Free Essay

Commands (Windows)

In:

Submitted By nishakaar
Words 1063
Pages 5
10 Useful Windows Commands You Should Know….

There are some things you can only do from the command line, even on Windows. Some of these tools don’t have graphical equivalents, while others are just plain faster to use than their graphical interfaces.
We can’t possibly cover all the useful commands you can use in the Command Prompt or PowerShell here. We’ll be focusing on commands that should be useful even if you’re not a command-line person. ipconfig – Quickly Find Your IP Address
You can find your IP address from the Control Panel, but this takes quite a few clicks. The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway — useful if you want to know the IP address of your router’s web interface.
To use the command, just type ipconfig into a Command Prompt window. You’ll see a list of all the network connections your computer is using. Look under Wireless LAN adapter if you’re connected to Wi-Fi or Ethernet adapter Local Area Connection if you’re connected to a wired network.

ipconfig /flushdns – Flush Your DNS Resolver Cache
If you change your DNS server, the effects won’t necessarily take place immediately. Windows uses a cache that remembers DNS responses it’s received, saving time when you access the same addresses again in the future.
To ensure Windows is getting addresses from the new DNS servers instead of using old, cached entries, run the ipconfig /flushdns command after changing your DNS server.

ping, tracert – Troubleshoot Network Connection Issues
If you’re experiencing issues connecting to a website or other network connection issues, Windows and other operating systems have some standard tools you can use to identify problems.
First, there’s the ping command. Type ping google.com and Windows will send packets to Google.com. Google will respond and let you know it’s received them. You’ll be able to see if any packets didn’t make it to Google.com — perhaps you’re experiencing packet loss — and how long it took you to hear back — perhaps the network is saturated and packets are taking a while to reach their destinations.

There’s also the tracert command, which traces the route it takes for a packet to reach a destination. For example, run tracert google.com and you’ll see the path your packet takes to reach Google. If you’re having issues connecting to a website, tracert can show you where the problem is occurring.

For more information about using these commands, read our introduction to troubleshooting Internet connection problems. shutdown – Create Shutdown Shortcuts on Windows 8
The shutdown command is particularly useful on Windows 8. You can use it to create your own shortcuts and place them on your Start screen or desktop, allowing you to more easily shut down Windows without digging through the charms bar or logging out first.
This command can also be used to restart your computer. On Windows 8, you can even use a special switch to restart your computer into the advanced startup options menu. * Shut Down: shutdown /s /t 0 * Restart: shutdown /r /t 0 * Restart Into Startup Options: shutdown /r /o

recimg – Create Custom Recovery Images
The Refresh Your PC feature on Windows 8 allows you to restore your computer’s system state to its original state — either from a clean Windows install or as the computer came from its manufacturer. You can create your own custom recovery images, but this feature is hidden — you have to do it with the recimg command from a command line. This allows you to remove manufacturer-installed bloatware or add your favorite desktop programs to your recovery image.
For more information about using recimg, read our overview of everything you need to know about creating and using custom recovery images on Windows 8.

wbadmin start backup – Create System Recovery Images
Windows 8.1 removes the Windows 7 backup interface, which allowed you to create system backup images. These system images contain a complete snapshot of every single file on the system, so they’re different from Windows 8’s recovery images.
While the graphical interface has been removed, system administrators and geeks can still create system image backups by running the wbadmin start backup cmdlet in a PowerShell window. Unlike all the other commands here, this command-line tool must be run from within PowerShell, not the Command Prompt.

sfc /scannow – Scan System Files for Problems
Windows includes a system file checker tool that scans its system files and looks for problems. If system files are missing or corrupted, the system file checker will repair them. This may fix problems with some Windows systems.
To use this tool, open a Command Prompt window as Administrator and run the sfc /scannow command.

telnet – Connect to Telnet Servers
The telnet client isn’t installed by default. You’ll have to install it from the Control Panel. Once installed, you can use the telnet command to connect to telnet servers without installing any third-party software.
You should avoid using telnet if you can help it, but if you’re connected directly to a device and it requires that you use telnet to set something up — well, that’s what you have to do.

cipher – Permanently Delete and Overwrite a Directory
The cipher command is mostly used for managing encryption, but it also has an option that will write garbage data to a drive, clearing its free space and ensuring no deleted file can be recovered. Deleted files normally stick around on disk unless you’re using a solid state drive. The cipher command effectively allows you to “wipe” a drive without installing any third-party tools.
To use the command, specify the drive you want to wipe like so: ciper /w:C:\

netstat -an – List Network Connections and Ports
The netstat command is particularly useful, displaying all sorts of network statistics when used with its various options. One of the most interesting variants of netstat is netstat -an, which will display a list of all open network connections on their computer, along with the port they’re using and the foreign IP address they’re connected to.

This isn’t a comprehensive list of all the commands you might find useful, but we hope it’s given you some idea of the many powerful tools lurking under the surface. Linux isn’t the only operating system where users can benefit from learning some commands.

Similar Documents

Premium Essay

Basic Commands in Linux and Windows

...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................

Words: 2543 - Pages: 11

Free Essay

Respect

...Discipline is the glue that holds a combat team together. Without it there is no unit cohesion, no espirit de corps, no coordination. However, discipline is a complex product of training, leadership, and respect. It is respect which creates devotion to the team, and the important part is that that respect flows both up and down the chain of command. A leader respects the skills, strengths, and sacrifices of the people who work for him, and by giving that respect, in time and with effort, his troops come to respect him as well. That respect grows into devotion: the devotion of the leader to his troops, to do his best to see them through tough times and bring them home to their families, and the devotion of the troops to accomplishing the tasks of their unit under the vision of their leadership. Disrespect, however, has exactly the opposite effect. If a leader disrespects his troops, he fails to earn their respect and therefore fails to create devotion to the team. His attitude will be noticed and will become detrimental to morale, which in turn will hurt the combat effectiveness of each troop as well as the whole. Because he cannot respect his troops, he will also fail to recognize their true strengths and employ his forces to the best of their respective abilities. If, on the other hand, a troop fails to form respect for ANY leader, no matter how good that leader is at their job, then that troop forms a sort of uprising point... a point of discontention that saps unit...

Words: 508 - Pages: 3

Free Essay

M-1 Sfc Sharp

...Apply the Ethical Decision Making Method at Small Unit Level 158-C-1230 FM-1 FM 6-22 AR 600-100. Performance Steps: 1. Clearly define the ethical problem. SFC Sharp failed to shred secret documents that he personally marked as shredded. SGT Day is trying to cover for SFC Sharp and is encouraging me to look the other way. 2. Employ applicable laws and regulations. The unit commander and the unit’s standard operating procedure will determine if the documents were mishandled. SFC Sharp recorded the destruction of the book theses pages were from but the commander and proper personnel can determine if misconduct occurred. My responsibility is to report any questionable or unsafe acts. 3. Reflect on the ethical values and their ramifications. FM 1-60 States: “The Army is a values-based organization (Loyalty, Duty, Respect, Selfless Service, Honor, Integrity, Personal courage). It upholds principles that are grounded in the Constitution and inspire guiding values and standards for its members.” FM 1-61 builds on the value based ethics by stating: “The Army Values are the basic building blocks of a Soldier's character...

Words: 565 - Pages: 3

Free Essay

Mac Keyboard Shortcuts

...For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Shift ⇧ Option ⌥ Control ⌃ Caps Lock ⇪ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command. In some apps, you can undo and redo multiple commands. Command-A Select All items. Command-F Find: Open a Find window, or find items in a document. Command-G Find Again: Find the next occurrence...

Words: 2262 - Pages: 10

Free Essay

Asdfasdgasdfasdf

...Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages, AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID, AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager, ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|8, Control|24, Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet, DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander, ExpertRender, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process, HDpack, Home-to-Hollywood, ...

Words: 13199 - Pages: 53

Free Essay

Homework

...1. Command used, "whatis ls". The purpose of ls is to list directory contents 2. Command used, "man date". The -R option outputs RFC-2822 complaint date string when used with the date command. 3. Command used, "man clear". Other commands shown from this output in the text were tput and terminfo. 4. Command used, "cal 8 1991". I was born on Friday, August 2nd, 1991. 5. Commands used, "cal 2 20XX (XX being 06 through 15)". By looking for which years contained February 29th, I determined (confirmed) that 2008 and 2012 are both leap years. 6. Commands used, "clear" and "man date". Determined that option -u, --utc, and --universal for the date command will display todays date in UTC. 7. Command used, "date -u". As of right now, todays date and time as displayed from the ouput is Mon Jan 18 21:58:55 UTC 2010. 8. Commands used, "cat > month" and "cal 1 2010 >> month". I used "cat > month" to create a file called month and then " cal 1 2010 >> month" to add information to the existing month file with the current month. 9. Command used, "more month". This command displayed the contents of the month file created in Exercise 8, displaying January of 2010. 10. Commands used, "who -u >> users_info" and "more users_info". The "who -u >> users_info" command input information about idle time for users currently logged into into the file called users_info. The "more users_info" command displayed the contents of this file. 11. Command used, "more month users_info". This displayed the...

Words: 855 - Pages: 4

Free Essay

Principles of Management

...Introduction Fayol’s 14 principles derive from the circumstance that Fayol felt that management was not well defined. In his striving to change this circumstance he suggested “some generalized teaching of management” to be a main part of every curriculum at places of higher education and even beginning in “primary schools” . Fayol’s dedication to this idea is demonstrated by the fact that after retirement he went on to not just write books about management ideas, but more importantly, he found the Centre For Administrative Studies (CAS) in 1917 in Paris . The CAS mainly functioned as a centre of discussion between professionals from a large variety of professions, in order to further the knowledge and understanding of management principles. Discussion is what Fayol had in mind, when he presented his 14 principles . In Fayol’s own words: “Are they [the principles] to have a place in the management code which is to be built up? General discussion will show”. In the following I will discuss each of his principles under the aspect of a comparison with examples, historic or modern, and in relation to other theoreticians of management, in order to examine how Fayol’s principles hold up as “management code” today. Principle 1: Division of work The idea of division of work, or as Adam Smith called it “division of labour”, in 1776 probably goes back to the beginning of work itself. Fayol recognizes this in considering specialization as part of “the natural order” comparing...

Words: 4716 - Pages: 19

Free Essay

Huck Finn Essay

...to add 500 gold, it would be entered as: player.additem 00000f 500 Targeting To target an object, open the console and click the object. Its name will appear about center screen. An item targeted in the console is also called a reference. A target may also be selected using the PRID command and the target's Reference ID. Short Code or Prefix Required Short code refers to a code having a short form that can be used interchangeably with the Long form. * ToggleFogOfWar is the long code form. * TFOW is the short code form. Prefix Required refers to a code needing a prefix to work as intended. * SetHealth <#> will set the max health of the target selected by clicking or the PRID command to <#>. * Player.SetHealth <#> will set your max health to <#>. Subpages Alchemy | Armor | Items | Food and Drinks Potions and Poisons Ingredients | Heavy Light Clothing Jewelry | Books Keys Miscellaneous Soul Gems | Weapons | Magic | Other | Arrows Blades Blunts Bows Staves | Spells Diseases Enchantments Perks Shouts Skills | Actor Values Batch Lists Characters Factions Locations Weather | Toggle commands Command | Effect | rm | Toggle Run Mode. Will switch between run mode and walking mode. Same function as <Caps Lock> key. | tg | Toggles grass | ts | Toggles display of skybox and fog. | TLL | Toggles LOD | TIM | Toggle Immortal Mode (Still take damage, health will never...

Words: 2661 - Pages: 11

Premium Essay

Nt1210 Intro to Networking Lab 5.4

...(starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise 5.4.4 If your local machine (node A) is not connecting to any other hosts on the network, what two commands will give you information on whether...

Words: 344 - Pages: 2

Free Essay

Special Effecr

...their center. Useful. Option key (Alt) - point on a path between any two points while pressing option. Path will be stretch as you move the pointer. Sometimes useful. Option key (Alt) - when pressed, you can select any object in the group. Very useful. To edit a text block in a group you don't have to use Option, just insert text cursor and edit. Option key (Alt) - when pressed, you can click on any object and drag it to create a copy of this object. You can't however, copy groups this way. Option key (Alt) - when in text-editing mode, you can position cursor between any two letters, press Option and right-arrow or left-arrow keys to increase or decrease tracking. Note: you can combine Shift, Control and Option in many cases. Command key - when pressed, arrow for selection appears. When depressed returns to the last selected tool. Useful when you forget to select a point or an object. Space bar - when pressed, little hand appears, allowing you to move...

Words: 385 - Pages: 2

Free Essay

Dsdsadasas

...------------------------------------------------- Superior orders From Wikipedia, the free encyclopedia   (Redirected from Superior Orders) Superior orders, often known as the Nuremberg defense, lawful orders or by the German phrase "Befehl ist Befehl" ("orders are orders"), is a plea in a court of law that a person, whether a member of the armed forces or a civilian, not be held guilty for actions which were ordered by a superior officer or a public official.[1] The superior orders plea is often regarded as the complement to command responsibility.[2] One of the most noted uses of this plea, or "defense," was by the accused in the 1945–46 Nuremberg Trials, such that it is also called the "Nuremberg defense". The Nuremberg Trials were a series of military tribunals, held by the main victorious Allied forces after World War II, most notable for the prosecution of prominent members of the political, military, and economic leadership of the defeated Nazi Germany. It was during these trials, under the London Charter of the International Military Tribunal which set them up, that the defense of superior orders was no longer considered enough to escape punishment; but merely enough to lessen punishment.[3] Historically, the plea of superior orders has been used both before and after the Nuremberg Trials, with a notable lack of consistency in various rulings. Apart from the specific plea of Superior Orders, discussions about how the general concept of superior orders ought to...

Words: 2164 - Pages: 9

Free Essay

Command Design Pattern

...Command Design Pattern Agenda * What is the Command Desgn Pattern (CDP) * Object Interaction and Command Object Hierarchy * Command Pattern generic UML * Recorded demonstration * Java example code * What are the benefits/drawbacks of the CDP The intent of this presentation is to provide a walk through and recorded demonstration of the command design pattern. What is the Command Design Pattern? * A Behavioral design pattern * An object is utilized to represent and encapsulate information * The information includes method name, object owning method, and method value parameters * The information can be called immediately or at a later time The command pattern is a behavioral design pattern in which an object is utilized to represent and encapsulate information (Banas, 2012). The interesting thing about the command design pattern is that it can allow one to store lists of commands which can be called immediately or at a later time. What is the Command Design Pattern? * Client specifies which command to run when the execute() method is invoked on one of the encapsulated methods * An object named “Invoker” transfers the Command to a separate object named “Receiver” which executes the correct code The command pattern allows the client to determine which command to run when the execute method is invoked in the command interface (Kuchana, 2004). After the command is “invoked” to execute, he concrete command that is identified transfers...

Words: 1146 - Pages: 5

Free Essay

Networking

...APPENDIX vi Commands |Insert and replace | |i |insert before cursor | |I |insert at beginning of line | |a |append after cursor | |A |append after end of line | |o |open blank line below cursor to insert | |O |open blank line above cursor to insert | |r |replace current character | |R |replace characters at cursor position | |C |change rest of line beginning at cursor position | |ESC |quit Text-input mode and return to vi-command mode | |Operators | |x |delete character(s)at cursor ...

Words: 363 - Pages: 2

Free Essay

It320 Assignment 2

...1. O IOS 2. L command-line interface (CLI) 3. I user EXEC mode 4. R privileged EXEC mode 5. S global configuration mode 6. A interface configuration mode 7. N routing protocol configuration mode 8. Q IOS image 9. B feature set 10. C ROM monitor /ROMMON 11. T boot ROM 12. D power-on self test (POST) 13. G bootstrap 14. J configuration register 15. U boot field 16. H boot system command 17. M setup mode 18. F host name 19. P console password 20. E enable password 21. K command recall Concept Questions Pg. 24 1. Attach a rollover cable to the PC’s COM port and then use either the Console port or the Auxiliary port on the router. The Console port is preferred because messages from the router are logged on this line. The second way is to use the Auxiliary port for remote access and can also be used if the Console port is damaged or not responding. The third way to access the CLI is through Telnet. 2. The user EXEC can only use a certain amount of commands and the user EXEC can’t configure anything on the router. The privileged EXEC can use every command and can configure the router anyway that person wants. 3. First it’s the platform in which the image runs on, second is the special features that are supported in the image, and last is where the image runs or whether it’s become a zipped or compressed file. 4. ROMMON is not IOS, so it doesn’t accept IOS commands, and it cannot route...

Words: 354 - Pages: 2

Free Essay

Lab 4.1: Using Linux Command-Line Basics

...Labs Lab 4.1: Using Linux Command-Line Basics What is the purpose? This lab demonstrates how to redirect data from a process and how to identify and kill a process. What are the steps? • Task 1: Redirecting and piping standard output Procedure 1. Obtain a list of files from the home directory, including the hidden files. Redirect the output to a file named Listing by using the ls -a > listing command. 2. Obtain a long list of files, including the hidden files, and append the output to the same file. 3. Use the cat listing | less command to view the file and pipe the output to less. 4. Use the cat command to view the file again. However, this time, pipe the output to lpr to print the file. 5. Redirect the output of ls to the special file /dev/null. What happens? It’s redirected to dev/null Why? It’s null. • Task 2: Putting tasks in the background and terminating the job Procedure 1. Use the tail –f command to view your listing file from the previous task. The –f option tells tail to follow changes; therefore, the file will continue to run this command until you cancel the command by pressing Ctrl+C. Put the file in the background using the tail -f listing & command. You may need to press Enter again to view the command prompt. 2. Put the process in the background and display the prompt again. Run the top command in the foreground. This will provide you a list of your top 20 processes by CPU usage. Put this list in the background and stop it by pressing...

Words: 780 - Pages: 4