We strongly recommend that you add this article to your favorites. You can use this document as you go. New users need to add this article to your favorites. It is impossible for you to remember it all?
CMD command
Net use ipipc $ ""/user: "" creates an empty IPC link.
Net use ipipc $ "password"/user: "user Name" Create an IPC non-empty Link
Net use h: ipc $ "password"/user: "user Name". After you log in directly, map the other party C: H:
Net use h: ipc $ after login ing to the other Party C: to the local is H:
Net use ipipc $/del Delete IPC Link
. Net use h:/del: Delete the H ing from the ing peer to the local host that is h:
Net user username and password/add create user
Net user guest/active: yes to activate the guest user
. Net user.
Net user account name view account attributes
Net localgroup administrators user name/add the "user" to the administrator so that it has administrator permissions. Note: add s to the administrator and use the plural
Net start to check which services are enabled
. Net start service name. (For example, net start telnet and net start schedule)
Net stop service name to stop a service
Net time target ip address view peer time
Net time target ip Address/set sets the time synchronization between the local computer time and the "target IP" host. The parameter/yes can be used to cancel the confirmation.
. Net view.
. Net view ip address.
Net config display system network settings
. Net logoff disconnection sharing
. Net pause service name: suspend a service
Net send ip "Text Information" sends information to the recipient
Network Connection type and information being used in the net ver LAN
. Net share
Net share ipc $ enable ipc $ share
Net share ipc $/del Delete ipc $ share
Net share c $/del Delete C: share
Net user guest 12345 after logging in with the guest user, change the password to 12345
Net password Change System Login password
Netstat-a is usually used to check which ports are enabled.
Netstat-n is commonly used to view the network connection of a port.
Netstat-v view ongoing work
Netstat-p protocol name example: netstat-p tcq/ip to view the usage of a protocol (view the usage of TCP/IP protocol)
Netstat-s: view all protocol usage in use
If an nbtstat-A ip address is enabled on one of the ports from 136 to 139, you can view the user name that the other party recently logged on to (the user name is before 03). Note: Parameter-A must be capitalized.
Tracert-parameter ip (or computer name) Tracking routing (packet), parameter: "-w number" is used to set the timeout interval.
Ping An ip address (or domain name) to send 32-byte data to the host. Parameter: "-l [space] data packet size"; "-n data transmission count "; "-t" indicates that the ping is always performed.
Ping-t-l 65550 ip address death ping (send a file larger than 64 KB and ping it until the ping ends)
Ipconfig (winipcfg) is used for windows NT and XP (windows 95 98) to view the local IP address. The "/all" parameter of ipconfig shows all configuration information.
Tlist-t displays processes in the tree line list (this is an additional system tool, which is not installed by default and is in the Support/tools folder of the installation directory)
After the kill-F process name is added with the-F parameter, a process is forcibly terminated. (This is an additional tool of the system. It is not installed by default. It is in the Support/tools folder of the installation directory)
After the del-F file name and the-F parameter are added, the read-only files can be deleted./AR,/AH,/AS, And/AA respectively indicate the deletion of read-only, hidden, system, and archive files, /A-R,/A-H,/A-S,/A-A means to delete files except read-only, hidden, system, archive. For example, "DEL/AR *. *" means to delete all read-only files in the current directory, "DEL/A-S *. *" means to delete all files except system files in the current directory
II:
Del/S/Q directory or use: rmdir/s/Q directory/S to delete all subdirectories and files in the directory. At the same time, you can use the parameter/Q to cancel the deletion operation and then delete it directly. (The two commands serve the same purpose)
Move the drive letter path to move the file name to store the path of the mobile file move the file name to move the file, with the parameter/y will cancel the confirmation that the Mobile Directory has the same file prompt to directly Overwrite
Fc one.txt two.txt> 3st.txt compares two files and outputs them to the 3st.txt file. ">" and ">" are redirection commands.
At ID: Enable a registered scheduled task
At/delete: stops all scheduled tasks. Use the/yes parameter to stop the tasks without confirmation.
At ID/delete: Stop a registered scheduled task
At view all scheduled tasks
At ip time program name (or a command)/r runs a program of the other party at a certain time and restarts the computer
Finger username @ host
Telnet ip port: Remote and login server, default port: 23
Connecting an open ip address to an IP address (the command after telnet logon)
Telnet directly type telnet on the local machine to enter the local telnet
Copy path file name 1 path file name 2/y copy file 1 to the specified directory as file 2, use the parameter/y to cancel the confirmation at the same time you want to rewrite an existing directory file
Copy c: srv.exe ipadmin $ copy local c: srv.exe to the admin of the other party
Cppy 1st.jpg/b4242st.txt/a 3st.jpg contains a new file. Note: The 2st.txt File Header must be empty in three rows. Parameter:/B indicates the binary file, And/a indicates the ASCLL file.
Copy ipadmin1_svv.exe c: Or: copyipadmin $ *. * copy the srv.exe file (all files) shared by the peer administrator to the local C:
The file or directory tree target address of xcopy. The directory name copies the file and directory tree. The parameter/Y does not prompt to overwrite the same file.
After you get server.exe c: server.exe, download the server.exe of the specified IP address to the target host c: server.exe with the following parameters: -I refers to binary transfer, which is used for transferring exe files. If-I is not added, it is transmitted in ASCII mode (Transfer text file mode ).
After logging on to the tftp-I peer IP put c: server.exe, upload local c: server.exe to the host
The ftp ip port is used to upload files to the server or perform file operations. The default port is 21. Bin refers to binary transfer (executable files). The default value is ASCII transfer (for text files)
Route print displays the IP route. The Network address Network addres, subnet mask Netmask, Gateway address addres, and Interface address are displayed.
Arp is used to view and process ARP caches. ARP is used to resolve an IP address into a physical MAC address. Arp-a displays all information
Start program name or command/max or/min open a new window and maximize (minimize) run a program or command
Mem view cpu usage
Attrib file name (directory name) to view the attributes of a file (directory)
Attrib file name-A-R-S-H or + A + R + S + H remove (ADD) the archive of A file, read-only, system, and hidden attribute; use + to add an attribute
Dir: view the file. The parameter "/Q" indicates the user of the file and directory system./T: C indicates the file creation time./T: A indicates the last file access time./T: w. last modification time
Date/t, time/t use this parameter, that is, "DATE/T", "TIME/T" will only display the current date and time, without entering a new DATE and TIME
Set specifies the environment variable name = the character to be assigned to the variable to set the environment variable
Set displays all current environment variables
Set p (or other characters) displays all environment variables starting with p (or other characters ).
Pause the batch processing program and display: press any key to continue ....
If execute condition processing in the batch processing program (for more information, see if command and variable)
The goto tag directs cmd.exe to the rows with labels in the batch processing program (the tag must be a separate row and headers with colons, for example, the ": start" tag)
Call path: the batch processing file name calls another batch processing program from the batch processing program (for more information, see call /?)
For execution of a specific command on each file in a group of files (for more information, see for command and variable)
Echo on or off enables or disables echo. The current echo settings are displayed only when echo is used without parameters.
Echo information is displayed on the screen
Echo information> pass.txt: Save "information" to the pass.txt File
Findstr "Hello" aa.txt search for the string hello in the aa.txt File
Find file name to find a file
Title name change the title name of the CMD window
Set the color value to the foreground and background colors of the cmd console; 0 = Black, 1 = blue, 2 = green, 3 = light green, 4 = red, 5 = purple, 6 = yellow, 7 = white, 8 = gray, 9 = light blue, A = light green, B = light green, C = light red, D = light purple, E = light yellow, F = light white
The prompt name is changed to the command prompt displayed by cmd.exe (Change C:, D: To: EntSky)
III:
Ver displays version information in the DOS window
In the winver pop-up window, the version information (memory size, system version, patch version, and computer name) is displayed)
Format drive letter/FS: Type Format disk, type: FAT, FAT32, NTFS, for example: format D:/FS: NTFS
Md directory name create directory
Replace the directory of the source file to be replaced
Rename original file name New File Name
Tree displays the directory in a tree structure, and uses the-f parameter to list the file names in the first folder.
Type file name display text file content
More file names display output files on screen
Doskey command to be locked = character
Doskey UNLOCK command = Lock Command provided for DOS (edit command line, re-call win2k command, and create macro ). For example, run the following command to lock the dir: doskey dir = entsky (doskey dir = dir cannot be used); unlock: doskey dir =
Taskmgr call up the Task Manager
Chkdsk/f d: Check disk D and display status report; add parameter/f and fix disk errors
Tlntadmn telnt service admn, type tlntadmn to select 3, and then select 8, you can change telnet service default port 23 to any other port
Exit to exit the cmd.exe program. Currently, the parameter/B is used to exit the current batch processing script, not cmd.exe.
Path: Specifies the executable file name.
Cmd starts a Windows 2 K Command explanation window. Parameters:/eff,/en, and enable command extension. For more information, see cmd /?
Regedit/s registry file name import to registry; parameter/S indicates quiet mode import, no prompt;
Regedit/e registry file name export Registry
Cacls file name parameters display or modify the file access control list (ACL)-for NTFS format. Parameter:/D User name: Set to deny access to a user;/P User name: perm to replace the access permission of the specified user;/G User name: perm to grant the access permission to the specified user; Perm can be: N none, R read, W write, C Change (write), F full control; for example: cacls D: est.txt/D pub set d: est.txt to reject pub user access.
Cacls file name to view the object access user permission list
Add annotation to the batch file for REM text content
Netsh to view or change the local network configuration
IV:
II