Windows System Network Tool User Manual

zhaozj2021-02-17  47

Windows System Network Tool User Manual

(2002 latest version)

Author: Lonely Swordsman

Website: http://www.janker.org

I. Introduction

Living in the era of Internet, every day we are using various network tools, such as: sending email with Outlook Express or FOXMAIL, download file with Netants or flashget, to determine if the specified IP address is used to use ping, see your IP address IPConfig and many more. However, when you use someone else's computer, it will often feel that your hands are not in your own network tool. We know that the intelligent ABC input method comes with Chinese Windows, it is not best in all input methods, but because it does not need to be installed and easy to use, the performance is stable, so it has been loved by everyone. In fact, the Windows system has a very little network tool for a very good network, used for the configuration, testing and troubleshooting of the network system, and regrets that there are very little friends to know, even if they don't know, so It's a pity that it is often accompanied by far. To this end, the author is close to this article. From the basic concept of the network, the network tools that come into the Windows system have made a more comprehensive introduction to everyone, I hope to help the friends who learn and use the network, consider Readers' universality, this article will only describe the network tools in Windows 95/98 / ME.

Second, learn the network common sense

Before you introduce the use of Windows Network Tools, learn some basic network common sense is very necessary, which will mainly explain the following common network concepts so that you can understand and use the Windows network tools that will be described later.

1. TCP / IP protocol: TCP / IP is a network communication protocol that specificallys all communication devices on the network, especially the data transfers between a host and another host, and transmission. TCP / IP can transmit data without error in the Internet. For Internet users, do not need to know the entire structure of the network protocol, just understand the address format of IP, you can communicate with hosts around the world.

2, IP address: IP (Internet Protocol) address is an identifier of the network host on the Internet, a total of 32 bits. This address is unique in the entire network. In order to make it easy, the 32 digits can be divided into 4 groups, 8 bits per group, and then each group is represented by the corresponding decimal number, format: nnnn (where N It is an integer between 0 and 255, such as 202.99.121.8. Among them, 127.n.n.n is specified as a loopback address, that is, the return address, no matter what program, once the return address is sent, the protocol software returns it immediately, and no network transmission is performed, for example: 127.0.0.1.

3, Subnet Mask: Subnet Mask is used to identify different physical networks under the same IP network address, which can share the same IP network address through subnet mask, which can share the same IP network address in the same IP network, greatly reduced The number of network addresses, reducing the overhead of the network address and the burden of the gateway. The subnet mask format and IP are very similar, and it is n.n.n.n, for example: 255.255.255.0.

4, port: Port port is mainly used to identify the same IP host to provide different service services in order to access the host through different ways, which is a server that corresponds to the corresponding process on the host, and the port range is 0 to 65535, where 0 to 1024 ports are used for system services, and 1024 or more ports can be used for user service programs. For example: 80 port is a web browsing network service, and the 21-port is a file transfer service. The 23-port is the and 1433 port to provide the remote management service to provide Microsoft SQL Server database services. 5, domain name: When there is no domain name, we have access to the network host resources according to the IP address, but for those who are used to memory, I always hope that there is a marking method than IP addresses more habits. Then there is another set of system-domain name system DNS (Domain Name System) for named IP addresses. Its main features have two: First, define a set of rules for computer domain names, and the other is to convert domain names into IP addresses. The domain name uses a hierarchy, each layer constitutes a subdomain name, and the subdomain is separated from the circle, from left to right, respectively: computer name, network name, institution name, and highest domain name. For example: www.sina.com.cn where WWW is the name of the default host name for the computer, Sina means Sina.com, COM is expressed as a business agency, and CN is the highest domain name to be affiliated to mainland China.

6, MAC address: IP address refers to the address used by the Internet Internet Protocol, and the Mac (Media Access Control) address is the address used by Ethernet protocol. There is no inevitable connection between the IP address and the MAC address, and the MAC address is the address of the Ethernet network card and the length is 48. Each Ethernet network card manufacturer will apply to the IEEE organization to write a unique MAC address in the serial EEPROM of the NIC when the network card is produced. Any two Ethernet NIC's MAC address, no matter which manufacturer is produced. The MAC address exists in each Ethernet package, which is an integral part of the Ethernet header. The IP address is an Internet protocol address, and each Internet package must have an IP address. Each Internet Service Provider (ISP) must apply to a set of IP addresses to the relevant organization, and then generally allocated to their users. The IP address is independent of the MAC address, because the Ethernet user can still connect to the Internet via the MODEM to obtain a dynamic IP address, which can be inconsistent each time. The IP address is usually operating in a wide area network, and the router is handled by the IP address. The MAC address is operating in a local area network, and the interconnection between the local area network is generally a network protocol conversion through an existing public network or dedicated line. IP information can be transmitted on the Ethernet. At this point IP addresses are only part of the Ethernet packet data field, and the Ethernet switch or processor does not see IP addresses, just use it as normal data processing. The format of the MAC address is: N-N-N-N-N-N-N-N-N-N-Number 16, such as 00-A0-0C-18-31-5B.

7, machine name: Machine name NetBIOS computer name, is the NetBIOS protocol difference between different computers, up to 16 characters, but the last bit is often used for the system, so it is actually only 15 characters to users. It is often referred to as NBNAME or NBTNAME, which is called NBNAME or NBTNAME. For example: loneliness swordsman or Janker. The following steps can be observed and modified on the computer name on Windows: Start -> Settings -> Control Panel -> Network -> Identification. In fact, in our computer, the computer name is often corresponding to the native IP address. The default Windows 9x installation is often with the NetBIOS protocol. By using the network program, the IP address can be used by the IP address to find its corresponding computer name. So many friends on the Internet often weird why strangers know their names. Most of the reasons are that you fill your computer name into your real name when you install Windows. 8, DHCP protocol: Dynamic host configuration protocol is the standard of TCP / IP, and design purposes are to centralize dynamic IP address assignments. For example: The IP address of our dialing users is dynamically assigned by the ISP's DHCP server, so almost every dialing IP address is different. In fact, the biggest benefit of using DHCP servers is greatly improved the utilization of IP addresses, not only reduces expenses, but also saves IP resources. Some local area networks also use DHCP servers to allocate IP addresses to clients to meet special needs.

9, Route Routing: Routing refers to the process of forwarding communication between the path between the network. The computer being set to support routing, used to receive messages sent, and forward them to the correct destination through the most efficient available routes, even if there may be many available routes. Computers on different physical networks should communicate with each other, and there must be routers. Router Maintaining Physical Network Mapping on your network and forwards data received from a physical network to other physical networks.

10. Gateway Gateway: The gateway is a facility that is operated on the OSI transportation layer in the interconnect network, so it is called facilities because the gateway is not necessarily a device, it is possible to implement gateway functions in a host. Of course, it does not exclude the use of a computer to specifically implement the protocol conversion function of the gateway. Since the gateway is a facility that implements interconnection, interoperability, and application interoperability. So in the TCP / IP network, the gateway sometimes refers to the device-router that implements this function.

Third, network tool introduction

In order to make everyone easier to master Windows network tools, the following story not only gives the role, principles, and usage of network tools, but also give a detailed application example, referring to exercises, will have to play a half-time. The two points that need to be pointed herein are:

l The program files of the following network tools are stored in the Windows installation directory, and the default directory of the general Windows system installation is c: / windows, but not all users are installed in this directory.

l For the introduction, some host systems, usernames, and passwords, etc. are assumed, and the user needs to know the real network configuration of the system they face.

1, the most common network test tool - ping.exe

Role: The main role of ping is to verify the connection to the remote computer. This command can only be used after the TCP / IP protocol is installed.

Principle: Send a specific packet to the remote computer through the ICMP protocol, then waits and receives the returned packet, verifying each received data plug according to the transmission message. By default, four echo packets containing 32-byte data (a loop uppercase alphanumeric alphanumeric alphanumeric alphanumeric) are transmitted. The process is as follows:

(1) Verify the connection to one or more remote computers by sending ICMP echo packets to the computer and listening to the backset data packet.

(2) Each sending packet is waiting for one second.

(3) Print the number of data packets that have been transmitted and received. Usage: ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [[-j computer -List] | [-K computer-list] [-w timeout] destination-list

Parameter list:

Number Parameters Describe 1 -T ping specified by the computer until the interrupt. 2 -a parsing the address as the computer name. 3 - N count Send counts of ECHO packets specified by COUNT. The default is 4. 4 -l Length Send an Echo packet containing the amount of data specified by Length. The default is 32 bytes; the maximum is 65, 527. 5 -f Send "Do not segment" in the packet. The packet will not be segmented by the gateway on the route. 6 -i TTL Sets the "Survival Time" field to the value specified by TTL. 7 -V TOS Set the Service Type field to the value specified by TOS. 8 -r Count Records the route of the outgoing and returning packets in the Record Routing field. COUNT can specify at least 1 set, up to 9 computers. 9 -s count Specifies the timestamp of the number of hops specified by count. 10 -j computer-list Routing packets using Computer-List specified. A continuous computer can be separated by the intermediate gateway (routing sparse source) IP allowed to be 9. 11 -k computer-list Routing packets using Computer-List specified by Computer-List. Continuous computers cannot be separated by intermediate gateway (routing strict source) IP allowed to 9. 12 -W Timeout specifies the time separation, the unit is millisecond. 13 Destination-List Specifies a remote computer to ping.

Example:

(1) Determine whether the local TCP / IP protocol stack is installed

PING 127.0.0.1 or ping machine name

Description: If reply from 127.0.0.1 .... information is displayed.

(2) Determine whether it can reach a remote computer that specifies the IP address

C: /> ping 192.168.0.1 or 202.102.245.25

Note: If the reply ... information is displayed, it will be reached, and if request timed out is displayed. If it is displayed.

(3) Get the corresponding IP address based on the domain name

C: /> ping www.domain.com Enter

Description: The reply from xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx .xxxx is the IP address corresponding to the domain name.

(4) Get the domain name according to IP address

C: /> ping -a xxx.xxx.xxx.xxx

Description: If you display pinging www.domain.com [xxx.xxx.xxx.xxx], www.domain.com is the domain name corresponding to IP.

(5) Get the machine name according to IP address

C: /> ping -a 127.0.0.1

Description: If you display pinging janker [127.0.0.1] ... information JANKER is the machine name corresponding to IP. This method can only reflect the local machine name.

(5) Ping's IP address 30 times

C: /> ping -n 30 202.102.245.25

(6) Use 400-bytes long package ping specified IP address

C: /> ping -l 400 202.102.245.25

2, network configuration view program -winipcfg.exe (Win 95) or ipconfig.exe (WIN 98 / ME) role: This tool is mainly used to discover and solve TCP / IP network issues, you can use this tool to get host configuration information , Including IP addresses, subnet masks, and default gateways, and the like. usage:

(1) View all configuration information: WiniPCFG or IPConfig / ALL

Host Name: Janker

Description: PPP AdaPater (Point-to-point data transfer protocol)

Physical Address (MAC Address): 00-A0-0C-18-31-4C

IP Address (IP address): 202.96.168.10

Subnet Mask (subnet mask): 255.255.255.255 (used to identify if it is within the same LAN)

Default Gateway (default gateway): 202.96.168.10 (Communicate different network contacts)

DNS Server: 202.96.199.162 (providing a query service named IP)

NetBIOS over TCPIP (NetBIOS protocol): enabled (can)

Note: If the IP address of the computer is repeated with the existing IP address, the subnet mask is shown to 0.0.0.0.

(2) Refresh configuration: For Windows 95 customers enabled DHCP, use the release and rent option of the winiPCFG command, and Windows 98 / ME client instead of ipconfig / release_all and ipconfig / renew_all command, manually release or update the client's IP configuration lease.

3, network connection statistics Tools - NetStat.exe

Role: This tool shows TCP connection tables, UDP listener tables, and IP protocol statistics on your computer.

Usage: You can use the netstat command to display protocol statistics and current TCP / IP connections. The NetStat -a command will display all connections, and NetStat -r displays routing tables and active connections. The NetStat -E command will display the Ethernet statistics, and NetStat -s displays statistics for each protocol. If NetStat -n is used, the address and port number cannot be converted into a name.

Example:

(1) Display all connections

C: /> netstat -a

Active Connections

Connection

Proto Local Address Foreign Address State

; Protocol local address external address status

TCP 0.0.0.0:21 0.0.0.0:0 Listening

; Your machine provides FTP file transfer service

TCP 0.0.0.0:80 0.0.0.0:0 Listening

; Your machine provides web web services

TCP 61.128.203.194:139 0.0.0.0:0:0 Listening; NetBIOS service

TCP 61.128.203.194:7626 0.0.0.0:0 Listening

Your machine is likely to be installed "Ice" Trojan

TCP 61.128.203.194:80 202.102.25.121:1164 ESTABLISHED

The IP address is 202.102.25.121 people are browsing your webpage on your machine.

TCP 192.168.0.254:1071 202.102.249.245:80 SYN_SENT

You are submitting web requests to the IP address of 202.102.249.245

TCP 61.128.203.194:1211 202.108.41.2:80 Establish

You are browsing the IP address 202.108.41.2 website page

TCP 61.128.203.194:1210 202.102.245.25:80 Close_wait

You are closing and the IP address is 202.102.245.25

TCP 61.128.203.194:1081 202.101.98.155:6667 Establish

You are chatting with IRC software

UDP 0.0.0.0:135 *: *

Local system service

UDP 61.128.203.194:137 *: *

NetBIOS name service

UDP 61.128.203.194:138 *: *

NetBIOS Datashers

UDP 61.128.203.194:139 *: *

; NetBIOS session service

UDP 0.0.0.0:4000 *: *

You are chatting with OICQ software

(2) Show statistics of all protocols

C: /> netstat -s

IP Statistics

; IP statistics

Packets received = 5378528

Receive the number of packets

Received header errors = 738854

Number of receiving head errors

Received Address Errors = 23150

Receive address error

DataGrams forwarded = 0

Data post delivery

Unknown protocols received = 0

Unknown protocol received number

Received Packets Discarded = 0

; Number of packets discarded after receiving

Received Packets Delivered = 4616524

; Number of packets that receive after receiving

Output requests = 132702

Request number

Routing discards = 157

Routing discard

Discarded Output Packets = 0

; Discard the number of request packets

Output packet no route = 0

Do not rout the number of request packets

Reassembly request = 0

Re-assemble the number of requests

Reassembly successful = 0; reassembly success

Reassembly failures =

Re-assembly failure

DataGrams SuccessFully Fragrams Success Fragmented = 0

Data reported in successful fragmentation

DataGrams Failing Fragmentation = 0

Data number of fragmentation failures

Fragments create = 0

Splitting

ICMP Statistics

ICMP statistics

Received Sent

Receive transmission

Messages 693 4

Number of messages;

Errors 0 0

Number of errors

Destination unreachable 685 0

Unable to reach the number of hosts

Time Exceeded 0 0

Timeout

Parameter Problems 0 0

Number of parameter errors

Source quenches 0 0

Source

REDIRECTS 0 0

Redirection

Echoes 4 0

Number of responses

Echo replies 0 4

Respond to the number of responses

Timestamps 0 0

Number of time stamps

TimeStamp Replies 0 0 0

Timestamp reply

Address Masks 0 0

Number of address masks

Address Mask Replies 0 0 0

; Address mask reply

TCP Statistics

TCP statistics

Active Opens = 597

Directive open number

Passive Opens = 135

Passive opening

Failed connection Attempts = 107

; Connection failure attempt

RESET Connections = 91

; Reset connection

Current Connections = 8

Current positive part

Segments received = 106770

Received number of pieces

Segments Sent = 118431

Send number

Segments retransmitted = 461

Recommptive number

UDP statistics

UDP statistics

DataGrams received = 4157136

Data report ends

NO ports = 351928

; Non-port number

Receive ErrorS = 2

Receive the number of errors

DataGrams Sent = 13809

Description: You can usually know the ports and services that are being opened on your machine. You can check if you have a Trojan on your machine! Generally speaking, if there is an abnormal port in listening, you need to pay attention. At the same time, you can also see the status of the machine that is connected to those IP addresses in TCP, UDP, or other protocols.

4, manipulating the tools for network routing table - ROUTE.EXE

Role: This tool is used to display and control the routing table of your machine IP. The main displayed information is: target address, network mask, gateway, and local IP address.

Usage: route [-f] [-p] [Command [destination] [mask subnetmask] [Gateway] [metric costmetric]]

Parameter Description:

(1) parameter

-f Clear the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will be cleared before the command is run.

-P This parameter is used with the add command, the route will last for a long time between the system boot. By default, the system does not retain the route when restarted. When used with the Print command, display the registered persistent routing list. Ignore all other commands that always affect the respective persistent routes.

(2) Command

Print printing route

Add add route

Delete delete routing

Change changed the existing deposit

Destination Specifies the computer that sends a Command.

Mask SubnetMask specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used.

Gateway specifies the gateway.

A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted.

Metric CostMetric assigns the number of integer hops (from 1 to 9999) to calculate the fastest, most reliable and / or cheapest route.

Example:

(1) Show all routing information:

C: /> Route Print

============================================================================================================================================================================================================= ====================

Interface List

Network interface list

0x1 ......................... MS TCP loopback interface

Local return interface

0x2 ... 44 45 53 54 77 77 ... NTS PPPoE Adapter # 1

; ADSL network card

0x1000005 ... 00 50 BA DD B5 40 ... Realtek RTL8029 (AS) Ethernet Adapt

;Ethernet card

============================================================================================================================================================================================================= ==================== Active Routes:

Activity route

Network Destination Netmask Gateway Interface Metric

0.0.0.0 0.0.0.0 61.141.206.103 61.141.206.103 1

61.141.206.0 255.255.255.0 61.141.206.103 61.141.206.103 100

61.141.206.103 255.255.255.255 127.0.0.1 127.0.0.1 100

61.255.255.255 255.255.255.255 61.141.206.103 61.141.206.103 100

127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1

169.254.0.0 255.255.0.0 169.254.153.205 169.254.153.205 2

169.254.153.205 255.255.255.255 127.0.0.1 127.0.0.1 1

169.254.255.255 255.255.255.255 169.254.153.205 169.254.153.205 1

192.168.0.0 255.255.255.0 192.168.0.1 192.168.0.1 1

192.168.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1

192.168.0.255 255.255.255.255 192.168.0.1 192.168.0.1 1

224.0.0.0 224.0.0.0 61.141.206.103 61.141.206.103 100

224.0.0.0 224.0.0.0 169.254.153.205 169.254.153.205 1

224.0.0.0 224.0.0.0 192.168.0.1 192.168.0.1 1

255.255.255.255 255.255.255.255 61.141.206.103 61.141.206.103 1

DEFAULT GATEWAY: 61.141.206.103

============================================================================================================================================================================================================= ==================== Description: Route Print and NetStat -R have the same effect.

(2) Add a routing

C: /> Route Add 157.0.0.0 Mask 255.0.0.0 157.55.80.1 Metric 3 IF 2

Note: If the IF parameter is not given, the system will try to find a best network interface for the gateway 157.55.80.1.

(3) Delete a route

C: /> Route delete 157.0.0.0

5, address resolution tool -arp.exe

Role: This tool is used to view and process the ARP cache. ARP is the meaning of address resolution protocol, which is responsible for parsing an IP address as a physical MAC address.

usage:

ARP -A [inet_addr] [-n [if_addr]]]]

arp -d inet_addr [if_addr]

ARP -S INET_ADDR Ether_ADDR [if_addr]

Parameter Description:

-a Displays the current ARP item by querying TCP / IP. If INET_ADDR is specified, only the IP and physical address of the specified computer are displayed.

-g is the same as -A.

INET_ADDR specifies the IP address in a dotted decimal tag, such as: 202.102.245.32.

-N Displays the network interface ARP item specified by if_addr.

if_addr specifies the IP address (if any if any) you need to modify its address conversion table interface. If there is no existence, the first applicable interface will be used.

-d Delete items specified by inet_addr.

-s Add items in the ARP cache to associate the IP address INET_ADDR and physical address Ether_addr. The physical address is given by 6 hexadecimal bytes separated by a hyphen. Specify the IP address using a tether of the decimal tag. The item is permanent, that is, the timeout expiration will automatically remove from the cache.

Ether_ADDR Specifies the physical address.

Example:

(1) Show current ARP items

C: /> arp -a

(2) Add a static entry

C: /> ARP -S 157.55.85.212 00-AA-00-62-C6-09

6, NetBIOS special tool - NBTSTATAT.EXE

Role: This tool is mainly used to see the current NetBIOS-based TCP / IP connection status, which you can get the group names and machine names of remote or local machines through this tool.

Usage: nbtstat [-a remoteename] [-A ip address] [-c] [-n] [-r] [-r] [-s] [-s] [interval]

Parameter Description:

-A Remotename lists its name table using the name of the remote computer.

-A IP Address uses a remote computer's IP address to list a name table.

-c gives the IP address of each name and lists the contents of the NetBIOS name cache.

-n lists the local NetBIOS name. "Registered" indicates that the name has been registered in BNODE or WINS (other node type). -R Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file.

-r lists the name resolution statistics of the Windows network name resolution. On the Windows 2000 computer configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS.

-S Displays the client and server session, listed remote computers only via the IP address.

-s Displays the client and server session. Try converting a remote computer IP address into the name of the host file.

Interval Re-displays the selected statistics, and suspend Interval seconds between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NBTSTAT prints a current configuration information.

Example:

(1) Check the other's machine name and MAC address according to the IP address:

C: /> NBTSTAT -A 202.110.96.75

Netbios Remote Machine Name Table

Name Type Status

-------------------------------------------------- -------------------

Janker <00> Unique Registered

Workgrp <1e> Group registered

Mac Address = 00-B0-D0-7A-9C-12

Description: The other party's machine name is JANKER, group is Workgrp, where <00> <1e> is the last character of the NetBIOS name.

(2) List all local NetBIOS names:

C: /> nbtstat -n

Netbios Local Name Table

Name Type Status

--------------------------------------------

Janker <00> Unique Registered

Janker <20> Unique Registered

Janker <00> Unique Registered

Machine named Janker

Public <00> Group register

Group named public

INET ~ Services <1c> Group registered

Description of the machine installed with Internet Information Service Services

..__ msbrowse __ .. <01> Group registered

Description Machine installed with MSBrowser Service service

7. File transfer tool - FTP.exe

Role: Transfer files to remote computers that are running the FTP service or send files (sometimes called daemon) from a remote computer that is running an FTP service. FTP can interact with.

usage:

(1) Direct access to the FTP interacts with command line. After execution, it is displayed as FTP>.

(2) FTP [-V] [-N] [-i] [-d] [-g] [-ss: filename] [-A] [-w: windowsize] [computer] parameter description:

-v prohibits displaying a remote server response.

-n prohibits automatically logging in to an initial connection.

-i multiple file transfer When the interaction tips are turned off.

-d Enable debug, display all FTP commands passed between clients and servers.

-g Disable file name, which allows usage of wildcard characters (* and?) in local files and path names.

-s: filename Specifies a text file containing the ftp command; these commands will automatically run when the FTP starts. Space is not allowed in this parameter. Use this switch instead of redirect (>).

-A Use any local interface when bundled data connections.

-w: Windowsize replaces the default size of 4096 transmission buffer.

Computer Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.

Command list:

Command description! Exit from the FTP subsystem to the housing? Display FTP Command Description Append local-file [remote-file] Use the current file type setting to attach a local file to a file on a remote computer. ASCII Sets the file transfer type to the default ASCII Bell

Switch the ring to make a bell after each file transfer command. By default, the ringtone is close to the Binary Transmission Type to binary BYE to end the FTP session with the remote computer and exit the FTP CD Remote-Directory Change the work directory on the remote computer. Close

End the FTP session with the remote server and return to the command interpreter Debug

Switch debugging. When the debug is open, each command sent to the remote computer is printed, and the front is string ">". By default, debugging is a closed delete remote-file delete file DIR [Remote-Directory] [local-file] on a remote computer display remote directory file and subdirectory list disconnect disconnected from the remote computer, keep ftp prompt get remote-file [local-file] Copy the remote file to the local computer Glob to switch the file name combination using the current file conversion type. The combination allows usage wildcards (* and?) In internal files or path names. By default, the combination is opened by Hash

Switch the digital signature (#) printing of each data block that has been transmitted. The size of the data block is 2048 bytes. By default, hash symbol printing is a closed help [command] Display FTP Command Description LCD [Directory] changes the working directory on the local computer. By default, the working directory is the directory of the FTP LITERAL ARGUMENT [...] sends the parameters to the remote FTP server. Will return a single FTP reply code LS [Remote-Directory] [local-file] Display remote directory file and subdirectory abbreviation list MDELETE Remote-files [...] Delete files on remote computers MDir Remote-Files [... ] local-file displays a remote directory file and subdirectory list. You can use MDIR to specify multiple files MGET Remote-files [...] Use the current file transfer type to copy remote files to local Computers MKDIR Directory Create Remote Directory MLS Remote-Files [...] local-file Display remote directory files and sub-directory files The abbreviation list of the directory MPUT local-files [...] uses the current file transfer type to copy local files to the remote computer Open Computer [port] to connect to the specified FTP server to connect the PROMPT switching prompt. If the prompt transmits all files when prompted, the FTP will prompt in the multi-file transfer process allows you to selectively retrieve or store files. By default, the prompt is open-file [remote-file] Use the current file transfer type to copy local files to the remote computer on the remote computer PWD Display the current directory quit on the remote computer End the FTP session with the remote computer and exit FTP quote Argument [...] sends parameters to the remote FTP server. A single FTP reply code will be returned. Quote and Litral The same recv remote-file [local-file] Use the current file transfer type to copy the remote file to the local computer. Recv and get the same Remotehelp [command] Display Remote Command Help Rename FileName NewFileName Rename Remote File RMDir Directory Remove Remote Directory Send Local-file [Remote-file] Copy the local file to remote computers using the current file transfer type. Send Displays the FTP connection and switching the current status trace tracking of the FTP connection and switching. TRACE Displays the route Type [Type-name] setting or display file transfer type user username [password] [Account] specifies remote computer users Verbose

Switch Verbose mode. If open, all FTP responses will be displayed. After the file transfer is complete, statistics related to the transmission efficiency will be simultaneously displayed. By default, Verbose is open.

Example:

(1) Use the interactive method to log in to the user guest and password 1234 to download the file Test.zip file in the Download file of FTP server ftp.server.com.

C: /> ftp

FTP> Open ftp.server.com

Connected to ftp.server.com.

220 ftp server (ftp.server.com) Ready!

User (ftp.server.com. (None): Guest <- Enter your username

Password: <- Enter password

230 User Guest Logged in.

FTP> CD Download <- Go to Download Directory

250 CWD Command Successful.

FTP> Bina <- Set the transfer binary file mode

200 TYPE SET to I.FTP> GET TEST.ZIP <- Download File

200 Port Command Successful.

150 Opening Binary Mode Data Connection for Test.zip (5277 Bytes).

226 Transfer Complete.

FTP: 5277 BYtes Received in 2.4 Seconds 1kbytes / Seconds 1kbytes / Sec.

FTP> Close <- Close connection

221

FTP> Quit <- Exited Shell

C: />

(2) Automatically complete the download tasks in (1) with command line.

Create a file: Autodown.txt

User guest

1234

CD Download

bina

Get test.zip

Close

quit

Execute command: ftp -n -s: autodun.txt ftp.server.com

Description: Many servers support the anonymous way to log in, that is, the user name is anonymous, the password is any Email address, but most anonymous users can only download files, no access to the file.

8, powerful remote management tools -Telnet.exe

Role: You can use Telnet customers to connect to remote computers running with Telnet server software. Once connected, you can communicate with the Telnet server. The type of session executed depends on the configuration of the Telnet software. Communication, games, system management, and local login simulations are several typical types used by Telnet.

Execute: Start -> Run -> Telnet, enter the main window of Telnet, you can make the necessary settings for Telnet from the "Terminal" -> Preferences item of the main menu, such as local response, cursor properties, fonts Attributes, etc..

Use: After setting, select "Connect" -> Remote System item from the main menu, you enter the login window, fill in the host name and port number, and click the "Connect" button.

Note: No matter what remote system is logged in, it is generally necessary to enter the username and password first to access the remote system. How to operate after the specific login system, this should be determined by the settings of the other party, generally, login Once you can execute all console programs within your permissions, you can do not perform those programs with graphical interfaces because Telnet only supports the character interface. Telnet can do a lot of things, such as remote management, electronic guides BBS, MUD games, send and receive email, upload download files, and download web pages.

Example:

(1) Remote restart Linux server

First, log in to the Linux Telnet server WWW. Server.com, then convert to root with password Hello123, and then exit after restarting the remote host.

Host name: www.server.com port: 23

Red Hat Linux 6.2

KERNEL 2.2.12-16 on AN i686

Login: GUEST <- Enter your username

Password: <- Enter password

[Guest @ Server Guest] $ suhello123 <- Convert to root users

[root @ Server root] reboot <- Restart the server

Description: The default is not allowed to log in to the system directly with Telnet directly to the system, and you need to log in as an ordinary user, and then convert to the root user with the su command. In the Windows NT / 2000 system, administrator administrator is available directly. (2) Download the home page of the website

Host name: www.server.com port: 80

Get / http / 1.0 Enter 2 times

Description: Note The characters entered should be used. To view the received text, you can see the type of Web Server, such as IIS 5.0, Apache 1.3.22, etc.

(3) Participate in the electronic bulletin board BBS

Host name: SMTH.NET port: 23

Description: Shuimu Tsinghua Station, the best BBS site in China, follow the prompt operation after login.

(4) Play MUD game

Host name: 202.102.249.26 Port: 3333

Explanation: Fengyun MUD game, very fun, follow the prompt operation after login.

(5) Receive Email Letters

Assuming your mailbox at www.163.net: Badboy@163.net password is 12345

Host name: www.163.net port: 110

User Badboy <- Enter your username

OK!

Pass 12345 <- Enter password

OK!

STAT <- How many letters are there?

Twist

List <- Look at the file

1

2

3

....

28 <- Letter list

Retr 4 <- Take a look at the 4th letter

Here is the content of the fourth letter! ! !

Dele 7 <- Delete the 7th

OK!

Quit <- Exit

Fourth, conclude

This article starts with a more detailed introduction from the web foundation concept to most of the network tools that come with the Windows 95/98 / ME system. In fact, there are many network tools in Windows NT / 2000, which cannot be one by one here. Tell. But I believe that through the skilled use of these tools, we will lay a solid foundation for learning more in-depth network technologies.

转载请注明原文地址:https://www.9cbs.com/read-28470.html

New Post(0)