Thursday, September 3, 2009

Hyderabad, September 03: A powerful Indian politician and four other people were killed when their helicopter crashed in the dense jungles of southern India during a pounding rainstorm, media reported.

The helicopter carrying Andhra Pradesh state Chief Minister Y.S.R. Reddy, 60, lost contact with air traffic controllers Wednesday morning as heavy rains pelted the region, setting off a frantic 24-hour search operation involving the army, air force and police in an area infested with Maoist rebels.

On Thursday morning, commandoes and police finally reached the site of the crash after hacking through the jungles and found the bodies of all five people who had been on the aircraft, including Reddy, Press Trust of India reported, quoting officials from the ruling Congress Party.

Television also reported that five bodies had been found at the site about 170 miles (275 kilometers) south of the state capital, Hyderabad. There was no immediate official confirmation of Reddy’s death.

On Thursday, rescue teams crossing dense jungle and hilly terrain on foot reached the site, 8 kilometers (5 miles) from the nearest village, Rudrakodur.

There was no immediate indication that the helicopter was shot down.

The privately owned helicopter took off from Hyderabad and lost contact with air traffic controllers about 45 minutes into the flight.

Reddy, who was on an inspection tour of various rural social welfare programs, was accompanied by a bodyguard, two officials and a photographer.

Reddy, who belongs to Prime Minister Manmohan Singh’s ruling Congress Party, had won a second term in office in elections held this year.

The rebels, who say they are inspired by Chinese revolutionary leader Mao Zedong, have been fighting for more than three decades in several Indian states, including Andhra Pradesh, demanding land and jobs for agricultural laborers and the poor.

While the militants have a great deal of power in parts of rural India, they have little day-to-day control outside of isolated forests and villages.

More than 6,500 people have been killed in the violence.

From Wednesday till now -

- The chopper took off at 8.45 am for Chittoor and was scheduled to arrive at 10.45 am. Earlier reports suggested that the chopper had landed in the middle of thick forest, said to be affected by the Maoist activities.

- Air Traffic Control (ATC) sources said the chopper went off the radar due to heavy rains. The helicopter lost contact with Air Traffic Controller at the Begumpet Airport in Hyderabad and since then there has not been any contact with the Chief Minister.

- There has been no contact with the Andhra Pradesh Chief Minister, whose helicopter has been missing since 9:30 am after he took off from Hyderabad Wednesday monring, Home Ministry sources said earlier. "There has been no contact established with the helicopter," sources in the ministry said. Helicopters involved in the search had been called back due to bad weather but foot search will continue. 600 CRPF jawans were deployed for the search operation.

- Massive search operations were launched with seven Air Force helicopters and 5000 CRPF personnel pressed to find the Chief Minister and others aboard the chopper.

- Search operations were aborted because of bad weather in the area, which in any case is a challenge due to dense forest. The area is said to be infested with Naxals and Tigers.

- The air-search operations began at 6.00 to 6.30 on Thursday morning and there are reports of YSR's chopper being located. There is no news of survivors yet.

Monday, August 24, 2009

Removing Entries from Right-Click Menu

Sometimes, instead of adding entries, maybe your right-click menu has become too big. Eventually right-click menu’s (like mine) can take forever to load. If you would like to, you can definitely remove some of those useless options. Ready for a faster right-click menu? Let’s do it!

Step 1: Go to “Start,” “Run,” and type regedit.

Step 2: Navigate to HKEY_CLASSES_ROOT\*\shellexe\ContextMenuHandlers

Step 3: Find the folder that indicates the entry in the start menu and right-click. Select “Remove.”

Remove Entries for Certain File Types

Maybe your right-click menu has become way too long, and takes forever to load (like mine). If you would like to only remove entries for certain file types, simply go to the Folder Options menu like we did before and you may do the following:

Step 1: Go to “My Computer.” Click “Tools” and then click “Folder Options.”

Step 2: Click on the tab labeled “File Types.”

Step 3: Find a file type and select it.

Step 4: Find one of the entries and select “Remove.”

Now go out there and tweak!

More tweaks next time in WinHacks!

Adding Entries for Certain File Types in Right-Click Menu

Sometimes you may have a certain file type, e.g. .doc (Word document) that you would like to do something special with, e.g. open .doc as an email attachment. Today we will be looking at how to do just that. In other words, show you how to add additional options to right click menu when used on certain files. So let’s get started!

Step 1: Go to “My Computer.” Click “Tools” and then click “Folder Options.”

windows right click menu edit

Step 2: Click on the tab labeled “File Types.”

Step 3: Find a file type and select it. Then click “Advanced.”

Step 4: Click “New.” In the Action field type the name that you would like to appear.

Step 5: In the Application used to perform action textbox enter the path of the application you would like the file to load in (with quotes). E.g. “C:\Program Files\Mozilla Firefox\firefox.exe”.


add shortcuts to windows right click menu

Step 6: Click “OK” and you have your own customized right-click menu!



Tuesday, July 14, 2009

Disable the "Turn Off Computer" in windows XP?

this is a great idea for those Admin users who want to restrict the common users to shutdown public computer in common areas. You can disable the "Turn off Computer" option on the start menu and a common user will not "Turn Off, Restart and Stand By" a computer.

so here we go

You will need to be logged into your computer with administrative rights.

LOcate HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer in your registry editor.

On right side panel, right click to create a new DWORD value with the name NoClose.
Done restart your computer and see the changes.

Note( if you want to enable "Turn Off Computer" option in start menu simply change the value of data box to 0 or delete NoClose DWORD item.)

Youtube URL tricks

Instead of just searching and playing on youtube, here are some top Youtube URL tricks that you should know about :

View high quality videos

Youtube gives you the option to switch to high quality videos for some of the videos, however you can check if a video is available in high quality format by appending ‘&fmt=18′(stereo, 480 x 270 resolution) or ‘&fmt=22′(stereo, 1280 x 720 resolution) for even higher quality.

Embed Higher Quality Videos

While the above trick works for playback, if however you want to embed hig quality videos you need to append “&ap=%2526fmt%3D18″ and “&ap=%2526fmt%3D22″ to the embed url.

Cut the chase and link to the interesting part

Linking to a video where the real action starts at 3 minutes 22 seconds, wondered if you could make it start at 03:22? You are in luck. All you have to do is add #t=03m22s (#t=XXmYYs for XX mins and YY seconds) to the end of the URL.

Hide the search box

The search box appears when you hover over an embedded video. To hide the search box add ‘&showsearch=0′ to the embed url.

Embed only a part of Video

Just append ‘&start=30′ to skip first 30s of the video. In general you can modify the value after start= to the number of seconds you want to skip the video for.
Reply With Quote

Monday, July 13, 2009

TCP/IP Addressing

This article goes in depth on TCP/IP addressing with the use of subnet masks. Before you continue, be sure you have a good grip on counting with binary, we have provided a quick binary primer if you need a refresher.

MAC Address - Review

A MAC address (Media Access Control) is a unique address given to each network host (this includes computers, PLCs - programmable logic controllers, routers, switches, and wireless devices. This does not include hubs). In other words anything that makes a decision about the flow of network traffic or talks on the network itself. For more information, read our article on MAC addresses.

Clue: Think of a MAC address like a person's diver's license number, it is just a number that is unique from anyone else's. Now think of an IP address like a person's mailing address. The mailing address group people into zones by using the zip code, city, state, and street identifiers.

Enter the IP address

The IP address provides the grouping capability that MAC addresses do not. An IP address not only provides a grouping hierarchy but can be freely assigned and moved from one host to another. This grouping capability allows a host to differentiate local computers and distant ones so that communication to a host that is local could be direct and communication to a distant host could be efficiently routed.

Big Picture

Ok that is a quick discussion of why you need TCP/IP and its routing capabilities. Here is the real meat: TCP/IP addressing is actually in binary; even though everyone is used to seeing TCP/IP addresses using four numbers ranging from 0 to 255 the reality is, the address is binary but for us humans it is displayed in decimal format. If you convert an IP address from decimal numbers to binary, you will get four 8-bit binary numbers for a total of 32 bits.

I highly recommend that you brush up on binary before going any further. Make sure you can convert between decimal and binary numbers. Once again, refer to our tutorial on binary.

The Internet before subnet masks

Early on, to get IP address space on the Internet you were assigned a class A, B, or C block of addresses. A class A block was an address similar to: 124.xxx.xxx.xxx Where the Xs are address numbers between 0 and 255.

Since each segment of an IP address is 8 bits long, and there are 4 segments, it takes 32 bits to make up a whole IP address. From the example above, we can calculate the total number of hosts available on a class A address block. Since the last 3 segments are free to assign to the hosts in the address block, the total number is 2 to the power of 24 (32 bits in total address length, minus 8 bits used up for the network block address that was assigned; 124.XXX.XXX.XXX it is the 124 in this case). That is almost 16.8 million IP addresses! Class B address blocks were: 212.156.XXX.XXX (2 to the 16th power) 65.5 thousand addresses and a Class C network would give you 256 addresses. Below is a table of how each class network was divided.

Class Address Range Total Hosts Number of blocks
A 0-127.XXX.XXX.XXX 16.7 Million 128
B 128.0.0.0-
191.255.255.255
65.5 Thousand 16,384
C 192.0.0.0-
223.255.255.255
256 2 million
D & E 224.0.0.0-
255.255.255.255
N/A N/A

I also listed the Classes D & E which are out of the scope of this article. Class D networks are for multicast and class E have been reserved.

There is something significant about the addresses for a Class A, B, and C Block. If you were to convert the decimal value of each class to binary you can see that there is a pattern in the most significant bits. See table below:

Class First 4 bits
A 0XX
B 10X
C 110

Although this pattern made it immediately obvious to routers what type of address block they were dealing with, it was also very innefficient with the address space.

Enter the Subnet Mask

Similar to the first 3 bits of an IP address that make a class, the subnet mask is now used instead to determine the size of an address block. Most people are familiar with an address followed by a subnet mask of 255.255.255.0 Calculated out, this subnet mask allows for up to 254 hosts. So if the address of a computer is 63.26.15.5 and the subnet mask is 255.255.255.0 there are 253 other addresses on this network block ranging from 63.26.15.1 - 63.26.15.254 (the .0 and .255 addresses are reserved and cannot be asigned to a network host).

From this a newbie can easily surmise that an address of 45.52.75.10 with a subnet mask of 255.255.0.0 allows for 256 times 256 minus 2 addresses (65,534 addresses). These addresses range from 45.52.0.1 to 45.52.255.254 Again we subtract two from the total number because of those two reserved addresses that are at the beginning and end of the block.

Clue: Determining the number of hosts in your subnet is always done by caculating the number of bits used for the host address (there are 8 bits for a mask of 255.255.255.0 for example). Set 2 to the Nth power where N is the total number of host addrress bits, then subtract 2.
In other words (2^8) - 2=254.

Clue: All address blocks (subnets) will be 2 less of each power of 2: 6, 14, 30, 62, 126, 254..... That is because in each address block we must reserve space for a broadcast and a network ID. The network ID is the first address (such as 192.168.0.0) and the broadcast is the last address (192.168.0.255)

Unfortunately if you leave yourself with only the ability to declare subnet masks using the number 255 or 0 you have very few options. The smallest subnet you know how to make is 254 hosts. The next article is where the real lesson begins!

However, if you are not up to learning how to calculate your own masks, we have also provided a subnet mask reference table. Just be warned that we will take to responsibility for your sleepless nights as you ponder how a subnet mask actually works.

Calculating Subnet Masks

Subnet Masks in Binary

The easiest way to explain a subnet mask is by looking at the IP address and subnet mask in its binary format. Before you continue, be sure you have a good grip on counting with binary, we have provided a quick binary primer if you need a refresher. If you do not care for the intricasies of calculating a subnet mask and just need to know the correct mask for your situation, we have provided a reference table.

Not to mention you should already be familiar with the IP address. This article explains the basic use of an IP address and why we need a subnet mask.

A regular IP address when converted to binary is 32 bits in length, each segment being 8 bits long. Refer to our first address example of 63.26.15.5 with a subnet mask of 255.255.255.0 in binary.

Network and Host Addresses

In this example, it is only the last segment that changes from one host to another; this last segment is known as the host address; the first 3 segments, for this example, make up the network address. If we were to use an address with a subnet mask of 255.255.0.0 then the first 2 segments would make up the network address and the last two would be the host address. This is the kind of effect the subnet mask has on your IP address. It determines how big your network group is.

With that said, to go into any deeper detail we must look at the addressing in binary. Since we are just dealing with 32 binary bits we can stop grouping them in sets of 8 bits per segment and deal with them as a 32 bit string. Now when you create a mask, it does not have to be limited to groups of 8 bits (and it can have man more values than 255 or 0). These are called Variable Length Subnet Masks (VLSMs). By calculating out your VLSM you can create any block of IP addresses in sizes of powers of 2 minus 2.

For example, We can create a mask that only allows for 14 hosts (remember 14 hosts is 2 to the power of 4 then we subtract 2). Knowing that it is 2 to the power of 4, we know that we have an address block (subnet) with 4 bits for the hosts. That leaves a remaining 28 bits for the network address, also known as a /28. Now that we know the size of the network block we want (14 hosts) let's calculate the subnet mask that we would use for a /28 network.

CLUE: A block of IP addresses is referred to as a subnet. Because of this that is how subnet masks got their name,they are key into declaring how large a subnet actually is.

First map out your binary numbers again and keep them in groups of 8 bits each. That makes it easy to get the decimal number for each segment. Since our network size is 28 bits long we represent that with a string of 28 1s and the remainings 4 bits as 0s. So the first 3 segments (of 8 bits each) are all 1s. The decimal equivalent of an 8 bit segment of all 1s is 255. So the first 3 segments are 255. That leaves us with 4 bits left in the mask for the last segment. It will look something like this:

128 64 32 16 8 4 2 1
1 1 1 1 0 0 0 0

To make it easy, we have included a subnet mask calculator. This calculator converts decimal IP addresses and Subnet Masks. You can also optionally enter a destination IP address to see the results.

Add up the bits that are flagged with a one and we see that the last segment of the subnet mask with 14 hosts ( 16 - 2 ) is 240. For a subnet mask of 255.255.255.240 That is pretty much it with creating subnet masks, but now you need to learn a new rule about addressing.

IP Addresses with VLSMs

When you use a subnet mask of 255.255.255.192 what you have essentially done is divided up your last segment into 4 blocks (subnets). Using the binary of the last segment we can see our subnet mask only uses the first 2 most significant bits. Recall that the network address is made up from all the bits that line up with the 1s in the subnet mask. So in this case the network address 'overflows' into the last segment because it has two bits available in the last segment. The host address has the last 6 bits in the last segment. Let's see what this subnet masks looks like:

128 64 32 16 8 4 2 1
1 1 0 0 0 0 0 0

First lets say we have a network subnet of 10.10.10.X and we are using the same subnet mask 255.255.255.192 Our network host (HOST1) is currently using the address 10.10.10.75 Now lets display the binary of the last segment for both the subnet mask and the address of our host.

            |
128 64|32 16 8 4 2 1
SM 1 1| 0 0 0 0 0 0
HOST1 0 1| 0 0 1 0 1 1
|
Network Host

Notice the bar I drew in that divides the bits of the last segment. The last 6 bits on right are the host bits, we know this because it matches up with all the 0s in the subnet masks. Fromt he same logic we know about all the bits for the entwork masks because of the same reason, the network address matches up with all the 1s in the subnet mask.

So let's calculate the first and last addresses that can exist on the subnet of HOST1. To do this, that the ful address of the host and make the host side all 0s and do it again with all 1s. Look at the example:

            |
128 64|32 16 8 4 2 1
SM 1 1| 0 0 0 0 0 0=192
HOST1 0 1| 0 0 1 0 1 1=75
0s 0 1| 0 0 0 0 0 0=64
1s 0 1| 1 1 1 1 1 1=127
|
Network Host

The valid host addresses in the same subnet as our sample host are in the range of 10.10.10.64 - 10.10.10.127
Notice how there is specific requirements of the available addresses in the subnet.

So why doesn't a host with the IP address of 10.10.10.33 and SM 255.255.255.192 (HOST2) see HOST1 as a local computer?
Let's display all the data in binary:

            |
128 64|32 16 8 4 2 1
SM 1 1| 0 0 0 0 0 0=192
HOST1 0 1| 0 0 1 0 1 1=75
HOST2 0 0| 1 0 0 0 0 1=33
|
Network Host

Look at the first 2 bits in the network section of the each host. HOST1 and HOST2 have DIFFERENT network addresses! So a subnet mask plays a much more complicated role than just declaring the size of a subnet. It also limits that addresses you can use in a subnet. In our last example we noticed that a subnet mask of 255.255.255.192 will create a subnet of 64 addresses (for 62 hosts). But if you tried to start the addressing at 10.10.10.32 - 10.10.10.95 what actually happens is that your subnet overlapps into two separate subnets. Just do the calculations and you will see (just as I displayed above) that the network addresses of the first 32 hosts in the invalid subnet will have a different network address than the last 32 hosts in the invalid subnet.

Application

Learing how to create and declare subnet masks is not only useful for the technicians of ISPs who are assigning subnets to their customers. Using subnet masks is also key for firewalls and access lists. If you group IP addresses together based on host type (such as assigning all the workstations the addresses 10.10.10.128 - 10.10.10.254 and the servers the addresses 10.10.10.1 - 10.10.10.127) but use the subnet mask 255.255.255.0 (so that the hosts will communicate directly) you can then use masking as a way to apply different access rules with your firewall without having to specify each IP address individually.

Windows XP/2000 Commands & Tools

Here's the ultimate Windows XP/2000 command list that will make any Linux user feel at home at the command prompt. A lot of these commands are intended for administrating a network, but they are great for savvy home users as well. We even listed which OS you need for these commands.

  • at (windows XP/2000)
    Scheduling utility.
  • bootcfg (XP only)
    This utility allows you to set up your boot options, such as your default OS and other loading options.
  • cacls (XP, 2000, & NT4.0)
    Changes the ACLs (security Settings) of files and folders. Very similar to chmod in Linux.
  • comp (XP & 2000)
    This utility is very similar to diff in Linux. Use the /? switch to get examples of command usage.
  • contig (works with NT4.0 and newer)
    A great defrag utility for NTFS partitions.
  • control (XP only) - unpublished!
    Allows you to launch control panel applets from the command line.
  • control userpasswords2, for example will launch a helpful local user admin utility.
  • defrag (XP only - NT4.0 and Win2k use contig)
    Yes, XP comes with a command line disk defrag utility. If you are running Win2k or NT4.0 there is still hope. Contig is a free defrag program that I describe on the defrag page.
  • diskpart (XP only)
    Use this command to manage your disk partitions. This is the text version for the GUI Disk Manager.
  • driverquery (XP only)
    Produces a list of drivers, their properties, and their versions. Great for computer documentation.
  • eudcedit (XP only) -
  • unpublished!
    Private Character editor. Yes with this program built into Windows XP you can create your own font!
  • findstr
    Find String - similar to Linux's Grep.
  • fsutil (XP only) - unpublished!
    This is a utility with a lot of capability. Come back soon for great examples.
  • getmac (XP & 2000)
    This command gets the Media Access Control (MAC) address of your network cards.
  • gpresult (XP & 2000)
    This generates a summary of the user settings and computer group policy settings.
  • gpupdate (XP only)
    Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain.
  • ipconfig (XP, 2000 & NT4.0)
    This handy tool displays IP settings of the current computer and much more.
  • MMC (XP, 2000 & NT4.0) - Microsoft Management Console
    This is the master tool for Windows, it is the main interface in which all other tools use starting primarily in Windows 2000 and newer systems.
  • more
    Utility used to display text output one screen at a time. Ex. more c:\windows\win.ini
  • msconfig (XP only)
    The ultimate tool to change the services and utilities that start when your Windows machine boots up. You can also copy the executable from XP and use it in Win2k.
  • msinfo32 (XP &smp; 2000)
    An awesome diagnostic tool. With it you can get a list of running processes, including the residing path of the executable (great for manually removing malware) and get detailed information about hardware and system diagnostics.
  • narrator (XP only)
    Turns on the system narrator (can also be found in accessibility options in control panel). Will will allow your computer to dictate text to you.
  • netsh (XP & 2000)
    A network configuration tool console. At the 'netsh>' prompt, use the '?' to list the available commands and type "exit" to get back to a command prompt.
  • netstat (XP)
    A local network port tool - try netstat -ano.
  • nslookup (all)
    A DNS name resolution tool.
  • openfiles (XP Only)
    Allows an administrator to display or disconnect open files in XP professional. Type "openfiles /?" for a list of possible parameters.
  • Pathping (XP & 2000)
    A cross between the ping and traceroute utilities. Who needs Neotrace when you can use this? Type "pathping <ip address>" and watch it go.
  • recover (XP & 2000)
    This command can recover readable information from a damaged disk and is very easy to use.
  • reg (XP & 2000)
    A console registry tool, great for scripting Registry edits.
  • sc (XP & 2000)
    A command line utility called the Service Controller. A power tool to make service changes via a logon/logoff or startup/shutdown script.
  • schtasks (XP only)
    A newer version of the AT command. This allows an administrator to schedule and manage scheduled tasks on a local and remote machines.
  • secedit (XP & 2000)
    Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain. Example to update the machine policy: secedit /refreshpolicy machine_policy /enforce
    To view help on this, just type secedit.
    NOTE: In Windows XP SP1 and news, this command is superceded by: gpupdate /force
  • sfc (XP & 2000)
    The system file checker scans important system files and replaces the ones you (or your applications) hacked beyond repair with the real, official Microsoft versions.
  • shutdown (XP & 2000)
    With this tool, You can shut down or restart your own computer, or an administrator can shut down or restart a remote computer.
  • sigverif (XP only)
    Microsoft has created driver signatures. A signed driver is Microsoft tested and approved. With the sigverif tool you can have all driver files analyzed to verify that they are digitally signed. Just type 'sigverif' at the command prompt.
  • systeminfo (XP only)
    Basic system configuration information, such as the system type, the processor type, time zone, virtual memory settings, system uptime, and much more. This program is great for creating an inventory of computers on your network.
  • sysedit (XP/2000)
    System Configuration File Editor. An old tool that was very handy for the Windows 9X days. msconfig is what you want to use now.
  • tasklist (XP pro only)
    Tasklist is the command console equivalent to the task manager in windows. It is a must have when fighting scumware and viruses. Try the command:
    tasklist /svc
    to view the memory resources your services take up.
  • taskkill (XP only)
    Taskkill contains the rest of the task manager functionality. It allows you to kill those unneeded or locked up applications.
  • tree (XP & 2000)
    An amazing experience everyone should try! This command will provide a 'family tree' style display of the drive/folder you specify.
  • WMIC (XP & 2000)
    Windows Management Instrumentation Command tool. This allows you to pull an amazing amount of low-level system information from a command line scripting interface.

An A-Z Index of the Windows XP command line

   ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations•
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
b
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
c
CACLS Change file permissions
CALL Call one batch program from another•
CD Change Directory - move to a specific Folder•
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen•
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window•
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data
d
DATE Display or set the date•
DEFRAG Defragment hard drive
DEL Delete one or more files•
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders•
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
DSRM Remove items from Active Directory
e
ECHO Display message on screen•
ENDLOCAL End localisation of environment changes in a batch file•
ERASE Delete one or more files•
EXIT Quit the current script/routine and set an errorlevel•
EXPAND Uncompress files
EXTRACT Uncompress CAB files
f
FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files•
FOR /F Loop command: against the results of another command•
FOR Loop command: all options Files, Directory, List•
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations•
g
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line•
h
HELP Online Help
i
iCACLS Change file and folder permissions
IF Conditionally perform a command•
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
k
KILL Remove a program from memory
l
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
m
MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders•
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another•
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
n
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
p
PATH Display or set a search path for executable files•
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message•
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD•
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt•
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory•
q
QGREP Search file(s) for lines that match a given pattern.
r
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file•
REN Rename a file or files•
REPLACE Replace or update one file with another
RD Delete folder(s)•
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
s
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
SET Display, set, or remove environment variables•
SETLOCAL Control the visibility of environment variables•
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file•
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window•
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
t
TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time•
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session•
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file•
u
USRSTAT List domain usernames and last login
v
VER Display version information•
VERIFY Verify that files have been saved•
VOL Display a disk label•
w
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
x
XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark•

Friday, June 26, 2009

King of Pop Michael Jackson is No More











Michael Jackson, the child star turned King of Pop who set the world dancing but whose musical genius was overshadowed by a bizarre lifestyle and sex scandals, died on Thursday.
He was 50. Jackson was pronounced dead at about 2:26 p.m. PDT (2126 GMT) after arriving at a Los Angeles hospital in full cardiac arrest, said Fred Corral of the Los Angeles County Coroner's office. The cause of death was not known and an autopsy would likely take place on Friday, he said.

Jackson's sudden death had been reported earlier by U.S. media, which said he was taken ill at his home and rushed to the hospital by paramedics who found him not breathing when they arrived.

Known as the "King of Pop," for hits that included "Thriller" and "Billie Jean," Jackson's dramatic, one-gloved stage presence and innovative dance moves were imitated by legions of fans around the world.

He transformed music videos and his lifetime record sales tally is believed to be around 750 million, which, added to the 13 Grammy Awards he received, made him one of the most successful entertainers of all time.

But Jackson's belief that "I am Peter Pan in my heart", his preference for the company of children, his friendship with a chimp, his high-pitched voice and numerous plastic surgeries also earned him critics and the nickname "Wacko Jacko."

Jackson, who had lived as a virtual recluse since his acquittal in 2005 on charges of child molestation, had been scheduled to launch a comeback tour from London next month.

Quincy Jones, who helped arrange the music on the album "Thriller" and produced the "Off the Wall" album, told MSNBC: "I am absolutely devastated at this tragic and unexpected news."

"For Michael to be taken away from us so suddenly at such a young age, I just don't have the words. I've lost my little brother today, and part of my soul has gone with him."

SOLD-OUT SHOWS

Jackson had been due to start a series of concerts in London on July 13 running until March 2010. The singer had been rehearsing in the Los Angeles area for the past two months. The shows for the 50 London concerts sold out within minutes of going on sale in March.

"Rarely has the world received a gift with the magnitude of artistry, talent, and vision as Michael Jackson," said Neil Portnow, president and CEO of The Recording Academy in a statement.

"He was a true musical icon whose identifiable voice, innovative dance moves, stunning musical versatility, and sheer star power carried him from childhood to worldwide acclaim."

There were concerns about Jackson's health in recent years but the promoters of the London shows, AEG Live, said in March that Jackson had passed a 4-1/2 hour physical examination with independent doctors.

Outside the hospital in Los Angeles about 200 fans and reporters gathered on Thursday, waiting for confirmation of Jackson's death or condition.

Some fans were crying and hugging each other, and others were climbing atop fences to get a better look at a microphone stand where a news conference was supposed to take place.

"I hope he's gone to God, and I hope that he's free of all the troubles he's been plagued with," Tonya Blazer, 50, who said she had been a fan going back more than four decades to his days as a child star.

"I just feel like I'm paying tribute to him," said Dawn Burgess, 42, a fan who said she had posters of Michael pinned to her bedroom wall when she was a child.

CHILD STAR TO MEGASTAR

Jackson was born on Aug. 29, 1958, in Gary, Indiana, the seventh of nine children. Five Jackson boys -- Jackie, Tito, Jermaine, Marlon and Michael -- first performed together at a talent show when Michael was 6. They walked off with first prize and went on to become a best-selling band, The Jackson Five, and then The Jackson 5.

Jackson made his first solo album in 1972, and released "Thriller" in 1982, which became a smash hit that yielded seven top-10 singles. The album sold 21 million copies in the United States and at least 27 million worldwide.

The next year, he unveiled his signature "moonwalk" dance move while performing "Billie Jean" during an NBC special.

In 1994, Jackson married Elvis Presley's only child, Lisa Marie, but the marriage ended in divorce in 1996. Jackson married Debbie Rowe the same year and had two children, before splitting in 1999. The couple never lived together.

Jackson has three children named Prince Michael I, Paris Michael and Prince Michael II, known for his brief public appearance when his father held him over the railing of a hotel balcony, causing widespread criticism.

Saturday, June 20, 2009




Exam 70-290 contains the following Training Videos:
——————————————————————
Groups
Duration: 13:15
In this Video we discuss Creating Groups in Windows Server 2003 using Active Directory Users and Computers and Automating Group creation using the command line.

Computer Accounts
Duration: 7:56
In this Video we discuss Creating Computer Accounts on Windows Server 2003 using Active Directory Users and Computers and via command line utilities.

User Accounts
Duration: 16:03
In this Video we show you how to Create and Configure User Accounts in a Windows Server 2003 Active Directory Domain Environment.

Creating User Accounts Using Automation
Duration: 36:04
In this Video we show you how to Create and Configure User Accounts in a Windows Server 2003 Active Directory Domain Environment using automation tools like LDIFDE, CSVDE, the Net User and the Directory Services Commands.

Share and NTFS Permissions
Duration: 26:52
In this Video we discuss Share and NTFS Permissions. We discuss how these permission work when they are applied together and highlight issues you ll face when using Deny entries. Then we move on to discuss Inheritance, Effective Permissions and Taking Ownership of Files and Folders.

Shares
Duration: 11:23
In this Video we discuss the the default Windows Shares, how to create Shares and how to map to shares using the Command Line and the GUI.

Remote Desktop
Duration: 12:02
In this Video we show you how to configure and use the Remote Desktop feature of Windows Server 2003. We also take a detailed look at both the Client and Server Configuration.

Remote Desktop Web Connection
Duration: 4:50
Following on from our Video on the Windows Server 2003 Remote Desktop, we show you how to Install and Configure the Remote Desktop Web Connection and IIS.

Software Update Services (SUS)
Duration: 38:40
In this Video we install, configure and demonstrate how to use Microsoft Software Update Services to ensure all of your Windows 2000 and above Clients are updated automatically. We discuss Parent/Child SUS Servers, how to backup and restore your SUS Servers, Group Policy Client Configuration and how to Troubleshoot SUS.

Backups
Duration: 20:51
In this Video we discuss planning for and responding to disaster using Windows Backup on Windows 2003 Server. We show you how to backup and restore your files and we also discuss the 5 types of backup methods and demonstrate the relevance that archive bit has on your backup choices.

Automated System Recovery
Duration: 3:37
In this Video we discuss Creating the Automated System Recovery (ASR) Disk using Windows Backup on Windows 2003 Server.

System State Backup and Restores
Duration: 10:30
In this Video we demonstrate performing System State Backups and Restores and ensuring that an Authoritative Restore Replicates to your other Domain Controllers.

Printers
Duration: 40:54
In this video we show you how to configure Printers on a Windows 2003 Server.

Code:

http://rapidshare.com/files/157923361/LiP-Winstructor.Planning.Windows.Server.2003.part1.rar
http://rapidshare.com/files/157927758/LiP-Winstructor.Planning.Windows.Server.2003.part2.rar
http://rapidshare.com/files/157932795/LiP-Winstructor.Planning.Windows.Server.2003.part3.rar
http://rapidshare.com/files/157937982/LiP-Winstructor.Planning.Windows.Server.2003.part4.rar

Support me by downloading this file as a FREE USER

Code:

http://rapidshare.com/files/240677556/Passmark_PerformanceTest_v7.0.1004.0.rar

Tuesday, June 9, 2009

Lost the Administrator Password - Windows :

Lost the Administrator Password - Windows :

Hello Friends

Can't Log On to Windows XP?

If that's your only problem, then you probably have nothing to worry about. As long as you have your Windows XP CD, you
can get back into your system using a simple but effective method made possible by a little known access hole in Windows
XP.

You can easily change or wipe out your Administrator password for free during a Windows XP Repair. Here's how with a step-by-step description of the initial Repair process included for newbie's.

  1. Place your Windows XP CD in your cd-rom and start your computer (it's assumed here that your XP CD is bootable as it should be - and that you have your bios set to boot from CD)
  2. Keep your eye on the screen messages for booting to your cd Typically, it will be "Press any key to boot from cd"
  3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.
  4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now
  5. The Licensing Agreement comes next - Press F8 to accept it.
  6. The next screen is the Setup screen which gives you the option to do a Repair.
    It should read something like "If one of the following Windows XP installations is damaged, Setup can try to repair it"
    Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.
  7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
  8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically and you will see a progress bar stating "Your computer will reboot in 15 seconds"
  9. During the reboot, do not make the mistake of "pressing any key" to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.
  10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.
  11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.
  12. Now simply pick the account you need to change and remove or change your password as you prefer. If you want to log on without having to enter your new password, you can type control userpasswords2 at the prompt and choose to log on without being asked for password. After you've made your changes close the windows, exit the command box and continue on with the Repair (have your Product key handy).
  13. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password). Your programs and personalized settings should remain intact.
  14. I tested the above on Windows XP Pro with and without SP1 and also used this method in a real situation where someone could not remember their password and it worked like a charm to fix the problem. This security hole allows access to more than just user accounts.

15 Top Windows XP secrets :

15 Top Windows XP secrets :

    • Windows key + D - shows the desktop.
    • Windows key + M - minimizes all open windows.
    • Windows key + Shift + M - maximizes all open windows.
    • Windows key + E - Runs Windows Explorer.
    • Windows key + R - shows the RUN dialog.
    • Windows key + F - shows Search window.
    • Windows key + Break - shows System Properties box.
    • Windows key + TAB - Go through taskbar applications.
    • Windows key + PAUSE Display the System Properties dialog box.
    • Windows key + U Open Utility Manager.
    • ALT + TAB - Cycle through opened applications.
    • Hold down CTRL while dragging an item to Copy it.
    • CTRL + ESC Display the Start menu.
    • ALT + ENTER View the properties for the selected item.
    • F4 key Display the Address bar list in My Computer or
    • NUM LOCK + Asterisk (*) Display all of the subfolders that are under the selected folder.

  1. Lock Windows to protect computer :
    You can lock Windows to protect the computer when leaving the station easily by creating a shortcut with the path rundll32.exeuser32.dll, LockWorkStation. The Windows key + L is also a shortcut to this feature.
  2. Edit sysoc.inf to list all software :
    To show all software that can be removed from your computer (including protected Windows services), you can manually edit (using notepad for example) the sysoc.inf file located in Windows\inf\. Just remove the word hide next to the software pack.
    Note - use this at your own risk. Removing critical components of the system will make Windows instable.
  3. Windows XP comes with IPv4 and IPv6 :
    Windows XP comes both IPv4 and IPv6 support. To enable IPv6, you can install the protocols needed with the command "ipv6 install" in the command-prompt. Then type ipv6 /? to see the options. The installation will not remove the IPv4 protocols so your current configuration will still work.
  4. Access Task Manager with shortcut :
    To access the Task Manager easier, you can make a shortcut that points to %windir%\system32\taskmgr.exe.
  5. Stop treating ZIP files like Folders :
    If you don't want your Windows XP to treat ZIP files like folders, you can disable this component by running regsvr32 /u zipfldr.dll at the command prompt or Run dialog. If you start missing it, you can enable it by typing regsvr32 zipfldr.dll.
  6. Run program as diffrent user :
    You can run a program as a different user. Right click an application and select Run As command.
  7. Switch users leaving applications opened :
    You can switch users leaving the applications opened too (*NOTE* use this only when needed since it could lead to system instability).
    Go to Task Manager - processes and end the process explorer.exe. This will end only your session and not all applications. Then go to Applications tab, click New task and type runas /user:domainname\username explorer.exe. A password prompt will appear to login to the desired username. The user's session will start, with all your previously applications running.
    I recommend to open first a command-line prompt and type runas /? to see all the options available.
  8. Rename multiple files in Windows at once :
    Rename multiple files in Windows at once. Select them all, right click and select Rename. Enter the desired name. They will be renamed using what you specified, with a number in brackets to distinguish them.
  9. Task kill feature in Windows :
    Windows has a task kill feature similar to Linux. Go to a command prompt and run the command tasklist to see running processes with PID numbers. Then type tskill to end the specific task. This forces an instant closing of the task.
  10. Edit features with GPEDIT.MSC :
    You can edit many features by running gpedit.msc. You can add log on/log off scripts here and many features.
  11. Edit accounts in the command prompt :
    You can edit accounts by running "control userpasswords2" at the command prompt.
  12. Use systeminfo.exe to see System Information :
    You can use the systeminfo.exe command in the command prompt to see System Information, including all Windows updates and hotfixes.
  13. Disable system services for maximum performance :
    There are system services that you can disable to free up the system's load. To access the interface that permits you to make changes to system's services, type services.msc and the command prompt.
    This is a list of services that are *usually* useless and can be safely disabled.
    • Alerter
    • Application Layer Gateway Service,
    • Application Management
    • Automatic Updates
    • Background Intelligent Transfer
    • Clipbook
    • Distributed Link Tracking Client
    • Distributed Transaction Coordinater
    • Error Reporting Service
    • Fast User Switching Compatibility
    • IMAPI CD-Burning
    • Indexing Service
    • IPSEC Services
    • Messenger
    • Net Logon
    • Net Meeting
    • Remote Desktop Sharing
    • Network DDE
    • Network DDE DSDM
    • Portable Media Serial Number
    • Remote Desktop Help Session Manager
    • Remote Registry
    • Secondary Logon
    • Smartcard
    • SSDP Discovery Service
    • Uninterruptible Power Supply
    • Universal Plug and Play Device Host
    • Upload Manager
    • Webclient
    • Wireless Zero Configuration
    • WMI Performance Adaptor
    NOTE: Make sure you don't need them since some applications you're using could depend on them. If you make any application to fail by disabling any of the services, go back and enable it again.
  14. Repair Windows XP by using the XP installation CD:
    If your system failes to start due to an error related to missing HAL.DLL, invalid Boot.ini or any other critical system boot files you can repair this by using the XP installation CD. Simply boot from your XP Setup CD and enter the Recovery Console. Then run "attrib -H -R -S" on the C:\Boot.ini file and delete it. Run "Bootcfg /Rebuild" and then Fixboot.

List of All DOS Commands

I found this list of all the DOS commands in a website. But on searching Google to find the source gives thousands of results, so I decided not to credit anyone! Anyway it’s interesting have a look.

1 ANSI.SYS — Defines functions that change display graphics, control cursor movement, and reassign keys.

2 APPEND — Causes MS-DOS to look in other directories when editing a file or running a command.

3 ARP — Displays, adds, and removes arp information from network devices

4 ASSIGN — Assign a drive letter to an alternate letter

5 ASSOC — View the file associations

6 AT — Schedule a time to execute commands or programs.

7 ATMADM — Lists connections and addresses seen by Windows ATM call manager.

8 ATTRIB — Display and change file attributes.

9 BATCH — NRecovery console command that executes a series of commands in a file.

10 BOOTCFG — Recovery console command that allows a user to view, modify, and rebuild the boot.ini

11 BREAK — Enable / disable CTRL + C feature.

12 CACLS — View and modify file ACL’s.

13 CALL — Calls a batch file from another batch file.

14 CD — Changes directories.

15 CHCP — Supplement the International keyboard and character set information.

16 CHDIR — Changes directories.

17 CHKDSK — Check the hard disk drive running FAT for errors.

18 CHKNTFS — Check the hard disk drive running NTFS for errors.

19 CHOICE — Specify a listing of multiple options within a batch file.

20 CLS — Clears the screen.

21 CMD — Opens the command interpreter.

22 COLOR — Easily change the foreground and background color of the
MS-DOS window.

23 COMP — Compares files.

24 COMPACT — Compresses and uncompress files.

25 CONTROL — Open control panel icons from the MS-DOS prompt.

26 CONVERT Convert FAT to NTFS.

27 COPY — Copy one or more files to an alternate location.

28 CTTY — Change the computers input/output devices.

29 DATE — View or change the systems date.

30 DEBUG — Debug utility to create assembly programs to modify hardware settings.

31 DEFRAG — Re-arrange the hard disk drive to help with loading programs.

32 DEL — Deletes one or more files.

33 DELETE — Recovery console command that deletes a file.

34 DELTREE — Deletes one or more files and/or directories.

35 DIR — List the contents of one or more directory.

36 DISABLE — Recovery console command that disables Windows system services or drivers.

37 DISKCOMP — Compare a disk with another disk.

38 DISKCOPY — Copy the contents of one disk and place them on another disk.

39 DOSKEY — Command to view and execute commands that have been run in the past.

40 DOSSHELL — A GUI to help with early MS-DOS users.

41 DRIVPARM — Enables overwrite of original device drivers.

42 ECHO — Displays messages and enables and disables echo.

43 EDIT — View and edit files.

44 EDLIN — View and edit files.

45 EMM386 — Load extended Memory Manager.

46 ENABLE — Recovery console command to enable a disable service or driver.

47 ENDLOCAL — Stops the localization of the environment changes
enabled by the setlocal command.

48 ERASE — Erase files from computer.

49 EXPAND — Expand a Microsoft Windows file back to it’s original format.

50 EXIT — Exit from the command interpreter.

51 EXTRACT — Extract files from the Microsoft Windows cabinets.

52 FASTHELP — Displays a listing of MS-DOS commands and information about them

53 FC — Compare files.

54 FDISK — Utility used to create partitions on the hard disk drive.

55 FIND — Search for text within a file.

56 FINDSTR — Searches for a string of text within a file.

57 FIXBOOT — Writes a new boot sector.

59 FIXMBR — Writes a new boot record to a disk drive.

60 FOR — Boolean used in batch files.

61 FORMAT — Command to erase and prepare a disk drive.

62 FTP — Command to connect and operate on a FTP server.

63 FTYPE — Displays or modifies file types used in file extension
associations.

64 GOTO — Moves a batch file to a specific label or location.

65 GRAFTABL — Show extended characters in graphics mode.

66 HELP — Display a listing of commands and brief explanation.

67 IF — Allows for batch files to perform conditional processing.

68 IFSHLP.SYS — 32-bit file manager.

69 IPCONFIG — Network command to view network adapter settings and assigned values.

70 KEYB — Change layout of keyboard.

71 LABEL — Change the label of a disk drive.

72 LH — Load a device driver in to high memory.

73 LISTSVC — Recovery console command that displays the services and drivers.

74 LOADFIX — Load a program above the first 64k.

75 LOADHIGH — Load a device driver in to high memory.

76 LOCK — Lock the hard disk drive.

77 LOGON — Recovery console command to list installations and enable administrator login.

78 MAP — Displays the device name of a drive.

79 MD — Command to create a new directory.

80 MEM — Display memory on system.

81 MKDIR — Command to create a new directory.

82 MODE — Modify the port or display settings.

83 MORE — Display one page at a time.

84 MOVE — Move one or more files from one directory to another DIRECTORY

85 MSAV — Early Microsoft Virus scanner.

86 MSD — Diagnostics utility.

87 MSCDEX — Utility used to load and provide access to the CD-ROM.

88 NBTSTAT — Displays protocol statistics and current TCP/IP connections using NBT

89 NET — Update, fix, or view the network or network settings

90 NETSH — Configure dynamic and static network information from MS-DOS.

91 NETSTAT — Display the TCP/IP network protocol statistics and information.

92 NLSFUNC — Load country specific information.

93 NSLOOKUP — Look up an IP address of a domain or host on a network.

94 PATH — View and modify the computers path location

95 PATHPING — View and locate locations of network latency

96 PAUSE — command used in batch files to stop the processing of a command.

97 PING — Test / send information to another network computer or network device .

98 POPD — Changes to the directory or network path stored by the pushd command.

99 POWER — Conserve power with computer portables.

100 PRINT — Prints data to a printer port.

101 PROMPT — View and change the MS-DOS prompt.

102 PUSHD — Stores a directory or network path in memory so it can be returned to at any time.

103 QBASIC — Open the QBasic.

104 RD — Removes an empty directory.

105 REN — Renames a file or directory.

106 RENAME — Renames a file or directory.

107 RMDIR — Removes an empty directory.

108 ROUTE — View and configure windows network route tables.

109 RUNAS — Enables a user to execute a program on another
computer.

110 SCANDISK — Run the scandisk utility.

111 SCANREG — Scan registry and recover registry from errors.

112 SET — Change one variable or string to another.

113 SETLOCAL — Enables local environments to be changed without affecting anything else.

114 SHARE — Installs support for file sharing and locking capabilities.

115 SETVER — Change MS-DOS version to trick older MS-DOS programs.

116 SHIFT — Changes the position of replaceable parameters in a batch program.

117 SHUTDOWN — Shutdown the computer from the MS-DOS prompt.

118 SMARTDRV — Create a disk cache in conventional memory or extended memory.

119 SORT — Sorts the input and displays the output to the screen.

120 START — Start a separate window in Windows from the MS-DOS prompt.

121 SUBST — Substitute a folder on your computer for another drive letter.

122 SWITCHES — Remove add functions from MS-DOS.

123 SYS — Transfer system files to disk drive.

124 TELNET — Telnet to another computer / device from the prompt.

125 TIME — View or modify the system time.

126 TITLE — Change the title of their MS-DOS window.

127 TRACERT — Visually view a network packets route across a network.

128 TREE — View a visual tree of the hard disk drive.

129 TYPE — Display the contents of a file.

130 UNDELETE — Undelete a file that has been deleted.

131 UNFORMAT — Unformat a hard disk drive.

132 UNLOCK — Unlock a disk drive.

133 VER — Display the version information.

134 VERIFY — Enables or disables the feature to determine if files have been written properly.

135 VOL — Displays the volume information about the designated drive.

136 XCOPY — Copy multiple files, directories, and/or drives from one location to another.

137 TRUENAME — When placed before a file, will display the whole directory in which it exists

138 TASKKILL — It allows you to kill those unneeded or locked up applications

100 Windows XP RUN Commands

Here is a collection of 100 (One Hundred) Commands that can be entered in Start>Run in Windows XP, with their functions mentioned therein. I like it. If you can remember some important ones, you can save a lot of time.

Go to StartMenu>RUN, where u get the following box:


There you can enter these commands to get the results mentioned.

Function & Command
———————- ————————-
Accessibility Controls
access.cpl

Add Hardware Wizard
hdwwiz.cpl

Add/Remove Programs
appwiz.cpl

Administrative Tools
control admintools

Automatic Updates
wuaucpl.cpl

Bluetooth Transfer Wizard
fsquirt

Calculator
calc

Certificate Manager
certmgr.msc

Character Map
charmap

Check Disk Utility
chkdsk

Clipboard Viewer
clipbrd

Command Prompt
cmd

Component Services
dcomcnfg

Computer Management
compmgmt.msc

Date and Time Properties
timedate.cpl

DDE Shares
ddeshare

Device Manager
devmgmt.msc

Direct X Control Panel (If Installed)*
directx.cpl

Direct X Troubleshooter
dxdiag

Disk Cleanup Utility
cleanmgr

Disk Defragment
dfrg.msc

Disk Management
diskmgmt.msc

Disk Partition Manager
diskpart

Display Properties
control desktop

Display Properties
desk.cpl

Display Properties (w/Appearance Tab Preselected)
control color

Dr. Watson System Troubleshooting Utility
drwtsn32

Driver Verifier Utility
verifier

Event Viewer
eventvwr.msc

File Signature Verification Tool
sigverif

Findfast
findfast.cpl

Folders Properties
control folders

Fonts
control fonts

Fonts Folder
fonts

Free Cell Card Game
freecell

Game Controllers
joy.cpl

Group Policy Editor (XP Prof)
gpedit.msc

Hearts Card Game
mshearts

Iexpress Wizard
iexpress

Indexing Service
ciadv.msc

Internet Properties
inetcpl.cpl
IP Configuration (Display Connection Configuration)
ipconfig /all

IP Configuration (Display DNS Cache Contents)
ipconfig /displaydns

IP Configuration (Delete DNS Cache Contents)
ipconfig /flushdns

IP Configuration (Release All Connections)
ipconfig /release

IP Configuration (Renew All Connections)
ipconfig /renew

IP Configuration (Refreshes DHCP & Re-Registers DNS)
ipconfig /registerdns

IP Configuration (Display DHCP Class ID)
ipconfig /showclassid

IP Configuration (Modifies DHCP Class ID)
ipconfig /setclassid
ava Control Panel (If Installed)
jpicpl32.cpl

Java Control Panel (If Installed)
javaws

Keyboard Properties
control keyboard

Local Security Settings
secpol.msc

Local Users and Groups
lusrmgr.msc

Logs You Out Of Windows
logoff

Mcft Chat
winchat

Minesweeper Game
winmine

Mouse Properties
control mouse

Mouse Properties
main.cpl

Network Connections
control netconnections

Network Connections
ncpa.cpl

Network Setup Wizard
netsetup.cpl

Notepad
notepad

Nview Desktop Manager (If Installed)
nvtuicpl.cpl

Object Packager
packager

ODBC Data Source Administrator
odbccp32.cpl

On Screen Keyboard
osk

Opens AC3 Filter (If Installed)
ac3filter.cpl

Password Properties
password.cpl

Performance Monitor
perfmon.msc

Performance Monitor
perfmon

Phone and Modem Options
telephon.cpl

Power Configuration
powercfg.cpl

Printers and Faxes
control printers

Printers Folder
printers

Private Character Editor
eudcedit

Quicktime (If Installed)
QuickTime.cpl

Regional Settings
intl.cpl

Registry Editor
regedit

Registry Editor
regedit32

Remote Desktop
mstsc

Removable Storage
ntmsmgr.msc

Removable Storage Operator Requests
ntmsoprq.msc

Resultant Set of Policy (XP Prof)
rsop.msc

Scanners and Cameras
sticpl.cpl

Scheduled Tasks
control schedtasks

Security Center
wscui.cpl

Services
services.msc

Shared Folders
fsmgmt.msc

Shuts Down Windows
shutdown

Sounds and Audio
mmsys.cpl

Spider Solitare Card Game
spider

SQL Client Configuration
cliconfg

System Configuration Editor
sysedit

System Configuration Utility
msconfig

System File Checker Utility (Scan Immediately)
sfc /scannow

System File Checker Utility (Scan Once At Next Boot)
sfc /scanonce

System File Checker Utility (Scan On Every Boot)
sfc /scanboot

System File Checker Utility (Return to Default Setting)
sfc /revert

System File Checker Utility (Purge File Cache)
sfc /purgecache

System File Checker Utility (Set Cache Size to size x)
sfc /cachesize=x

System Properties
sysdm.cpl

Task Manager
taskmgr

Telnet Client
telnet

User Account Management
nusrmgr.cpl

Utility Manager
utilman

Windows Firewall
firewall.cpl

Windows Magnifier
magnify

Windows Management Infrastructure
wmimgmt.msc

Windows System Security Tool
syskey

Windows Update Launches
wupdmgr

Windows XP Tour Wizard
tourstart

Wordpad
write

So, memorise what you use..