. In the run window, enter :-
(Sorted by English characters )-
% Temp % --------- open a Temporary Folder-
. -------------- C: \ documentsandsettings \ folder where the user name is located-
. ------------- C: \ documentsandsettings-
... ------------ My computer-
\ -------------- Drive c-
Add or delete programs-
Access. Cpl ----- auxiliary function options-
Accwiz --------- Auxiliary Function Wizard-
CMD ------------ cmd command prompt-
Command -------- cmd command prompt-
A complete set of computer running commands (enter the following command in the running process)
Winver --------- check the Windows version
Wmimgmt. msc ---- open the windows management architecture
Wupdmgr -------- Windows Update Program
Winver --------- check the Windows version
Wmimgmt. msc ---- open the windows management architecture
Wupdmgr -------- Windows Update Program
Wscript -------- Windows Scri
Gpedit. msc ----- Group Policy sndrec32 ------- RecorderNSLookup ------- IP address detector explorer ------- open Resource ManagerLogoff --------- logout command tsshutdn ------- 60 seconds countdown shutdown commandLusrmgr. msc ---- local user and group services. msc --- local service settingsOobe/msopad/A ---- check if XP is activated notepad -------- open not
Start → run → command Summary
Winver-check WIndows versionWmimgmt. MsC open windowsWMI)WupdmgrwinDows update programWscriptwinDows Script Host settingsWrite BoardWinmsd-system emailInformationWiaacmgr-ScanProfile and camera wizardWinchatxpChat with LAN
Mem.exe displayStorage usageMsconfig. eXe-System Configuration UtilityCollationMplayer2-simpleEasy Widnows Media PlayerMspaint graphic BoardMstsc Remote Desktop ConnectionConnectMplayer2-MediaBody playe
At present, 3G and next-generation networks have become two hot topics in the communication field, both of which are constantly developing and evolving, and they are constantly integrated. Taking the implementation of short messages in softswitch as an example, this paper discusses the support of the Next Generation Network with Softswitch as the core for the UMTS network using WCDMA wireless technology in 3G, A solution for interworking with 3G wireless networks through Softswitch is provided.
that anyone who wants to enter the system must have a valid user name and password (the Input Method Vulnerability is almost extinct), even if you only have a small account permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
=======================================================
permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.Finally, it is most important to cultivate a good security awareness.========================================================== =Start → run → command collectionWinver --------- check the Windows versionWmimgmt. msc ---- open windows management architecture
Start → run → command collection
[Sun] lison
02.18
Back to group Forum
Winver --------- check the Windows versionWmimgmt. msc ---- open windows management architecture (Wmi)Wupdmgr -------- Windows Update ProgramWscript -------- Windows Script Host settingsWrite ---------- WordPadWinmsd
system must have a valid user name and password (the Input Method Vulnerability is almost extinct), even if you only have a small account permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
========================================================== =Start → run → command collectionW
Windows Command OverviewWinver --------- check the Windows version
Wmimgmt. msc ---- open windows management architecture (Wmi)
Wupdmgr -------- Windows Update Program
Wscript -------- Windows Script Host settings
Write ---------- WordPad
Winmsd --------- system information
Wiaacmgr ------- scanner and camera wizard
Winchat -------- XP built-in LAN chat
Mem.exe -------- Display memory usage
Msconfig.exe --- System Configuration Utility
Mplayer2 ------
XP command set 3winver --------- check the Windows version Wmimgmt. msc ---- open windows management architecture (Wmi) Wupdmgr -------- Windows UpdateProgram Wscript -------- Windows Script Host settings Write ---------- WordPad Winmsd --------- system information Wiaacmgr ------- scanner and camera wizard Winchat -------- XP built-in LAN chat Mem.exe -------- Display memory usage Msconfig.exe --- System Configuration Utility Mplayer2 -----
that anyone who wants to enter the system must have a valid user name and password (the Input Method Vulnerability is almost extinct), even if you only have a small account permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
=======================================================
wants to enter the system must have a valid user name and password (the Input Method Vulnerability is almost extinct), even if you only have a small account permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
========================================================== =Start → run
From: http://blog.csdn.net/blog51/archive/2006/09/18/1236425.aspx
Net view ------- displays the domain list, computer list, or the total number of specified computersWinver --------- check the Windows versionWmimgmt. msc ---- open the windows management architectureWupdmgr -------- Windows Update ProgramWscript -------- Windows Script Host settingsWrite ---------- WordPad winmsd ----- system informationWiaacmgr ------- scanner and camera wizardWinchat
almost extinct), even if you only have a small account permission, you can also use it for the final purpose. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
========================================================== =Start → run → command collectionWinver --------- check the Windows versionWmimgmt.
Winver --------- check the Windows versionWmimgmt. msc ---- open windows management architecture (Wmi)Wupdmgr -------- Windows Update Program Wscript -------- Windows Script Host settingsWrite ---------- WordPadWinmsd --------- system informationWiaacmgr ------- scanner and camera wizardWinchat -------- XP built-in LAN chat Mem.exe -------- Display memory usageMsconfig.exe --- System Configuration UtilityMplayer2 ------- simple Widnows Media Player
that anyone who wants to enter the system must have a valid user name and password (the Input Method Vulnerability is almost extinct), even if you only have a small account permission, you can also use it to achieve your final goal. Therefore, eliminating empty passwords and adding a strong password to your account is the best way to defend against weak password intrusion.
Finally, it is most important to cultivate a good security awareness.
=================================================
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.