3 pagesPart 1 dos OverviewChapter 2 dos OverviewBefore reading this book, you must first understand what DOS is. This chapter first briefly introduces the DOS Operation SystemAnd briefly introduces the operating system history to explain the
As dos, it should be said that it is the only way for new users to go without talking about network security or system operations.
Recently, a friend strongly urged me to write a DOS tutorial. If you want to write a DOS tutorial, you have nothing
With the popularization of computers and networks, networking operations between computers (such as file transmission, chatting, etc.) and internet networks are becoming more and more important. Since DOS has so many users, how can you use it to
With the popularization of computers and networks, networking operations between computers (such as file transmission, chatting, etc.) and internet networks are becoming more and more important. Since DOS has so many users, how can you use it to
Code
Red) virus and the upgraded version of Nimda (Nimda) virus are rampant on the Internet. The small worm virus has infected millions of servers and PCs around the world and has forced websites in batches.
Closed, network interruptions or LAN
What is DoS attack?
DOS is denialService. DOS refers to the defect of the intentional attack network protocol or the cruelly depletion of the resources of the attacked object through brutal means, in order to make the target computer or network
DOS Base Command
CD Change current directory sys make DOS system disk
Copy copy file del Delete file
deltree delete directory tree dir column file name
diskcopy disk Edit Text Edit
Format formatted disk MD to establish subdirectories
Mem View
There are many commands and parameters that are not exposed in the DOS system. I've been collecting and sorting out a lot. Because there are several kinds of DOS, the following only takes MS-DOS as an example to describe the commands and parameters
The format of the DIR command:
dir [D:][path][name][[/a][:attrib]][/o:[sorted][/s][/b][/l][/c[h]
(1) Dir/a:attrib default contains all files (System files. hidden files)
Attrib[:][h/-h] Displays only hidden or not suppressed files.
[R/-r]
Because of the popularity and application of computer increasingly in-depth, in order to meet the needs of people, the computer's function with its development has become more and more powerful, more and more hardware equipment, such as from the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.