click the "My Computer" icon on your desktop, select Tools * "Folder Selection", select "Show all files and folders" in the Advanced Settings option of the View tab. The purpose of this setting is to display hidden folders and files. ----2. Go to the Windows 2000 system directory, generally for the winnt directory, then enter the inflicity (that is, C: / WinNT / INF), this directory is an implicit directory, there is a sysoc.inf file in this directory, this file is only 4KB, first Back up this file, use the text editing software to open this file after the backup is complete, then click the "Edit" menu, select the "Replace" option, enter ", hide" in "Finding Content", what is not all in "replacement" Lose, then click the "All Replace" buttons to save this file exit. ---- 3. Click Start * "Settings" * "Control Panel", double-click the Add / Remove Programs icon, then click the Add / Remove Windows Component button, open the Windows Component Wizard window, more than 5 in the component Items, such as "COM ", "Distributed Transaction Coordinator", "Fax Services", "Accessories, Tools", "Image Processing", etc. (as shown in the drawings), then remove the components from it is deleted. -------------------------------------------------- ----- 17, RIS client pre-classification and run sysprep.exe You can use pre-prix when using RIS to install Windows 2000 Professional, you must use the pre-prix to enter the client's GUID, how to enter? A global unique identifier (GUID) that relies on the computer. GUID is usually the MAC address of the NIC. In front of the MAC address of the NIC, add enough forward zero to ensure that the GUID is 32 16-based numbers is a complete GUID. Example 000000-0000-0000-0000-5254AB15C2EE wherein "52-54-AB-15-C2-EE" is the MAC address of the client network card. After running sysprep.exe on an experimental machine, you will be prompted to turn off your computer. At this time, it should be noted when you restart your computer. If you still start from your hard drive, you will be installed. So you should choose from to start the computer from the floppy disk or other media, and use a third-party image software to make clones throughout the hard disk or partition.

Then distribute the cloned files into each computer, then use the third-party image software to solve the image on each computer, then select the installation from the hard disk. Before running sysprep, let's first familiarize with its main switch parameters: -sysprep.inf Use sysprep.inf to configure a computer, apply to a computer-nosidgen computer that is used to clone the same configuration, does not generate a new SID number -PNP computer after reboot Reproducing PNP Device-Reboot runs sysprep restarts your computer, not shutdown ------------------------------------------------------------------------------------------------------------------------------------------------------------ --------------------- 18, using RIS to implement the client to install the operating system: If you start with the NIC, first ensure the client's system BIOS has put the network card Set to the first startup device. When the client starts, it automatically connects the RIS server. After the connection is connected, the RIS server prompts the user to press the F12 to download the user to install the Smart Wizard, and the user only needs to be repaired when the first installation system or system is damaged. F12, It is usually not used. If you start with a floppy disk, you will be prompted to press the F12 to initialize the network service. After Press F12, you must remember to remove the startup floppy before the character appears. -------------------------------------------------- 19. How to upgrade the NT4 domain to Win2000 domain to pay attention to the following points: 1, NT4's primary domain controller PDC must use NTFS file system format, if the FAT16 format will fail; 2, NT4 upgrade is unidirectional, So there is no way to upgrade Win2000B3 will return to the NT4 environment; 3. When doing upgrade planning, you must first back up important information and pre-preparation work, and remove applications that cannot be performed in Win2000B3, etc.; 4, First upgrade the PDC and upgrade BDC (before upgrading PDC, first upgrade the BDC offline, wait until the Win2000B3 domain controller, then upgrade the BDC or select the environment that does not upgrade the BDC to retain NT4); 5, upgrade, installation There are three important directories that need to be specified, including Active Directory, log profiles, and sysvol directories, determine the path of the directory under the NTFS partition; 6, the user account, group account and computer account will remain. -------------------------------------------------- - 20, in Win2000, the fax first, first install a modem that supports faxes normally; after installing the modem, the modem you use will appear in the lower right corner of the taskbar.

Since the Fax machine of Win 2000 is sent without receiving fax, if we want it to automatically receive the fax, you must right-click your modem name and select in the pop-up menu. "Receive"; additional computer transmission fax is implemented by "print" function, whether it is the same regardless of the image or text, so we can pass the content of the fax in Word or other editor, then select File / Print "Menu, select" Fax "and click" Print "button," Fax Send Wizard ", click" Next ", enter the recipient's name and phone number, and then select" Immediately according to its own actual situation "or "Time to send". ------------------------------------------- ------------ 21, first install Windows XP and then install Windows 2000 After installing the startup menu to enter the restore consumption, run the command: fixmbr C: fixboot C: Copy x: / i386 / ntldr C: COPY x: /i386/ntdetect.com C: X is the optical drive.

-------------------------------------------------- - - 22 Error information: "The Windows Installer Service Could Not Be Accur if you are running Windows in Safe Mode, or if The Windows Installer IS Not Correctly Installed ....". The reason for this error is Windows 2000 SP3 Contains version 2.0.2600.2 version of Windows Installer, when DCOM's default IMPERSOTION Level is set to Anonymous, this MSI version cannot run normally. And after the W2K SP3 is installed, the system will remain in the system, even if you re-upgrade SP3, it will not function properly. In order to successfully install SP3, you need to set the Impersonation Level for the DCOM for Identify, and to delete the residual file /%Windir%/system32/msisip.dll when the installation fails. DCOM Impersonation Level Setting: 1. Run DCMCNFG 2. If you have some objects are not registered, the program will prompt you to register. 3. Enter the DCOM Setting Properties, select Default Properties, and set the default impersonation for Identify. -------------------------------------------------- ----- 23, making custom boot floppy disk 1, use Format A: / s in pure DOS to process a floppy disk 2, create file config.sys in the floppy disk, and edit the command line: device = oakcdrom.sys / d: mscdxxx device = Himem.sys (to load the Windows system information file HIMEM.SYS, so that the DOS system can run smartdrv.exe) DOS = high, umb files = 60 buffers = 80 3, create a file in the disk AutoExec.bat, and edit the command line: loadHigh A: / smartdrv /la:/mscdex.exe / d: mscdxxx 4, oakcdrom.sys and himem.sys Copy to a disk Note: Config.sys Command line Decation = Oakcdrom .sys / d: mscdxxx and autoexec.bat's command line: A: / mscdex.exe / d: MSCDXXX is to load the optical drive under pure DOS. The xxx in the MSCDXXX in config.sys and autoexec.bat can be any character, but both must be the same. -------------------------------------------------- --- 24, handmade a route in the system and make it permanently curing, for example, "Route Add 192.168.50 192.168.255.255.0 192.168.4.100, but how to automatically load the route each time, can be added back, then add a parameter -P It became a permanent curing.

After adding a static routing record using the -p parameter, this record is stored in the registry, in the specific location: hkey_local_machine / system / currentcontrolset / services / tcpip / parameters / persistentRoutes -------------- ----------------------------------------- 25, Win2000 for the for command application: Open a DOS window in Win2000, then perform FOR / L% a in (1,1,254) do start / min / low telnet 192.168.0.% A 3389, all open 3389 port hosts After exposing this command, you will open 254 small windows in the taskbar. It is recommended to have no archive, save it. Scan a host's multiple ports, as follows for / l% a in (1, 1,65535) Do START / LOW / MIN Telnet 192.168.0.1% A This scans 192.168.0.1 1 to 65535 ports to scan all ports for / l% a in (1, 1, 254) do for / l% B IN (1,1,65535) do start / low / min telnet 192.168.0.% b This will scan all 1 to 65535 segments of 192.168.0.x paragraphs or above can only be used under Win2000, Because / l accumulation parameters are Win2000 to the extension of For course WinXP and Win.Net can be used. Other have not tried it yet ---------------------- ----------------------------- 26, MTU We know that the MTU (Maximum Transfer Unit Maximum Transmission Unit) defines TCP / IP protocols The number of bytes included in the network transmitted in the network can effectively improve the access speed and stability of the network by adjusting this parameter. In a Windows95 environment, the default setting of this value is 1500 bytes. Since the MTU is set to 576 bytes of routers, the result of the data packet size has caused 1500 bytes of data packets. Slimed into a number of 576 bytes or less packets, causing the system transfer speed to decrease. In order to match the size of the packet, you must regulate the relevant numerical value under the registration. -------------------------------------------------- - 27, Windows serial number in the operating system WINDOWS 98 installation serial number: 1. Open the registry editor under the premise of entering the operating system, expand HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion branch, right Find the "ProductKey" string value in the side window, and its key value is the serial number! 2, if you can't enter the operating system, you can view the serial number of Windows 98 under DOS: Start your computer with the boot disk, then enter C: / Windows / Command / Find / L "ProductKey" C: /Windows/system.dat (assuming C The disk is a system disk), and the serial number of Windows 98 will be displayed after entering. WINDOWS 2000 installation serial number: Enter the Windows 2000 system installation folder, open the / system32 folder, find $ winnt $ .inf file, double-click the notepad to open, [userData] section "ProductID =" back quotation characters String is the serial number of Windows 2000! XP and 2003 are the same.

---------------------------------------------- 28, SYS .Com sys.com command, this command is specifically used to "transfer" from the source disk to the target disk, will copy the system files on the source disk (such as IO.SYS, etc.) to the corresponding position of the target disk , Make the target disk can be started separately. When you turn it on, the system will prompt you: Invalid system disk, MS-DOS version does not match the error message, the command.com command is damaged, you can "pass the correct operating system" pass "to your hard disk, such as It turns out that your computer is started from the C drive, then you can type "SYS C:" after starting with the boot disk. After the operation is completed, the system will prompt: "System Transferred", after restarting, it is generally possible to run normally, so it is removed from your reinstall system. The SYS command is the cleansing means of rebuilding the Boot area, or killing the Boot area virus. (The Boot area here is actually the guiding sector on the activity partition) --------------------------------- --------------- 29, FDISK hidden parameters switch its grammatical format: fdisk / parameter 1, / ACTOK does not check if there is a bad sector in disk surface: Use this parameter to speed up partition operating. 2, / cMBR Re-establish the main boot record of the specified disk: its operation is equivalent to / MBR parameters, and the difference is that the disk can be specified. 3, / EXT Establish extended partition: establish an extension partition on the current disk (establish a logical disk partition for aged) 4, / fprmt In interactive mode U. Support for large-capacity inquiry screens, but inquiry when establishing a new partition, use FAT16 or FAT32 format. 5, / log build disk logical partition: establish a logical disk, must be used at the same time as / ext. 6, / logo uses FAT16 to establish a disk logical partition. 7. / MBR Re-establishs the main boot record 446 bytes of the master boot record. 8, / PRI establishes a residential area, and the partition will automatically be set to an activation form. 9. / Prio uses the FAT16 format to establish a primary partition and set to an activation form. 10, / Q End FDisk is not restarting the computer: Use it to restart your computer after changing the partition table. 11, / status Display Current Disk Partition Status: When there is no logical partition on the disk extension partition, the extension partition will not be displayed. 12, / x Do not use the LBA property: Use it will not produce partitions with LBA properties. -------------------------------------------------- - 30, completely delete WinMe's system restore 1. First click on "My Computer" to select "Properties", in the Performance tab, select "File System", "Disable System Restore" in "Troubleshoot" tab Optional. 2, run the regedit, find hkey_local_machine / system / currentControlSet / Services / VXD / VXDMON / Clear all the keys 3, restart your computer to delete the C: / _ restore directory (hidden folder).

----------------------------------------- 31, Windows 2000 BUGS in a gives Everyone At the end of the directory of Full Control, you will create a file, remove the permission of this file, set to Administrator Full Control Only. Then use any ordinary user to log in, enter this EVERYONE FULL Control directory, try to access this file, of course, is of course refusing access. But you can delete it! This problem briefly explains that you can see through the description of WinHelp's File Permission. It is more referred to, and there is a relationship with a File Delete Child's hidden authority. Microsoft's explanation is to ensure that UNIX is compatible. Because the Win2K system is too large, if the permissions between the domains are more complicated, it will be very complicated. Therefore, if there is something that needs to be protected, perhaps use DENY permissions better. EFS is indeed a very powerful set of encryption systems, because of its power, we have to be cautious and cautious in use. First before the addition and deletion of AD, you must remove all EFS encryption, otherwise this EFS encrypted file or folder will never be opened. This is actually warned when installing or deleting the AD, can be easily ignored by the user. For specific reasons I think is because Local Administrator and the SID of Domain Administrator are different, so there is a problem. In addition, when performing Duplicate operation, it is necessary to remove EFS before executing sysprep, otherwise these data will never be read. Another problem with EFS is that it cannot prevent a file from being deleted. That is, as long as a user has permission to enter the directory where the EFS encryption file is located, you can delete it, so you can put it on the folder encryption and setting permissions in the EFS file. ------------------------------------------ 32, find the bottleneck 1 of the system, Find a memory bottleneck to use the following counter to identify a bottleneck memory resource: (1) System / Processor Queue Length (2) Memory / Pages / Sec 2, Find Disk Bottlenecks in Performance Tools Use the following counter to identify a bottleneck disk Resources: (1) PhysicalDisk /% Disk Time and% IDLE TIME (2) PhysicalDisk / Disk Reads / Sec and Disk Writes / Sec (3) PhysicalDisk / Avg.disk Queue Length (4) LogicalDisk /% Free Space also monitoring memory Counters to determine if there are too many memory pagings to make the disk used tensions. Note: Unlike physical disk counters, the data of logical disk counters is not collected by the operating system by default. To obtain a logical drive or the performance counter data of the storage volume, you must type diskperf -yv at the command prompt. This results in a disk performance statistical driver for collecting disk performance data to report data of logical drives and storage volumes. By default, the operating system uses the diskperf -yd command to include physical drive data. For more information on using the DiskPerf command, type Diskperf at the command prompt -?

3. Finding processor bottlenecks using the following counter to identify processor resources: (1) Processor / Interrupts / Sec (2) Processor /% Processor Time (3) Process /% Processor Time (4 System / Processor Queue Length 4, find network bottlenecks in performance tools to identify bottleneck network resources: (1) Network interface / bytes Total / Sec, Bytes Sent / Sec and Bytes Received / Sec (2) Protocol_Layer_Object / Segments Received / Sec, SEGMENTS SENT / Sec, Frames Sent / Sec, Frames Received / Sec, for the NWLINK performance object, with frame-related counters report zero. Use the object-based counter. (3) Server / Bytes Total / Sec, Bytes Received / Sec and Bytes Sent / Sec (4) Network Segment /% Network Utilization ---------------------- ---------------------- 33, there are many ways to close the 445 port, but I recommend the following methods: Modify the registry, add a key value Huest: hkey_local_machine key: system / controlset / services / netbt / parameters name: SMBDEVICEENABED TYPE: REG_DWORD VALUE: 0 After the modification is complete, restart the machine, run "netstat -an", you will find that your 445 port is no longer listening. -------------------------------------------- 34, Windows 98 Extract.exe and ext.exe actually, the Windows 98 super boot disk also has this command, this already appearing in DOS6.22, originally only the Microsoft's development of a command to decompress the CAB compression package, but it The function is more than just decompression, we are more for using it to restore system files in the CDD. (If you can enter the graphical interface, you can use SFC, which is more powerful, convenient) The following is the use parameter and command format of the extract.exe command: / y Overwrite the existing files no longer prompt / a process all CAB File, from the specified first CAB file start / D display the directory of the file contained in the CAB file, no decompression / e decompression, replace "*. *", That is, unpacking all file / L DIR specified solutions The location of the compressed file, the default is the current directory / c copy CAB file When we know that the system files you want to recover are in the location where the CD is installed, you can use extract / y win98_27.cab cdfs.vxd command (from Windows 98 The name of the CDFS.VXD file in the installation CD is restored in the WIN98_27.CAB compression package). However, if you don't know the exact location at this file, you must first use the extract / d win98 _ *. CAB (here * is a number representing the CAB file package) to view CDFS.VxDG for each CAB file, Trouble. Ext.exe.

I just introduced that there is a bit of trouble when extract.exe finds a system file that the path is unstuten, if it combines it with ext.exe, you don't need to know the specific path to the file. However, it is important to note that this ext.exe command is in an ebd.cab compression package, you can't use it directly. You must first use the extract / y ebd.cab ext.exe command to extract EXT.EXE in the EBD.CAB compression package to the same directory, now you know the effect of EBD.CAB compression package? . Use the ext.exe command to quickly resume the system file of the unknown path from the CD, type the ext.exe command, then "please enter the path windows cabiles" _ ", type the Windows 98 installation disk Path, such as "G: / PWIN98", "please enter to extract:" You Want To Extract: ", type the file name you need to find, if it is still CDFS. VXD, will prompt "please enter the path fo extract do" "for current directory:", it means that it is necessary to enter the path to decompress the release of the file, such as c: / windows / system, A confirmation information will appear again after another: The Options you entered WERE: Source Path: g: / PWIN98 File (s) to extract: cdfs.vxd destination path: c: / windows / system is this okay? (Y / n : "Y", the ext command will start working quickly. It not only finds the detailed location of the file, but it can automatically decompress the file until the file is released to the specified path, the speed is extremely fast. --------- ---------------------------- 35, is there a tool to drop the dynamic disk back to the basic disk? Have a lot of time as follows Try, and succeed: Install Recovery Console, enter the recovery console, remove one or two unimported volumes with the diskpart command, restart, found that the data that has been changed back to the base plate, the data that is not deleted is intact (small Handsome is not done !!!!!!) --------------------------------------- - 36. Win2000 unconnected IP unavailable solution Win2000 has such a function, when our network cable is broken due to various reasons, the system will prompt your network cable without a connection, you will ping your address. There is also a powerful force, causing some friends who have no friends who do not even connect to the nets. Now give a solution, but not guaranteed certain success (this is unsuccessful on a large part of the NIC. Called "Media Sense) 1. We can ban this feature through the registry, as follows: HKEY_L Ocal_machine / system / currentControlSet / Services / TCPIP / Parameters has a keyword for disabledhcpmediasense, DWORD type (if you don't create yourself), the default is 0 to open the detection function, set it to 1 to turn off the probe. After the modification is complete, restart the computer, then you remove the network cable, though the system is still not connected, but the IP bound to the NIC is still tube.

Second, you can make a back rotation, 1326 connects to deception can also be concatenated: take the crystal head network card one end: orange white, orange, green white, blue, blue white, green, brown white, brown, the other end does not pick up RJ-45 Directly connect 13, 26 directly, ie orange white, green, orange, other 6 wires don't want to pay --------------------- ---------------- 37, NT does not recognize the hard disk, only recognize the 8G hard disk solution with atapi.sys in SP6, atdisk.sys replaces the NT installation disk. Original file in the i386 directory, then run the installer or after the NT copying file to the hard disk, replace the files on the $ ** $ copy on the C drive with these two files, which can be on the large capacity hard drive Install NT4.0 without re-adjust partition ------------------------------------- - 38, how do I use the netsh command to configure COPY to another IAS? Netsh aaaa show config> Path / file.txt netsh exec file.txt should be available in Netsh aaaa dump> file.txt in 2k3 ------------------- ---------------------- 39, can you install route and remote access components under Win2000 Pro to make it remote login server? 2K Pro is with RRAS The function, only the MMC Console, 2K Pro's RRAS, only one service, just start the management tool -> service Routing and Remote Access service (not started by default), then you can nearer Seeing "Incoming Connections", in the incoming connection, you can configure RAS customers, VPN customers, etc., 2K Pro only support three remote users, RAS, VPN, and direct connections to accept one customer, together client.

---------------------------------------- 40, Rras Console Displays An "Internal" routing interface After you install Routing and Remote Access Services (RRAS), an interface named "Internal" appears under Routing Interfaces in the Routing and Remote Access Services management console. This interface is part of RRAS and represents all Remote Access Services (RAS) devices. All ras clients area part of this interface. The "inload" interface shop not be deleted ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- -------- 41, how to increase the save time saved in the ARP buffer project? The time the default value saved in the ARP buffer project is two minutes, you can change it below: Open the registry editor; find hkey_local_machine / system / currentcontrolset / service / tcpip / parameters to find "Double-word value" under "New", After entering the name ArpCachelife, enter the number of seconds you wish to save; exit the editor, restart your computer. ------------------------------------- 42, modify the password of the domain controller? After using Erd Commander 2002, the ISO CD is started to change the DC local password. The DC is the hand to the hand. Use the local administrator password to log in to this machine (directory recovery mode), then configure the local security policy boot script, suppose you The domain administrator's account is admin, the content of the boot script should be NET user admin 12345678 to be saved as an admin.bat file, then restart. Then your DC's administrator password is changed to 12345678. Everything will be fixed. -------------------------------------- 43, to disable the Office XP text service? ? Removing CTFMon.exe from MSConfig does not disable text services. Because the text service will start automatically when you start a pro program. To prohibit text services, follow these steps: Step 1: Delete Chinese Optional User Enter Method For Windows 2000 systems, delete this feature: 1. Exit the Office program. 2. Click Start, click Setting, and then click Control Panel. 3. In the Control Panel, double-click Add / Remove Programs. 4. In the current installer list, select Microsoft Office XP products. Click to change. 5. In the Maintenance Mode dialog box, select Add or Remove Components, then click Next. The dialog box to select the installation option is displayed. 6. Click the plus number before the Office sharing function. 7. Click on the icon of the Chinese optional user input method to select not installed. 8. Click Update. Step 2: Remove the optional user input from the text service: 1. Click Start, click Setting, and then click Control Panel. 2. In the control panel, double-click the text service.

3. In the installed service list, except English (US), one by one deletes the remaining input method. Step 3: Run the Regsvr32 / U logout MSIMTF.DLL and MSCTF.DLL files. 1. Click Start -> Run. 2. In the Run dialog, type the following command: "Regsvr32.exe / u msimtf.dll" (excluding dual quotes) 3. Click OK. 4. Repeat 1 to 3 steps for MSCTF.dll files. After prohibiting the text service, you can add other input methods as before. -------------------------------------------------- - 44, what is RPC? ? Inter-process communication (IPC) is a communication technology used by programs and processes run between multitasking operating systems or networking computers. There are two types of process communication (IPC). Local Process Call (LPC) LPC is used in multi-tasking operating systems such that tasks running simultaneously can be sessions. These tasks shared memory space allows tasks to synchronize and transmit information. Remote Process Call (RPC) RPC is similar to LPC, just working online. RPC begins to appear in a computer that runs a SUN microsystem and HP's running UNIX operating system. By IPC and RPC, the program can utilize other programs or computer processing processes. Client / Server Mode Calculation The remote process calls with other technologies such as messages, as a mechanism for inter-system communication. The client executes its own task, but provides backend file services by the server. RPC provides the client to provide a communication mechanism for the rear server application service, as shown in Figure R-4. If you want the client / server application to be a separate program, the server can run the data access section because it is recently separated by the data, and the client can run the data representation and the front end portion interact with the user. Thus, the remote process call can be seen as part of the part of the split program through the network. LPC is sometimes also known as coupling mechanism. Use this method to divide the program, do not need to copy the entire database or most of its programs to the user system when the user wants to access the data. In fact, the server only processes the request, even only performs some data calculations, and sends the resulting result to the user. Because when the data is placed in one place, the database synchronization is easy to implement, so many users can access the same data simultaneously. The distributed computing environment is a computer cluster connected by a communication system-network connection. It is easy to see this network as a computing platform. If it is equal, any computer can be a client or server. Some processing tasks can be divided into separate runners in parallel on different network computers, while independent programs are handed over to computer processing that best suits this task. This strategy can use computer idle resources to improve network efficiency. A typical enterprise network includes many heterogeneous computer systems that run different operating systems.

------------------------------------------------- 45 How to prohibit anonymous users from connecting your IPC $ sharing? We can implement key: hklm / system / currentControlSet / Control / LSA Name: RESTRICTANONYMOUE: REG_DWORD VALUE: 1 | 2 Description: When you set this value to 1, anonymous users cannot list the list of host users; When the value is set to 2, anonymous users cannot connect your IPS $ sharing, not recommended 2, otherwise some of your services can not be activated, such as SQL Server ... ------------ ---------------------------------- 46, regedit.exe parameters: filename Import .reg file Table / S Import. REG File Enter Registry (quiet mode) / e exported registry file example: regedit / e filename.reg HKEY_LOCAL_MACHINE / SYSTEM / L: SYSTEM specified system.dat / r: user specified User.dat / C compression [File name] (Windows 98) ---------------------------------------------------------------------------------------------------------------------------------- . The REG file is the most convenient. About the operation of the registry, common is to create, modify, delete. - Creating a creation is divided into two kinds, one is to create children (Subkey) Note: If you are not very clear about the naming of the registry, you can look at the Registry Naming Standard Manual (http://www.sometips.com/ Tips / RegistryHack / 204.htm) We create a file, the content is as follows: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] Then execute the script, you have created a name "Test4adam" in HKEY_LOCAL_MACHINE / SOFTWARE / Children. The other is to create a project name that this file format is a typical file format, consistent with the file format you exported from the registry: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] "Test1" = "ADAM" "TEST2" = HEX: 61 "Test3" = dword: 00000064 Test1 type is "String Value" Test2 type is "binary value" TEST3 type is "dword value" Note: If your registration table is not There is a Test4ADAM this child, then the script will create the child for you. - Modifying modifications is relatively simple, just export you need to modify, then modify it with Notepad, then import it, here I will not repeat it.

- Delete let us first say to delete a project name, we create a file as follows: Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] "TEST1" = - Execute this script, HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM "test1 "It's deleted; let's take a look at the delete one child, we create a script with the following: Windows Registry Editor Version 5.00 [-HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM] Execute this script, HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM has been deleted. -------------------------------------------------- ------ 48, Power Users Group: Members of the Power Users group can modify the non-administrative user's account, start the default service without starting (note, a member of a Power User group cannot stop a system service) This group member cannot modify the administrator's account password, install the system service or modify the operating system file. -------------------------------------------------- ----- 49, Remote Backup and Restore: You can use the / saveboot: dsrepair command option in the Boot.ini file on the remote computer, boot the remote machine to enter the recovery mode, then use the planned task or The AT command implements backup and recovery. Implementing remote restarts You can use the corresponding management programs in 2000, XP, 2003.

-------------------------------------------------- ------ 50, RAS client to obtain DHCP options: the mobile users receive their IP configurations from the Remote Access Server, but they are not able to receive any DHCP options In order to enable this, a DHCP relay agent must be. configured on the Remote Access server. This will allow DHCPINFORM, which are used to obtain Windows Internet name Service (WINS) and Domain name System (DNS) addresses, domain name, Default Gateway or other DHCP options originating from the DHCP server, to reach The Mobile Clients. ------------------------------------------------ ---------- 51, use the netsh command to copy IAS settings: Remote Access Policies Are Not Stored In Active Directory; They Are Stored Locally In The IAS.MDB File. To Copy The IAS Configuration To Another Server We Must type netsh aaaa show config /file.txt at the command prompt. This stores the configuration settings, including registry settings, in a text file. The path can be relative, absolute, or a UNC path. We must then copy the file we created to the destination computer, and at a command prompt on the destination computer, type netsh exec /file.txt. A message will appear indicating whether the update was successful or not. ----- -------------------------------------------------- - 52, DHCP User Class:

User classes allow DHCP clients to differentiate themselves by specifying a User Class option.When available for client use, this option includes a user-determined class ID that can help to group clients of similar configuration needs within a scope, such as providing a shorter lease time for portable computers that move frequently or use remote access often. Typically a DHCP server will be used to distribute different options that are specific to the needs of clients. to configure a User Class Lease Time we must open the DHCP console, select the DHCP Server, open Scope, Right click Scope options, select Configure Options, select the Advanced ban, Select appropriate Vendor Class and User Class (= Windows2000LapTopComputers in this example), Select 051 Lease, and Enter lease time: 14400 (4 hours = 14400 seconds ) ------------------------------------- -------- 53, Mobile DHCP Database: To Move The DHCP Database We Must First Stop The DHCP Service on The Old Server, Back Up The Registry Key H KLM / SOFTWARE / Microsoft / DhcpServer / Configuration, and install DCHP on the new server.We must then stop the DHCP service on the new server and restore the Registry key from the old server onto the new server. Then we must delete the contents of C: / WINNT / System32 / DHCP on the new server, copy the database file DHCP.MDB from the old server onto the new server but not the transaction logging (* .LOG) and checkpoint (* .CHK) files and start the DHCP Service On The New Server. Finally WE Must Reconcile All Scopes on The New Server To Synchronize The Database with The Registry. -------------------------------------------------------------------------------------------------------------------------------- ------------------------------ 54, DNS aging record function:

Previous versions of Microsoft operating systems that do not support dynamic Domain Name System (DNS) require that a static DNS entry use a static IP address whenever possible. If we upgrade to Microsoft Windows 2000 and our present DNS server is Windows 2000, the IP address will remain the same, but the DNS "A" record remains static. However, the static PTR record is converted to a dynamic entry and is subject to the aging process. The Windows 2000 Dynamic Domain Name System (DDNS) client does not overwrite an Existing "a" Record if The IP Addresses Match. To Convert Static Entries To Dynamic Entries, We Must Use The / AgeallRecords Option In The DNSCMD.EXE Command. ----------------- ---------------------------------------- 55, NBTSTAT A useful command: nbtstat -R: Releases Names Registered with a WINS Server and The Renews Their Registrations. This Will Release Clients Will Get Registered Properly Again. ------------------- -------------------------------------- 56, D NS's fast zone transfer format: By default, all Windows-based DNS servers use a fast zone transfer format, which uses compression and can include multiple records per TCP message during a connected transfer This format is also compatible with more recent Berkeley Internet Name. Domain (Bind -Based DNS Servers That Run Versions 4.9.4 and Later. ---------------------------------- ----------------------- 57, 98/2000 / XP / 2003 Access XP problem Some people say that Guest, some people even install NetBeui, etc. Since then, you will summarize the correct statement, pay attention to the 98/2000 / XP / 2003 access to XP / 2003 user authentication issues with normal network connection. First of all, I can't access the guests why you cannot access. 1. By default, XP disables guest account 2. By default, XP local security policies are prohibited from accessing GUEST users from network.

By default, XP's local security policy - User Rights Assassin, "Empty Case Users can only log in to the console" are enabled, that is, any account of the empty password cannot be locally logged in, Guest Default empty password ··· So, if you need to use guest users to access XP, you want to perform the above three settings: Enable guest, modify the security policy allows Guest to access, disable 3 security policies or give guests. Sometimes it will encounter another situation: When accessing XP, the username in the login dialog is gray, which is always a guest user, and cannot enter other user accounts. The reason is that this security policy is in the Strange (Management Tool - Local Security Policy - Security Options - "Network Access: Sharing and Security Mode for local accounts"). By default, XP's access method is the way "only guest", then you access it, of course, you cannot enter other user accounts for GUEST. So, accessing the easiest way to access the XP is: No need to enable guest, only modify the above security policy is "classic". Other systems access XP can enter account information. As for accessing 2003, by default 2003 disable guest, but there is no XP that hate the default contradictory guest mode sharing, so you can enter your username password access. -------------------------------------------------- ------ 58, IPX / SPX frame type:.. NetWare 3.11 uses the 802.3 frame type Netware 3.12 and above uses the 802.2 frame type This network has both NetWare 3.11 and NetWare 4.1 servers, so both Frame Types must be installed . Installation of multiple frame types on a Windows 2000 Professional requires editing of the Registry, specifically add both types to the multi-string value pktType in HKLM / SYSTEM / CurrentControlSet / Services / NwlnkIPX / Parameters / Adapters / , where Is The Network Adapter Identifier. ------------------------------------------------------------------------------------------------------------------- ------------- 59, four coding methods: ANSI: System preset standard text storage format. ANSI is an abbreviation for American National Standards Institute. It was established in 1918 and a voluntary organization with more than 1300 members, including all large computer companies. ANSI is specifically established for computer industry, which is a considerable standard of standards in the world. Unicode: The integration of all major directive files in the world, including the public segments used in business and personal computers. When you use the Unicode format to store files, you can use the Unicode Control Character Assistment Description Language Coverage, such as Arabic, Hebrew. User Enter the text containing Unicode characters in "Notepad" and stores files, the system will prompt you to select Unicode encoding in Save As, these characters will not be lost. You need to remind everyone that some Windows 2000 fonts cannot display all Unicode characters.

转载请注明原文地址:https://www.9cbs.com/read-116578.html

New Post(0)