Windows Command Prompt Microsoft’S Name for the Command Line Is the Command Prompt

Total Page:16

File Type:pdf, Size:1020Kb

Windows Command Prompt Microsoft’S Name for the Command Line Is the Command Prompt CHAPTER 10 Troubleshooting Windows This chapter covers the following A+ exam topics: . Repair Environments and Boot Errors . Windows Tools and Errors . Command-Line Tools You can find a master list of A+ exam topics in the “Introduction.” This chapter covers CompTIA A+ 220-701 objectives 2.1, 2.2, and 3.4 and CompTIA A+ 220-702 objectives 2.1, 2.3, and 2.4. Now for the toughest part of working with Windows: troubleshoot- ing. As I mentioned in Chapter 1, “Introduction to Troubleshooting,” troubleshooting is the most important skill for a computer technician to possess. There are many different things that can go wrong in a computer; the majority of them are software-related. This chapter endeavors to give you the tools, utilities, and skills necessary to trou- bleshoot the various boot errors, stop errors, and other Windows errors that you might encounter. Repair Environments and Boot Errors Windows startup errors prevent you from accessing the operating system. Because of this, Windows Vista and XP have various startup tools, menus, and repair environments that you can use to trou- bleshoot these startup and boot errors. Windows Repair Tools There are many tools included with Windows Vista and XP that are designed to help you troubleshoot and repair just about any issue that 266 CHAPTER 10: Troubleshooting Windows might come up. Before we get into the exact issues you might face, let’s dis- cuss some of these repair tools, what they do, and where you can access them. Let’s start with the Advanced Boot Options menu. Advanced Boot Options Menu If Windows Vista/XP/2000 won’t start and you don’t see an error message, the culprit might be a video driver, new configuration, or other system issues. There are several startup options that can aid in fixing the problem. To access these startup options, press the F8 key immediately after the computer starts up; this brings up the Windows Advanced Boot Options menu, as shown in Figure 10.1. FIGURE 10.1 Windows Vista Advanced Boot Options menu The following options are included in the Advanced Boot Options menu: . Safe Mode: Starts system with a minimal set of drivers; used in case one of the drivers fails. Safe Mode is a good option when attempting to use System Restore. Safe Mode with Networking: Starts system with a minimal set of driv- ers and enables network support. Safe Mode with Command Prompt: Starts system with a minimal set of drivers but loads command prompt instead of Windows GUI. 267 Repair Environments and Boot Errors . Enable Boot Logging: Creates a ntbtlog.txt file. Enable low-resolution video (640x480): Uses a standard VGA driver in place of a GPU-specific display driver, but uses all other drivers as normal. (This is called Enable VGA Mode in Windows XP/2000.) . Last Known Good Configuration: Starts the system with the last con- figuration known to work; useful for solving problems caused by newly installed hardware or software. Directory Services Restore Mode: This is used to restore a domain controller’s active directory (Windows Server). Even though it is listed, it is not used in Windows Vista/XP/2000. Debugging Mode: Enables the use of a debug program to examine the system kernel for troubleshooting. Disable automatic system on system failure (Vista only): Prevents Windows from automatically restarting, if an error causes Windows to fail. Choose this option only, if Windows is stuck in a loop in which Windows fails, attempts to restart, and fails again repeatedly. Disable driver signature enforcement (Vista only): Enables drivers containing improper signatures to be installed. Start Windows Normally: This can be used to boot to regular Windows. This option is listed in case a person inadvertently pressed F8, but did not want to use any of the Advanced Boot Options. ExamAlert Know the Advanced Boot Options for the exam. If Windows Vista fails to start properly, and then restarts automatically, it nor- mally displays the Windows Error Recovery screen and gives you the follow- ing options: Safe Mode, Safe Mode with Networking, Safe Mode with Command Prompt, Last Known Good Configuration, and Start Windows Normally. This means that Windows has acknowledged some sort of error or improper shut down and offers a truncated version of the Advanced Options Boot menu. 268 CHAPTER 10: Troubleshooting Windows Note There is a small window of time available to press F8; it’s right between the BIOS and when the normal operating system boots. Press F8 repeatedly right after the BIOS POST begins. Note It is recommended that you attempt to repair a computer with the Advanced Boot Options before using Windows Vista’s System Recovery Options or Windows XP/2000’s Recovery Console. Windows Recovery Environment (WinRE) WinRE is a set of tools included in Windows Vista, Windows Server 2008, and other upcoming Windows operating systems. It takes the place of the Recovery Console used in Windows XP/2000. Also known as System Recovery Options, WinRE’s purpose is to recover Windows from errors that prevent it from booting; it can also be instrumental in fixing issues causing a computer to “freeze” up. There are two possible ways to access WinRE: . Booting to the Windows Vista DVD: This option is more common with an individual computer that had Windows Vista installed; for exam- ple, if you performed a clean installation with the standard Windows Vista DVD and made no modifications to it. To start WinRE, make sure that the DVD drive is first in the boot order of the BIOS, boot to the Windows Vista DVD (as if you were starting the installation), choose your language settings and click next, and then select Repair Your Computer, which you can find at the lower-left corner of the screen. Note Important! Do not select Install Now because that would begin the process of rein- stalling Windows Vista on your hard drive. Booting to a special partition on the hard drive that has WinRE installed: This option is used by OEMs (original equipment manufac- turers) so that users can access WinRE without having to search for and boot off of a Windows Vista DVD. These OEMs (computer builders and system integrators) will preinstall WinRE into a special partition on 269 Repair Environments and Boot Errors the hard drive, separate from the operating system, so that the user can boot into it at any time. Compare this to the older Recovery Console that was installed into the same partition as the operating system. To access WinRE that has been preinstalled, press F8 to bring up the Advanced Boot Options menu, highlight Repair Your Computer, and press Enter. If you don’t see Repair Your Computer in the Advanced Boot Options menu, then it wasn’t installed to the hard drive, and you have to use option 1, booting from the Vista DVD. Note that you can still use option 1, even if WinRE was installed to the hard drive; for example, in a scenario where the hard drive installation of WinRE has failed. Note The process to install WinRE to the hard drive is a rather complicated one and is not covered on the A+ exam. However, if you are interested, here is a link that gives the basics of installing WinRE: http://blogs.msdn.com/winre/archive/2007/01/ 12/how-to-install-winre-on-the-hard-disk.aspx. Regardless of which option you selected, at this point a window named System Recovery Options should appear, prompting you to select an operat- ing system to repair. Most users will only have one listed. Highlight the appropriate operating system in need of repair and click Next. This displays the options at your disposal, as shown in Figure 10.2. Table 10.1 describes these options in more depth. FIGURE 10.2 Windows Vista System Recovery Options window 270 CHAPTER 10: Troubleshooting Windows TABLE 10.1 Description of the Windows Vista System Recovery Options System Recovery Option Description Startup Repair When clicked, this automatically fixes certain problems, such as missing or damaged system files that might prevent Windows from starting correctly. When you run Startup Repair, it scans your computer for the problem and then tries to fix it so your computer can start correctly. System Restore Restores the computer’s system files to an earli- er point in time. It’s a way to undo system changes to your computer without affecting your personal files, such as email, documents, or photos. Note: If you use System Restore when the computer is in safe mode, you cannot undo the restore operation. However, you can run System Restore again and choose a different restore point, if one exists. Windows Complete PC Restore This restores the contents of a hard disk from a backup. Windows Complete PC Backup and Restore is only included with Vista Business and Vista Ultimate. Windows Memory Diagnostic Tool Scans the computer’s memory for errors. Command Prompt Advanced users can use the Command Prompt (Replaces the Recovery to perform recovery-related operations and also Console in XP/2000) run other command-line tools for diagnosing and troubleshooting problems. Puts the user into a directory called X:\Sources. Works very much like the previous Recovery Console in Windows XP/2000, with the addition of a few new com- mands. Recovery Console The Windows XP/2000 Recovery Console is the command-line interface used for repairs. It is included on the Windows XP and 2000 CD-ROMs. The Recovery Console can be invaluable when the system cannot start from the hard drive due to missing or corrupted files. These missing files could very well block the Advanced Boot Options menu.
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Attachment D to Adm. Memo No. 004 INSTRUCTIONS FOR
    Attachment D to Adm. Memo No. 004 INSTRUCTIONS FOR FORMATTING A DISKETTE Formatting is the preparation of diskettes for storage of information. There are several different versions of the format command that can be used. The version that you use depends upon the type of diskette and the type of disk drive in which the diskette is being formatted. In order for us to be able to read the Tuition Grant diskettes you send, the diskettes should be properly formatted. Below is a table that identifies the more commonly used diskette types and disk drive specifications. The correct version of the format command will appear in the row for your diskette type and drive type. The format command uses the parameter “d:” to indicate the disk drive designation. For example, your 5 ¼ drive may be the “A:” drive. Instead of typing “FORMAT D:”, replace the drive designation with “A:” and type “FORMAT A:”. To verify that the disks were formatted correctly, perform the CHKDSK command on the newly formatted diskette. The format for the CHKDSK command is “CHKDSK d:”. When the command returns the disk information, compare it to the information in the fourth column of the table that corresponds to your diskette type and disk drive.. If the “total disk space” numbers are the same, the diskette is formatted correctly. DISK TYPE DRIVE TYPE FORMAT COMMAND SPACE INFO. 5 ¼” DSDD DSDD FORMAT d: 362,496 bytes total disk space 5 ¼” DSDD HD FORMAT d: /T:40 /N:9 362,496 bytes total disk space 5 ¼” HD DSDD Cannot be formatted 5 ¼” HD HD FORMAT d: 1,213,952 bytes total disk space 3 ½” DSDD DSDD FORMAT d: 730,112 bytes total disk space 3 ½” DSDD HD FORMAT d: /T:80 /N:9 730,112 bytes total disk space 3 ½” HD DSDD Cannot be formatted 3 ½” HD HD FORMAT d: 1,457,664 bytes total disk space 3 ½” DSHD FORMAT d: 1,457,664 bytes total disk space.
    [Show full text]
  • Attack Tactics 7! the Logs You Are Looking For
    Attack Tactics 7! The Logs You Are Looking For © Black Hills Information Security @BHInfoSecurity Brought To You By! © Black Hills Information Security| @BHInfoSecurity Brought To You By! Just type “‘Demo,<script>alert(document.cookie);</script> or ‘ 1=1;--” into the Questions box DEMO will work fine too…. © Black Hills Information Security| @BHInfoSecurity Brought To You By! https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to- active-defense-cyber-deception-and-hacking-back-14124 © Black Hills Information Security| @BHInfoSecurity © Black Hills Information Security| @BHInfoSecurity Problem Statement © Black Hills Information Security @BHInfoSecurity JPcert to the rescue… Sort of.. © Black Hills Information Security @BHInfoSecurity A helpful diagram Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Executive Problem Statement Basic Questions: ● Are our tools working? ● What can we detect? ● How can we test this? ● What are our gaps? ● What existing tools can fill them? ● What do we have to buy? ● Can we buy ourselves out of this problem? © Black Hills Information Security @BHInfoSecurity TryingA helpful to diagramtie it all together Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Adventures in (just enabling proper) Windows Event Logging Important Event IDs ● 4624 and 4634 (Logon / Logoff) ● 4662 (ACL’d object access - Audit req.) ● 4688 (process launch and usage) ● 4698 and 4702 (tasks + XML) ● 4740 and 4625 (Acct Lockout + Src IP) ● 5152, 5154, 5156, 5157 (FW
    [Show full text]
  • Teradici Remote Workstation Card Agent for Windows
    Teradici PCoIP Remote Workstation Card Agent for Windows Documentation Teradici PCoIP Remote Workstation Card Agent for Windows Documentation This documentation is intended for administrators who are installing the Remote Workstation Card Agent for Windows as part of a Teradici Remote Workstation Card system. It assumes thorough knowledge of conventions and networking concepts, including firewall configuration. Although many agent features and settings can be configured using the Windows user interface, some administrative tasks require use of Windows command line tools. Users should be familiar with both cmd and PowerShell. About the PCoIP Remote Workstation Card Agent for Windows The PCoIP Remote Workstation Card Agent for Windows introduces Teradici brokering to a Teradici Remote Workstation Card deployment, allowing the desktop to be managed by Teradici Cloud Access Manager or by third-party brokers like Leostream. A complete PCoIP Remote Workstation Card deployment includes these components: • A physical host machine, which provides the desktop to remote clients. See System Requirements for more information. • A PCoIP Remote Workstation Card installed on the host machine. • The PCoIP Remote Workstation Card software for Windows installed on the host machine. • The Remote Workstation Card Agent for Windows installed on the host machine. About PCoIP Licensing When the Remote Workstation Card Agent for Windows is installed, the Remote Workstation Card can be licensed using a Remote Workstation Card license. With this flexibility, you can
    [Show full text]
  • F.A.Q. Series ROM-DOS TM
    21520 30th Drive SE #110 Bothell, WA 98021 USA Tel: (425) 951-8086 Fax: (425) 951-8095 [email protected] [email protected] www.datalight.com TM ROM-DOS F.A.Q. Series Question: Assuming they don't want FAT32, Long Filename support, or Sockets, why should my customer upgrade to the newest ROM-DOS? Answer: Since our first FAT32 and LFN release 4.00.1091, there have been several improvements to the core ROM- DOS kernel. This core code is used primarily for our DOS 6.22 compatible compilations, and then extended in the case of a FAT32 or Long Filename build. The 4.00.1091 release is also a new code base and there will be no further upgrades to the previous DOS 6.22 code. In order to obtain new features, fixes, and support a customer must upgrade to release 4.00.1091 or greater. Along with the performance enhancements for both size and speed, several corrections have been made to the ROM-DOS kernel. These include stack and memory issues, disk access issues, and compatibility with the former market leader in DOS. Most of the ROM-DOS utilities have also been improved for size and speed, along with bug fixes. The major changes happened with the XCOPY, HIMEM, MSCDEX, CHKDSK, FDISK and FORMAT utilities. In the realm of international support, the Euro was added to the keyboard and display driver code. ROM- DOS and PC-DOS 2000 are the only non-GUI operating systems to support the Euro. Finally, new ROM-DOS utilities have been added.
    [Show full text]
  • Tutorial for VCS
    Tutorial for VCS STEP 1: login to the Linux system on Linuxlab server. Start a terminal (the shell prompt). Click here to open a shell window Fig. 1 The screen when you login to the Linuxlab through equeue STEP 2: In the terminal, execute the following command: module add ese461 You could perform “module avail” in the terminal to find the available modules on Linuxlab. Make sure ese461 is presented when you execute this command. 1.Find the available modules 2.Make sure ese461 is presented 3.This command will set up the work environment for class ESE461 Fig. 2 Build work environment for class ESE461 using module 1 STEP 3: Getting started with Verilog • Creating a new folder (better if you have all the files for a project in a specific folder). • Enter into this new folder and start writing your Verilog script in a new file (.v file). Example code for modeling an counter is here • In addition to model code, Test Bench script has to be given in order to verify the functionality of your model (.v file). Example code of test bench for counter is here. Use gedit to edit the .v files (gedit is a commonly used GUI editor on Linux ) Fig. 3 Open gedit through teminal STEP 4: Compiling and simulating your code • In the terminal, change the directory to where your model and test bench files (Counter.v and Counter_tb.v) are present by using this command: cd <path> For example: cd ~/ESE461/VcsTutorial/ (Remark: ‘~’ means home directory on Linux) • Compile the files by typing in the terminal: vcs <file>.v <file_tb>.v In the above example, it should be: vcs Counter.v Counter_tb.v There should be no error presented in the terminal.
    [Show full text]
  • Device Manager 1
    CHAPTER 1 Device Manager 1 This chapter describes how your application can use the Device Manager to transfer information into and out of a Macintosh computer. The Device Manager controls the 1 exchange of information between applications and hardware devices. Manager Device This chapter provides a brief introduction to devices and device drivers (the programs that control devices) and then explains how you can use the Device Manager functions to ■ open, close, and exchange information with device drivers ■ write your own device driver that can communicate with the Device Manager ■ provide a user interface for your device driver by making it a Chooser extension or desk accessory. You should read the sections “About the Device Manager” and “Using the Device Manager” if your application needs to use the Device Manager to communicate with a device driver. Applications often communicate with the Device Manager indirectly, by calling functions of other managers (for example, the File Manager) that use the Device Manager. However, sometimes applications must call Device Manager functions directly. The sections “Writing a Device Driver,” “Writing a Chooser-Compatible Device Driver,” and “Writing a Desk Accessory,” provide information you’ll need if you are writing your own device driver. If you writing a device driver, you should understand how memory is organized and allocated in Macintosh computers. See Inside Macintosh: Memory, for this information. You should also be familiar with resources and how the system searches resource files. You can find this information in the chapter “Resource Manager” in Inside Macintosh: More Macintosh Toolbox. If your device driver is to perform background tasks, you’ll need to understand how processes are scheduled.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • IBM Cognos Analytics - Reporting Version 11.1
    IBM Cognos Analytics - Reporting Version 11.1 User Guide IBM © Product Information This document applies to IBM Cognos Analytics version 11.1.0 and may also apply to subsequent releases. Copyright Licensed Materials - Property of IBM © Copyright IBM Corp. 2005, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at " Copyright and trademark information " at www.ibm.com/legal/copytrade.shtml. The following terms are trademarks or registered trademarks of other companies: • Adobe, the Adobe logo, PostScript, and the PostScript logo are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States, and/or other countries. • Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. • Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo, Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. • Linux is a registered trademark of Linus Torvalds in the United States, other countries, or both. • UNIX is a registered trademark of The Open Group in the United States and other countries. • Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.
    [Show full text]
  • The Ask Leo! ® Guide to Routine Maintenance 2 Contents the Ask Leo! Manifesto
    The Ask Leo! Guide to Routine Maintenance Simple steps to make your computer last longer and run faster. By Leo A. Notenboom An Ask Leo! ebook ISBN: 978-1-937018-10-8 (pdf) Copyright © 2013 The Ask Leo! ® Guide to Routine Maintenance 2 http://askleo.com Contents The Ask Leo! Manifesto ......................................................................................................................................... 7 Be sure to register your book! ................................................................................................................................. 8 Introduction – 12 months or 12,000 miles .............................................................................................................. 9 Back Up ................................................................................................................................................................ 10 Creating a System Repair Disk ............................................................................................................................. 11 Creating a Windows 7 System Repair disc ....................................................................................................... 11 A System Repair disc might not be all you think ............................................................................................. 12 A System Repair disc is not a System Installation disc .................................................................................... 13 A System Installation disc IS a System Repair disc
    [Show full text]
  • Solve Errors Caused by Corrupt System Files
    System File Corruption Errors Solved S 12/1 Repair Errors Caused by Missing or Corrupt System Files With the information in this article you can: • Find out whether corrupt system files could be causing all your PC problems • Manually replace missing system files using your Windows installation CD • Use System File Checker to repair broken Windows system files • Boost the memory available to Windows File Protection for complete system file protection Missing or corrupt system files can cause many problems when using your PC, from cryptic error messages to mysterious system crashes. If one of the key files needed by Windows has gone missing or become corrupt, you may think that the only way to rectify the situation is to re-install Windows. Fortunately, nothing that drastic is required, as Microsoft have included several tools with Windows that allow you to replace corrupt or missing files with new, fresh copies directly from your Windows installation CD. Now, whenever you find that an important .DLL file has been deleted or copied over, you won’t have to go to the trouble of completely re-installing your system – simply replace the offending file with a new copy. Stefan Johnson: “One missing file can lead to your system becoming unstable and frequently crashing. You may think that the only way to fix the problem is to re-install Windows, but you can easily replace the offending file with a fresh copy from your Windows installation CD.” • Solve errors caused by corrupt system files ................... S 12/2 • How to repair your missing system file errors ..............
    [Show full text]
  • Vmware ESX Host Utilities 5.2.1 Installation and Setup Guide
    IBM System Storage N series VMWare ESX Host Utilities 5.2.1 Installation and Setup Guide GC53-1173-03 NA 210-05158_A0 Table of Contents | 3 Contents Supported features ....................................................................................... 7 Getting information, help, and services ...................................................... 9 Before you call ............................................................................................................ 9 Using the documentation ............................................................................................. 9 Web sites ................................................................................................................... 10 Accessing online technical support ........................................................................... 10 Hardware service and support ................................................................................... 10 Supported servers and operating systems .................................................................. 10 Firmware updates ...................................................................................................... 10 How to send your comments ...................................................................... 13 Changes to this document: March 2011 ................................................... 15 Introduction to Host Utilities ..................................................................... 17 What the Host Utilities are .......................................................................................
    [Show full text]