In the Windows era, most things can be done with a mouse or keyboard in a very intuitive way, so many people gradually forget the previous black and flickering operating system. indeed, the goal of science and technology is to make computer operations more and more simple, so that anyone can use the computer. for general users, this is OK, but if you are a software developer, it seems a bit unreasonable if you think so.
In development, there will always be no need to use more than n dos commands. Many things do not need to be processed one by one, and all the processing steps are written directly using the batch files, such: dailybuilder (daily compilation), and then let it automatically run OK, or many times to use a function, direct operation in DOS is faster than in windows. and so on.
So for those who have forgotten or are vague, pick up these commands and maybe you will use them tomorrow.
I have collected some information here, mainly to facilitate searching (in fact, there is no need to remember everything, as long as you can find it when using it)
Net use \ IP \ IPC $ & quot;/User: & quot; create an empty IPC Link
Net use \ IP \ IPC $ & quot; password & quot;/User: & quot; User Name & quot; create a non-empty IPC Link
Net use H: \ IP \ C $ & quot; password & quot;/User: & quot; User Name & quot; after logging in directly, map the other party's C: to the local host with h:
Net use H: \ IP \ C $ after login ing to the other Party C: to the local h:
Net use \ IP \ IPC $/del Delete IPC Link
. Net use H:/DEL: Delete the H ing from the ing peer to the local host that is H:
Net user username and password/Add create user
Net user guest/active: yes to activate the Guest user
. Net user.
Net user account name view account attributes
Net localgroup *** istrators user name/Add add Add "user" to the administrator so that it has administrator permissions. Note: *** after istrator, add s to use the plural number.
Net start to check which services are enabled
. Net start service name. (For example, Net start Telnet and Net start Schedule)
Net stop service name to stop a service
Net time \ target IP address view peer time
Net time \ target IP/set sets the time synchronization between the local computer time and the "target IP" host, and the parameter/Yes can cancel the confirmation information.
. Net view.
Net view \ IP to view which shares are enabled in the Peer LAN
Net config display system network settings
. Net logoff disconnection sharing
. Net pause service name: suspend a service
Net send IP & quot; text & quot; send information to the recipient
Network Connection type and information being used in the net ver LAN
. NET Share
NET Share IPC $ enable IPC $ share
NET Share IPC $/del Delete IPC $ share
NET Share C $/del Delete C: Share
Net user guest 12345 after logging in with the guest user, change the password to 12345
Net Password Change System Login Password
Netstat-A is usually used to check which ports are enabled.
Netstat-N is commonly used to view the network connection of a port.
Netstat-V view ongoing work
Netstat-P protocol name example: netstat-p tcq/IP to view the usage of a protocol (view the usage of TCP/IP protocol)
Netstat-S: view all protocol usage in use
If an nbtstat-a ip address is enabled on one of the ports from 136 to 139, you can view the user name that the other party recently logged on to (the user name is before 03). Note: Parameter-A must be capitalized.
Tracert-parameter IP (or computer name) Tracking routing (packet), parameter: "-W number" is used to set the timeout interval.
Ping An IP address (or domain name) to send 32-byte data to the host. Parameter: "-l [space] data packet size"; "-N data transmission count "; "-T" indicates that the Ping is always performed.
Ping-T-l 65550 IP address death Ping (send a file larger than 64 KB and ping it until the ping ends)
Ipconfig (winipcfg) is used for Windows NT and XP (Windows 95 98) to view the local IP address. The "/all" parameter of ipconfig shows all configuration information.
Tlist-T displays processes in the tree line list (this is an additional system tool, which is not installed by default and is in the support/tools folder of the installation directory)
After the kill-f process name is added with the-F parameter, a process is forcibly terminated. (This is an additional tool of the system. It is not installed by default. It is in the support/tools folder of the installation directory)
After the Del-F file name and the-F parameter are added, the read-only files can be deleted./AR,/AH,/As, And/AA respectively indicate the deletion of read-only, hidden, system, and archive files, /A-R,/a-h,/a-s,/A-A means to delete files except read-only, hidden, system, archive. For example, "del/AR *. *" means to delete all read-only files in the current directory, "del/A-S *. *" means to delete all files except system files in the current directory
#2 II:
Del/S/Q directory or use: rmdir/S/Q directory/s to delete all subdirectories and files in the directory. At the same time, you can use the parameter/Q to cancel the deletion operation and then delete it directly. (The two commands serve the same purpose)
Move drive letter \ path \ file name to be moved storage path of the mobile file \ move the file name to move the file, use the parameter/y to cancel the confirmation that the Mobile Directory contains the same file prompt and overwrite it directly
FC one.txt two.txt 3st.txt compares two files and outputs them to the 3st.txt file. & quot; and & quot; Are redirection commands.
At ID: Enable a registered scheduled task
At/delete: stops all scheduled tasks. Use the/Yes parameter to stop the tasks without confirmation.
At ID/delete: Stop a registered scheduled task
At view all scheduled tasks
At \ IP time Program Name (or a command)/R runs a program of the other party at a certain time and restarts the computer
Finger username @ host
Telnet IP port: Remote and login server, default port: 23
Connecting an open IP address to an IP address (the command after Telnet logon)
Telnet directly type telnet on the local machine to enter the local telnet
Copy path \ file name 1 path \ file name 2/y copy file 1 to the specified directory as file 2, use the parameter/y to cancel the confirmation at the same time you want to rewrite an existing directory file
Copy c: \ srv.exe \ IP \ *** $ copy local c: \ srv.exe to the other party's ***
Cppy 1st.jpg/b4242st.txt/A 3st.jpg contains a new file. Note: The 2st.txt File Header must be empty in three rows. Parameter:/B indicates the binary file, And/A indicates the ascll file.
Copy \ IP \ *** $ \ svv.exe c: \ or: Copy \ IP \ *** $ \*. * copy the srv.exe file (all files) shared by the peer *** IMG to the local C:
The target address of the file or directory tree to be copied in xcopy. \ directory name: copy the file and directory tree. The parameter/y does not prompt to overwrite the same file.
After you get server.exe c: \ server.exe and log on to the target host, download the server.exe file of the specified IP address to the parameter c: \ server.exe of the target host: -I refers to binary transfer, which is used for transferring EXE files. If-I is not added, it is transmitted in ASCII mode (Transfer text file mode ).
After logging on to the TFTP-I peer IP put c: \ server.exe, upload the local c: \ server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable files). The default value is ASCII transfer (for text files)
Route print displays the IP route. The network address network addres, subnet mask netmask, gateway address addres, and interface address are displayed.
ARP is used to view and process ARP caches. ARP is used to resolve an IP address into a physical MAC address. ARP-A displays all information
Start program name or command/max or/min open a new window and maximize (minimize) run a program or command
Mem view CPU usage
Attrib file name (directory name) to view the attributes of a file (directory)
Attrib file name-a-r-s-h or + A + R + S + H remove (ADD) the archive of a file, read-only, system, and hidden attribute; use + to add an attribute
Dir: view the file. The parameter "/Q" indicates the user of the file and directory system./t: C indicates the file creation time./t: A indicates the last file access time./t: w. last modification time
Date/t, time/t use this parameter, that is, "date/T", "Time/t" will only display the current date and time, without entering a new date and time
Set specifies the environment variable name = the character to be assigned to the variable to set the environment variable
Set displays all current environment variables
Set P (or other characters) displays all environment variables starting with P (or other characters ).
Pause pause the batch processing program and display: press any key to continue ....
If execute condition processing in the batch processing program (for more information, see if command and variable)
The Goto tag directs cmd.exe to the rows with labels in the batch processing program (the tag must be a separate row and headers with colons, for example, the ": Start" tag)
If you have not written anything, please help me to complete the resource. Thank you.