Doscommand parameter getting started Tutorial: Explanation of common doscommand parameters in Chinese
Doscommand parameter getting started Tutorial: describes common doscommand parameters in Chinese.
I. DIR command format:
Dir [D:] [PATH] [NAME] [[/A] [: attrib] [/o: [sorted] [/s] [/l] [/c [h]
(1) dir/a: attrib contains all files by default (system files. hidden files)
Attrib [:] [h/-h] Only displays hidden or non-hidden files.
[R/-r] Only displays read-only or non-read-only files
[S/-s] Only displays system files or non-system files
[A/-a] Only displays files to be archived or non-Archive
(2)/o [:] sorted: by default, all sub-directories are displayed in alphabetical order before the file.
/O [n/-n]: displayed alphabetically or in reverse order by file name
[E/-e]: Display in alphabetical or reverse order of the extension.
[D/-d]: Display in chronological or reverse order
[S/-s]: displays data in the descending order of size or in reverse order.
[G/-g]: The Sub-directory is prior to the file or the file is prior to the sub-directory
(3)/s parameter: list all files in the current directory and Its subdirectories
Column name ir/s/a/o: n c: \> PRN
Print and output all subdirectories and files on drive C according to their affiliation and in alphabetical order.
(4)/B parameter: only the file name and extension are displayed.
(5)/L parameters: list all files or subdirectories with lowercase letters
Training:
All files (including implicit and system files) in the current directory of dir/)
Dir/ah implicit file (including sub-directories (hidden) dir/a-h
Dir/as Column System File dir/a-s
Dir/ad sub-directory dir/a-d
Dir/o in alphabetical order
Dir/B only displays file names and extensions
Ii. attrib [+ r |-r] [+ a |-a] [+ s |-s] [+ h |-h] [d:] [name] [/s]
Default attrib name: displays the (File) attributes of a file.
Attrib io. sys (or sub-directory)
Shr c: \ io. sys is specified as a system (s) Implicit (h) read-only (r) file.
You can also attrib *. sys to display the file attributes with the extension sys.
The parameter [+ r |-r] sets or removes the read-only attribute of the file.
[+ A |-a] set or unarchive file Properties
[+ H |-h] sets or removes implicit attributes of a file, especially for subdirectories)
The/s parameter takes effect for all files in the current and current subdirectories.
Can be used to find files
Example:
Attrib news86 column news86 document attributes
Attrib + r report.txt is set to read-only attrib-s-h record.txt
Attrib + :*.*
Attrib-a: *. bak
Xcopy a: B:/a: Copy all files marked as "ARCHIVE" on disk A to disk B.
Xcopy a: B:/m: Copy all the files on disk A to disk B and move them to the archive attribute.
3. cd Introduction: cd... returns the upper-level directory "." indicates the current directory "." indicates the parent directory.
Cd ...... return to the parent directory (parent directory) of the parent directory)
Cd A: \ change the current directory of disk A to the root directory.
Cd A: \ xx change the current directory of disk A to the subdirectory xx
Cd .. \ 98 first returns the parent directory, and then enters the 98 subdirectory under the parent directory
Cd .. return to parent directory
Cd \ 98 go to the 98 subdirectory under the root directory
4. copy [/y] [/-y] [/v] [/B]
Copy/y is not prompted to overwrite all files
/-Y to prompt all files (yes or no)
/V copy for verification
/B display in binary format
Copy w1.wps con/B can display wps files on the screen without entering the wps status
Copy .. \ 98 copy all files in the 98 sub-directories under the parent directory to the current sub-directory
Copy. \ 97 when all the files in the 97 sub-directories under the current directory are copied to the current directory
Copy. c: \ copy all files in the current directory to the c root directory.
. Indicates *. * File
Copy nul a. abc to clear the. abc file (the file length is changed to 0)
Copy file name + con append commands or content to text files
Copy con file name create text file (F6 save disk Exit)
Copy con prn detection printer Switch
V. xcopy command
Xcopy [source] [date] [/p] [/s] [/e] [/v] [/y]
Xcopy [date] xcopy a: B: \/d: 08/18/98/s/v copy files after 98.08.18
Xcopy [/p] prompts you to create a subdirectory
Copy xcopy [/s] along with subdirectories. Note: If this subdirectory does not exist on the target disk
If the disk end is not ended with "\", the following message is displayed:
Does destination specify a file name or directory name on the target
[F = file, d = directory]?
Create a file on the target disk [press] or create a subdirectory [press d]? D key should be selected
Xcopy [/v] with verification
* 1) If xcopy does not copy system or hidden files, you must modify the attributes before copying them.
Whether a prompt is displayed when xcopy [/y] is overwritten, And/y does not contain a prompt
If the target disk or subdirectory name is omitted, copy it to the current directory.
Vi. del/p
Add/p to indicate whether to prompt before deletion
If the sub-directory name is added after del, all the files under the sub-directory (except hidden. system. Read-Only files) will be deleted,
Add/p to confirm.
VII. undelete [name]/au
Restore all files that meet the conditions (which can be recovered) without prompting, and set the initial letter to "#". If
If yes, add it in the order of "# % & 0 1 2-9 a-z.
For example, undelete *. dbf/au restores all files with the extension "dbf" and starts with "#" as files.
Name,/list only lists the files that can be recovered, without restoring
Undelete/load: load undelete into memory
/Unload undelete out of memory
/S [drive] monitors and manages the specified drive
Undelete/SC
Resident undelete in memory ,? Create an implicit sentry sub-directory to delete files on drive C.
Manage undelete/ds recovery
The recovery command can use undelete to completely restore the file name (very complete)
Most commonly used undelete *.*
Deltree/y [driveath]
Deltree deletes subdirectories and files, although some files are system files or hidden files
It can contain wildcards. When it contains wildcards, it will delete files and subdirectories that meet the conditions.
For example :? Undelete *. dbf/au restores all files with the extension "dbf" and starts with "#" as files.
Name.
/List only lists files that can be recovered without restoration.
Undelete/load: loads undelete into memory.
/Unload undelete the memory.
/S [drive] monitors and manages the specified drive.
Undelete/SC: resident memory of undelete and create an implicit sentry sub-directory to delete drive C
You can use the undelete/ds command to completely restore the file name (perfect ).
The most commonly used is undelete *.*
8. deltree/y [driveath]
Deltree deletes subdirectories and files, although some files are system or implicit.
It can contain wildcards. In this case, it will delete files or subdirectories that meet the conditions.
For example, L1 files, L2 subdirectories, L3 files, and L4 subdirectories exist.
Deltree L *. * will delete all the above files and subdirectories, but confirm before deletion. If not,
You can enter "N ".
The/y parameter is deleted without confirmation.
The deleted files can be restored using undelete ,? However, the sub-directories and their files cannot be recovered.
Special tools, such as NORTON 8.0.
If undelete/s is used in advance ,? Then you can find the complete file in the sentry subdirectory, but the name is already
Changed.
9. dos = high [| low [umb | noumb]
Dos = high; umb loads itself into high-end memory (high) and manages the upper-level memory (umb ).
Noumb does not manage the upper-level memory.
Device = himem. sys should be loaded before writing dos = high and umb.
To load a program or driver into the upper-level memory, dos = umb must be used to save most of the general memory.
You can write dos = high and umb at any position in config. sys.
If hma not avoiable or load down low is displayed, high-end memory cannot be used.
10. The doskey records the previously typed doscommands. You can use F7 to display them, use "commandid" to select them, and use F9 to input them.
Command number.
Doskey/restall is reloaded once, and the previous command line is revoked.
Doskey/history shows all the commands in the memory. You can ">" display them to other files, abbreviated as "/H ".
Doskey dir = cls, the same as cls.
Doskey/macros can display all macro definitions. You can use ">" to redefine them to a file, which can be abbreviated as "/M ".
Doskey dir = undefinable macro definition of dir.
Doskey p = dir $ tdir *. exe/p $ tdir c: \ t $ *
$ T indicates the command delimiter, while $ * indicates the command Terminator.
Doskey/insert (overstrike )? When you re-enter the command, whether to insert or override the old command
Status (default ).
Eleven unzip emm386.exe
Provides management of the extended memory so that the application can use it just like the regular memory.
The common usage is in config. sys.
Device = c: \ dos \ himem. sys
Device = c: \ dos \ emm386.exe ram
D = 64 set the DMA memory quantity to 64 K
Noems provides access to the upper-level memory, but does not provide access to the extended memory.
It should be noted that it is best not to use it in windows, because windows itself manages extended memory.
Program. Use the manager in windows.
12. fc command fc/B dt. dat dt2.dat> B (for binary code comparison)
Compares two files, which are generally used for access progress and modifying game storage files.
The actual code location should contain 0100, for example, 0000 05E4: 00 67.
0100 or 0000 06E4: 00 67 should be added when debugging-e is used.
Add the redirected file "> P" to output the comparison result to the p file.
13. format/q/u/s/n: sectors/f: size/c
/Q Parameter: Quick formatting. Only the File Allocation Table and root directory are scanned. this parameter is only valid for formatted disks.
Make sure that no new bad channels are added after formatting.
/U parameter: It is unconditionally formatted and does not save the information on the original disk. This prevents "unformat ".
/S parameter: format it as a system disk, or use the "sys" command.
/F: size can be 160 180 320360720 1200 1440 2800
/N: sector n can be 1-Side Disk with a capacity of 160 k and 180 k
You can format a k disk on a 4-inch high-density drive.
You can format 8 sectors on a 5-inch high-density drive.
/C re-test the bad slice. If one slice is marked as "bad", the format will not be tested in the future.
Test, marked only. You can test it again when "/C" is used.
14. unformat command
The command that uses the format and does not use the "/u" parameter takes effect. It can be used to fix the loss.
Bad hard disk partition table, but does not work for network disks.
Unformat drive: [/l] [/test] [/p]
/L display each file and subdirectory found by unformat. If this switch is not enabled, only those files and subdirectories are displayed.
For broken files and subdirectories, press ctrl + s to pause and press any key to continue.
/Test only performs one test, without actual repair work, and simulates the process.
/P: print the data while testing.
Note: This method cannot repair all files, especially disks that have been formatted and added with data.
The recovered files are stored in sub-directories such as subdir1.... 2... 3.
15. interlnk syntax interlnk g = e. It can communicate with each other through a serial port or a parallel port.
Map the e drive on the server to the g drive of the client.
All operations mean access to the server. The method for canceling the ing is interlnk g =
Enter interlnk separately to display all mappings.
Note: interlnk plugin can be used only when the driver is installed with the interlnk.exe device.
The drive letter and config .? The number of lastdrv.exe settings in sysis related.
The connection mode is as follows:
5-7 2-15
3-2 3-13
7-4 4-12
6-6 5-10
3-3 6-11
8-5 15-2
4-20 13-3
9-25-12-4
10-5
11-6
25-25
25-pin 25
、Interlnk.exe and intersvr.exe
Interlnk.exe redirect requests from the client drive or print interface to another Server Driver
Or printer.
Syntax: add the following to config. sys:
Device = c: \ dos \ interlnk.exe [drive: n] [/noprinter] [com] [lpt]
17. memmaker [/batch] [session] [/swaprive]
Memmaker can optimize the memory configuration ,? Write the configuration to autoexec. bat and config. sys.
In this process, you need to restart the machine several times.
18. memitem memcolor memdefault submenu menu option include
In autoexec. bat: config. sys:
Path c: \ dos; c: \ ucdos [menu]
Doskey menucolor = 15, 1 (foreground color 15, background color 1)
\ Mouse menuitem = base_config, this is a base
Goto % config %-> choose menuitem = cced_config, this is a cced
Option prompt
: Base_config menudefault = base_config, 5
Goto exit-> the default bounce time is base_config. The delay is 5 seconds.
: Cced_config [common]
C: \ dos \ smartdrv.exe/l device = c: \ dos \ himem. sys
Goto exit the common part of each item
: Exit-> end [base_config]
Device = c: \ dos \ emm386.exe ram
Dos = high, umb
[Cced_config]
Device = c: \ dos \ smartdrv.exe/double_buffer
Include = base_config include base_config settings
It can be selected based on the computer's Configuration Requirements under different circumstances.
19. mscdex.exe provides a program for reading and writing the optical drive.
Mscdex/drive [/Drive] [/e] [/k] [/s] [/l: letter]
Typical: device = c: \ cdrom. sys/d: mscd000 in config. sys
In autoexec. bat, c: \ dos \ mscdex/d: mscd000/l: g
An optical drive is configured with the symbol g
The parameter/drive1 is the ID number of the optical drive, which must be consistent with the symbol in config. sys. Multiple
/D: mscd000/d: mscd001
/E: use the extended memory to mount the optical drive driver.
/S: whether to enable the shared optical drive in ms_net or windows
/V indicates whether the memory is displayed during loading.
/L: The drive letter that the letter assigns to the optical drive.
/M: number indicates the number of buffers.
Note :? If smartdrv.exe is used to accelerate the read/write capability of the optical drive, it should be in autoexec.
In bat, mscdex .? Before the exe is written in smartdrv.exe, the use of smartdrv.exe can be greatly improved.
The ability to read and write the drive.
20. Use of msd
Msd allows you to check computer configurations and system information.
Including :? Driver parameters, computer cpu parameters, memory size parameters, display type, string-and-parallel port conditions,
And the usage of each IRQ. Based on this, you can analyze whether the new device conflicts with the original device.
At the same time, you can analyze the memory resident program to determine whether there is a virus in the memory. If yes, It is marked "??? ".
21. prompt dos prompt
$ Q equal sign $ t current time $ d current date $ p current drive symbol
$ # Prompt $ n current drive $ g greater than sign $ l less than sign $ B display "|" MPS queue No.
$ H hide the prompt $ E to display "<-"
For other text, the prompt ljw of the text is directly displayed, and the prompt is ljw prompt.
Prompt only displays the current drive letter and greater than the number.
22. ramdrive. sys uses memory as a virtual disk.
It should be noted that all data is stored in the memory and should be stored in the hard disk in a timely manner. Otherwise, after power loss or crash
All data will be lost, the advantage is that the operation speed is fast, but cannot be used in windows.
Example: config. sys: device = c: \ dos \ ramdrive. sys/size [/e | a]
Size is the number of bytes in k, that is, the size of the created virtual disk.
/E or/a both use extended memory to create a virtual disk ,? To add parameters, you must first load memory management.
Himem.sysand emm386.exe.
23. subst connects a drive to a sub-directory
For example, if you map A: \ l1 \ l2 sub-directory requests to the S disk, enter
Subst s: a: \ l1 \ l2
Use dir s :? The command displays the contents in the: \ l1 \ l2 sub-directory, the same as other copy del commands.
You can use subst s: d to cancel this ing.
Subst can be used to display various join conditions
Note :? You can use subst a: c: a to create A read/write disk for.
For example ,? You must use disk A for installation. You can copy all the software you want to install to C:.
Directory, enter subst a: c: a, and then go to A: to install the software.
Twenty-four, mem/c/m/p/d Regular memory display program
/C shows the usage of all memory resident programs, including conventional regular memory and uppermemory
High-end memory usage and overall usage (regular high-end reserved extended memory)
/P page display, pause between pages
The/m post-added Module name is as follows:/m msdos displays the memory usage of the DOS system.
/D detailed examples of regular high-end reserved extended memory
Through analysis, we can see whether the memory usage is reasonable and whether various programs are loaded normally.
Based on the memory optimization tool memmaker for various management, but also can analyze some program crashes
If "??? ", It can be determined that there is a virus in the memory, is conducive to the discovery and elimination.
25. Use of various pipeline Tools ">>><"
Rewrite the output or required input caused by various commands
For example, ir *. bat/B> p can output the file name in dir *. bat to the p file.
Time
> P. bat
If there is only one carriage return in the p file, you can append the time to the p. bat file.
">>>" Is to redirect the output generated by the command, such as to a file or printer.
> The generated content will be appended to the file.> the original file content will be overwritten.
"<" Indicates that the content to be entered in the command is reoriented.
For example, time