Windows XP cmd command set

Source: Internet
Author: User

Cmd.exe is a command extension interface that can be used outside the system to execute any executable program under the environment variables of the system. The operation is similar to the previous MS-dos, however, the function is more powerful than MS-dos.
Although learning is a little abstract, we only need to lay a good foundation for MS-dos and it is easy to get started. If you are unfamiliar with the doscommand, let's take a look at the doscommand and then read this article, as shown in figure
If the one who is a system expert before the article goes through the page, I will not talk nonsense much. Please refer to the following:
1. External commands:
1. atmadm.exe: Open the ATM Call Manager.-C indicates that all connections are listed,-s indicates that only statistics are displayed, and-a indicates that all registered connection addresses are listed.
2. arp.exe: Command Used to view and modify the local ARP table, /A displays the current network interface and the current ARP table,/d deletes the ARP table of the specified IP address, and/s adds the ARP table with the IP address and MAC address specified. The ARP command is usually used to ping the IP address of the peer or gateway.
3,
Attrib.exe: file attribute settings. + indicates setting attributes,-Indicates canceling attributes,/s indicates setting the current directory and subdirectory files (Wildcards are supported), And/d Indicates setting folders (wildcard configuration is supported ).
, Set the following options: A archive attribute, s system attribute, H hidden attribute, R
Read-only attribute. For example, to add system and hide properties to all directories and subdirectories of C:/Windows, run the following command: attrib + S + d c:/Windows/*. */s.
/D.
4. auditusr.exe: sets the audit policy for each user, /Is successfully added or changed policy audit,/if addition or change failed policy audit,/R delete all security policy reviews,/RA delete all user policy reviews,/e Delete the current user policy review configuration export to file,/I import from file to user policy review configuration.
5. blastcln.exe: Microsoft's malicious program removes the command line program tool. It only has the/V parameter, after running, the system service, system program, Registry Startup item, file name damaged or lost by viruses, and so on will be detected. A report is provided after detection.
6. boot.exe /? See its help for Chinese command parameters.
7. cacls.exe: a command line program that sets file or directory permissions./T changes the command execution result to the current directory and all subdirectories./C
Force Command Execution ignore error prompt,/g User: perm gives the user the specified access permission, Perm can read for R, W write, c Change, f full control,/P
User: perm replaces the specified access permission of the user. Perm can be n-free, R-read, W-write, C-change, F-full control,/d user
Deny Access From a specified user. In the preceding parameters, user indicates the specified user name. The command is simple and will not be used as an example.
8. chkdsk.exe: disk check command. Important Parameters include:/F fixing disk errors,/R searching for incorrect information on fat, and trying to restore,/x
Remove the volume label, add this parameter when the command cannot be completed successfully,/I checks fat for a smaller intensity,/V
Skip the loop check of the folder structure. The last two parameters can only be applied to a disk in NTFS format. For example, we want to fix E: the lost files can be chkdsk/F/R/X/V
E: this command.
9. chkntfs.exe: the disk check Command automatically loaded during system strength./I: time indicates the time to wait for the disk check to be skipped./x
Set partitions that are not checked when the computer starts, And/C sets partitions that must be checked when the computer starts. If an error is found on the partition, The chkdsk command and/d
Restores the changes made to the command to the default state. The purpose of this command is that we often see that an illegal shutdown is a computer's self-check. If we are idle, we can use CHKNTFS/x C: D:
E: F :............ Skip this command.
10. cipher.exe: advanced operating program for EFS file encryption./e encrypts the specified directory. In the future, the files added to this directory will be automatically encrypted./d
Decrypts a specified directory, and will not be automatically encrypted when files are added to the directory in the future./s will operate on the specified directory and all its subdirectories, And/I will ignore errors, force encryption, decryption,/F
Ignore all encrypted files in the directory and perform encryption operations,/K
Create a new key for the user. This parameter cannot be mixed with other parameters./R: filename is the recovery proxy and Certificate file generated by the encrypted user, so that multiple users can view the encrypted file,/u
Try to find All EFs encrypted files on the local hard disk. If the user's encrypted key or certificate file is not available, it will reset with the current password,/n
It can only be used with the/u parameter at the same time. The function is not to change the key or certificate password,/W
This process is similar to file crushing. This parameter cannot be used with other parameters
Back up the keys and certificates of EFS encrypted files. This is a very practical command and I hope you can use it skillfully.

111_comp.exe: file comparison command. The main parameter/D is used to display different parts of the file in decimal format, And/A uses ASCII characters to display different parts of the file, for example, comp C:/boot. ini c:/boot1.ini/.
12、compact.exe: The File compression program on the NTFS drive./C: compresses the specified file or folder, and the files added to the directory will also be compressed,/u
Decompress the specified file or directory, and the files added to the directory will not be compressed later,/s will execute command operations in the current directory and all its subdirectories,/I
Ignore errors, force compression,/F ignore compressed files, and force compression.
13w.convert.exe: partition format conversion command, which can convert FAT32 to NTFS format,/Fs: NTFS to NTFS format,/x
Remove the volume label for conversion./V runs the command in detail in the converted partition or volume. For example, we want to convert I: the disk is in the NTFS format, and the command is convert I:
/Fs: NTFS/X/V. Then we can see that the command is executed quickly. At this time, the computer cannot be powered off.
142.16defrag.exe: Command Line version of Windows fragment program.-A only analyzes and does not sort
When the disk space is insufficient, force sorting. This parameter should be used with caution and-V should display the results of fragment. For example, we sort out the drive I:, the command is defrag/S/V
I: The speed is faster than that of the fragment program in the GUI. You can also learn about the fragment status of the drive in detail.
152.16diskperf.exe: disk performance counter./Nd: Disable the disk performance counter on the physical drive and/nV disable the disk performance counter on the logical drive.
16.0doskey.exe: Set the macro command in cmd. Please use /? Query specific parameters. You can set the definition of shortcut keys in cmd, such as F7, F8, F9, and F10.
17. diskcomp.com: compare two floppy disks.
18. diskcopy.com: a command to copy a floppy disk.
192.16eventcreate.exe: System Log creation command,/s remote operating system to be connected;/L specifies the event log for the event to be created;/I specifies the type of the event to be created, valid values include error, warning, and information./d specifies a description for the newly created log.
2018.expand.exe: extract one or more cab package files. Remember the two parameters and/d displays the file list of the source file,/F: files extracts the files used from the specified cab file.
21、ipxroute.exe: Source Route Selection controller.
22、ipconfig.exe: displays the current TCP/IP configuration protocol command. Without parameters, the configuration of the current local connection and/All are displayed.
Display All TCP/IP configurations and protocols, including DNS and public ip,/Renew refresh IP address parameters assigned by HDCP,/release
Release the current HDCP value and disable the local TCP/IP protocol.
23most label.exe: disk volume label operation. There is basically no parameter to say.
24、logman.exe: Manages Performance Logs and alarm services. For details about the parameters, see /?.
25.0logoff.exe: log out of the system./Server: servername indicates the terminal server to be logged out. If no parameter is added, the server is logged out.
26w.mountvol.exe: disk mount point Operation Command./volumename specifies the name of the target volume to be loaded,/d deletes the volume from the specified directory, and/L lists the name of the volume already loaded in the specified directory.
272.16mqbkup.exe: Backup and Restore commands in bits.-B backs up the file to the specified path and-R restores the file backed up 2 from the specified path.-y does not require you to directly execute the command.
28w.msg.exe: Lan message sending command. Username specifies the user name and message
Sent message,/Server: Specifies the server on which the message is to be sent. For example, if you want to send "are you" to the Administrator on 192.168.1.2
Ready ", command: MSG/Server: 192.168.1.2 administrator" Are you ready ".
29w.msiexec.exe: MSI Format File installer,/I installation and configuration installer,/X uninstall the installed MSI program,/
Perform operations on the MSI installer on the network, and/quiet is directly installed and/Passive without user negotiation.
Unable to participate in the mode. During operations on the MSI file, only the progress bar and/norestart programs are displayed.
30、move.exe: indicates the file movement command./y cancels the confirmation message when the file is changed, And/-y prompts the operator whether to confirm when the file is changed.

31. more.com: Command for displaying large text files.
32w.netstat.exe: used to display statistics of TCP, IP, UDP, and ICMP protocols and current network connections./A is used to display all current connections and listening ports, And/B
Display the executable program for creating each connection. Note that this parameter takes a long time and sufficient permissions, and/e displays Ethernet information. This parameter can be used in combination with/s testing,/n
The IP address and port number are displayed as numbers, And/o displays the process PID values related to each connection,/P
Displays the specified protocol connection. The protocol can be TCP, UDP, tcpv6, and udpv6. This parameter can be used together in/s,/R displays the route table,/s
Displays statistics by protocol. Displays all information about IP, IPv6, ICMP, ICMPv6, TCP, tcpv6, UDP, and udpv6.
When used together with/B, All executable program creation and connection components can be displayed. For example, you can use netstat to display the current network information and port monitoring status in detail.
/Abnov command to view.
33、openfiles.exe: list or interrupt opened files on the local or remote system. For more information, see /? Query. The reason for the length is not listed.
342.16pathping.exe: test the connectivity of the network path./g host-list releases the host list of the sending source and/h maximum_hops.
The maximum number of hops of the target, the source address specified by/I, And/o do not determine the host address name, or the connection time of/P period waiting for Ping, in milliseconds,/Q Mum
Queries records the timeout time for each of the queried hops and/W waiting for each semi-connection. Unit: millisecond,/P connectivity between the test and rsup,/t
Test the connectivity of each hop in the base layer with priority connection.
3520.ping.exe: test the network connectivity. The/T command is run continuously on the host of the other party until the host is interrupted manually. We can use Alt + C to combine the command to interrupt the host, or press Ctrl
+ The break is suspended and/A performs domain name resolution when executing the command. For example, if we do not know the IP address of a website, we can directly add this parameter to ping its URL.
36366power0000.exe: Computer Power Supply Configuration management solution.
371_proxycmd.exe: view the current WinHTTP proxy settings,-d set direct access,-p set proxy server and optional bypass list,-u
You can directly import proxy settings from the current IE browser.
38、q1_rv.exe: displays the application terminal servers available on the network,/domain: domain
Display Terminal Domain Information. By default, the current domain and/address are used to display the Network Node Address and/continue.
After each information is displayed, the screen is not paused. You can use ">" ">" to export the list to a file.
3920.qprocess.exe: displays the process information command, * displays all visible processes, processid displays processid processes, username
Display all processes and sessionnames running on sessionname
Show all processes related to programname,/ID: NN show all processes running at session NN,/Server: servername
Displays the processes,/System displays, and system-related process information of the terminal server to be queried.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.