any intermediate transfer. It indicates that the two machines are in the same LAN. Usage: tracert IP.
V. net
This command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at a
Summary of several network CMD commands most commonly used by Windows http://www.cnblogs.com/sbaicl/archive/2013/03/05/2944001.htmlFirst, PingThe main test is the correctness of the TCP/IP protocol configuration and current network status.The basic usage format for the ping command is: ping IP address/hostname/domain n
the two machines are in the same LAN. Usage: tracert IP.
V. net
This command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at all the sub-
CMD (network command) netstat-a to check which ports are enabled. Use netstat-an netstat-n to check the network connection of the ports, commonly used netstat-an netstat-v to view ongoing work netstat-p protocol name example: netstat-p tcqip to view the use of a Protocol (to view the use of the tcpip Protocol) netstat-s: Check the usage of all Protocols in use. I
Common O m cmd commands and O M cmd commands
@ Echo offset PortNum = 3306for/f "tokens = 15" % a in ('ipconfig ^ | findstr/I/c: "IP Address "') do (set IP = % a) for/f "tokens = 5" % a in ('netstat-ano ^ | findstr "% IP %: % PortNum % "') do (set PID = % a) echo Port Number % PortNum % the corresponding PID is: %
new blank file!
For a programmer, an operating system is not easy to take into account the command line terminal ease of use, learn to use the command line terminal is also a necessary accomplishment of the programmer.In peacetime life really do not need to use these obscure things, but once learned, will become you installed force and improve the quality of life a big weapon!
The use of CMD is far more than that, and we can also use:Ping
user
ARP display, modify the IP address of the local area network-Physical Address mapping list
System Management
At schedule commands and programs to run on a specific date and time
Shutdown immediate or timed shutdown or restart
Tskill End Process
Taskkill End Process (higher than tskill, but no command in version WinXPHome)
Tasklist Show List of processes (not in Window
To become a computer master, you must master eight cmd commands.
1. ping
It is a command used to check whether the network is smooth or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS command that must be m
100 cmd commands commonly used under Windows and 100 cmd commands commonly used for common operations
gpedit.msc-– Group Policy2. Sndrec32 ——-Recorder3. Nslookup ——-IP Address Detector is a command-line tool that monitors whether DNS servers in a network can correctly im
any intermediate transfer. It indicates that the two machines are in the same LAN. Usage: tracert IP.
V. net
This command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at a
ipconfig displaying and modifying TCP/IP settings
MSG sends a message to the user
ARP display, modify the IP address of the local area network-Physical Address mapping list
System Management
At schedule commands and programs to run on a specific date and time
Shutdown immediate or timed shutdown or restart
Tskill End Process
Taskkill End Process (higher than tskill, bu
How many of the eight frequently-used cmd commands on the Internet do you know?
I. pingIt is a command used to check whether the network is smooth or the network connection speed. As an administrator or hacker living on the network, the ping command is the first DOS
--- Windows File ProtectionTsshutdn ------- 60 seconds countdown shutdown commandTourstart ------ XP introduction (roaming XP program displayed after installation)Taskmgr -------- Task ManagerEventvwr ------- Event ViewerEudcedit ------- Word Creation ProgramExplorer ------- open the Resource ManagerPackager ------- object packagePerfmon. msc ---- computer performance monitoring programProgman -------- Program ManagerRegedit.exe ---- RegistryRsop. msc ------- group policy result setRegedt32 ---
Jview.exe > Command-Line loader for Java Java command Line loader
Core components of Krnl386.exe > Core component for Windows 2000 2000
Label.exe > Change label for drives changing the volume label of the drive
Lcwiz.exe > License Compliance Wizard for local or remote systems. License Compliance Wizard
Ldifde.exe > LDIF cmd line manager LDIF Directory Exchange command-row management
Licmgr.exe > Terminal Server License Manager Terminal Services
; Reset an active section reset activity sectionRexec.exe> runs commands on remote hosts running the rexec service. Run the command on the remote computer that runs the rexec service. The rexec command verifies the user name on the remote computer before executing the specified command. The command can be used only after the TCP/IP protocol is installed.Risetup.exe> starts the Remote Installation Service wizard. Run the Remote Installation Wizard serv
the two machines are in the same LAN. Usage: tracert IP.
V. net
This command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at all the sub-
any intermediate transfer. It indicates that the two machines are in the same LAN. Usage: tracert IP.
V. net
This command is the most important one in network commands. You must thoroughly understand the usage of each of its sub-commands, because it is too powerful, this is the best intrusion tool that Microsoft provides for us. First, let's take a look at a
CMD-XP.CMD commands
The command here can be used to query some system information, determine the network quality, and detect the causes of network instability. It is also a commonly used command by hackers. Familiarizing yourself with these commands facilitates your work.
F
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.