Cmd.exe is a command extension interface that can be used outside the system to execute any executable program under the environment variables of the system. The operation is similar to the previous MS-dos, however, the function is more powerful than MS-dos.
Although learning is a little abstract, we only need to lay a good foundation for MS-dos and it is easy to get started. If you are unfamiliar with the doscommand, let's take a look at the doscommand and then read this article, as shown in figure
If the one who is a system expert before the article goes through the page, I will not talk nonsense much. Please refer to the following:
1. External commands:
1. atmadm.exe: Open the ATM Call Manager.-C indicates that all connections are listed,-s indicates that only statistics are displayed, and-a indicates that all registered connection addresses are listed.
2. arp.exe: Command Used to view and modify the local ARP table, /A displays the current network interface and the current ARP table,/d deletes the ARP table of the specified IP address, and/s adds the ARP table with the IP address and MAC address specified. The ARP command is usually used to ping the IP address of the peer or gateway.
3,
Attrib.exe: file attribute settings. + indicates setting attributes,-Indicates canceling attributes,/s indicates setting the current directory and subdirectory files (Wildcards are supported), And/d Indicates setting folders (wildcard configuration is supported ).
, Set the following options: A archive attribute, s system attribute, H hidden attribute, R
Read-only attribute. For example, to add system and hide properties to all directories and subdirectories of C:/Windows, run the following command: attrib + S + d c:/Windows/*. */s.
/D.
4. auditusr.exe: sets the audit policy for each user, /Is successfully added or changed policy audit,/if addition or change failed policy audit,/R delete all security policy reviews,/RA delete all user policy reviews,/e Delete the current user policy review configuration export to file,/I import from file to user policy review configuration.
5. blastcln.exe: Microsoft's malicious program removes the command line program tool. It only has the/V parameter, after running, the system service, system program, Registry Startup item, file name damaged or lost by viruses, and so on will be detected. A report is provided after detection.
6. boot.exe /? See its help for Chinese command parameters.
7. cacls.exe: a command line program that sets file or directory permissions./T changes the command execution result to the current directory and all subdirectories./C
Force Command Execution ignore error prompt,/g User: perm gives the user the specified access permission, Perm can read for R, W write, c Change, f full control,/P
User: perm replaces the specified access permission of the user. Perm can be n-free, R-read, W-write, C-change, F-full control,/d user
Deny Access From a specified user. In the preceding parameters, user indicates the specified user name. The command is simple and will not be used as an example.
8. chkdsk.exe: disk check command. Important Parameters include:/F fixing disk errors,/R searching for incorrect information on fat, and trying to restore,/x
Remove the volume label, add this parameter when the command cannot be completed successfully,/I checks fat for a smaller intensity,/V
Skip the loop check of the folder structure. The last two parameters can only be applied to a disk in NTFS format. For example, we want to fix E: the lost files can be chkdsk/F/R/X/V
E: this command.
9. chkntfs.exe: the disk check Command automatically loaded during system strength./I: time indicates the time to wait for the disk check to be skipped./x
Set partitions that are not checked when the computer starts, And/C sets partitions that must be checked when the computer starts. If an error is found on the partition, The chkdsk command and/d
Restores the changes made to the command to the default state. The purpose of this command is that we often see that an illegal shutdown is a computer's self-check. If we are idle, we can use CHKNTFS/x C: D:
E: F :............ Skip this command.
10. cipher.exe: advanced operating program for EFS file encryption./e encrypts the specified directory. In the future, the files added to this directory will be automatically encrypted./d
Decrypts a specified directory, and will not be automatically encrypted when files are added to the directory in the future./s will operate on the specified directory and all its subdirectories, And/I will ignore errors, force encryption, decryption,/F
Ignore all encrypted files in the directory and perform encryption operations,/K
Create a new key for the user. This parameter cannot be mixed with other parameters./R: filename is the recovery proxy and Certificate file generated by the encrypted user, so that multiple users can view the encrypted file,/u
Try to find All EFs encrypted files on the local hard disk. If the user's encrypted key or certificate file is not available, it will reset with the current password,/n
It can only be used with the/u parameter at the same time. The function is not to change the key or certificate password,/W
This process is similar to file crushing. This parameter cannot be used with other parameters
Back up the keys and certificates of EFS encrypted files. This is a very practical command and I hope you can use it skillfully.
111_comp.exe: file comparison command. The main parameter/D is used to display different parts of the file in decimal format, And/A uses ASCII characters to display different parts of the file, for example, comp C:/boot. ini c:/boot1.ini/.
12、compact.exe: The File compression program on the NTFS drive./C: compresses the specified file or folder, and the files added to the directory will also be compressed,/u
Decompress the specified file or directory, and the files added to the directory will not be compressed later,/s will execute command operations in the current directory and all its subdirectories,/I
Ignore errors, force compression,/F ignore compressed files, and force compression.
13w.convert.exe: partition format conversion command, which can convert FAT32 to NTFS format,/Fs: NTFS to NTFS format,/x
Remove the volume label for conversion./V runs the command in detail in the converted partition or volume. For example, we want to convert I: the disk is in the NTFS format, and the command is convert I:
/Fs: NTFS/X/V. Then we can see that the command is executed quickly. At this time, the computer cannot be powered off.
142.16defrag.exe: Command Line version of Windows fragment program.-A only analyzes and does not sort
When the disk space is insufficient, force sorting. This parameter should be used with caution and-V should display the results of fragment. For example, we sort out the drive I:, the command is defrag/S/V
I: The speed is faster than that of the fragment program in the GUI. You can also learn about the fragment status of the drive in detail.
152.16diskperf.exe: disk performance counter./Nd: Disable the disk performance counter on the physical drive and/nV disable the disk performance counter on the logical drive.
16.0doskey.exe: Set the macro command in cmd. Please use /? Query specific parameters. You can set the definition of shortcut keys in cmd, such as F7, F8, F9, and F10.
17. diskcomp.com: compare two floppy disks.
18. diskcopy.com: a command to copy a floppy disk.
192.16eventcreate.exe: System Log creation command,/s remote operating system to be connected;/L specifies the event log for the event to be created;/I specifies the type of the event to be created, valid values include error, warning, and information./d specifies a description for the newly created log.
2018.expand.exe: extract one or more cab package files. Remember the two parameters and/d displays the file list of the source file,/F: files extracts the files used from the specified cab file.
21、ipxroute.exe: Source Route Selection controller.
22、ipconfig.exe: displays the current TCP/IP configuration protocol command. Without parameters, the configuration of the current local connection and/All are displayed.
Display All TCP/IP configurations and protocols, including DNS and public ip,/Renew refresh IP address parameters assigned by HDCP,/release
Release the current HDCP value and disable the local TCP/IP protocol.
23most label.exe: disk volume label operation. There is basically no parameter to say.
24、logman.exe: Manages Performance Logs and alarm services. For details about the parameters, see /?.
25.0logoff.exe: log out of the system./Server: servername indicates the terminal server to be logged out. If no parameter is added, the server is logged out.
26w.mountvol.exe: disk mount point Operation Command./volumename specifies the name of the target volume to be loaded,/d deletes the volume from the specified directory, and/L lists the name of the volume already loaded in the specified directory.
272.16mqbkup.exe: Backup and Restore commands in bits.-B backs up the file to the specified path and-R restores the file backed up 2 from the specified path.-y does not require you to directly execute the command.
28w.msg.exe: Lan message sending command. Username specifies the user name and message
Sent message,/Server: Specifies the server on which the message is to be sent. For example, if you want to send "are you" to the Administrator on 192.168.1.2
Ready ", command: MSG/Server: 192.168.1.2 administrator" Are you ready ".
29w.msiexec.exe: MSI Format File installer,/I installation and configuration installer,/X uninstall the installed MSI program,/
Perform operations on the MSI installer on the network, and/quiet is directly installed and/Passive without user negotiation.
Unable to participate in the mode. During operations on the MSI file, only the progress bar and/norestart programs are displayed.
30、move.exe: indicates the file movement command./y cancels the confirmation message when the file is changed, And/-y prompts the operator whether to confirm when the file is changed.
31. more.com: Command for displaying large text files.
32w.netstat.exe: used to display statistics of TCP, IP, UDP, and ICMP protocols and current network connections./A is used to display all current connections and listening ports, And/B
Display the executable program for creating each connection. Note that this parameter takes a long time and sufficient permissions, and/e displays Ethernet information. This parameter can be used in combination with/s testing,/n
The IP address and port number are displayed as numbers, And/o displays the process PID values related to each connection,/P
Displays the specified protocol connection. The protocol can be TCP, UDP, tcpv6, and udpv6. This parameter can be used together in/s,/R displays the route table,/s
Displays statistics by protocol. Displays all information about IP, IPv6, ICMP, ICMPv6, TCP, tcpv6, UDP, and udpv6.
When used together with/B, All executable program creation and connection components can be displayed. For example, you can use netstat to display the current network information and port monitoring status in detail.
/Abnov command to view.
33、openfiles.exe: list or interrupt opened files on the local or remote system. For more information, see /? Query. The reason for the length is not listed.
342.16pathping.exe: test the connectivity of the network path./g host-list releases the host list of the sending source and/h maximum_hops.
The maximum number of hops of the target, the source address specified by/I, And/o do not determine the host address name, or the connection time of/P period waiting for Ping, in milliseconds,/Q Mum
Queries records the timeout time for each of the queried hops and/W waiting for each semi-connection. Unit: millisecond,/P connectivity between the test and rsup,/t
Test the connectivity of each hop in the base layer with priority connection.
3520.ping.exe: test the network connectivity. The/T command is run continuously on the host of the other party until the host is interrupted manually. We can use Alt + C to combine the command to interrupt the host, or press Ctrl
+ The break is suspended and/A performs domain name resolution when executing the command. For example, if we do not know the IP address of a website, we can directly add this parameter to ping its URL.
36366power0000.exe: Computer Power Supply Configuration management solution.
371_proxycmd.exe: view the current WinHTTP proxy settings,-d set direct access,-p set proxy server and optional bypass list,-u
You can directly import proxy settings from the current IE browser.
38、q1_rv.exe: displays the application terminal servers available on the network,/domain: domain
Display Terminal Domain Information. By default, the current domain and/address are used to display the Network Node Address and/continue.
After each information is displayed, the screen is not paused. You can use ">" ">" to export the list to a file.
3920.qprocess.exe: displays the process information command, * displays all visible processes, processid displays processid processes, username
Display all processes and sessionnames running on sessionname
Show all processes related to programname,/ID: NN show all processes running at session NN,/Server: servername
Displays the processes,/System displays, and system-related process information of the terminal server to be queried.