1. The most basic, most commonly used, ping 192.168.10.88 -t, parameter-T is waiting for the user to interrupt test 2. View DNS, IP, Mac, etc. A.WIN98: Winipcfg B.Win2000 or more: IPConfig / All C.NSLOOKUP: See DNS C: /> NSLOOKUP DEFAULT Server: ns.hesjptt.net. .hesjptt.net.cn address: 202.99.160.68 Non-Authoritative Answer: Name: pop.pcpop.com address: 202.99.160.212 3. Network letter makes NET send computer name / IP | * (broadcast) transfer content, pay attention cannot be cross-network Segment Net Stop Messenger stops the letter, you can also start the messenger service in the panel - service modification of Net Start Messenger 4. Detect the other party computer name, the group, the domain, and the current username PING -A IP -T, only Netbios Nbtstat -A 192.168.10.146 Comparison 5.NetStat -a Show all port netstat -s -e, which is currently open, is more detailed to display your network information, including TCP, UDP, ICMP, and IP statistics. Detect the ARP binding (dynamic and static) list, display all connected to my computer, display the other party IP and MAC address ARP -A 7. Bundle IP and MAC address in the proxy server, solve the local area network stealing IP: ARP -S 192.168.10.59 00-50-FF-6C-08-75 Release NIC IP and MAC Address Binds: ARP -D NIC IP 8. Hide your computer Net Config Server / Hidden: Yes Net Config Server in network neighbors / hidden: No is open 9. Several net command A. Displays the current Workgroup Server List Net View, when you use this command without an option, it displays a list of current domains or networks on the network. For example: view shared resources on this IP, you can c: /> net view 192.168.10.8 at 192.168.10 shared resource resource resource resource shared name Type Types -------------------------------------------------- ---------------------- The website service Disk command successfully completed. B. View user account list NET user C. View network link NET USE, for example: Net Use z: //192.168.10.8.8Movie maps this IP's MOVIE shared directory to a local Z disk D. Record link NET session For example: c: /> net session computer username customer type open free time -------------------------------- --------------------------------------------- //192.168.10.110 Rome Windows 2000 2195 0 00:03:12 //192.168.10.51 Rome Windows 2000 2195 0 00:00:39 Command successfully.
10. Routing Tracking Command A.Tracert Pop.pcpop.com B.Pathping Pop.pcpop.com In addition to displaying routing, 325S analysis is provided,% 11% of the lost package is calculated. Machine Sharing Resources NET Share B. Manually Remove Shared Net Share C $ / D NET Share D $ / D NET Share IPC $ / D NET Share Admin $ / D Note $ Space. C. Add a share: C: / Net Share mymovie = E: / Downloads / Movie / Users: 1 MyMovie shared success. At the same time, the number of limited link users is 1 person. 12. Set static IP A. Set static ip cmd netsh netsh> int interface> ip interface ip> set add "Local Link" Static IP Address Mask Gateway B. View IP Settings Interface IP> Show Address ARP Display and Modification The item in the Address Resolution Protocol (ARP) cache. One or more tables are included in the ARP cache that stores the IP address and its resolved Ethernet or token ring physical address. Each Ethernet or token ring network adapter installed on a computer has its own separate table. If you use without parameters, the ARP command will display the help information. Syntax ARP [-A [inetaddr] [-n ifceaddr]] [-g [inetaddr]] [-d inetaddr]] [-d inetaddr]] [-s inetaddr etheraddr [iFaceddr]] parameter -a [inetaddr] [ -N ifceaddr] Displays the current ARP cache table for all interfaces. To display the ARP cache item for the specified IP address, use the ARP -A with the inetaddr parameter, which is the INetAddr represents the specified IP address. To display the ARP cache table for the specified interface, use the -n ifceaddr parameter, which the IFACEADDR represents the IP address assigned to the specified interface. -N parameter is case sensitive. -g [inetaddr] [-n ifceaddr] is the same as -A. -d inetaddr [ifceaddr] deletes the specified IP address item, which is the INetAddr represents the IP address. For a specified interface, you want to delete an item in the table, use the ifAceAddr parameter, where the IFACEADDR represents the IP address assigned to the interface. To delete all items, use an asterisk (*) wildcard instead of inetaddr. -s inetaddr etheraddr [ifceaddr] Add IP address inetaddr to the static item of the physical address EtherAddr to the ARP cache. To add a static ARP cache item to the specified interface, use the ifAceAddr parameter, where the IFACEAddr represents the IP address assigned to the interface. /? Display help at the command prompt. Note The IP address of Inetdr and IFACEADDR is represented by a decimal number of decisions with a dot. The physical address EtherAddr consists of six bytes, which are represented by hexadecimal notes and is separated by a linker (for example, 00-AA-00-4F-2A-9C). The items added by the -s parameter belong to a static item, which will not timeout in the ARP cache. These items will be deleted if the TCP / IP protocol is terminated. To create a permanent static ARP cache item, use the appropriate ARP command in the batch file and run the batch file when starting through the Plan Task Program.
This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To display the ARP cache table of all interfaces, type: ARP -A for interfaces for the assigned IP address of 10.0.0.99, to display its ARP cache table, type: arp -a -n 10.0.0.99 to add IP Address 10.0.0.80 Analysis into a static ARP cache item for physical address 00-AA-00-4F-2A-9C, typing: arp -s 10.0.0.80 00-AA-00-4F-2A-9C AT plan at the specified time And the date run commands and programs on your computer. The AT command can only be used when the "Plan" service is running. If you use it without a parameter, the AT lists the scheduled commands. Syntax AT [// computename] [{[id] [/ delete] | / delete [/ yes]}] hours: minutes [/ interactive] [{/ every: Date "[, ... ] | / next: date [, ...]}] command] Parameters // computername Specifies the remote computer. If this parameter is omitted, the AT schemes the commands and programs on the local computer. The ID specifies the identification code assigned to the scheduled command. / delete cancels the scheduled command. If the ID is omitted, all scheduled commands in the computer will be canceled. / YES Removes all inquiry from the system to "Yes" when deleting the programmed event. Hours: minutes Specifies the time of the command run. This time was used in a 24-hour hour (ie from 00:00 [midnight] to 23:59): minutes format. / Interactive allows Command to interact with the user's desktop for users who log in when running Command. / Every: Run the command command every week or monthly designated date (for example, every Thursday, or the third day of the month). Date Specifies the date of running the command. You can specify a week or day (ie, type M, T, W, TH, F, S, SU) or a certain day or day in a month (ie, type numbers between 1 and 31) . Separate multiple date items with commas. If DATE is omitted, AT uses the current day of the month. / next: Run Command when the next specified date (for example, next Thursday) comes. Command specifies the Windows command to run, program (.exe or .com file) or batch program (.bat or .cmd file). When the command requires the path as a parameter, use an absolute path, which is the entire path starting from the drive letter. If the command is on the remote computer, specify the general named Agreement (UNC) symbol of the server and shared name instead of the remote drive letter. /? Display help at the command prompt. Note Schtasks is a more powerful super-collection command, which contains all the features in the AT command line tool. For all command line plan tasks, Schtasks can be used to replace AT. For more information on Schtasks, see "Related Topics". When using the AT command to use the AT command, you must be a member of the local administrators group. Loading cmd.exe Before running the command, AT does not automatically load the cmd.exe (command interpreter). If you do not run an executable file (.exe), you must use the method shown below to load CMD.exe: CMD / C DIR> C: /Test.out.
View the scheduled command When you use AT without a command line option, the planned task appears in a table similar to the following format: Status ID Day Time Command Lineok 1 Each F 4:30 PM Net Send Group Leads Status Dueok 2 Each M 12:00 AM Chkstor> Check.Fileok 3 Each F 11:59 PM Backup2.bat Contare Identification Number (ID) When using an identification number (ID) at command prompt, the information of a single task item will display In the format similar to the following: Task ID: 1 Status: OK Schedule: Each F Time of Day: 4: 30 PM Command: Net Send Group Leads Status Due When a command with AT (especially with command line options After the command), you want to check if the command syntax is correct by typing the AT without a command line option. If the information is displayed in the "Command Line" column, delete the command and retrore it. If it is not correct, you can bring less command line option when you retrore this command. View Results The already scheduled commands that have been scheduled are run as the background program. The result is not displayed on the computer. To redirect the output to a file, use the redirect symbol (>). If you redirect the output to a file, whether you use AT in the command line or in a batch file, you need to use an escape (^) before the redirect symbol. For example, to redirect the output to the output.text file, you want to type: AT 14:45 c: /test.bat ^> c: /output.txt Execute the current directory for the command to the SystemRoot folder. Change the system time After using the AT command to plan the command to run, if you change your computer's system time, the AT scheduler is synchronized with the modified system time by typing the AT that does not command line options. The stored command has been scheduled to store in the registry. This way, if you restart the Plan service, you will not lose the planned task. Connecting to the network drive For schedule jobs that need to access the network, do not use the reordered drive. The Plan Services may not access these redirected drives, or if there are other users log in when the scheduled task is running, these redirected drives may not appear. Therefore, for the planning job, use the UNC path. For example: AT 1:00 PM my_backup // server / share Please do not use the following syntax (where x:?) Connection is created by the user): AT 1:00 PM my_backup x: If a AT command using the drive letter is planned to connect The shared directory should contain an AT command to disconnect the drive when the drive is complete. If the connection to the drive cannot be disconnected, the assigned drive letter will not be available under the command prompt.
Example To display a list of scheduled commands on the Marketing server, type: at // marketing To learn more about the server Corp 3 identification number 3 command, type: at // corp 3 To plan at 8:00 am Run the network sharing command on the CORP server and redirect the list to the Corp.txt file of the Maintenance server (located in the Reports Sharing Directory), type: at // corp 08:00 cmd / c "Net Share Reports = D : / Marketing / Reports >> //maintenance/reports/corp.txt "Back up the Marketing server hard drive's hard drive back up to the tape drive at midnight after every five days, first create a batch program named Archive.cmd (it contains backup Command), then plan the running of the batch program, please type: at // marketing 00:00 / Every: 5, 10, 15, 20, 20, 30 Archive To cancel all the scheduled commands on the current server, Please clear the AT plan information as described below: At / delete If the command to run is not an executable (.exe) file, use the CMD / C to load CMD.exe: CMD / C Dir> c: /test.out. RSH Runs the command on the remote computer running the RSH service. Windows XP and Windows 2000 do not provide RSH services. Windows 2000 Server Resource Kit provides RSH services called RSHSVC.exe. Use RSH display without parameters to display help. Syntax RSH [Host] [-l UserName] [-n] [command] Parameters Host Specifies the remote computer running Command. -l username Specifies the username used on remote computers. In the case of omitting, the name of the current login user is used. -n Redirects the input of the RSH to the NULL device. This prevents the display of the local computer command result. Command specifies the command to run. /? Display help at the command prompt. Note The standard operation RSH command copies the standard input to the remote command, copies the standard output of the remote Command to its standard output, and copy the standard error of the remote Command to its standard error. RSH usually terminates when the remote command is terminated. Use the redirect symbol to cause the redirection to occur on the remote computer, to take redirect symbols (for example, ">>") in quotation marks. If you do not use quotation marks, redirect will occur on the local computer. For example, the following command attached to the remote file "Localfile" in the local file "LocalFile": rsh OtherComputer Cat Remotefile >> LocalFile The following command Additional Remote file RemoteFile is attached to the remote file OtherRemotefile: RSH OtherComputer Cat Remotefile ">>" Remotefile Using RSH This domain's primary domain controller must be used to confirm that the username or RSH command failed when using a computer that has been logged in to a domain and running Windows XP Professional. .rhosts file. Rhosts file usually licenses network access of UNIX systems. The.rhosts file lists the computer name and associated login name that can access the remote computer.
When you run the RCP, REXEC, or RSH commands on the remote computer of the .rhosts file, you don't have to provide login and password information for remote computers. The .rhosts file is a text file that each behavior is an entry. The entry is composed of local computer names, local usernames, and all annotations related to this entry. Each entry is separated by a tab or space, and the note is taken with a symbol (#). For example: Host7 #this computer is in room 31a .rhosts file must be in the user's home directory of the remote computer. For more information on remote computers .Rhosts file specific execution, see the documentation for the remote system. This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To perform a Telcon command on a remote computer VAX1, type: RSH VAX1 -L Admin1 Telcon TFTP Transports files or transfers files to run a normal file transfer protocol (TFTP) service or Daemon remote computer (especially running UNIX) or Transfer files from the remote computer (TFTP) service or DAEMON remote computer (especially running a UNIX). Syntax TFTP [-i] [Host] [{GET | PUT}] [Source] [Destination] parameter -i specified binary image transfer mode (also known as octal mode). In binary image mode, the file is transmitted in one byte. Use this mode when transferred binary files. If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the tail (EOL) character to the appropriate format of the specified computer. Use this mode when sending a text file. If the file transfer is successful, the data transfer rate will be displayed. Host Specifies local or remote computers. PUT passes the Destination file on the local computer to the Source file on the remote computer. Because the TFTP protocol does not support user authentication, the user must log in to the remote computer, and the file must be written on the remote computer. GET transmits the Destination file on the remote computer to the Source file on the local computer. Source Specifies the files to be transferred. Destination Specifies the location of transferring files. If Destination is omitted, it will assume that it is the same name in the Source. /? Display help at the command prompt. Note Use the GET Parameters If you transfer file Fileton on your local computer to file fileOne on your remote computer, specify your PUT. If you transfer file FileTwo on a remote computer to file fileOne on a remote computer, specify GET. Windows XP or Windows 2000 does not provide general purpose TFTP servers. The TFTP server service provided by Windows 2000 provides remote boot feature for Windows XP and Windows 2000 client computers. This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To transfer file users.txt from the local computer to users19.txt on remote computer VAX1, type: TFTP VAX1 PUT Users.txt users19.txtnbtstat Displays NetBIOS based on TCP / IP (NetBT) protocols based on local computers and remote computers Statistics, NetBIOS name tables, and NetBIOS name cache. NBTSTAT can refresh the NetBIOS name cache and registering the Windows Internet Name Service (WINS) name. Use NBTSTAT display help with parameters.
Syntax NBTSTAT [-A Remotename] [-A ipaddress] [-c] [-n] [-r] [-r] [-r] [-S] [-S] [interval] parameter -a remote network NetBIOS name table, where Remotename is a NetBIOS computer name for a remote computer. The NetBIOS Name Table is a list of NetBIOS names used by the application running on the computer. -A ipaddress Displays the NetBIOS name table of the remote computer, which is specified by the IP address of the remote computer (separated by a decimal point). -c Displays the NetBIOS name cache content, NetBIOS name table, and each address thereof. -n Displays the NetBIOS name table of the local computer. The status in the registered indicates that the name is registered by the broadcast or WINS server. -r Displays the NetBIOS name resolution statistics. On the Windows XP computer configured to use WINS, this parameter will return the name number that has been parsed and registered by broadcast and WINS. -R Clear the contents of the NetBIOS name cache and reload from the LMHOSTS file with a #pre tag. -Rr Release and refresh the NetBIOS name of the local computer registered by WINS. -s Displays the NetBIOS client and server session and try to convert the target IP address to the name. -S Displays the NetBIOS Customer and Server Session, listed remote computers only via the IP address. Interval Re-displays the selected statistics, you can interrupt the number of seconds specified in Interval between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NetStat will only display a current configuration information. /? Display help at the command prompt. Note NBTSTAT command line parameters are case sensitive. The following table lists the column headings generated by NBTSTAT. The title indicates the number of bytes that INPUT. The number of bytes sent in Output. IN / OUT This connection is from a computer (outgoing) or other computer to the local computer (incoming). The LIFT Name The time the cache item is saved before being cleared. Local Name Local NetBIOS name is associated with a connection. Remote Host is related to a remote computer related name or IP address. <03> Transforms the last byte of the hexadecimal NetBIOS name. Each NetBIOS name is 16 characters long. Since the last byte usually has special significance, because the same name (only the last byte) may appear several times on a computer. For example, <20> is a space in ASCII text. TYPE name type. The name can be a single name or a group name. Whether the NetBIOS service ("Registered") is running on the Status remote computer, or whether the same computer name has been registered ("conflict"). State NetBIOS connection status. The following table lists the possible NetBIOS connection status. Status Description The connection session has been established. The endpoint of associated connections has been created and associated with the IP address. INVASTATION The endpoint is available to the inner direction. The idle end point has been opened without receiving connections. The connection session is in the connection phase. At this stage, the mapping of the name to the IP address of the selected target is being parsed. Accepting an inbound session is currently being accepted and will be connected in a short term. Reconnect the session will try to reconnect (if the first connection failed). The outbound session is in the connection phase. This phase is creating a TCP connection. Inbound inbound sessions in the connection period. Disconnecting the session is disconnecting. The interrupts have been interrupted and the local computer has been disconnected and waited for the confirmation of the remote system.