Windows system command set

xiaoxiao2021-03-06  50

The Complete Works of windows system command: wgscd posted from: internet time: 2004-12-14winver --------- check the Windows version

WMIMGMT.MSC ---- Open Windows Management Architecture (WMI)

Wupdmgr -------- Windows Update

WScript -------- Windows Script Host Settings

Write ---------- Word board

WinMSD --------- System Information

WiACMGR -------- Scanner and Camera Wizard

WinChat -------- XP comes with LAN chat

Mem.exe -------- Show memory usage

Msconfig.exe --- System Configuration Utility

MPlayer2 ------- Easy Widnows Media Player

MSPAINT -------- Drawing Board

MSTSC ---------- Remote desktop connection

MPlayer2 ------- Media Player

Magnify -------- Magnifier utility

MMC ------------ Open the console

MOBSYNC -------- Synchronous command

DXDIAG --------- Check DirectX Information

DRWTSN32 ------ System Doctor

DEVMGMT.MSC --- Device Manager

DFRG.MSC ----- Disk Defragmentation

Diskmgmt.msc --- Disk Management Utility

DCOMCNFG ------- Open System Component Services

Ddeshare ------- Open DDE Sharing Settings

DVDPLAY -------- DVD player

Net Stop Messenger ----- Stop the letter

NET Start Messenger ---- Starting the Letter Service

Notepad -------- Open Notepad

NSLOOKUP ------ Network Management Tool Wizard

NTBACKUP ------ System Backup and Restore

Narrator ------- Screen "Tellors"

NTMSMGR.MSC ---- Mobile Storage Manager

NTMSOPRQ.MSC --- Mobile Storage Administrator Action Request

NetStat -an ---- (TC) Command Check Interface

SyncApp -------- Create a briefcase

SYSEDIT -------- System Configuration Editor

SIGVERIF ------ Document Signature Verification Program

SNDREC32 ------ recorder

Shrpubw -------- Create a shared folder

SECPOL.MSC ----- Local Security Policy

Syskey --------- System encryption, once encryption can not unlock, protect the double password of the Windows XP system

Services.msc --- Local Service Settings

SNDVOL32 ------ Volume Control Program

Sfc.exe -------- System File Checker

SFC / Scannow --- Windows file protection

TSSHUTDN ------ 60 second countdown shutdown command

Tourstart ----- XP Introduction (Roaming XP Programs after the installation is complete)

Taskmgr -------- Task Manager

Eventvwr ------- Event Viewer

eudufactdit ------- Brand

Explorer ------- Open Explorer

Packager ------- Object Package

Perfmon.msc ---- Computer Performance Monitoring Procedure

Progman -------- Program Manager

Regedit.exe ---- Registration

RSOP.MSC ------- Group Policy Results Set

Regedt32 ------- Registry Editor

Rononce -p ---- 15 seconds shutdown

Regsvr32 / u * .dll ---- Stop DLL file operation

Regsvr32 / u zipfldr.dll ------ Cancel ZIP support

cmd.exe -------- cmd command prompt

Chkdsk.exe ----- CHKDSK disk check

CERTMGR.MSC ---- Certificate Management Utility

Calc ----------- Start the calculator

Charmap -------- Start character mapping table CLICONFG ------- SQL Server client network utility

CLIPBRD -------- Clipboard Viewer

CONF ----------- Start netmeeting

Compmgmt.msc --- Computer Management

Cleanmgr -------- garbage finishing

Ciadv.msc ------ Index Server

OSK ------------ Open the screen keyboard

ODBCAD32 ------ ODBC Data Source Manager

OOBE / MSOOOBE / A ---- Check if XP is activated

LusRMgr.msc ---- User and Group

LOGOFF --------- Logout Command

IEXPRESS ------- Trojan bundle, system comes

Nslookup ------- IP address detector

FSMGMT.MSC ----- Shared Folder Manager

Utilman -------- Auxiliary Tool Manager

GPEDIT.MSC ----- Group Policy

XP Run Bar Talking Command

. ---------------- $ SYSTEMROOT $ / Documents and Settings / UserName / Directory

AppWiz.cpl ------------ Add Delete Program

Control Userpasswords2 -------- User Account Settings

Cleanmgr ------- Disk cleaning

CMD -------------- Command Prompt mode, can be used as an attachment to Windows, ping, convert these features that cannot be used in graphical environments to be done with it.

CMD -> JVIEW ----- check the Java virtual machine version.

Command.com ------ The call is the NTVDM built-in NTVDM, a DOS virtual machine. It is completely a virtual environment similar to the Virtual PC, and the system itself is not covered. When we run the DOS program at the command prompt, it is actually automatically transferred to the NTVDM virtual machine, and the CMD itself does not matter.

Calc ----------- Start the calculator

Chkdsk.exe ----- Disk check

Compmgmt.msc --- Computer Management

CONF ----------- Start netmeeting

Control Userpasswords2 ----- User Account Permissions Settings

DEVMGMT.MSC --- Device Manager

Diskmgmt.msc --- Disk Management Utility

DFRG.MSC ----- Disk Defragmentation

DRWTSN32 ------ System Doctor

DVDPlay -------- Start Media Player

DXDIAG ----------- DirectX Diagnostic Tool

Eventvwr.exe ----- Event Viewer Explorer ------- Open Explorer

GPEDIT.MSC ------- Group Policy Editor

GPUPDATE / TARGET: Computer / Force Forced Refreshing Group Policy

LOGOFF --------- Logout Command

LusRMgr.msc ---- User and Group

Msinfo32 --------- System Information

Msconfig --------- System configuration utility

NET START (ServiceName) ---- Started the service

NET STOP (ServiceName) ----- Stop the service

Notepad -------- Open Notepad

Nusrmgr.cpl ------- with Control Userpasswords, open the User Account Control Panel

Nslookup ------- IP address detector

OOBE / MSOOOBE / A ---- Check if XP is activated

PBRUSH ------------- Start MSPaint Draw Tool Perfmon.msc ---- Computer Performance Monitoring Program

Progman -------- Program Manager

Regedit ---------- Registry Editor

Regedt32 ------- Registry Editor

Regsvr32 / u * .dll ---- Stop DLL file Run Route Print ------ View Routing Table

RSOP.MSC ------- Group Policy Results Set

Rundll32.exe rundll32.exe% systemroot% / system32 / shimgvw.dll, ImageView_fullscreen ---- Start a blank Windows image and fax viewer

SECPOL.MSC -------- Local Security Policy

Services.msc --- Local Service Settings

SFC / Scannow ----- Start System File Checker

SNDREC32 ------ recorder

Taskmgr ----- Task Manager (for 2000 / XP / 2003)

TSSHUTDN ------ 60 second countdown shutdown command

WinChat -------- XP self-contained LAN

WinMSD --------- System Information

WinVER ----- Display the About Windows window

Wupdmgr ----------- Windows Update

DOS common network command

ARP: Displays and modify "Address Resolution Protocol" (ARP) to the Ethernet IP or token Ring Physical Address Translation Table. This command can only use arp -a [inet_addr] [-n [if_addr]] arp -d inet_addr [if_addr] arp -d inet_addr [iaddr] arp -d inet_addr ]addr] arp -d inet_addr inaddr] arp -d inet_addr ]addr] arp -d inet_addr ]addr] arp -d inet_addr ]addr] arp -d inet_addr] parameter -a Show current ARP items. If INET_ADDR is specified, only the IP and physical address of the specified computer are displayed. -g is the same as -A. INET_ADDR specifies the IP address in a dotted decimal tag. -N Displays the network interface ARP item specified by if_addr. if_addr specifies the IP address (if any if any) you need to modify its address conversion table interface. If there is no existence, the first applicable interface will be used. -d Delete items specified by inet_addr. -s Add items in the ARP cache to associate the IP address INET_ADDR and physical address Ether_addr. The physical address is given by 6 hexadecimal bytes separated by a linked character. Specify the IP address using a tether of the decimal tag. The item is permanent, that is, the timeout expiration will automatically remove from the cache. Ether_ADDR Specifies the physical address. ------------------------------------------ Finger is running finger service Specify the information about the user on the system. Different variables are output according to the remote system. This command is only available after the TCP / IP protocol is installed. Finger [-l] @computer [...] parameter -L Displays information in a long list form. User Specifies the user to get related information. Omit user parameters to display all users of the specified computer: @Computer ----------------------------------- ------- FTP Transfer files to remote computers that are running FTP services or send files from remote computers that are running FTP services (sometimes called daemon). FTP can interact with. Click the "FTP command" in the "Related Topic" list to obtain the available "FTP" subcommand description. This command is only available after the TCP / IP protocol is installed. FTP is a service. Once started, you will create a sub-ring that can use the ftp command, and you can return to the Windows 2000 command prompt from the child environment by typing the quit subcommand. When the FTP sub-environment is run, it is represented by the FTP command prompt. FTP [-V] [-N] [-i] [-d] [-g] [-r: filename] [-A] [-w: windowsize] [computer] parameter -V disable display remote server response. -n prohibits automatically logging in to an initial connection. -i multiple file transfer When the interaction tips are turned off. -d Enable debug, display all FTP commands passed between clients and servers. -g Disable file name, which allows usage of wildcard characters (* and?) in local files and path names. (See the Glob command in the online "Command Reference".) -S: filename Specifies a text file containing the ftp command; these commands will run automatically when the FTP starts. Space is not allowed in this parameter. Use this switch instead of redirect (>). -A Use any local interface when bundled data connections. -w: Windowsize replaces the default size of 4096 transmission buffer. Computer Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the row.

------------------------------------------ NBTSTAT This diagnostic command uses NBT (NetBIOS on TCP / IP) Display Protocol Statistics and Current TCP / IP Connections. This command is only available after the TCP / IP protocol is installed. NBTSTAT [-A Remotename] [-A IP address] [-c] [-n] [-r] [-r] [-s] [-r] [interval] parameter -a Remotename lists the name of the remote computer Its name table. -A IP Address uses a remote computer's IP address to list a name table. -C gives the IP address of each name and lists the contents of the NetBIOS name cache. -n lists the local NetBIOS name. "Registered" indicates that the name has been registered in BNODE or WINS (other node type). -R Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file. -r lists the name resolution statistics of the Windows network name resolution. On the Windows 2000 computer configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS. -S Displays the client and server session, listed remote computers only via the IP address. -s Displays the client and server session. Try to convert a remote computer IP address into the name of using the host file. Interval Re-displays the selected statistics, and suspend Interval seconds between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NBTSTAT prints a current configuration information. ------------------------------------------ NetStat Display protocol statistics and current TCP / IP network connection. This command can only be used after the TCP / IP protocol is installed. NetStat [-a] [-e] [-n] [-r] [-r] [interval] parameter -a display all connection and listening ports. Server connections are usually not displayed. -e Displays Ethernet statistics. This parameter can be used in conjunction with the -s option. -n Displays the address and port number in digital format (instead of trying to find the name). -s Displays statistics for each protocol. By default, statistics on TCP, UDP, ICMP, and IP are displayed. The -p option can be used to specify the default subset. -p protocol Displays the connection of protocols specified by Protocol; Protocol can be TCP or UDP. If you use the - S option to display the statistics of each protocol, Protocol can be TCP, UDP, ICMP, or IP. -r Displays the contents of the routing table. Interval re-displays the selected statistics and suspend Interval seconds between each display. Stop the statistics by Ctrl B stop. If this parameter is omitted, NetStat will print a current configuration information. ------------------------------------------ ping verification with remote computers connection. This command can only be used after the TCP / IP protocol is installed. Ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter -t ping specified computer until interrupt. -a resolves the address as a computer name. -n count Sends count of the ECHO packet specified by COUNT. The default is 4. -l Length Sends an Echo packet containing the amount of data specified by Length.

The default is 32 bytes; the maximum is 65, 527. -f Send "Do not segment" flag in the packet. The packet will not be segmented by the gateway on the route. -i TTL sets the "Survival Time" field to the value specified by TTL. -V TOS sets the Service Type field to the value specified by TOS. -r Count Records the route from the "Record Routing" field. COUNT can specify at least 1 set, up to 9 computers. -s count Specifies the timestamp of the number of hops specified by count. -j Computer-List uses computer-list to route packets. The continuous computer can be separated by the intermediate gateway (routing sparse source) IP allowed to be 9. -k computer-list Routing packets using Computer-List specified by computer-list. Continuous computers cannot be separated by intermediate gateway (routing strict source) IP allowed to be 9. -w Timeout specifies a time division, in milliseconds. Destination-list Specifies a remote computer to be ping. ---------------------------------------- RCP in Windows 2000 Computer and Running Copy of the system between the housing port monitor RSHD. The RCP command is a connection command that can also be used to replicate files between two running RSHDs from the Windows 2000 computers. The RSHD port monitor can be used on UNIX computers, but cannot be used on Windows 2000, so Windows 2000 computer can only be used as a system that issues a command. Remote computers must also provide RCP utilities by running RSHD. RCP [-a | -b] [-h] [-r] Source1 Source2 ... Sourceen Destination Parameters -A Specifies the ASCII transmission mode. This mode converts the carriage return / chamber to a carriage return, and converts the lunar into the carriage return / wrap in the transmission file. This mode is the default transmission mode. -b Specifies the binary image transfer mode. No carriage return / commissioning conversion is performed. -H Transfer Source files marked as hidden properties on a Windows 2000 computer. If there is no such option, the effect of specifying the hidden file on the RCP command line is not the same as the file. -r Cut all the subdirectories of the source to the target. Both Source and Destination must be a directory, although even if the source is not a directory, use -r can also work. But there will be no recursive. The Source and Destination format must be [Computer [.user]: FileName. If the [Computer [.user]:] section is ignored, the computer will assume a local computer. If the [.User] section is omitted, the currently logged in Windows 2000 username will be used. If a fully qualified computer name is used, in which [.user] must be included in [.User]. Otherwise, the last part of the computer name will be interpreted as the username. If multiple source files are specified, Destination must be a directory. If the file name is not headed by UNIX's forward slash (/) or the backslash (/) of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is a directory that issues a command. In the remote system, this is the login directory of the remote user. The period (.) Represents the current directory. Use escape characters (/, "or ') in remote paths to use wildcards in remote computers. -------------------------- --------------- REXEC runs the command on the remote computer running the Rexec service.

Before executing the specified command, verify the username on the remote computer, only the command can only be used after the TCP / IP protocol is installed. Rexec Computer [-l username] [-n] Command Parameters Computer Specifies the remote computer to run the Command. -l username Specifies the username on the remote computer. -n redirects the input of Rexec to NULL. Command specifies the command to run. ------------------------------------------ Route control network routing table. This command can only be used after the TCP / IP protocol is installed. Route [-f] [-p] [command [destination] [mask subnetmask] [Gateway] [MATRIC COSTMETRIC]] Parameter -f Clears the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will be cleared before the command is run. -P This parameter is used with the add command, the route will last for a long time between the system boot. By default, the system does not retain the route when restarted. When used with the Print command, display the registered persistent routing list. Ignore all other commands that always affect the respective persistent routes. Command specifies one of the following commands. Command Purpose Print Print Routing Add Add Routing Delete Remove Routing Change Change Now the Deploy Destination Specifies the computer that sends a Command. Mask SubnetMask specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used. Gateway specifies the gateway. A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted. Metric CostMetric assigns the number of integer hops (from 1 to 9999) to use the fastest, most reliable and / or cheapest route. -------------------------------------------------- ----------------------------- RSH runs the command on the remote computer running the RSH service. This command can only be used after the TCP / IP protocol is installed. RSH computer [-l username] [-n] Command Parameters Computer Specifies the remote computer running Command. -l username Specifies the username used on remote computers. If omitted, use the login username. -n redirects the input of the RSH to NULL. Command specifies the command to run. __________________________________________________________________________________ Tftp transfer files to a remote computer running TFTP service or remote computer to transfer files from the TFTP service is running. This command can only be used after the TCP / IP protocol is installed. TFTP [-i] Computer [GET | PUT] Source [Destination] Parameters -i Specify binary image transfer mode (also known as "eight bytes"). In binary image mode, the file is moved by one byte by one byte. Use this mode when transferred binary files. If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the EOL character to UNIX's carriage return and a host computer's carriage return / wrap. This mode should be used when sending a text file.

转载请注明原文地址:https://www.9cbs.com/read-80995.html

New Post(0)