Tag:addexcestartrgs is intoutputclicklse Sub nbtstat (ByVal IP as String)Dim Strrst, StrRst1, StrRst2, strRst3 as StringDim N1, N2, N3 as IntegerTryDim p as New process () ' can be used with processp.StartInfo.FileName = "cmd.exe"P.startinfo.useshellexecute = FalseP.startinfo.redirectstandardinput = TrueP.startinfo.redirectstandardoutput = TrueP.startinfo.redirectstandarderror = TrueP.startinfo.createnowindow = TrueP.start ()Application.doevents ()P.
64-bit Win7 system nbtstat problem, 64-bit win7 system nbtstat
Write in a 32-bit system:"Cmd/c C: \ Windows \ system32 \ nbtstat.exe-a 192.168.44.1"Yes, but in 64-Bit mode,
C: \ Windows \ system32 \ nbtstat.exe cannot be found in the program.Is the cause of the 64-bit system. Change the command to "cmd/c C: \ Windows \ sysnative \ nbtstat.exe-a 192.168.44.1 ".
uses a straight path containing three CIDR blocks:
Route add 209.98.32.33 mask merge limit 202.96.123.250 metric 3
· Route deleteUse this command to delete a route entry from the route table. Example: route delete 209.98.32.33
NBTStat
Use the nbtstat command to release and refresh the NetBIOS name. The
After five sections of the explanation, we must have a more clear understanding of wins, the last part of this series briefly discusses the use of the nbtstat command. Nbtstat, full name NBT (NetBIOS) status, is a literal description of the NetBIOS status command. And this command
following example, you can change the data route to another vro, which uses a straight path containing three CIDR blocks:
Route add 209.98.32.33 mask merge limit 202.96.123.250 metric 3
· Route Delete
Use this command to delete a route entry from the route table. Example: Route Delete 209.98.32.33
NBTSTAT
Use the nbtstat
or machine name, you can use the nbtstat command to further get the other party's information, which adds to our invasion of the safety factor.Three, NetstatThis is a command to view the status of the network, easy to use and powerful.-A View all open ports of the local machine, can effectively discover and prevent Trojan Horse, can know the service that the mac
Write in 32-bit system: "cmd/cC:\\Windows\\system32\\nbtstat.exe-a192.168.44.1" Yes, but in 64 bits,C:\\windows\\system32\\nbtstat.exe in the program, is not found.is the cause of the 64-bit system, change the command to "cmd/c c:\\windows\\sysnative\\nbtstat.exe-a 192.168.44.1" on it.The Magical Sysnative folderIn fact, the%windir%\sysnative folder does not exist, it is only a 64-bit Windows system provides a redirection mechanism. We already know t
. If we use the ping command to test and verify the connectivity from this computer to the host whose IP address is 10.0.0.99, the ARP cache displays the following items:
Interface: 10.0.0.1 on interface 0x1
Internet address physical address type
10.0.0.99 00-e0-98-00-7c-dc dynamic
In this example, the cache item indicates that the remote host located in 10.0.0.99 is resolved to the Media Access Control Address of 00-e0-98-00-7c-dc, which is a
Interface IP configuration
This is a way of interacting with each other.
We can enter the command directly:
"netsh interface ip add address ' local area Connection ' 10.0.0.2
255.0.0.0 "
To add an IP address.
If you do not know the grammar, it does not matter Oh!
At the prompt, enter? We can find the answer. Convenient inconvenient ah?
It turns out that there are some things that people like about Microsoft. Alas, very few of them!
Windows Networ
address of arp-s can be manually entered into the ARP cache. The project remains valid during the computer boot process, or when an error occurs, the manually configured physical address automatically updates the project. Arp-d IP can use this command to manually delete a static project. Now we can use the ipconfig and ping commands to view our network configurations and determine if they are correct. We can use netstat to view the connections establ
use this command to change the data destination. In the following example, you can change the data route to another vro, which uses a straight path containing three CIDR blocks:Route add 209.98.32.33 mask merge limit 202.96.123.250 metric 3Route Delete -- Use this command to delete a route from the route table. Example: Route Delete 209.98.32.33
NBTSTAT
The
provides remote boot for Windows XP and Windows 2000 client computers.This command is available only when the Internet Protocol (TCP/IP) is installed as a component of the network adapter attribute in a network connection.ExampleTo transmit the file users.txt to users19.txt on vax1 from a local computer, type:TFTP vax1 put users.txt users19.txtNBTSTATDisplays NetBIOS statistics, NetBIOS name table, and NetBIOS name cache for local and remote computer
Memcached Set store commandThe Memcached set command is used to store value (data value) in the specified key (key) .If the set key already exists, the command can update the original data corresponding to the key, that is, the role of the update.Grammar:The basic syntax format for the SET command is as follows:Set[noreply] The parameters are described as foll
Windows Network Command line program
C:\>nslookup www.jb51.net
Server:www
address:192.168.5.8
Non-authoritative Answer:
Name:www.jb51.net
address:202.103.69.64
This section includes:
Shi
Use Ipconfig/all to view configuration
Use Ipconfig/renew to refresh the configuration
For DHCP-enabled Windows 95 and Windows 98 customers, use the release and renew options for the winipcfg command, instead of the ipconfi
Use the mkdir command to create directories and subdirectories under Linuxnow that we've listed the entries in the directory with the LS command, we're going to learn how to create a directory under a Linux system. Under Linux, we can use the mkdir command. MKDIR is the acronym for Make directory. What is mkdir?Mkdir is a co
Tags: Linux daily operation and maintenance management skillsw command: View system loadWLoad average the number of active processes that use CPU activity during the unit timeTo view the number of system CPUs (logical CPUs)Cat/proc/cpuinfo(When our process does not exceed the number of logical CPUs in our system per unit of time, it is the optimal state,When our process is larger than the CPU, be aware of what is taking up our CPU.Vmstat
Tags: sort_wc_uniq shell tee_tr_split cutNote content:L 8.10 Shell special symbol cut command L 8.11 sort_wc_uniq command L 8.12 tee_tr_split command L 8.13 Shell special symbol Note Date:2017.8.168.10 Shell special symbol cut command Special symbols:1.* Any arbitrary character wildcard a wildcard650) this.width=650;
Linux Command (1): ls command, linux Command ls
The ls command is the most commonly used command in linux.
The ls command is short for list. By default, ls is used to print the list of the current directory. If ls specifies other
returned value of TTL, You Can preliminarily judge the operating system of the host to be pinged. The reason for this is "preliminary judgment" is that this value can be modified. Here, TTL = 32 indicates that the operating system may be Win98.
(TIPS: If TTL = 128, the target host may be Win2000; If TTL = 250, the target host may be UNIX)
The ping command can be used to quickly locate LAN faults, quickly search for the fastest QQ server, and Ping a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.