[Original] I personally organize AD2000 skills, all of you collect! More than 60.

xiaoxiao2021-03-06  43

Selfless! ! ! ! ! Have all collections! ! There is also part, finishing 1, install Win2K free serial number

method one:

In the process of installing the Windows2000, you want to enter the registration number during the process of installing the Windows 2000. In order to make the installation, you need to enter the registration number during the installation process. Copy the installation file to the hard disk, open the setupp.ini under the i386 directory, change the number behind the PID to 51837270, then you will ask you to enter the serial number again during the entire installation process.

Method Two:

After the content of the file is completely removed, the rewest is changed as the following information:

[PID]

PID

=

"42144270"

EXTRADATA = 62706A776C7766637274CE52597B39

----------------------------------------------

2. Use the command line format installed with the answer file

Use the floppy disk to start using WinNT.exe to implement an unrecognized installation: WinNT.exe

/u:d:/setup.txt

/ S: D: / i386

/ T: C:

Enter the operating system, use the Winnt32.exe installation new system to implement an unrecognized installation: Winnt32.exe

/u:d:/setup.txt

/ S: D: / i386

/ Tempdrive: C:

Using the CD-ROM to start the unrecognized installation: A. Creating a reply file named Winnt.sif, putting its related files into a floppy disk or engraving the file into Windows

2000 / XP installation in the i386 directory in the disc. b, start the computer with a 2000 CD to implement an automatic installation process without answering. The floppy disk is automatically called in the floppy disk or the response file in the CD I386 Winnt.SIF.

/ syspart: drive_letter

Indicates that the installation start file can be copied to a hard disk and mark the hard disk as an active, and then install the disk to other computers. When the computer is started, it will automatically start the next phase of the installation. However, you must always use the / tempDrive parameter and / syspart parameter. Running Windows

NT

4.0, windows

2000

Or Windows

On the computer of XP, you can use the / syspart option to start

Winnt32. Run Windows

95, Windows

98 or Windows

ME

The computer cannot use this option. This parameter can only be valid when running Winnt32.exe.

Special key name and function:

Key name: repartition

Key value: Yes | NO

Specifies whether to restrict and format the client first primary disc (formatted to NTFS system). This is only in Windows

2000 CD boot computer for unattended participation in installation.

Key Name: ExtendoemPartition

Key value: 0 | 1

Allow installation to establish expansion partitions

-------------------------------------------------- -

3, how to maintain system files in Windows2000

WINDOWS

2000 report tells what to do if your system file is replaced or deleted? This is a problem that will appear from time to time, you can use Windows

The system file protection program from 2000 is restored. In Windows

In 2000, the SFC command is useful for maintaining the entire system file. Specific practice is:

In the "Start" / "Run", enter "SFC / Scannow" to scan the system file and fix it.

The SFC command statement is as follows:

SFC

[/ scannow]

[/ scanind]

[/ scanboot]

[/ ca Zancel]

[/ enable]

[/ purgeCache]

[/ cachesize = x]

[/ quiet]

. Where: / scannow immediately scans all protected system files.

/ scanind

Scan all protected system files once.

/ scanboot

Scan all protected system files each time you start.

/ ca ZANCEL

Cancel all the scans of all suspended protected system files.

/ enable

Enabled for normal operation

Windows

Document protection.

/ purgecache

Clear the file cache and immediately scan all protected system files.

/ cachesize = x

Set the file cache size.

/ quiet

Do not prompt users to replace all incorrect file versions.

You can choose to use these commands as needed.

-------------------------------------------------- ---------------

4, Windows

2000

The magical use of environment variables

Install Windows

2000

Professional version, C disk still installing Winodws

98, and WinodWS

2000 installed on the E disk (application software is in Windows

Install under 98). Try to open some software without installing, find that Visual

FoxPro

6, VC , WPS

2000 and other software can be used directly, WinZIP8.0 and other software input registration number can also be used, Photoshop and other software open, pop up a series of dialog boxes, display the following information: The following dynamic link library PFPICK can not be found. DLL with the path: D

/ Program

FILES / Adobe / Photoshop5.0cs / Winnt / System32 /

Winnt / system

/ Winnt

/ WinNT / System32 / WBEM

But after all the way, click OK, it is still open. Can you not let these dialogs appear? This involves Windows

The environment variable setting of 2000.

Although Windows

98 There is also an environment variable in the registry, but there is no Windows

2000 This is easy to modify. Analyze the contents of the above dialogs, the first is the software installation path, the rest is the system directory, the last one is the path setting of the environment variable. Then look up the dynamic link library file PFPICK. The DLL location is found in the system directory.

Thus, open the control panel, double-click System, select Environment Variables in "Advanced", you can see two dialogs, "User Variables" above, set up a temporary variable, used to store temporary files The following is "System Variable", set some system parameters, we need to modify this "path" path here:% systemroot% / system32

% Systemroot%

% SystemRoot% / System32 / WBEM

We only need to add some statements behind: "C

/ Windows

C

/ Windows / System

C

/ Windows / system32

", Then restart your computer, double-click Photoshp5.0c.exe, you will find that there is no previously listed dialogs. Later I found out, other software, like ACDSEE, Foxmail, OICQ, Sonique, Jet-Audio, etc. Software can also be used directly, Dreamweaver, Firework, Flash4, CuteftP can be used after entering the registration code, and Netants will pop up the dialog box, display "MSIPCSV. EXE Unable to locate the program, enter the point getProcessFlags on the dynamic link library Kernel32. "On the DLL. No matter what you press" OK ", you can open it, because your system does not delete what information, so your operating system is still safe. -------------- ----------------------------------------------

5, delete the problem of NTFS partition?

If you want to delete NTFS partitions, you can use Windows

2000 CD Startup computer Enter the installer, delete the partition, or use fdisk, but fdisk does not delete the NTFS partition in the extended partition, which can be used as the following Debug method:

Debug

A

10

MOV

AX, 0201

MOV

BX, 0100

MOV

CX, 0001

MOV

DX, 0080

int

13

int

20

g = 10

Fly

2CE

2DD

00

A

10

MOV

AX, 0301

g = 10

Qi

(DUG ?? Depressed ing ~~~~~)

-------------------------------------------------- ---

6, how to delete the Win2000's default management sharing (C $, D $, etc.)?

After win2000 is installed, the system will create some hidden shares, you can play at CMD

Net

Share

View them. There are a lot of articles on IPC intrusion on the Internet, I believe that everyone must be unfamiliar with it. To prohibit these sharing

,turn on

Management Tools> Computer Management> Shared Folders> Sharing

Press the right button on the corresponding shared folder, point to stop sharing, but after the machine is restarted, these shares will be reopened again.

If you want to ban the default sharing of% Driveletter% $, you can follow the following locations in the registry

HKEY_LOCAL_MACHINE // System // CurrentControlSet // Services // LanmanServer // Parameters

New Name: AutoShareServer

Types of:

REG_DWORD

value:

0

If you want to ban the default sharing of Admin $, you can follow the following locations in the registry

HKEY_LOCAL_MACHINE // System // CurrentControlSet // Services // LanmanServer // Parameters

New Name: AutoShaRewks

Types of:

REG_DWORD

value:

0

Default shared directory path and function:

C $

D $

E $

The root directory of each partition. Win2000

PRO version, only administrator

BACKUP

Operators group members can be connected, Win2000

Server version Server

OperatROS group can also be connected to these shared directories, admin $

% Systemroot%

Remote management shared directory. Its path will always point to the Win2000 installation path, such as C: / Winnt.

FAX $

Win2000

In Server, Fax $ will arrive at the FAX client.

IPC $

Empty connection. IPC $ sharing provides the ability to log in to the system.

Netlogon

This share is in Windows

2000

Server Net

Login

Service is used in handling login domain requests

Print $

% SystemRoot% / System32 / Spool / Drivers

User remote management printer

-------------------------------------------------- ------------

7. How to let Win2000 directly enter VGA mode

At NT4.0, after installing the operating system, the VGA mode will appear, and Win2000 is not, you can add a parameter / basevideo in the boot.ini file, as follows:

[boot "

Loader]

TIMEOUT = 30

DEFAULT = MULTI (0) Disk (0) RDisk (0) Partition (1) / Winnt

[Operating

SYSTEMS]

Multi (0) Disk (0) rdisk (0) Partition (1) / Winnt = "Microsoft

Windows

2000

Server

/ FastDetect / Basevideo

-------------------------------------------------- -----------

8, Windows

What is the use of the hiberfil.sys file in the 2000 directory? This file is terrible but deletes it.

You must have used the sleep function inside "Power Management" in a certain period. In fact, whether it is sleep, or the STD we have said before, the principle is the same: save the information in the memory in this file when executing, restart Windows

In 2000, I recovered it back. The size of this file is equal to your physical memory capacity. Be sure to delete it, the method only one: cancel sleep function.

-------------------------------------------------- ------------

9, solve small memory installation Windows

2000 problem

If you need to install Windows2000 on a machine that is less than 64MB, but in the default, you must have 64MB of memory to install Windows.

2000

Server, however, it can be bypassed.

First of all, WINDOWS

The 2000 I386 installation directory is copied to the local / network drive. Edit the file i386 TXTSETUP.SIF (extension is SIF!) File. Search RequiredMemory. Edit this line, let you change the minimum memory, but before you change, you must fully realize that you have made everything! EG: RequiredMemory = 66584576. save document.

Install as usual.

Everything OK ... (this method is not suitable for installation with Winnt32.exe, but only) installed with Winnt.exe.)

-------------------------------------------------- --------------------

10, Microsoft's Windows

2000 recovery console

If you use the Windows2000 recovery console, administrators can access 2000 systems from command dialog, replace corrupted files, start and terminate service. When installed, it will add an option to the start menu.

The following operations should be described below:

Start system to windows2000

Insert installation CD

Go to i386 directory from the command line, type: C: /> Winnt32

/ cmdcons

Click "OK" on the confirmation information bar that appears

The file will be copied to the computer, and the new project C: /cmdcons/bootsect.dat= "Microsoft is added to the startup menu.

Windows

2000

Command

Console

/ cmdcons

Complete the information bar appears, click "OK"

Restart your computer, "Microsoft

Windows

2000

Command

Console "is selected, start the Windows2000 to the command line mode.

The system will ask the 2000 installation and its administrator password you want to fix.

When you enter your password, you can type commands, such as taking disable to terminate the service, DiskPart to create and delete many other commands such as partitions. Just type HELP can list a list of all commands.

You can also hit the console directly from the installation CD. From the disc boot system (if your motherboard supports the optical drive start), select Repair and type C to fix it.

If you rename the administrator account, the console can still use it, unless you delete the administrator account. But repair console (Recovery

Console is temporarily unable to work in the domain.

--------------------------------------------------

11, Driver.cab problem

In C: / WinNT / Driver

In the cache / i386 directory, there is a compressed file for Driver.cab, a size of about 50MB.

Windows is stored inside

The benefits of built-in built-in drivers are the benefits of establishing this document. If the system's configuration changes, if new peripherals, etc., Windows

2000 can automatically extract the corresponding drivers from this file for installation, without user inserting Windows

2000 disc. This is a good feature, but for the hard disk space, it is preferred to insert the CD every time in exchange for hard disk space! What's more, for most users, do not change the system of the system. Everyone deletes the driver.cab file as much as possible, releases 50MB of hard disk space.

---------------------------------------------

12, Windows

2000

Server installation network card as a consideration of the route:

At present, the current operating system, such as NetWare, Windows

NT

Server

4.0 and windows

2000

Server et al, usually only supports a route connection of 4 network cards. If more than 4 network cards, excess network cards will not have routing functions, that is, users connected to the network card cannot communicate with users connected to another 4 network cards. So, the number of network cards installed in a server should not exceed 4.

-------------------------------------------------- ----

13. How to join ordinary users into the admin group in the case of the working group?

If you have a regular user account, there is a very simple method to get NT

Administrator account:

First rename the logon.scr under WinntSystem32 to logon.old backup

Then rename usrmgr.exe to logon.scr

Then restart

Logon.scr is the program loaded when starting, after restarting, there will be no previous login password input

Face, but user manager

At this time he has permission to add yourself to the Administrator group. (Xiao Shuai has not done)

-------------------------------------------------- -

14, how to put Windows

2000

ServicePack

3 integrated into Windows

In the installation disk of 2000, this is installed for Windows

2000 integrates service

Pack

3. Don't you have to install it alone?

1, download Windows from the website

2000

SP3, pass w2ksp3.exe

-X command decompresses the service package into a directory C: / W2KSP3;

2, put Windows

The 2000 source installation file is copied to the directory of the hard disk C: / w2kinstall (for the copy of the entire disc);

3. Run C: / W2KSP3 / I386 / update Update.exe

-s: c: / w2kinstall;

4, then install Windows by c: / w2kinstall

2000, put Windows

2000 integrates service

Pack

3, do not have to be installed separately.

Update

The parameters are as follows:

Update

[-u] [- f] [- n] [- o] [- z] [- q] [- l] [- s:

]

-u

Unattended mode

-f

Forcing other applications shut down when shutdown

NN

Do not uninstall backup files

-o

No prompt to rewrite OEM files

-z

Don't restart after installation is complete

-Q

Quiet mode (no need to participate)

-L

List the patches that have been installed

-s:

Take service

Pack file integrate to

note:

1, the above operations must be all in Windows

Finished in 2000, if you do under other Windows systems, you will receive a prompt.

2, here, after this installed Windows

There is a small problem in 2000, that is, if you run SFC / Scannow Check the protected system file, the program will need you to insert "Windows

2000

Service

Pack3 "CD, this will be a problem, because the CD we make this seems to be unregistered, that is, you can't check the protected system files. So you have to think about it.

3. This has been recorded into an optical disk after the installation file is recorded.

-------------------------------------------------- -

15. You can hide the hard disk partition by modifying the key value in the registry.

Start the Registry Editor, find "HKEY_CURRENT_USER \Software\Microsoft \Windows \currentversion \Policies Hyxplorer", and create a binary key value "Nodrives" in the registry. When the key value corresponding to "NODRIVES" is 01000000, the drive A; the key value is 02000000, the drive B; the key value is 04000000, hiding the drive C ... found the law? Suppose you want to hide the drive letter, ranked n in English letters, then convert 2 (n-1) (N-1) (N-1) to 16-based, this value corresponds to the drive letter to be hidden. For example, if you want to hide the G disk, g is ranking 7, 2 in English, equal to 64, converting the 64 to 16 into 40 So "nodrives" is: "40

00

00

00

-------------------------------------------------- -------

16, in Windows

Remove unwanted components in 2000

Windows

After the 2000 installation is complete, some components (such as components in the attachment) have all been installed. For components that generally users do not use, such as accessories, code conversion, etc. can be deleted. If you want to delete these unwanted components in Windows 98, you can open the Control Panel, by clicking "Add / Remove Programs" Icon, select and delete in the Add / Remove Windows Component tab. But in Windows

This method cannot be deleted in 2000 because there is no such components in the "Add / Delete Windows Components" list. Is there a way to add these components in the Add / Remove Programs list?

---- Introduction to a method that can add these components in the Add / Remove Windows Components list, then remove these unnecessary components, the specific steps are as follows.

----1. Double-click the "My Computer" icon on your desktop, select Tools * "Folder Selection", select "Show all files and folders" in the Advanced Settings option of the View tab. The purpose of this setting is to display hidden folders and files.

----2. Go to Windows

2000 system directory, generally for the winnt directory, then enter the inflicment (that is, C: / WinNT / INF), this directory is an implicit directory, there is a sysoc.inf file in this directory, this file is only 4KB, first back up File, use the text editing software to open this file after the backup is complete, then click the "Edit" menu, select the "Replace" option, enter ", hide" in "Finding Content", and do not lose in "replace", Then click the "All Replace" button to save this file exit.

---- 3. Click Start * "Settings" * "Control Panel", double-click the Add / Remove Programs icon, then click the Add / Remove Windows Component button, open the Windows Component Wizard window, more than 5 in the component Item, such as "COM ", "Distributed

TRANSACTION

Coordinator, "Fax Services", "Accessories and Tools", "Image Processing", etc. (as shown in the drawings), then remove the components from it is removed.

-------------------------------------------------- -----

17, RIS client pre-tiered and runs sysprep.exe

Install Windows with RIS

2000

When Professional can use pre-prices, you must create a client's GUID, how to enter?

A global unique identifier (GUID) that relies on the computer. GUID is usually the MAC address of the NIC. In front of the MAC address of the NIC, add enough forward zero to ensure that the GUID is 32 16-based numbers is a complete GUID. Example 000000-0000-0000-0000-5254AB15C2EE

"52-54-AB-15-C2-EE" is the MAC address of the client network card.

After running sysprep.exe on an experimental machine, you will be prompted to turn off your computer. At this time, it should be noted when you restart your computer. If you still start from your hard drive, you will be installed. So you should choose from to start the computer from the floppy disk or other media, and use a third-party image software to make clones throughout the hard disk or partition. Then distribute the cloned files into each computer, then use the third-party image software to solve the image on each computer, then select the installation from the hard disk.

Before running sysprep, or first familiar with its main switch parameters:

-Sysprep.inf

use

Sysprep.inf

To configure a computer, apply to a computer that clonally configured

-NOSidgen

No new SID number is not generated after the computer is restarted - PNP

Re-detect the PNP device after the computer restart

-Reboot

run

Sysprep

Restart the computer, not shutdown

-------------------------------------------------- -------

18. Precautions when using RIS to install an operating system:

If you start with a NIC, you first guarantee that the client's system BIOS has set the network card to the first startup device. When the client starts, it automatically connects the RIS server. After the connection is connected, the RIS server prompts the user to press the F12 to download the user to install the Smart Wizard, and the user only needs to be repaired when the first installation system or system is damaged. F12, It is usually not used.

If you start with a floppy disk, you will be prompted to press the F12 to initialize the network service. After Press F12, you must remember to remove the startup floppy before the character appears.

-------------------------------------------------- -

19. How to upgrade the NT4 domain to Win2000 domain:

1, NT4's primary domain controller PDC must be used in NTFS file system format, if the FAT16 format will fail;

2, NT4 upgrade is one-way, so there is no way to return to the NT4 environment after upgrading Win2000B3;

3. When doing upgrade planning, you must first back up important information and pre-preparation work, and remove applications that cannot be performed in Win2000B3;

4, first upgrade the PDC and upgrade BDC (before upgrading the PDC, please upgrade the BDC offline, wait until the PDC is fully upgraded to the Win2000B3 domain controller, upgrade the BDC or select the environment that does not upgrade BDC to retain NT4;

5. During the upgrade process, the installer will have three important directories to specify, including Active

Directory's database, log profile, and sysvol directory, make sure the path of the directory is under NTFS partition;

6. After upgrading, the user account, group account and computer account will be retained.

-------------------------------------------------- -

20. Revenue fax in Win2000

First, install a modem that supports faxes normally; after installing the modem, the modem you use will appear in the lower right corner of the taskbar. Due to the default, Win

The 2000 fax machine is only sent without receiving fax, if we want it to automatically receive the fax, you must right-click your modem name, select "Receive" in the pop-up menu; additional computers send fax It is implemented by "print" function, no matter the image or text, so we can pass the content of the fax in Word or other editor, then select "File / Print" menu, select "Fax" Click the "Print" button, "Fax Send Wizard", click "Next", enter the recipient's name and phone number, and then select "Send Now" or "Time Send" according to its own actual situation.

-------------------------------------------------- ----

21, install Windows first

XP installed Windows

Restore the startup menu after 2000

Enter the recovery console and run the command:

FixmbR

C:

FIXBOOT

C:

Copy

X: / i386 / ntldr

C: COPY

x: /i386/ntdetect.com

C: X is the optical drive.

-------------------------------------------------- ----

22, Windows2000

SP3 upgrade failed after failed

Many people install Windows2000

Errors occur when SP3: "AN

Error

in

Updating

Your

SYSTEM

HAS

Occurred ",

After selecting OK, it will be interrupted later, and will not use Windows.

Installer Installs the MSI package. Error information: "The

Windows

Installer

Service

COULD

NOT

Bo

Accessed.

THIS

CAN

Occur

IF

You

ARE

Running

Windows

in

Safe

Mode,

oral

IF

THE

Windows

Installer

IS

NOT

Correctly

Installed .... ".

The reason for this error is Windows

2000

SP3 includes version 2.0.2600.2 version of Windows

Installer, when DCOM's default impersonation

When Level is set to Anonymous, this MSI version cannot run normally. And in W2K

After the SP3 installation fails, the system will remain in the system, even if you re-upgrade SP3, you will not function properly. In order to successfully install SP3, you need to set up the Impersonation of DCOM

Level

for

Identify,

And to delete the residual file /%Windir%/system32/msisip.dll when the installation fails.

DCOM

Impersonation

Level

Setting method:

1.

Run DCMCNFG

2.

If you have some objects that have not registered, the program will prompt you to register.

3.

Enter the DCOM Setting Properties, select DEFAULT

Properties, set Default

Impersonation

for

Identify.

-------------------------------------------------- -----

23, making custom boot floppy disk

1, use Format under pure DOS

A: / s

Handling a floppy disk

2, create file config.sys in the floppy disk, and edit the command line:

Device = oakcdrom.sys / d: mscdxxx

Device = Himem.sys (to load the system information file HIMEM.SYS for Windows, so that the DOS system can run smartdrv.exe)

DOS = HIGH, UMB

FILES = 60

Buffers = 80

3. Create a file autoexec.bat in the plate and edit the command line:

Loadhigh

A: / smartdrv

/ L

A: / mscdex.exe

/ D: MSCDXXX

4, oakcdrom.sys and himem.sys copy to a disk

Note: Command line in config.sys Device = Oakcdrom.sys / D: Mscdxxx and AutoeExec.bat command line: A: /Mscdex.exe

/ d: MSCDXXX is to load the optical drive under pure DOS. The xxx in the MSCDXXX in config.sys and autoexec.bat can be any character, but both must be the same.

-------------------------------------------------- ---

24. Handmade a route in the system and make it permanently curing

"ROUTE"

Add

192.168.50.0

Mask

255.255.255.0

192.168.4.100

But how to make the system automatically load the route each time, it can be added after the parameter -P is permanently cured. After adding a static routing record using the -p parameter, this record is stored in the registry, in the specific location: hkey_local_machine / system / currentcontrolset / services / TCPIP / parameters / PersistentRoutes

-------------------------------------------------- ---

25, Win2000 for the for command application:

Open a DOS window in Win2000, then execute

for

/ L

% a

in

(1,1,254)

DO

Start

/ min

/ low

Telnet

192.168.0.% A

3389

This will expose all open 3389 ports of 192.168.0.x.

After this command is executed, the 254 small windows will be opened in the taskbar. It is recommended to have any not archive, and save it first.

Scan multiple ports of a host, as follows

for

/ L

% a

in

(1, 1, 65535)

DO

Start

/ low

/ min

Telnet

192.168.0.1

% a

This scans 192.168.0.1 ports 1 to 65535 port

Scan all ports of a network segment

for

/ L

% a

in

(1,1,254)

DO

for

/ L

% B

in

(1, 1, 65535)

DO

Start

/ low

/ min

Telnet

192.168.0.% A

% B

This will scan all 1 to 65535 segments of 192.168.0.x paragraphs.

The above command can only be used under Win2000, because / l accumulated parameters are Win2000 to extensions for FOR. Of course, WinXP and Win.NET are available.

Others haven't tried it yet

-------------------------------------------------- -

26, MTU

We know MTU (Maximum

TRANSFER

The Unit maximum transmission unit defines the number of bytes contained in each packet transmitted in the network based on the TCP / IP protocol, which can effectively improve the access speed and stability of the network by adjusting this parameter. In a Windows95 environment, the default setting of this value is 1500 bytes. Since the MTU is set to 576 bytes of routers, the result of the data packet size has caused 1500 bytes of data packets. Slimed into a number of 576 bytes or less packets, causing the system transfer speed to decrease. In order to match the size of the packet, you must regulate the relevant numerical value under the registration.

-------------------------------------------------- -

27, Windows

The location of the serial number in the operating system

Windows

98 installation serial number:

1. Open the registry editor under the premise of entering the operating system, expand

HKEY_LOCAL_MACHINE / SOFTWARE / Microsoft / Windows / CurrentVersion branch, find "ProductKey" string value in the right window, and its key value is the serial number!

2, if you can't enter the operating system, you can view Windows under DOS.

98

Serial number: Start the computer with the boot disk, then enter C: / Windows / Command / Find / L

ProductKey

C: /Windows/system.dat (assuming the C disk is a system disk), you will show Windows after entering the bus.

The serial number of 98.

Windows

2000 installation serial number:

Go to Windows

The 2000 system installation folder, open the / system32 folder, find the winnt $ .inf file, double-click the notepad to open, [userData] section "ProductID =" back quotation string, is the serial number of Windows2000! XP and 2003 are the same.

-----------------------------------------------

28, sys.com

Sys.com Command, this command is specifically used to "transfer" the system from the source disk to the target disk, will copy the system file on the source disk (such as IO.SYS, etc.) to the corresponding position of the target disk, make The target disk can be started separately. When you turn it on, the system will prompt you: Invalid system disk, MS-DOS version does not match the error message, the command.com command is damaged, you can "pass the correct operating system" pass "to your hard disk, such as It turns out that your computer is started from the C drive, then you can type "SYS after starting the boot disk"

C: "You can. After the operation is complete, the system will prompt:" System

", after restarting, it is generally possible to run normally, so it will be the hassle of your reinstall system. Thes command is the most simple means to rebuild the Boot area, or kill the Boot area virus.

(The Boot area here is actually the guiding sector on the activity partition)

------------------------------------------------

29, FDISK hidden parameter switch

Its grammar format is: fdisk / parameters

1, / ACTOK

Do not check if the disk surface has a bad sector: use this parameter to speed up the partition operation.

2, / CMBR

Re-establish the main boot record of the specified disk: its operation is equivalent to / MBR parameters, and the difference is that the disk can be specified.

3, / EXT

Establish an extension partition: Establish an extended partition on the current disk (use logic disk partitions to age)

4, / fprmt

Use of in interactive mode FAT16 or FAT32: When adding this parameter, it is not necessary to support a large-capacity inquiry screen, but inquiry when establishing a new partition, use FAT16 or FAT32 format.

5, / log

Establish disk logical partition:

Establish a logical disk, must be used at the same time as / ext.

6, / logo

Use FAT16 to establish a disk logical partition.

7, / Mbr

Re-establish the main guidance record of the main disk (Master

Boot

RECORD) 446 bytes.

8, / pri

Establish a restrict, and the partition will automatically be set to activate.

9, / prio

Establish the primary partition with the FAT16 format and set to an activation form.

10, /

End FDisk is not restarting the computer: Use it when you use it, restart your computer after changing the partition table.

11, / status

Displays the current disk partition: When the logical partition is not performed on the disk extension partition, the extension partition will not be displayed.

12, / x

Do not use LBA properties: Use it will not produce partitions with LBA properties.

-------------------------------------------------- -

30, completely delete WinMe system restore

1. First click on "My Computer" to select "Properties", in the Performance tab, select File System, and select "Disable System Restore" in the Troubleshooting tab.

2, running regedit, find

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / VXD / VXDMON / Clear all the keys

3, restart the computer

You can delete the C: / _ RESTORE directory (hidden folder). -----------------------------------------

31, Windows

2000

Bugs

In one gives Everyone

Full

At the end of Control permission, you will create a file at the end of the CONTROL permission, remove the permission of this file, set to Administrator

Full

CONTROL

Only. Then use any ordinary user to log in and enter this everyone.

Full

The Control directory tries to access this file, of course, refuses to access. But you can delete it! This problem is simple, you can pass the File of WinHelp

The instructions of Permission are seen. And more reflect, and a file

Delete

Child's hidden permissions have a relationship. Microsoft's explanation is to ensure that UNIX is compatible. Because the Win2K system is too large, if the permissions between the domains are more complicated, it will be very complicated. Therefore, if there is something that needs to be protected, perhaps use DENY permissions better.

EFS is indeed a very powerful set of encryption systems, because of its power, we have to be cautious and cautious in use. First before the addition and deletion of AD, you must remove all EFS encryption, otherwise this EFS encrypted file or folder will never be opened. This is actually warned when installing or deleting the AD, can be easily ignored by the user. Specific reasons I think is because Local

Administrator and Domain

The SID of Administrator is different, so there is a problem. In addition, when performing Duplicate operation, it is necessary to remove EFS before executing sysprep, otherwise these data will never be read. Another problem with EFS is that it cannot prevent a file from being deleted. That is, as long as a user has permission to enter the directory where the EFS encryption file is located, you can delete it, so you can put it on the folder encryption and setting permissions in the EFS file.

------------------------------------------

32, find the bottleneck of the system

1, find memory bottlenecks

Use the following counter to identify the bottleneck memory resources in the Performance Tool:

(1) SYSTEM /

PROCESSOR

Queue

Length

(2) MEMORY /

Pages / Sec

2, find disk bottlenecks

Use the following counter to identify a bottleneck of disk resources in performance tools:

(1) PhysicalDisk /

%

DISK

Time

with

%

Idle

Time

(2) PhysicalDisk /

DISK

Reads / Sec

with

DISK

Writes / sec

(3) PhysicalDisk /

Avg.disk

Queue

Length

(4) LogicalDisk /

%

Free

Space

Also monitors the memory counter to determine if there are too many memory pagings to make the disk used tensions.

Note: Unlike physical disk counters, the data of logical disk counters is not collected by the operating system by default. To obtain a logical drive or a performance counter data of the storage volume, you must type in the command prompt.

Diskperf

-yv. This results in a disk performance statistical driver for collecting disk performance data to report data of logical drives and storage volumes. By default, operating system uses

Diskperf

-YD

Commands contain physical drive data. Use

Diskperf

For more information on the command, type in the command prompt

Diskperf

- ?.

3, find processor bottleneck

Use the following counter to identify the processor resources of the bottleneck in the performance tool: (1) Processor /

Interrupts / Sec

(2) Processor /

%

PROCESSOR

Time

(3) Process (Process) /

%

PROCESSOR

Time

(4) SYSTEM /

PROCESSOR

Queue

Length

4, find a network bottleneck

Use the following counter to identify network resources with bottlenecks in performance tools:

(1) NETWORK

Interface /

BYTES

Total / Sec, Bytes

Sent / Sec

with

BYTES

Received / Sec

(2) Protocol_Layer_Object /

Segments

Received / Sec, Segments

SENT / Sec, Frames

Sent / Sec

with

Frames

Received / Sec

for

NWLINK

Performance objects, with frame-related counters report zero. Use the object-based counter.

(3) SERVER /

BYTES

Total / Sec, Bytes

Received / Sec

with

BYTES

Sent / Sec

(4) NETWORK

Segment /

%

NetWork

Utilization

---------------------------------------------

33. There are many ways to close the 445 port, but I recommend this method:

Modify the registry, add a key value

Hive:

HKEY_LOCAL_MACHINE

Key:

System / ControlSet / Services / NetBt / Parameters

Name:

SMBDeviceEnabled

TYPE:

REG_DWORD

Value:

0

After the modification, restart the machine and run "NetStat

", you will find that your 445 port is no longer listenging.

--------------------------------------------

34, Windows

Extract.exe and ext.exe in 98

In fact, Windows

The 98 super boot disk also has this command, this already appearing in DOS6.22, originally only a command to decompress the CAB compression package in Microsoft, but its function is not only unzipped, we are more It is to use it to restore the system files in the CDD. (If you can enter the graphical interface, you can of course use SFC, it's more powerful, convenient)

Below is the use parameter and command format of the extract.exe command:

/ Y

No time to override existing files

/ A

Handle all CAB files, starting from the specified first CAB file

/ D

Display the directory of the files contained in the CAB file, not decompression

/ E

Unzip, replace "*. *", To decompress all files

/ L

DIR specifies the location of the decompressed file, the default is the current directory

/ C

Copy the CAB file

When we know that the system files that want to recover can be used when installing the position in the disc, you can use extract.

/ Y

Win98_27.cab

CDFS.VXD command (from Windows

98 Installing the name of the Win98_27.cab compression package in the installation CD). However, if you don't know the exact location at this file, you must first use the extract / d win98 _ *. CAB (here * is a number representing the CAB file package) to view CDFS.VxDG for each CAB file, Trouble. Ext.exe. I just introduced that there is a bit of trouble when extract.exe finds a system file that the path is unstuten, if it combines it with ext.exe, you don't need to know the specific path to the file. However, it is important to note that this ext.exe command is in an ebd.cab compression package, you can't use it directly. Extract must be used first

/ Y

Ebd.cab

The ext.exe command extracts ext.exe in the EBD.CAB compression package to the same directory, now you know the effect of EBD.CAB compression package? .

Use the ext.exe command to quickly restore system files that unknown paths in the disc, type ext.exe command, then "please

ENTER

THE

Path

Windows

Cab

FILES (A :)

_ "When you type of Windows

98 The path where the disc is located, such as "G: / PWIN98", "please" after the carriage return "

ENTER

THE

Name (s) of

THE

File (s)

You

Want

TO

Extract: "When you type you need to find the file name, if you still have cdfs.vxd, you will be prompted after entering the bus." please

ENTER

THE

Path

fo

EXTRACT

Do ("Enter"

for

Current

Directory: "It means that it is necessary to enter the path to be decompressed, such as c: / windows / system", after entering the arrival again, the following confirmation information appears:

THE

Options

You

entered

WERE:

Source

Path

:

G: / PWIN98

File (s)

TO

EXTRACT

:

CDFS.VXD

Destination

Path

:

C: / windows / system

IS

THIS

Okay? (y / n)

:

After "Y", the ext command quickly started, but it can not only find the detailed location of the file, but it can automatically decompress the file until the file is released to the specified path, and the speed is extremely fast.

-------------------------------------

35. Is there a tool to drop the dynamic disk back to the basic disk?

I have repeatedly trying to work and succeeded:

Install Recovery

Console, enter the recovery console, delete one or two unimported volumes with the diskpart command, restart, found that the data that has been changed back to the base plate, the data that is not deleted is intact

(Xiao Shuai has not done !!!!!!)

-----------------------------------------

36. Win2000 unconnected network is unavailable solution

Win2000 has such a feature. When our network cable is broken due to various reasons, the system will prompt your network cable without a connection. You will make your address no longer force, causing some of the only friends who don't have a friend without even network. Can't do it. A solution is given now, but it does not guarantee a certain success (which is unsuccessful on a large part of the NIC. This function of Win2000 is called "Media" (Media "

Sense)

First, we can ban this feature through the registry: HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / CURRENTCONTROLSET / SYSTEM / TCPIP / Parameters There is a keyword for disabledhcpmediasense, DWORD type (if you don't have yourself), default is 0 Open the detection function, set it to 1, turn off the probe. After the modification is complete, restart the computer, then you remove the network cable, though the system is still not connected, but the IP bound to the NIC is still tube.

Second, you can make a back rotator, 1326 even deceived can also

Specific connection method:

Crystal head network card one end: orange white, orange, green white, blue, blue white, green, brown, brown

The other end does not pick up RJ-45, directly connect 13, 26, ie orange white, orange, green, other 6 lines do not use 理 理

---------------------------------------

37, NT does not recognize the hard disk, can only identify the solution of 8G hard drive

Replace the original file in the i386 directory in the NT installation disc, then run the installer or replace the copy with these two files after running the installer or after the NT replication file is used to the hard disk. On the $ ** $ file on the C drive, you can install NT4.0 on a large capacity hard drive without re-adjusting the partition.

----------------------------------------

38. How do I use the netsh command to configure COPY on another IAS?

Netsh

AAAA

Show

Config

>

Path / file.txt

Netsh

EXEC

File.txt

This should be

Can be used below 2k3

Netsh

AAAA

DUMP

> file.txt

-----------------------------------------

39, in Win2000

Can I install routing and remote access components to make it remote login server?

2K

Pro is a RRAS function, but there is only MMC without Server

Console, 2K

PRO's RRAS only done a service, just put the management tool -> Serving Routing

and

REMOTE

Access service starts in the line (not started by default), then you can see "Incoming Connection" in the network neighbor, in the incoming connection, can configure RAS customers, VPN customers, etc., 2K

PRO only supports three remote users, RAS, VPN, and direct connections to accept one customer, together three customers.

----------------------------------------

40, RRAS

Console

Displays

AN

"In"

Routing

Interface

After

You

INSTALL

Routing

and

REMOTE

ACCESS

Services

(RRAS),

AN

Interface

Named

"In"

Appears

Under

Routing

Interfaces

in

THE

Routing

and

REMOTE

ACCESS

Services

Management

Console.

THIS

Interface

IS

part

Of

RRAS

and

Represents

all

REMOTE

ACCESS

Services

(RAS)

DEVICES.

All

RAS

Clients

ARE

part

Of

THIS

Interface.

THE

"In"

Interface

Should

NOT

Bo

deleted

-----------------------------------------

41, how to add saving time saved in the ARP buffer project?

The time default value saved in the ARP buffer project is two minutes, and it can be changed below:

Open the Registry Editor;

Find hkey_local_machine / system / currentcontrolset / service / tcpip / parameters

Look at "Double Word Value" under "New", enter the name ArpCachelife, enter the number of seconds you want to save;

Exit the editor and restart your computer.

-------------------------------------

42, modify the password of the domain controller?

Erd

Commander

After the 2002 Making ISO CD launched the DC local password, the DC is the hand to come. Use the local administrator password to log in this machine (directory recovery mode), then configure the power-on script of the local security policy, assume your domain administrator The account is admin, the content of the boot script should be

Net

User

admin

12345678

Save to the admin.bat file and then restart. Then your DC's administrator password is changed to 12345678. Everything will be done.

-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

43, disable off

XP text service? ?

Removing CTFMon.exe from MSConfig does not disable text services. Because the text service will start automatically when you start a pro program. To prohibit text services, follow these steps:

Step 1: Delete Chinese Optional User Enter Method

For Windows

2000 system, delete this feature:

1.

Exit, so Office

program.

2.

Click Start, click Setting, and then click Control Panel.

3.

In the Control Panel, double-click Add / Remove Programs.

4.

In the current installer list, select Microsoft

Office

XP products. Click to change.

5.

In the Maintenance Mode dialog box, select Add or Remove Components, then click Next. The dialog box to select the installation option is displayed.

6.

Click the plus number before the Office sharing function.

7.

Click on the icon of the Chinese optional user input method to select not installed.

8.

Click Update.

Step 2: Remove the optional user input from the text service:

1.

Click Start, click Setting, and then click Control Panel.

2.

In the control panel, double-click the text service.

3.

In the installed service list, except English (US), one by one deletes the remaining input method.

Step 3: Run Regsvr32

/ U

Log out of MSIMTF.DLL and MSCTF.dll files.

1.

Click Start -> Run.

2.

In the Run dialog, type the following command:

Regsvr32.exe

/ U

MSIMTF.DLL "

(Excluding double quotes)

3.

Click OK.

4.

Repeat 1 to 3 steps for MSCTF.dll files.

After prohibiting the text service, you can add other input methods as before.

-------------------------------------------------- -

44, what is RPC? ?

Inter-process communication (IPC) is a communication technology used by programs and processes run between multitasking operating systems or networking computers. There are two types of process communication (IPC). Local Process Call (LPC) LPC is used in multi-tasking operating systems such that tasks running simultaneously can be sessions. These tasks shared memory space allows tasks to synchronize and transmit information.

Remote Process Call (RPC) RPC is similar to LPC, just working online. RPC begins to appear in a computer that runs a SUN microsystem and HP's running UNIX operating system.

By IPC and RPC, the program can utilize other programs or computer processing processes. Client / Server Mode Calculation The remote process calls with other technologies such as messages, as a mechanism for inter-system communication. The client executes its own task, but provides backend file services by the server. RPC provides the client to provide a communication mechanism for the rear server application service, as shown in Figure R-4. If you want the client / server application to be a separate program, the server can run the data access section because it is recently separated by the data, and the client can run the data representation and the front end portion interact with the user. Thus, the remote process call can be seen as part of the part of the split program through the network. LPC is sometimes also known as coupling mechanism.

Use this method to divide the program, do not need to copy the entire database or most of its programs to the user system when the user wants to access the data. In fact, the server only processes the request, even only performs some data calculations, and sends the resulting result to the user. Because when the data is placed in one place, the database synchronization is easy to implement, so many users can access the same data simultaneously.

The distributed computing environment is a computer cluster connected by a communication system-network connection. It is easy to see this network as a computing platform. If it is equal, any computer can be a client or server. Some processing tasks can be divided into separate runners in parallel on different network computers, while independent programs are handed over to computer processing that best suits this task. This strategy can use computer idle resources to improve network efficiency. A typical enterprise network includes many heterogeneous computer systems that run different operating systems.

-------------------------------------------------

45, how to prohibit anonymous users from connecting your IPC $ sharing?

We can implement it by modifying the registry

Key: HKLM / System / CurrentControlSet / Control / LSA

Name:

Restrictanonymous

TYPE:

REG_DWORD

Value:

1

|

2

Note: When the value is set to 1, anonymous users cannot list the host user list; when the value is set to 2, anonymous users cannot connect your IPS $ sharing, not recommended 2, otherwise you may cause some of your services that you can't Start, such as SQL

Server ...

-----------------------------------------------

46, Regedit.exe parameters:

Filename

Import

.reg

File entering registry

/ s

Import

.reg

File Enterprise (quiet mode)

/ e

Export registry file

Example: regedit

/ e

FileName.Reg

HKEY_LOCAL_MACHINE / SYSTEM

/ L: System

Specify

System.dat

/ R: User

Specify

User.dat

/ C

compression

[file name]

(Windows

98)

-------------------------------------------------- ----

47, ". REG" file full Raiders

In order to facilitate the modification of the registry, we will make some scripts, but whether it is an INF file or a VBS script, I think it is only the .reg file is the most convenient. About the operation of the registry, common is to create, modify, delete. --create

Create a division, one is to create a child (Subkey)

Note: If you are not very clear about the naming of the registry, you can check the registry naming standard manual (http://www.sometips.com/tips/registryhack/204.htm)

We create a file, the content is as follows:

Windows

Registry

Editor

Version

5.00

[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]

Then execute this script, you have created a child name "Test4Adam" in HKEY_LOCAL_MACHINE / SOFTWARE /.

The other is to create a project name

The file format is a typical file format, which is consistent with the file format you exported from the registry:

Windows

Registry

Editor

Version

5.00

[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]

"TEST1" = "adam"

"TEST2" = HEX: 61

"TEST3" = dword: 00000064

Test1 type is "String

Value

Test2 type is "binary

Value

Test3 type is "DWORD

Value

Note: If there is no Test4adam in your registry, the script will create the child for you.

--modify

Modifications are relatively simple, just export you need to modify, then modify it with Notepad, then import it, I will not repeat it here.

--delete

Let's first tell the delete a project name, we create a file as follows:

Windows

Registry

Editor

Version

5.00

[HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]

"TEST1" = -

Execute this script, "Test1" under HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM is deleted;

Let's take a look at the delete one child, we create a script as follows:

Windows

Registry

Editor

Version

5.00

[-HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM]

Execute this script, HKEY_LOCAL_MACHINE / SOFTWARE / TEST4ADAM has been deleted.

-------------------------------------------------- --------

48, Power

Users

Group:

Power

Members of the user group can modify the account of non-administrative users, start the service that is not started by default (note, a power

The member of the User Group cannot stop a system service), which cannot modify the administrator's account password, install the system service or modify the operating system file.

-------------------------------------------------- -----

49, remote backup and restore:

The corresponding operating system path in the boot.ini file on the remote computer is added to the / safeboot: dsrepair command option, boot the remote machine to the recovery mode, then use the planned task or the AT command to implement backup and restore. Implementing remote restarts You can use the corresponding management programs in 2000, XP, 2003. -------------------------------------------------- --------

50, RAS

Client gets DHCP

Options:

THE

MOBILE

Users

Receive

THEIR

IP

Configurations

From

THE

REMOTE

ACCESS

Server, But

the

ARE

NOT

Able

TO

Receive

Any

DHCP

Options.

In

ORDER

TO

enable

this,

a

DHCP

RELAY

Agent

Must

Bo

Configured

on

THE

REMOTE

ACCESS

Server.

THIS

Will

Allow

DHCPINFORM,

Which

ARE

Used

TO

Obtain

Windows

Internet

Name

Service

(Wins)

and

Domain

Name

SYSTEM

(DNS)

Addresses,

Domain

Name,

DEFAULT

Gateway

oral

Other

DHCP

Options

ORIGINATING

From

THE

DHCP

Server,

TO

REACH

THE

MOBILE

CLIENTS.

-------------------------------------------------- --------

51. Use the netsh command to copy the IAS settings:

REMOTE

ACCESS

Policies

ARE

NOT

stored

in

Active

Directory;

the

ARE

stored

Locally

in

THE

IAS.MDB

File.

TO

Copy

THE

IAS

CONFIGURATION

TO

Another

Server

WE

Must

Type

Netsh

AAAA

Show

Config /file.txt

AT

THE

Command

PROMPT.

THIS

Stores

THE

CONFIGURATION

Settings,

including

Registry

Settings,

in

a

TEXT

File.

THE

Path

CAN

Bo

RELATIVE,

Absolute,

oral

a

UNC

Path.

WE

Must

THEN

Copy

THE

File

WE

created

TO

THE

Destination

COMPUTER,

and

AT

a

Command

Prompt

on

THE

Destination

COMPUTER,

Type

Netsh

EXEC

/file.txt.

A

Message

Will

Appear

Indicating

WHETHER

THE

Update

WAS

Successful

oral

NOT.

-------------------------------------------------- -------

52, DHCP User Class:

User

Classes

Allow

DHCP

Clients

TO

Differentiate

Themselves

BY

Specifying

a

User

Class

Option.when

Available

for

Client

USE,

THIS

Option

Includes

a

User-determined

Class

Id

That

CAN

Help

TO

group

Clients

Of

SIMILAR

CONFIGURATION

Needs

Wtem

a

SCOPE,

Such

AS

providing

a

SHORTER

Lease

Time

for

Portable

Computers

That

Move

FREQUENTLY

oral

USE

REMOTE

ACCESS

OFTEN.

Typically

a

DHCP

Server

Will

Bo

Used

TO

Distribute

Different

Options

That

ARE

Specific

TO

THE

Needs

Of

CLIENTS.

TO

CONFIGURE

a

User

Class

Lease

Time

WE

Must

Open

THE

DHCP

Console,

SELECT

THE

DHCP

Server,

Open

SCOPE,

Right

click

Scope

Options,

SELECT

CONFIGURE

Options,

SELECT

THE

Advanced

Ban,

SELECT

ApproPriate

Vendor

Class

and

User

Class

(= Windows2000LaptopComputers

in

THIS

Example,

SELECT

051

Lease,

and

ENTER

Lease

Time: 14400

(4

Hours

=

14400

SECONDS)

-------------------------------------------------- -------

53, mobile DHCP database:

TO

Move

THE

DHCP

Database

WE

Must

First

STOP

THE

DHCP

Service

on

THE

Old

Server,

BACK

UP

THE

Registry

Key

HKLM / Software / Microsoft / DHCPServer / Configuration,

and

INSTALL

DCHP

on

THE

New

Server.We

Must

THEN

STOP

THE

DHCP

Service

on

THE

New

Server

and

RESTORE

THE

Registry

Key

From

THE

Old

Server

Onto

THE

New

Server.

THEN

WE

Must

Delete

THE

Contents

Of

C: / WinNT / System32 / DHCP

on

THE

New

Server,

Copy

THE

Database

File

DHCP.MDB

From

THE

Old

Server

Onto

THE

New

Server

BUT

NOT

THE

TRANSACTION

Logging

(* .Log)

and

Checkpoint

(* .Chk)

Files

and

Start

THE

DHCP

Service

on

THE

New

Server.

Finally

WE

Must

Reconcile

all

Scopes

on

THE

New

Server

TO

SYNCHRONIZE

THE

Database

WITH

THE

Registry.

-------------------------------------------------- ------ 54, DNS aging recording function:

Previous

Versions

Of

Microsoft

Operating

Systems

That

DO

NOT

Support

Dynamic

Domain

Name

SYSTEM

(DNS)

Require

That

a

Static

DNS

Entry

USE

a

Static

IP

Address

WHENEVER

Possible.

IF

WE

UPGRADE

TO

Microsoft

Windows

2000

and

Our

Present

DNS

Server

IS

Windows

2000,

THE

IP

Address

Will

Remain

THE

Same, But

THE

DNS

"A"

Record

Remains

STATIC.

However,

THE

Static

Ptr

Record

IS

Converted

TO

a

Dynamic

Entry

and

IS

Subject

TO

THE

aging

.

THE

Windows

2000

Dynamic

Domain

Name

SYSTEM

(DDNS)

Client

Does

NOT

Overwrite

AN

existing

"A"

Record

IF

THE

IP

Addresses

Match.

TO

Convert

Static

entries

TO

Dynamic

ENTRIES,

WE

Must

USE

THE

/ AGEAllRecords

Option

in

THE

DNSCMD.EXE

COMMAND.

-------------------------------------------------- -------

55. A useful command in nbtstat:

NBTSTAT

-Rr: releases

Names

Registered

WITH

a

Wins

Server

and

THEN

Renews

THEIR

Registrations.

THIS

Will

RELEASE

Obsolete

Records

and

all

Wins

Clients

Will

get

Registered

Properly

Again.

-------------------------------------------------- -------

56, DNS FAST

zone

TRANSFER

Format:

BY

DEFAULT,

all

Windows-based

DNS

Servers

USE

a

FAST

zone

TRANSFER

Format,

Which

Uses

Compression

and

CAN

Include

Multiple

Records

per

TCP

Message

during

a

Connected

TRANSFER.

THIS

Format

IS

ALSO

Compatible

WITH

More

Recent

Berkeley

Internet

Name

Domain

(Bind)

-BASED

DNS

Servers

That

Run

Versions

4.9.4

and

Later.

-------------------------------------------------- -------

57, 98/2000 / xp / 2003 issue of XP

Some people say that enabling Guest, some people even install NetBeui et al. Since then, you will summarize the correct statement, pay attention to the 98/2000 / XP / 2003 access to XP / 2003 user authentication issues with normal network connection. First of all, I can't access the guests why you cannot access.

1. By default, XP

Disabate GUEST account

2. By default, XP local security policies are prohibited from accessing from network access.

3. By default, XP's local security policy - User Rights Assassin, "Empty Case Users can only log in to the console" are enabled, that is, any account of the empty password cannot be locally logged in, Guest Default empty password ···

So, if you need to use the guest user to access XP, you want to perform the above three settings: Enable guest, modify the security policy allows guest to access, disable 3 security policies or give guests.

Sometimes it will encounter another situation: When accessing XP, the username in the login dialog is gray, which is always a guest user, and cannot enter other user accounts.

The reason is that this security policy is in the Strange (Management Tool - Local Security Policy - Security Options - "Network Access: Sharing and Security Mode for local accounts"). By default, XP's access method is the way "only guest", then you access it, of course, you cannot enter other user accounts for GUEST.

So, accessing the easiest way to access the XP is: No need to enable guest, only modify the above security policy is "classic". Other systems access XP can enter account information.

As for accessing 2003, the 2003 is disabled by default, but there is no XP

The annoying default contradictory guest approach is shared, so you can directly enter your username password access.

-------------------------------------------------- --------

58, IPX / SPX

Frame

TYPE:

NetWare

3.11

Uses

THE

802.3

Frame

TYPE.

NetWare

3.12

and

ABOVE

Uses

THE

802.2

Frame

TYPE.

THIS

NetWork

HAS

Both

NetWare

3.11

and

NetWare

4.1

Servers,

SO

Both

Frame

Types

Must

Bo

INSTALLED.

Installation

Of

Multiple

Frame

Types

on

a

Windows

2000

PROFESSIL

Requires

editing

Of

THE

REGISTRY,

Specifically

Add

Both

Types

TO

THE

Multi-string

Value

PKTTYPE

in

HKLM / System / CurrentControlSet / Services / NWLnkipx / parameters / adapters / ,

WHERE

IS

THE

NetWork

Adapter

Identifier.

-------------------------------------------------- --------

59, four coding methods:

ANSI: System preset standard text storage format. ANSI is American

National

STANDARDS

Abbreviation for institution. It was established in 1918 and a voluntary organization with more than 1300 members, including all large computer companies. ANSI is specific for computers

Industrial establishment standards, it is a very important standard in the world. Unicode: The integration of all major directive files in the world, including the public segments used in business and personal computers. When you use the Unicode format to store files, you can use the Unicode Control Character Assistment Description Language Coverage, such as Arabic, Hebrew. use

The system will prompt you to select Unicode encoding in "Save As" in "Notepad" in "Notepad". These characters will not be lost. Need to remind everyone, part of Windows

The 2000 font cannot display all Unicode characters. If some characters are missing in the discovery file, simply change it to other fonts.

Unicode

BIG

Endian: The sequence of text bits (storage units) in the Unicode file established on the BIG-Endian processor (such as Apple Macintosh), opposite to the text bitmuncing order of the files established on the INTEL processor. The most important bit group has the lowest address and will first store a larger end of the text. To enable users of such computers to access your files, select Unicode

BIG-Endian format.

UTF-8: UTF means universal word set conversion format (Universal

Character

Set

Transformation

FORMAT, UTF-8 is the 8-bit form format of Unicode. If you use only important information of 8 bitmines within the same location in group, you can choose the UTF-8 format.

-------------------------------------------------- -----

60, CA certificate revocation:

Revoking

a

Certificate

IS

a

Two

STEP

PROCESS

First

WE

Must

Revoke

THE

Certificate

and

THEN

Create

(this

IS

DONE

Automatically)

and

Publish

THE

CERTIFICATE

Revocation

List

(CRL).

Finally,

THE

CERTIFICATE

Revocation

Lists

(CRLS)

Must

Bo

ACCESSIBLE

TO

all

Users.

IT

Should

Bo

PUT

in

a

NetWork

Share

and

THE

Users

Should

Have

ApproPriate

(READ)

Permission

TO

THE

Share.

-------------------------------------------------- -----

61, hide your computer in the network neighbors, 2000 absolutely available

There are two ways:

A. Edit Registration:

HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / SERVICES / LANMANSERVER / PARAMETERS

The value of Hidden is set from 0 to 1, which is the dword type.

B. Run as follows:

Net

Config

Server

/ hidden: yes

This user may connect to your computer but cannot see you in the network neighbor.

-------------------------------------------------- ---------

转载请注明原文地址:https://www.9cbs.com/read-56874.html

New Post(0)