Command Line

xiaoxiao2021-03-06  42

ARP

Show and modify "Address Resolution Protocol" (ARP) to the Ethernet IP or token Ring Physical Address Translation Table. This command is only available after the TCP / IP protocol is installed.

ARP -A [inet_addr] [-n [if_addr]

arp -d inet_addr [if_addr]

ARP -S INET_ADDR Ether_ADDR [if_addr]

parameter

-A

Display the current ARP item by querying TCP / IP. If INET_ADDR is specified, only the IP and physical address of the specified computer are displayed.

-g

The same as -a.

INET_ADDR

Specify an IP address in a dotted decimal tag.

NN

Displays the network interface ARP item specified by if_addr.

IF_addr

Specifies the IP address (if any) that needs to modify its address conversion table interface. If there is no existence, the first applicable interface will be used.

-d

Delete the item specified by inet_addr.

-S

Add items to the ARP cache, associate the IP address INET_ADDR and physical address Ether_addr. The physical address is given by 6 hexadecimal bytes separated by a hyphen. Specify the IP address using a tether of the decimal tag. The item is permanent, that is, the timeout expiration will automatically remove from the cache.

ether_addr

Specify the physical address.

Finger

Display information about the user on the specified system running the finger service. Different variables are output according to the remote system. This command is only available after the TCP / IP protocol is installed.

Finger [-l] [user] @computer [...]

parameter

-L

Display information in a long list form.

User

Specifies the user to obtain relevant information. Omit user parameters to display information about all users on the specified computer:

@computer

Ftp

Transfer files to remote computers that are running the FTP service or send files from a remote computer that is running an FTP service (sometimes called daemon). FTP can interact with. Click the "FTP command" in the "Related Topic" list to obtain the available "FTP" subcommand description. This command is only available after the TCP / IP protocol is installed. FTP is a service. Once started, you will create a sub-environment in which the ftp command can be used, and you can return to the Windows 2000 command prompt by typing the quit subcommand. When the FTP sub-environment is run, it is represented by the FTP command prompt.

FTP [-V] [-N] [-i] [-d] [-g] [-ss: filename] [-a] [-w: windowsize] [Computer]

parameter

-V

Disable the remote server response.

NN

It is forbidden to log in to the initial connection.

-i

Turn off the interaction when transmitting multiple files.

-d

Enable debug, display all FTP commands passed between clients and servers.

-g

Disable file name groups, which allows the use of wildcard characters (* and?) In local files and pathnames. (See the glob command in the online "command reference".)

-s: filename

Specifies a text file containing the ftp command; these commands will automatically run when the FTP starts. Space is not allowed in this parameter. Use this switch instead of redirect (>).

-A

Use any local interface when bundled data connections.

-w: Windowsize

Alternatively the default size is 4096 transmission buffer.

Computer

Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.

NBTSTAT

This diagnostic command uses NBT (TCP / IP NetBIOS) display protocol statistics and current TCP / IP connection. This command is only available after the TCP / IP protocol is installed.

NBTSTAT [-A Remotename] [-A IP address] [-c] [-n] [-r] [-r] [-s] [-S] [interval] parameter

-A Remotename

List its name table using the name of the remote computer.

-A ip address

Use the IP address of the remote computer to list the name table.

-C

Given the IP address of each name and list the contents of the NetBIOS name cache.

NN

List the local NetBIOS name. "Registered" indicates that the name has been registered in BNODE or WINS (other node type).

-R

Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file.

-r

List the name resolution statistics of the Windows network name resolution. On the Windows 2000 computer configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS.

-S

Display client and server sessions, only listing remote computers through the IP address.

-S

Display client and server sessions. Try converting a remote computer IP address into the name of the host file.

Interval

Re-displays the selected statistics, suspend Interval seconds between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NBTSTAT prints a current configuration information.

Netstat

Display protocol statistics and current TCP / IP network connections. This command can only be used after the TCP / IP protocol is installed.

NetStat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval]

parameter

-A

Display all connection and listening ports. Server connections are usually not displayed.

-e

Display Ethernet statistics. This parameter can be used in conjunction with the -s option.

NN

Display addresses and port numbers in digital format (instead of trying to find name).

-S

Displays statistics for each protocol. By default, statistics on TCP, UDP, ICMP, and IP are displayed. The -p option can be used to specify the default subset.

-p protocol

Displays the connection to protocol specified by protocol; Protocol can be TCP or UDP. If you use the -s option to display the statistics of each protocol, Protocol can be TCP, UDP, ICMP, or IP.

-r

Display the contents of the routing table.

Interval

Re-displays the selected statistics, suspend Interval seconds between each display. Stop the statistics by Ctrl B stop. If this parameter is omitted, NetStat will print a current configuration information.

Ping

Verify the connection with the remote computer. This command can only be used after the TCP / IP protocol is installed.

Ping [-t] [-A] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [-j computer-list] | [-k computer-list] [-w Timeout] destination-List

parameter

-t

Ping specified computer until the interrupt.

-A

Resolve the address as the computer name.

-n count

Send count of the ECHO packet specified by COUNT. The default is 4.

-l Length

Send an Echo packet containing the amount of data specified by Length. The default is 32 bytes; the maximum is 65, 527.

-f

Send a "Do not segment" flag in the packet. The packet will not be segmented by the gateway on the route.

-i TTL

Set the "Survival Time" field to the value specified by TTL.

-V TOS

Set the Service Type field to the value specified by TOS.

-r count

Record the routing of the outgoing and returning packets in the Record Routing field. COUNT can specify at least 1 set, up to 9 computers.

-s count

Specifies the timestamp of the number of hops specified by count.

-j Computer-List

Routing the packet using the computer list specified using computer-list. A continuous computer can be separated by the intermediate gateway (routing sparse source) IP allowed to be 9. -k computer-list

Routing the packet using the computer list specified using computer-list. Continuous computers cannot be separated by intermediate gateway (routing strict source) IP allowed to 9.

-w Timeout

Specifies a timeshoot, unit is millisecond.

Destination-List

Specifies the remote computer to be ping.

RCP

Copy the file between the Windows 2000 computer and the system running the Remote Housing Port Monitor RSHD. The RCP command is a connection command that can also be used to replicate files between two running RSHDs from the Windows 2000 computers. The RSHD port monitor can be used on UNIX computers, but cannot be used on Windows 2000, so Windows 2000 computer can only be used as a system that issues a command. Remote computers must also provide RCP utilities by running RSHD.

RCP [-A | -B] [-h] [-r] Source1 Source2 ... Source2 ... Source1 Destination

parameter

-A

Specifies the ASCII transmission mode. This mode converts the carriage return / chamber to the carriage return on the outgoing file, and converts the lunar into the carriage return / wrap in the incoming file. This mode is the default transmission mode.

-b

Specifies the binary image transfer mode. No carriage return / commissioning conversion is performed.

-H

Transfer a source file that is marked as hidden attribute on a Windows 2000 computer. If there is no such option, the effect of specifying the hidden file on the RCP command line is not the same as the file.

-r

Cut all the subdirectory contents of the source to the target. Source and Destination must be a directory, although even if the source is not a directory, use -r can also work. But there will be no recursive.

Source and Destination

The format must be [Computer [.user]: FileName. If the [Computer [.user]:] section is ignored, the computer will assume a local computer. If the [.User] section is omitted, the currently logged in Windows 2000 username will be used. If a fully qualified computer name is used, in which [.user] must be included in [.User]. Otherwise, the last part of the computer name will be interpreted as the username. If multiple source files are specified, Destination must be a directory.

If the file name is not headed by UNIX's forward slash (/) or the backslash (/) of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is a directory that issues a command. In the remote system, this is the login directory of the remote user. The period (.) Represents the current directory. Use escape characters (/, "or ') in remote paths to use wildcards in remote computers.

REXEC

Run the command on the remote computer running the REXEC service. Before executing the specified command, verify the username on the remote computer, only the command can only be used after the TCP / IP protocol is installed.

Rexec computer [-l username] [-n] Command

parameter

Computer

Specifies the remote computer to run the Command.

-l username

Specifies the username on the remote computer.

NN

Redirect Rexec's input to NULL.

Command

Specifies the command to run.

Route

Control network routing table. This command can only be used after the TCP / IP protocol is installed.

Route [-f] [-p] [command [destination] [Mask SubnetMask] [Gateway] [Metric CostMetric]

parameter

-f

Clear the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will be cleared before the command is run.

-p

When this parameter is used with the Add command, the route will last for a long time between the system boot. By default, the system does not retain the route when restarted. When used with the Print command, display the registered persistent routing list. Ignore all other commands that always affect the respective persistent routes.

Command

Specify one of the following commands.

Command purpose

Print printing route

Add add route

Delete delete routing

Change changed the existing deposit

Destination

Specifies the computer that sends a Command.

Mask Subnetmask

Specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used.

Gateway

Specify the gateway.

A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted.

Metric Costmetric

The number of integer hops (from 1 to 9999) is used to calculate the fastest, most reliable and / or cheapest route.

RSH

Run the command on the remote computer running the RSH service. This command can only be used after the TCP / IP protocol is installed.

RSH computer [-l username] [-n] Command

parameter

Computer

Specifies the remote computer running Command.

-l username

Specifies the username used on the remote computer. If omitted, use the login username.

NN

Redirect the input RSH to NULL.

Command

Specifies the command to run.

TFTP

Transfer files to remote computers that are running TFTP services or transfer files from a remote computer that is running a TFTP service. This command can only be used after the TCP / IP protocol is installed.

TFTP [-i] computer [get | put] Source [destination]

parameter

-i

Specify binary image transfer mode (also known as "eight bytes"). In binary image mode, the file is one byte to move by one byte. Use this mode when transferred binary files.

If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the EOL character to UNIX's carriage return and a host computer's carriage return / wrap. This mode should be used when sending a text file. If the file transfer is successful, the data transfer rate will be displayed.

Computer

Specify local or remote computers.

PUT

Transfer file Destination on your local computer to files Source on your remote computer.

get

Transfer file Destination on your remote computer to a file source on your local computer.

If you transfer file file-two on your local computer to file file-one on a remote computer, specify PUT. If you transfer file File-Two on a remote computer to file file-one on a remote computer, specify GET.

Because the TFTP protocol does not support user authentication, the user must log in, and the file must be written on the remote computer.

Source

Specifies the file to be transmitted. If the local file is specified -, the remote file is printed on stdout (if obtained), or read from stdin.

Destination

Specifies the location to transfer files. If Destination is omitted, it will assume that the same name is in the Source.

Tracert

This diagnostic utility will send an Internet Control Message Protocol (ICMP) that contains different survival time (TTL) values ​​to the target to determine the route to the target. To deliver at least 1, the TTL is a valid hop count before the TTL of the forwarding packet is forwarded. When the TTL on the packet arrives at 0, the router should send the "ICMP timeout" message back source. Tracert first sends a TTL to 1 echo packet and increment TTL at a subsequent delivery process, until the target response or TTL reaches the maximum value, thereby determining the route. Routing determines the route by checking the "ICMP timeout" message sent back to the intermediate router. However, some routers quietly down through packets that contain expired TTL values, and Tracert can't see. Tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name

parameter

/ d

Specifies that the address is not resolved as the computer name.

-h maximum_hops

Specifies the maximum number of hop points for search targets.

-j Computer-List

Specifies the sparse source routing along Computer-List.

-w Timeout

Every time you answer the number of microseconds to be specified by Timeout.

Target_name

Target computer name. Basic Law of the NET Command

Net

The following integrated Windows 98, Windows Workstation, and Windows Server three operating systems about the interpretation of the NET command, hoping to be more comprehensive.

Let me say some:

(1) The NET command is a command line command.

(2) Manage network environments, services, users, and login. . . . Wait for local information

(3) WIN 98, WIN WORKSTATION AND WIN NT has a NET command.

(4) However, the net command of Win 98 is different from the net command of WorkStation, NT.

(5) The net command in WorkStation and Server is basically the same.

(6) Get HELP

(1) Enter net in the way, Help - "Indexing -" Enter NT in the way in NT.

(2) Help NETCOMMAND / HELP or NET HELP COMMAND or NET COMMAND /? For Error Net Helpmsg Message # is 4 digits

(7) Forced parameters All net command accept options / Yes and / NO (abbreviated as / y, and / n). [Simple telling is a answer to the system in advance]

(8) There are some commands that work immediately and permanently, should be cautious when using it.

(9) The corresponding graphics tool can be found for the function of the net command.

(10) Command Command Command Parameter Options | Parameter Options | Parameter Options |. . . . . . Luoiro said a lot of pile, in fact, 6 and 7 useful, huh, huh. There are two things:

(1) There are some parameters in the NT command to use only in the Server environment.

(2) There are some parameters in the win98 NET command that cannot be used in the DOS-WIN, can only be used in the DOS environment.

Below the basic usage of the different parameters of the NET command:

First, NET View

Work: Display domain list, computer list, or a list of shared resource for specified computers.

Command format: Net View [// computername | / domain [: domainname]

Parameter introduction:

(1) Type NET View to display the list of computers of the current domain.

(2) // computername Specifies the computer to view its shared resource.

(3) / domain [: domainname] Specifies to view the domain of its available computer.

Simple case:

(1) NET View // Yfang View the list of shared resources for Yfang.

(2) NET View / Domain: Love View the list of machines in the LOVE domain. Second, NET USER

Work: Add or change user accounts or display user account information. This command can also be written as NET Users.

Command format: Net user [username [password | *] [options] [/ domain]

Parameter introduction:

(1) Type NET User without parameters to view a list of user accounts on your computer.

(2) UserName Add, delete, change, or view the user account name.

(3) Password assigns or change the password for the user account.

(4) * Tip Enter the password.

(5) / Domain executes the operation in the main domain controller of the computer main domain.

Simple case:

(1) NET USER Yfang View User Yfang Information

Third, NET USE

Work: Connect the computer or disconnect the computer and the shared resource connection, or display the connection information of the computer.

Command format: NET Use [DeviceName | *] [// computername / shasename [/ volume] [password | *] [/ user: [domainname /] username] [/ delete] | [/ personistent: {yes | no]}

Parameter introduction:

Type NET Use of NET Use of the parameters to list the network connection.

DeviceName Specifies the name of the resource to be connected or the device name to be disconnected.

// Computername / ShareName server and shared resources name.

Password Access the password for shared resources.

* Tip Type password.

/ User specifies another user that is connected.

DomainName Specifies another domain.

UserName Specifies the username of the login.

/ HOME connects the user to its host directory.

/ DELETE Cancels the specified network connection.

/ Persistent controls the use of permanent network connection.

Simple case:

(1) NET USE E: // Yfang / Temp will be established to E-press // yfang / TEMP directory

(2) NET USE E: // Yfang / TEMP / DELETE Disconnect Connection

Fourth, Net Time

Action: Synchronize the computer's clock with another computer or domain.

Command format: Net time [// computername | / domain [: name] [/ set]

Parameter introduction:

(1) // computername To check or synchronize the server name.

(2) / domain [: name] Specifies the domain to synchronize with its time.

(3) / SET Synchronize the computer clock with the clock specified by the specified computer or domain.

The following four parameters are related, so introduce together

V. Net Start

Just: Start the service, or display a list of start-up service.

Command format: Net Start Service

6. Net PAUSE

Work: Pause the service running.

Command format: Net Pause Service

Seven Net Continue

Work: Reactivate the hangs.

Command format: Net Continue Service

Eight, Net STOP

Work: Stop the Windows NT network service.

Command format: NET STOP Service

Parameter introduction: Let's see what these services are

(1) ALERTER (alarm)

(2) Client Service for NetWare (NetWare Client Service)

(3) Clipbook Server (Scrapbook Server)

(4) Computer Browser (computer browser)

(5) Directory Replicator (directory replicator)

(6) FTP Publishing Service (FTP) (FTP Release Service)

(7) LPDSVC

(8) NET LOGON (network login)

(9) NetWork DDE (Network DDE) (10) Network DDE DSDM (Network DDE DSDM)

(11) Network Monitor Agent (Network Monitoring Agent)

(12) NT LM Security Support Provider (NT LM Security Support)

(13) OLE (Object Links and Embedded)

(14) Remote Access Connection Manager (Remote Access Connection Manager)

(15) Remote Access Isnsap Service (Remote Access ISNSAP Service)

(16) Remote Access Server (Remote Access Server)

(17) Remote Procedure Call (RPC) Locator (Remote Process Call Locator)

(18) Remote Procedure Call (RPC) Service (Remote Process Call Service)

(19) SCHEDULE (scheduling)

(20) SERVER (server)

(21) SIMPLE TCP / IP Services (simple TCP / IP service)

(22) SNMP

(23) Spooler (background print program)

(24) TCP / IP NetBIOS Helper (TCP / IP NetBIOS Aid)

(25) UPS

(26) WorkStation (Workstation)

(27) Messenger (letter)

(28) DHCP Client

(29) EventLog The following services can only be used on NT Server

(1) File Server for Macintosh

(2) Gateway Service for NetWare

(3) Microsoft DHCP Server

(4) Print Server for Macintosh

(5) Remoteboot

(6) Windows Internet Name Service

Nine, Net Statistics

Work: Displays statistical records for local workstations or server services.

Command format: Net Statistics [Workstation | Server]

Parameter introduction:

(1) Type Net Statistics that does not have parameters lists the running services available for their statistics.

(2) WorkStation Displays statistics for local workstation services.

(3) Server displays statistics for local server services.

Simple case:

(1) NET STATISTICS Server | More Display Server Services Statistics

Ten, net share

Work: Create, delete, or display shared resources.

Command format: NET Share ShareName = Drive: path [/ users: Number | / unlimited] [/ Remark: "text"]

Parameter introduction:

(1) Type NET Share without parameters Displays information on all shared resources on the local computer.

(2) ShareName is the network name of shared resources.

(3) DRIVE: PATH Specifies the absolute path to the shared directory.

(4) / Users: Number settings can access the maximum number of users for shared resources at the same time.

(5) / unlimited does not limit the number of users who simultaneously access the shared resource.

(6) / Remark: "text" Add a comment on the resource, and the text is taken by quotation marks.

Simple case:

(1) NET Share MyLove = C: / Temp / Remark: "My First Share" Share C: / Temp with MyLOVE for shared name

(2) NET Share MYLOVE / DELETE Stop Sharing MYLOVE Directory

11. Net session

Action: List or disconnect the local computer and the session of the client connected to it, or Write as NET sessions or net sess.

Command format: Net session [// computename] [/ delete]

Parameter introduction:

(1) Type NET session without parameters Display all the sessions of the local computer.

(2) // COMPUTERNAME identifies the computer to list or discontinue the session.

(3) / delete ends all the computers during the computer and shutting down this session with // computername.

Simple case:

(1) NET session // yfang To display a list of client session information of the computer name YFANG.

Twelve Net Send

Work: Send a message to other users of the network, computer or communication name.

Command format: Net send {name | * | / domain [: name] | / users} message

Parameter introduction:

(1) Name To receive the username, computer name, or communication name of the send message.

(2) * Send messages to all names in the group.

(3) / Domain [: Name] sends the message to all the names in the computer domain.

(4) / Users sends the message to all users connected to the server.

(5) Message is sent as a message.

Simple case:

(1) Net send / users server will shutdown in 5 minutes. Send messages to users connected to the server

Thirteen, Net Print

Work: Display or control the print job and print queue.

Command format: Net print [// computename] Job # [/ hold | / release | / delete]

Parameter introduction:

(1) Computername shared the computer name of the printer queue.

(2) ShareName print queue name.

(3) JOB # Assign the identification number of the print job in the printer queue.

(4) / Hold Use Job #, wait in the printer queue to wait.

(5) / Release releases the reserved print job.

(6) / Delete removes the print job from the printer queue.

Simple case:

(1) NET Print // Yfang / SeeMe lists the directory of the SEEME printer queue on the // yfang computer

14. Net name

Work: Add or delete the message name (sometimes known as alias), or display the name list of the computer receive messages.

Command format: Net name [name [/ add | / delete]

Parameter introduction:

(1) Type NET Name without parameters to list the name of the currently used.

(2) Name Specifies the name of the received message.

(3) / add Add the name to your computer.

(4) / Delete removes the name from the computer.

Fifteen, Net localgroup

Work: Add, display, or change the local group.

Command format: Net localgroup groupname {/ add [/ comment: "text"] | / delete} [/ domain]

Parameter introduction:

(1) Type NET localGroup display server name and computer's local group name.

(2) Groupname To add, expand or delete local group names.

(3) / Comment: "text" Add a comment for the new or existing group.

(4) / Domain executes operations in the current domain's primary domain controller, otherwise doing only on the local computer?

(5) Name [...] lists the one or more usernames or group names to be added to the local group or from the local group.

(6) / add Add the global group name or username to the local group.

(7) / Delete removes a group name or username from the local group.

Simple case:

(1) Net localgroup love / add adds local groups named LOVE to the local user account database

(2) NET localgroup love Shows users in local groups

XVI, Net Group

Work: Add, display, or change global groups in the Windows NT Server domain.

Command format: net group groupname {/ add [/ comment: "text"] | / delete} [/ domain] parameter introduction:

(1) Type NET Group display server name and server group name without parameters.

(2) Groupname To add, extend, or delete groups.

(3) / Comment: "text" Adds a comment for the new group or existing group.

(4) / Domain executes this operation in the main domain controller of the current domain, otherwise perform actions on the local computer?

(5) UserName [...] list Displays one or more users to be added to groups or from the group.

(6) / add group or add the username in the group.

(7) / delete delete group or deletes the username from the group.

Simple case:

(1) NET GROUP Love Yfang1 Yfang2 / Add to add existing user accounts YFANG1 and YFANG2 to local computer LOVE groups

17. Net file

Action: Displays all open shared file names on a server and the number of locked files.

Command format: Net file [id [/ close]

Parameter introduction:

(1) Type NET files that do not have parameters to open the list of files on the server.

(2) ID file identification number.

(3) / Close Close the open file and release the lock record.

Eighteen, Net Config

Work: Displays the currently running configurable service, or display and change the settings for a service.

Command format: Net config [service [options]

Parameter introduction:

(1) Type NET Config displays a list of configurable services without parameters.

(2) Service is configured by the Net Config command (Server or Workstation)

(3) A specific option for the Options service.

Number, net computer

Work: Add or delete your computer from the domain database.

Command format: Net computer // computername {/ add | / del}

Parameter introduction:

(1) // computername Specifies the computer to be added to the domain or from the domain.

(2) / add Tim the specified computer to the domain.

(3) / DEL will delete the specified computer from the domain.

Simple case:

(1) Net computer // cc / add Add computer CC to the login domain

Twenty, Net Accounts

Just: Update the user account database, change the login requirements of the password and all accounts.

Command format: Net Accounts [/ forcelogf: {minutes | no}] [/ minpwlen: {days | unlimited}] [/ minpwage: days] [/ uniquepw: Number] [/ domain]

Parameter introduction:

(1) Type NET Accounts without parameters Display the current password setting, login time limit, and domain information.

(2) / forcelogoff: {minutes | no} Setting When a user account or a valid login time expires

(3) / MINPWLEN: LENGTH Set the number of user account passwords.

(4) / maxpwage: {days | unlimited} Set the maximum number of days that the user account password is valid.

(5) / MINPWAGE: DAYS Setting the user must keep the minimum number of days.

(6) / UniquePW: Number requires a user to change the password, the same password must be reused after Number.

(7) / Domain executes this operation on the main domain controller of the current domain.

(8) / SYNC When used for the primary domain controller, this command synchronizes all backup domain controllers in the domain.

Simple case:

(1) NET Accounts / MINPWLEN: 7 Set the maximum number of characters of the user account password to 7

---------------------- The above introduction is the basic usage of net commands under WinNT ------------------------------------------------ ------ Let's take a look at the basic usage of net commands under Win98.

The NET command in Win98 also has some of the names and functions of the parameters and the simple usage method and the usage of the corresponding parameters under WinNT.

Including

(1) NET TIME command

(2) Net print command

(3) NET USE command

(4) NET View command

In the win98, the NET command has some names of the parameter and the name of the corresponding parameters under WinNT, but the usage is somewhat different.

Including

(1) NET START

Work: Start the corresponding service. (Cannot be used in DOS-WIN)

Command format: NET Start [Basic | NWREDIR | WORKSTATION | NetBind | NetBeui | NWLINK] [/ List] [/ yes] [/ verbose]

(2) NET STOP

Work: Stop the corresponding service. (Can't use in DOS-WIN)

Command format: Net Stop [Basic | NWREDIR | WORKSTATION | NETBEUI | NWLINK] [/ YES]

There are still some parameters in the NET command in Win98 to be 98.

Including

(1) NET DIAG

Work: Diagnostics program running MS display network Diagnostic information

Command format: Net Diagnostics [/ names | / status]

(2) NET INIT

Work: Do not load protocol or network card driver by binding (cannot be used in DOS-WIN)

Command format: Net Initialize [/ Dynamic]

(3) NET logoff

Work: Disconnect the shared resource (can not be used in DOS-WIN) (

(4) NET logon

Working: Log in in Workgroup (cannot be used in DOS-WIN)

Command format: net logon [user [password |?] [/ Domain: Name] [/ yes] [/ savepw: no]

(5) Net Password

Work: Change your network login password (cannot be used in DOS-WIN)

Command format: Net Password // computer | / domain: name [user [oldpassword [newpassword]]

FTP command Daquan

The ftp command is one of the most frequent commands using the Internet user. Whether using FTP under DOS or UNIX operating system, you will have a lot of FTP internal commands, familiar with and flexibly apply the internal commands of FTP, which can be greatly convenient for users. Now dial-up users, if the ISP provides shell to use Nohup, then FTP will be your most money on Download method, FTP command line format is: ftp -v -d -i -n -g [host name]

-V Displays all response information of the remote server.

-D use debugging mode.

-N Limits an automatic login of FTP, ie not .NETRC files.

-G cancels the global file name.

The internal command used by FTP is as follows (where bracket represents optional):

1.! [Cmd [args] Performs interaction shell in the local machine, exit returns to the FTP environment, such as! Ls * .zip.

2. ¥ Macro-AME [ARGS] Perform a macro definition macro-name.

3. Acount [Password] provides the supplementary password required to access the system resource after logging in to the remote system.

4.AppendLocal-file [remote-file] Add a local file to a remote system host. If the remote system file name is not specified, the local file name is used.

5.ASCII uses the ASCII type transmission mode. 6. Bell Each command is executed, the computer rings once.

7.bin uses binary files.

8. Bye exits the FTP session process.

9. Case When using MGET, transfers the uppercase of the remote host file name to lowercase letters.

10.CD Remote-Dir enters the remote host directory.

11. CDUP enters the parent directory of the remote host directory.

12.chmod modefile-name Sets the way remote-name to Mode, such as Chmod 777 A.out.

13.Close interrupt FTP session with the remote server (corresponding to Open).

14. When CR transmits a file using the ASSCII mode, convert the return line to a back.

15. Delete Remote-file Deletes the remote host file.

16.Debug [debug-value] Setup debug mode, display each command sent to the remote host, such as DEBUP3, if set to 0, indicates canceling the debug.

17.DIR [remote-dir] [local-file] Displays the remote host directory and stores the result to local-file.

18.Disconnection with a Close.

19.Form Format Sets the file transfer mode to Format, defaults to File mode.

20.GetRemote-file [local-file] Transfers the remote host file Remote-File to local-file of the local hard drive.

21.Glob Sets the file name extension of MDelete, MGET, MPUT, and does not extend the file name, the -g parameter with the command line is not expanded.

22. Hash is transmitted 1024 bytes per transmitted, showing an HASH symbol (#).

23.Help [cmd] Displays help information for the FTP internal command CMD, such as Help Get.

24.idle [Seconds] Sets the sleep timer of the remote server to [Seconds] seconds.

25. Setting a binary transmission mode (with binary)

26.LCD [DIR] Switch to DIR of the local working directory.

27.ls [remote-dir] [local-file] Displays the remote directory Remote-Dir and stores local local-file.

28. MacDef Macro-Name Defines a macro, when you encounter a blank line under MacDef, the macro definition ends.

29.mdelete [remote-file] Deletes remote host files.

30. Mdir Remote-Files Local-file is similar to DIR, but multiple remote files can be specified, such as mdir * .o. *. Zipoutfile.

31.Mget Remote-files Transport multiple remote files.

32.mkdir Dir-Name built a directory in the remote host.

33.mls Remote-file local-file with nList, but can specify multiple file names.

34.Mode [Mode-Name] sets the file transfer mode to Mode-name, default is a Stream mode.

35.Modtime file-name Displays the final modification time of the remote host file.

36. MPUT local-file transfer multiple files to the remote host.

37.NewerFile-name retransmit the file if the modification time of the File-Name in the remote machine is closer to the same name file with the local hard disk.

38.nlist [remote-dir] [local-file] Displays the file list of the remote host directory and stores local-file of the local hard drive.

39.NMAP [InPatternOutPattern] Set the file name mapping mechanism, make the file transfer, some characters in the file mutual conversion, such as NMAP ¥ 1. ¥ 2. ¥ 3 [¥ 1, ¥ 2]. [¥ 2, ¥ 3 ], When the file A1.A2.A3 is transferred, the file name is changed to A1, A2, which is especially suitable for the case where the remote host is non-U-NIX machine. 40.ntrans [inchars [outchars] set file name%

转载请注明原文地址:https://www.9cbs.com/read-57455.html

New Post(0)