Windows System Network Tool User Manual
(2002 latest version)
Author: Lonely Swordsman
Website: http://www.janker.org
I. Introduction
Living in the era of Internet, every day we are using various network tools, such as: sending email with Outlook Express or FOXMAIL, download file with Netants or flashget, to determine if the specified IP address is used to use ping, see your IP address IPConfig and many more. However, when you use someone else's computer, it will often feel that your hands are not in your own network tool. We know that the intelligent ABC input method comes with Chinese Windows, it is not best in all input methods, but because it does not need to be installed and easy to use, the performance is stable, so it has been loved by everyone. In fact, the Windows system has a very little network tool for a very good network, used for the configuration, testing and troubleshooting of the network system, and regrets that there are very little friends to know, even if they don't know, so It's a pity that it is often accompanied by far. To this end, the author is close to this article. From the basic concept of the network, the network tools that come into the Windows system have made a more comprehensive introduction to everyone, I hope to help the friends who learn and use the network, consider Readers' universality, this article will only describe the network tools in Windows 95/98 / ME.
Second, learn the network common sense
Before you introduce the use of Windows Network Tools, learn some basic network common sense is very necessary, which will mainly explain the following common network concepts so that you can understand and use the Windows network tools that will be described later.
1. TCP / IP protocol: TCP / IP is a network communication protocol that specificallys all communication devices on the network, especially the data transfers between a host and another host, and transmission. TCP / IP can transmit data without error in the Internet. For Internet users, do not need to know the entire structure of the network protocol, just understand the address format of IP, you can communicate with hosts around the world.
2, IP address: IP (Internet Protocol) address is an identifier of the network host on the Internet, a total of 32 bits. This address is unique in the entire network. In order to make it easy, the 32 digits can be divided into 4 groups, 8 bits per group, and then each group is represented by the corresponding decimal number, format: nnnn (where N It is an integer between 0 and 255, such as 202.99.121.8. Among them, 127.n.n.n is specified as a loopback address, that is, the return address, no matter what program, once the return address is sent, the protocol software returns it immediately, and no network transmission is performed, for example: 127.0.0.1.
3, Subnet Mask: Subnet Mask is used to identify different physical networks under the same IP network address, which can share the same IP network address through subnet mask, which can share the same IP network address in the same IP network, greatly reduced The number of network addresses, reducing the overhead of the network address and the burden of the gateway. The subnet mask format and IP are very similar, and it is n.n.n.n, for example: 255.255.255.0.
4, port: Port port is mainly used to identify the same IP host to provide different service services in order to access the host through different ways, which is a server that corresponds to the corresponding process on the host, and the port range is 0 to 65535, where 0 to 1024 ports are used for system services, and 1024 or more ports can be used for user service programs. For example: 80 port is a web browsing network service, and the 21-port is a file transfer service. The 23-port is the and 1433 port to provide the remote management service to provide Microsoft SQL Server database services. 5, domain name: When there is no domain name, we have access to the network host resources according to the IP address, but for those who are used to memory, I always hope that there is a marking method than IP addresses more habits. Then there is another set of system-domain name system DNS (Domain Name System) for named IP addresses. Its main features have two: First, define a set of rules for computer domain names, and the other is to convert domain names into IP addresses. The domain name uses a hierarchy, each layer constitutes a subdomain name, and the subdomain is separated from the circle, from left to right, respectively: computer name, network name, institution name, and highest domain name. For example: www.sina.com.cn where WWW is the name of the default host name for the computer, Sina means Sina.com, COM is expressed as a business agency, and CN is the highest domain name to be affiliated to mainland China.
6, MAC address: IP address refers to the address used by the Internet Internet Protocol, and the Mac (Media Access Control) address is the address used by Ethernet protocol. There is no inevitable connection between the IP address and the MAC address, and the MAC address is the address of the Ethernet network card and the length is 48. Each Ethernet network card manufacturer will apply to the IEEE organization to write a unique MAC address in the serial EEPROM of the NIC when the network card is produced. Any two Ethernet NIC's MAC address, no matter which manufacturer is produced. The MAC address exists in each Ethernet package, which is an integral part of the Ethernet header. The IP address is an Internet protocol address, and each Internet package must have an IP address. Each Internet Service Provider (ISP) must apply to a set of IP addresses to the relevant organization, and then generally allocated to their users. The IP address is independent of the MAC address, because the Ethernet user can still connect to the Internet via the MODEM to obtain a dynamic IP address, which can be inconsistent each time. The IP address is usually operating in a wide area network, and the router is handled by the IP address. The MAC address is operating in a local area network, and the interconnection between the local area network is generally a network protocol conversion through an existing public network or dedicated line. IP information can be transmitted on the Ethernet. At this point IP addresses are only part of the Ethernet packet data field, and the Ethernet switch or processor does not see IP addresses, just use it as normal data processing. The format of the MAC address is: N-N-N-N-N-N-N-N-N-N-Number 16, such as 00-A0-0C-18-31-5B.
7, machine name: Machine name NetBIOS computer name, is the NetBIOS protocol difference between different computers, up to 16 characters, but the last bit is often used for the system, so it is actually only 15 characters to users. It is often referred to as NBNAME or NBTNAME, which is called NBNAME or NBTNAME. For example: loneliness swordsman or Janker. The following steps can be observed and modified on the computer name on Windows: Start -> Settings -> Control Panel -> Network -> Identification. In fact, in our computer, the computer name is often corresponding to the native IP address. The default Windows 9x installation is often with the NetBIOS protocol. By using the network program, the IP address can be used by the IP address to find its corresponding computer name. So many friends on the Internet often weird why strangers know their names. Most of the reasons are that you fill your computer name into your real name when you install Windows. 8, DHCP protocol: Dynamic host configuration protocol is the standard of TCP / IP, and design purposes are to centralize dynamic IP address assignments. For example: The IP address of our dialing users is dynamically assigned by the ISP's DHCP server, so almost every dialing IP address is different. In fact, the biggest benefit of using DHCP servers is greatly improved the utilization of IP addresses, not only reduces expenses, but also saves IP resources. Some local area networks also use DHCP servers to allocate IP addresses to clients to meet special needs.
9, Route Routing: Routing refers to the process of forwarding communication between the path between the network. The computer being set to support routing, used to receive messages sent, and forward them to the correct destination through the most efficient available routes, even if there may be many available routes. Computers on different physical networks should communicate with each other, and there must be routers. Router Maintaining Physical Network Mapping on your network and forwards data received from a physical network to other physical networks.
10. Gateway Gateway: The gateway is a facility that is operated on the OSI transportation layer in the interconnect network, so it is called facilities because the gateway is not necessarily a device, it is possible to implement gateway functions in a host. Of course, it does not exclude the use of a computer to specifically implement the protocol conversion function of the gateway. Since the gateway is a facility that implements interconnection, interoperability, and application interoperability. So in the TCP / IP network, the gateway sometimes refers to the device-router that implements this function.
Third, network tool introduction
In order to make everyone easier to master Windows network tools, the following story not only gives the role, principles, and usage of network tools, but also give a detailed application example, referring to exercises, will have to play a half-time. The two points that need to be pointed herein are:
l The program files of the following network tools are stored in the Windows installation directory, and the default directory of the general Windows system installation is c: / windows, but not all users are installed in this directory.
l For the introduction, some host systems, usernames, and passwords, etc. are assumed, and the user needs to know the real network configuration of the system they face.
1, the most common network test tool - ping.exe
Role: The main role of ping is to verify the connection to the remote computer. This command can only be used after the TCP / IP protocol is installed.
Principle: Send a specific packet to the remote computer through the ICMP protocol, then waits and receives the returned packet, verifying each received data plug according to the transmission message. By default, four echo packets containing 32-byte data (a loop uppercase alphanumeric alphanumeric alphanumeric alphanumeric) are transmitted. The process is as follows:
(1) Verify the connection to one or more remote computers by sending ICMP echo packets to the computer and listening to the backset data packet.
(2) Each sending packet is waiting for one second.
(3) Print the number of data packets that have been transmitted and received. Usage: ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [[-j computer -List] | [-K computer-list] [-w timeout] destination-list
Parameter list:
Number Parameters Describe 1 -T ping specified by the computer until the interrupt. 2 -a parsing the address as the computer name. 3 - N count Send counts of ECHO packets specified by COUNT. The default is 4. 4 -l Length Send an Echo packet containing the amount of data specified by Length. The default is 32 bytes; the maximum is 65, 527. 5 -f Send "Do not segment" in the packet. The packet will not be segmented by the gateway on the route. 6 -i TTL Sets the "Survival Time" field to the value specified by TTL. 7 -V TOS Set the Service Type field to the value specified by TOS. 8 -r Count Records the route of the outgoing and returning packets in the Record Routing field. COUNT can specify at least 1 set, up to 9 computers. 9 -s count Specifies the timestamp of the number of hops specified by count. 10 -j computer-list Routing packets using Computer-List specified. A continuous computer can be separated by the intermediate gateway (routing sparse source) IP allowed to be 9. 11 -k computer-list Routing packets using Computer-List specified by Computer-List. Continuous computers cannot be separated by intermediate gateway (routing strict source) IP allowed to 9. 12 -W Timeout specifies the time separation, the unit is millisecond. 13 Destination-List Specifies a remote computer to ping.
Example:
(1) Determine whether the local TCP / IP protocol stack is installed
PING 127.0.0.1 or ping machine name
Description: If reply from 127.0.0.1 .... information is displayed.
(2) Determine whether it can reach a remote computer that specifies the IP address
C: /> ping 192.168.0.1 or 202.102.245.25
Note: If the reply ... information is displayed, it will be reached, and if request timed out is displayed. If it is displayed.
(3) Get the corresponding IP address based on the domain name
C: /> ping www.domain.com Enter
Description: The reply from xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx.xxx .xxxx is the IP address corresponding to the domain name.
(4) Get the domain name according to IP address
C: /> ping -a xxx.xxx.xxx.xxx
Description: If you display pinging www.domain.com [xxx.xxx.xxx.xxx], www.domain.com is the domain name corresponding to IP.
(5) Get the machine name according to IP address
C: /> ping -a 127.0.0.1
Description: If you display pinging janker [127.0.0.1] ... information JANKER is the machine name corresponding to IP. This method can only reflect the local machine name.
(5) Ping's IP address 30 times
C: /> ping -n 30 202.102.245.25
(6) Use 400-bytes long package ping specified IP address
C: /> ping -l 400 202.102.245.25
2, network configuration view program -winipcfg.exe (Win 95) or ipconfig.exe (WIN 98 / ME) role: This tool is mainly used to discover and solve TCP / IP network issues, you can use this tool to get host configuration information , Including IP addresses, subnet masks, and default gateways, and the like. usage:
(1) View all configuration information: WiniPCFG or IPConfig / ALL
Host Name: Janker
Description: PPP AdaPater (Point-to-point data transfer protocol)
Physical Address (MAC Address): 00-A0-0C-18-31-4C
IP Address (IP address): 202.96.168.10
Subnet Mask (subnet mask): 255.255.255.255 (used to identify if it is within the same LAN)
Default Gateway (default gateway): 202.96.168.10 (Communicate different network contacts)
DNS Server: 202.96.199.162 (providing a query service named IP)
NetBIOS over TCPIP (NetBIOS protocol): enabled (can)
Note: If the IP address of the computer is repeated with the existing IP address, the subnet mask is shown to 0.0.0.0.
(2) Refresh configuration: For Windows 95 customers enabled DHCP, use the release and rent option of the winiPCFG command, and Windows 98 / ME client instead of ipconfig / release_all and ipconfig / renew_all command, manually release or update the client's IP configuration lease.
3, network connection statistics Tools - NetStat.exe
Role: This tool shows TCP connection tables, UDP listener tables, and IP protocol statistics on your computer.
Usage: You can use the netstat command to display protocol statistics and current TCP / IP connections. The NetStat -a command will display all connections, and NetStat -r displays routing tables and active connections. The NetStat -E command will display the Ethernet statistics, and NetStat -s displays statistics for each protocol. If NetStat -n is used, the address and port number cannot be converted into a name.
Example:
(1) Display all connections
C: /> netstat -a
Active Connections
Connection
Proto Local Address Foreign Address State
; Protocol local address external address status
TCP 0.0.0.0:21 0.0.0.0:0 Listening
; Your machine provides FTP file transfer service
TCP 0.0.0.0:80 0.0.0.0:0 Listening
; Your machine provides web web services
TCP 61.128.203.194:139 0.0.0.0:0:0 Listening; NetBIOS service
TCP 61.128.203.194:7626 0.0.0.0:0 Listening
Your machine is likely to be installed "Ice" Trojan
TCP 61.128.203.194:80 202.102.25.121:1164 ESTABLISHED
The IP address is 202.102.25.121 people are browsing your webpage on your machine.
TCP 192.168.0.254:1071 202.102.249.245:80 SYN_SENT
You are submitting web requests to the IP address of 202.102.249.245
TCP 61.128.203.194:1211 202.108.41.2:80 Establish
You are browsing the IP address 202.108.41.2 website page
TCP 61.128.203.194:1210 202.102.245.25:80 Close_wait
You are closing and the IP address is 202.102.245.25
TCP 61.128.203.194:1081 202.101.98.155:6667 Establish
You are chatting with IRC software
UDP 0.0.0.0:135 *: *
Local system service
UDP 61.128.203.194:137 *: *
NetBIOS name service
UDP 61.128.203.194:138 *: *
NetBIOS Datashers
UDP 61.128.203.194:139 *: *
; NetBIOS session service
UDP 0.0.0.0:4000 *: *
You are chatting with OICQ software
(2) Show statistics of all protocols
C: /> netstat -s
IP Statistics
; IP statistics
Packets received = 5378528
Receive the number of packets
Received header errors = 738854
Number of receiving head errors
Received Address Errors = 23150
Receive address error
DataGrams forwarded = 0
Data post delivery
Unknown protocols received = 0
Unknown protocol received number
Received Packets Discarded = 0
; Number of packets discarded after receiving
Received Packets Delivered = 4616524
; Number of packets that receive after receiving
Output requests = 132702
Request number
Routing discards = 157
Routing discard
Discarded Output Packets = 0
; Discard the number of request packets
Output packet no route = 0
Do not rout the number of request packets
Reassembly request = 0
Re-assemble the number of requests
Reassembly successful = 0; reassembly success
Reassembly failures =
Re-assembly failure
DataGrams SuccessFully Fragrams Success Fragmented = 0
Data reported in successful fragmentation
DataGrams Failing Fragmentation = 0
Data number of fragmentation failures
Fragments create = 0
Splitting
ICMP Statistics
ICMP statistics
Received Sent
Receive transmission
Messages 693 4
Number of messages;
Errors 0 0
Number of errors
Destination unreachable 685 0
Unable to reach the number of hosts
Time Exceeded 0 0
Timeout
Parameter Problems 0 0
Number of parameter errors
Source quenches 0 0
Source
REDIRECTS 0 0
Redirection
Echoes 4 0
Number of responses
Echo replies 0 4
Respond to the number of responses
Timestamps 0 0
Number of time stamps
TimeStamp Replies 0 0 0
Timestamp reply
Address Masks 0 0
Number of address masks
Address Mask Replies 0 0 0
; Address mask reply
TCP Statistics
TCP statistics
Active Opens = 597
Directive open number
Passive Opens = 135
Passive opening
Failed connection Attempts = 107
; Connection failure attempt
RESET Connections = 91
; Reset connection
Current Connections = 8
Current positive part
Segments received = 106770
Received number of pieces
Segments Sent = 118431
Send number
Segments retransmitted = 461
Recommptive number
UDP statistics
UDP statistics
DataGrams received = 4157136
Data report ends
NO ports = 351928
; Non-port number
Receive ErrorS = 2
Receive the number of errors
DataGrams Sent = 13809
Description: You can usually know the ports and services that are being opened on your machine. You can check if you have a Trojan on your machine! Generally speaking, if there is an abnormal port in listening, you need to pay attention. At the same time, you can also see the status of the machine that is connected to those IP addresses in TCP, UDP, or other protocols.
4, manipulating the tools for network routing table - ROUTE.EXE
Role: This tool is used to display and control the routing table of your machine IP. The main displayed information is: target address, network mask, gateway, and local IP address.
Usage: route [-f] [-p] [Command [destination] [mask subnetmask] [Gateway] [metric costmetric]]
Parameter Description:
(1) parameter
-f Clear the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will be cleared before the command is run.
-P This parameter is used with the add command, the route will last for a long time between the system boot. By default, the system does not retain the route when restarted. When used with the Print command, display the registered persistent routing list. Ignore all other commands that always affect the respective persistent routes.
(2) Command
Print printing route
Add add route
Delete delete routing
Change changed the existing deposit
Destination Specifies the computer that sends a Command.
Mask SubnetMask specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used.
Gateway specifies the gateway.
A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted.
Metric CostMetric assigns the number of integer hops (from 1 to 9999) to calculate the fastest, most reliable and / or cheapest route.
Example:
(1) Show all routing information:
C: /> Route Print
============================================================================================================================================================================================================= ====================
Interface List
Network interface list
0x1 ......................... MS TCP loopback interface
Local return interface
0x2 ... 44 45 53 54 77 77 ... NTS PPPoE Adapter # 1
; ADSL network card
0x1000005 ... 00 50 BA DD B5 40 ... Realtek RTL8029 (AS) Ethernet Adapt
;Ethernet card
============================================================================================================================================================================================================= ==================== Active Routes:
Activity route
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 61.141.206.103 61.141.206.103 1
61.141.206.0 255.255.255.0 61.141.206.103 61.141.206.103 100
61.141.206.103 255.255.255.255 127.0.0.1 127.0.0.1 100
61.255.255.255 255.255.255.255 61.141.206.103 61.141.206.103 100
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
169.254.0.0 255.255.0.0 169.254.153.205 169.254.153.205 2
169.254.153.205 255.255.255.255 127.0.0.1 127.0.0.1 1
169.254.255.255 255.255.255.255 169.254.153.205 169.254.153.205 1
192.168.0.0 255.255.255.0 192.168.0.1 192.168.0.1 1
192.168.0.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.0.255 255.255.255.255 192.168.0.1 192.168.0.1 1
224.0.0.0 224.0.0.0 61.141.206.103 61.141.206.103 100
224.0.0.0 224.0.0.0 169.254.153.205 169.254.153.205 1
224.0.0.0 224.0.0.0 192.168.0.1 192.168.0.1 1
255.255.255.255 255.255.255.255 61.141.206.103 61.141.206.103 1
DEFAULT GATEWAY: 61.141.206.103
============================================================================================================================================================================================================= ==================== Description: Route Print and NetStat -R have the same effect.
(2) Add a routing
C: /> Route Add 157.0.0.0 Mask 255.0.0.0 157.55.80.1 Metric 3 IF 2
Note: If the IF parameter is not given, the system will try to find a best network interface for the gateway 157.55.80.1.
(3) Delete a route
C: /> Route delete 157.0.0.0
5, address resolution tool -arp.exe
Role: This tool is used to view and process the ARP cache. ARP is the meaning of address resolution protocol, which is responsible for parsing an IP address as a physical MAC address.
usage:
ARP -A [inet_addr] [-n [if_addr]]]]
arp -d inet_addr [if_addr]
ARP -S INET_ADDR Ether_ADDR [if_addr]
Parameter Description:
-a Displays the current ARP item by querying TCP / IP. If INET_ADDR is specified, only the IP and physical address of the specified computer are displayed.
-g is the same as -A.
INET_ADDR specifies the IP address in a dotted decimal tag, such as: 202.102.245.32.
-N Displays the network interface ARP item specified by if_addr.
if_addr specifies the IP address (if any if any) you need to modify its address conversion table interface. If there is no existence, the first applicable interface will be used.
-d Delete items specified by inet_addr.
-s Add items in the ARP cache to associate the IP address INET_ADDR and physical address Ether_addr. The physical address is given by 6 hexadecimal bytes separated by a hyphen. Specify the IP address using a tether of the decimal tag. The item is permanent, that is, the timeout expiration will automatically remove from the cache.
Ether_ADDR Specifies the physical address.
Example:
(1) Show current ARP items
C: /> arp -a
(2) Add a static entry
C: /> ARP -S 157.55.85.212 00-AA-00-62-C6-09
6, NetBIOS special tool - NBTSTATAT.EXE
Role: This tool is mainly used to see the current NetBIOS-based TCP / IP connection status, which you can get the group names and machine names of remote or local machines through this tool.
Usage: nbtstat [-a remoteename] [-A ip address] [-c] [-n] [-r] [-r] [-s] [-s] [interval]
Parameter Description:
-A Remotename lists its name table using the name of the remote computer.
-A IP Address uses a remote computer's IP address to list a name table.
-c gives the IP address of each name and lists the contents of the NetBIOS name cache.
-n lists the local NetBIOS name. "Registered" indicates that the name has been registered in BNODE or WINS (other node type). -R Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file.
-r lists the name resolution statistics of the Windows network name resolution. On the Windows 2000 computer configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS.
-S Displays the client and server session, listed remote computers only via the IP address.
-s Displays the client and server session. Try converting a remote computer IP address into the name of the host file.
Interval Re-displays the selected statistics, and suspend Interval seconds between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NBTSTAT prints a current configuration information.
Example:
(1) Check the other's machine name and MAC address according to the IP address:
C: /> NBTSTAT -A 202.110.96.75
Netbios Remote Machine Name Table
Name Type Status
-------------------------------------------------- -------------------
Janker <00> Unique Registered
Workgrp <1e> Group registered
Mac Address = 00-B0-D0-7A-9C-12
Description: The other party's machine name is JANKER, group is Workgrp, where <00> <1e> is the last character of the NetBIOS name.
(2) List all local NetBIOS names:
C: /> nbtstat -n
Netbios Local Name Table
Name Type Status
--------------------------------------------
Janker <00> Unique Registered
Janker <20> Unique Registered
Janker <00> Unique Registered
Machine named Janker
Public <00> Group register
Group named public
INET ~ Services <1c> Group registered
Description of the machine installed with Internet Information Service Services
..__ msbrowse __ .. <01> Group registered
Description Machine installed with MSBrowser Service service
7. File transfer tool - FTP.exe
Role: Transfer files to remote computers that are running the FTP service or send files (sometimes called daemon) from a remote computer that is running an FTP service. FTP can interact with.
usage:
(1) Direct access to the FTP interacts with command line. After execution, it is displayed as FTP>.
(2) FTP [-V] [-N] [-i] [-d] [-g] [-ss: filename] [-A] [-w: windowsize] [computer] parameter description:
-v prohibits displaying a remote server response.
-n prohibits automatically logging in to an initial connection.
-i multiple file transfer When the interaction tips are turned off.
-d Enable debug, display all FTP commands passed between clients and servers.
-g Disable file name, which allows usage of wildcard characters (* and?) in local files and path names.
-s: filename Specifies a text file containing the ftp command; these commands will automatically run when the FTP starts. Space is not allowed in this parameter. Use this switch instead of redirect (>).
-A Use any local interface when bundled data connections.
-w: Windowsize replaces the default size of 4096 transmission buffer.
Computer Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.
Command list:
Command description! Exit from the FTP subsystem to the housing? Display FTP Command Description Append local-file [remote-file] Use the current file type setting to attach a local file to a file on a remote computer. ASCII Sets the file transfer type to the default ASCII Bell
Switch the ring to make a bell after each file transfer command. By default, the ringtone is close to the Binary Transmission Type to binary BYE to end the FTP session with the remote computer and exit the FTP CD Remote-Directory Change the work directory on the remote computer. Close
End the FTP session with the remote server and return to the command interpreter Debug
Switch debugging. When the debug is open, each command sent to the remote computer is printed, and the front is string ">". By default, debugging is a closed delete remote-file delete file DIR [Remote-Directory] [local-file] on a remote computer display remote directory file and subdirectory list disconnect disconnected from the remote computer, keep ftp prompt get remote-file [local-file] Copy the remote file to the local computer Glob to switch the file name combination using the current file conversion type. The combination allows usage wildcards (* and?) In internal files or path names. By default, the combination is opened by Hash
Switch the digital signature (#) printing of each data block that has been transmitted. The size of the data block is 2048 bytes. By default, hash symbol printing is a closed help [command] Display FTP Command Description LCD [Directory] changes the working directory on the local computer. By default, the working directory is the directory of the FTP LITERAL ARGUMENT [...] sends the parameters to the remote FTP server. Will return a single FTP reply code LS [Remote-Directory] [local-file] Display remote directory file and subdirectory abbreviation list MDELETE Remote-files [...] Delete files on remote computers MDir Remote-Files [... ] local-file displays a remote directory file and subdirectory list. You can use MDIR to specify multiple files MGET Remote-files [...] Use the current file transfer type to copy remote files to local Computers MKDIR Directory Create Remote Directory MLS Remote-Files [...] local-file Display remote directory files and sub-directory files The abbreviation list of the directory MPUT local-files [...] uses the current file transfer type to copy local files to the remote computer Open Computer [port] to connect to the specified FTP server to connect the PROMPT switching prompt. If the prompt transmits all files when prompted, the FTP will prompt in the multi-file transfer process allows you to selectively retrieve or store files. By default, the prompt is open-file [remote-file] Use the current file transfer type to copy local files to the remote computer on the remote computer PWD Display the current directory quit on the remote computer End the FTP session with the remote computer and exit FTP quote Argument [...] sends parameters to the remote FTP server. A single FTP reply code will be returned. Quote and Litral The same recv remote-file [local-file] Use the current file transfer type to copy the remote file to the local computer. Recv and get the same Remotehelp [command] Display Remote Command Help Rename FileName NewFileName Rename Remote File RMDir Directory Remove Remote Directory Send Local-file [Remote-file] Copy the local file to remote computers using the current file transfer type. Send Displays the FTP connection and switching the current status trace tracking of the FTP connection and switching. TRACE Displays the route Type [Type-name] setting or display file transfer type user username [password] [Account] specifies remote computer users Verbose
Switch Verbose mode. If open, all FTP responses will be displayed. After the file transfer is complete, statistics related to the transmission efficiency will be simultaneously displayed. By default, Verbose is open.
Example:
(1) Use the interactive method to log in to the user guest and password 1234 to download the file Test.zip file in the Download file of FTP server ftp.server.com.
C: /> ftp
FTP> Open ftp.server.com
Connected to ftp.server.com.
220 ftp server (ftp.server.com) Ready!
User (ftp.server.com. (None): Guest <- Enter your username
Password: <- Enter password
230 User Guest Logged in.
FTP> CD Download <- Go to Download Directory
250 CWD Command Successful.
FTP> Bina <- Set the transfer binary file mode
200 TYPE SET to I.FTP> GET TEST.ZIP <- Download File
200 Port Command Successful.
150 Opening Binary Mode Data Connection for Test.zip (5277 Bytes).
226 Transfer Complete.
FTP: 5277 BYtes Received in 2.4 Seconds 1kbytes / Seconds 1kbytes / Sec.
FTP> Close <- Close connection
221
FTP> Quit <- Exited Shell
C: />
(2) Automatically complete the download tasks in (1) with command line.
Create a file: Autodown.txt
User guest
1234
CD Download
bina
Get test.zip
Close
quit
Execute command: ftp -n -s: autodun.txt ftp.server.com
Description: Many servers support the anonymous way to log in, that is, the user name is anonymous, the password is any Email address, but most anonymous users can only download files, no access to the file.
8, powerful remote management tools -Telnet.exe
Role: You can use Telnet customers to connect to remote computers running with Telnet server software. Once connected, you can communicate with the Telnet server. The type of session executed depends on the configuration of the Telnet software. Communication, games, system management, and local login simulations are several typical types used by Telnet.
Execute: Start -> Run -> Telnet, enter the main window of Telnet, you can make the necessary settings for Telnet from the "Terminal" -> Preferences item of the main menu, such as local response, cursor properties, fonts Attributes, etc..
Use: After setting, select "Connect" -> Remote System item from the main menu, you enter the login window, fill in the host name and port number, and click the "Connect" button.
Note: No matter what remote system is logged in, it is generally necessary to enter the username and password first to access the remote system. How to operate after the specific login system, this should be determined by the settings of the other party, generally, login Once you can execute all console programs within your permissions, you can do not perform those programs with graphical interfaces because Telnet only supports the character interface. Telnet can do a lot of things, such as remote management, electronic guides BBS, MUD games, send and receive email, upload download files, and download web pages.
Example:
(1) Remote restart Linux server
First, log in to the Linux Telnet server WWW. Server.com, then convert to root with password Hello123, and then exit after restarting the remote host.
Host name: www.server.com port: 23
Red Hat Linux 6.2
KERNEL 2.2.12-16 on AN i686
Login: GUEST <- Enter your username
Password: <- Enter password
[Guest @ Server Guest] $ suhello123 <- Convert to root users
[root @ Server root] reboot <- Restart the server
Description: The default is not allowed to log in to the system directly with Telnet directly to the system, and you need to log in as an ordinary user, and then convert to the root user with the su command. In the Windows NT / 2000 system, administrator administrator is available directly. (2) Download the home page of the website
Host name: www.server.com port: 80
Get / http / 1.0 Enter 2 times
Description: Note The characters entered should be used. To view the received text, you can see the type of Web Server, such as IIS 5.0, Apache 1.3.22, etc.
(3) Participate in the electronic bulletin board BBS
Host name: SMTH.NET port: 23
Description: Shuimu Tsinghua Station, the best BBS site in China, follow the prompt operation after login.
(4) Play MUD game
Host name: 202.102.249.26 Port: 3333
Explanation: Fengyun MUD game, very fun, follow the prompt operation after login.
(5) Receive Email Letters
Assuming your mailbox at www.163.net: Badboy@163.net password is 12345
Host name: www.163.net port: 110
User Badboy <- Enter your username
OK!
Pass 12345 <- Enter password
OK!
STAT <- How many letters are there?
Twist
List <- Look at the file
1
2
3
....
28 <- Letter list
Retr 4 <- Take a look at the 4th letter
Here is the content of the fourth letter! ! !
Dele 7 <- Delete the 7th
OK!
Quit <- Exit
Fourth, conclude
This article starts with a more detailed introduction from the web foundation concept to most of the network tools that come with the Windows 95/98 / ME system. In fact, there are many network tools in Windows NT / 2000, which cannot be one by one here. Tell. But I believe that through the skilled use of these tools, we will lay a solid foundation for learning more in-depth network technologies.