Windows Command Prompt. | 1

Total Page:16

File Type:pdf, Size:1020Kb

Windows Command Prompt. | 1 windows command prompt. | 1 how to use windows command prompt. *this is a guide that was created from lecture videos and is used to help you gain an understanding of how to use windows command prompt. Windows Command Line Basics How to get to the command line- Start -> CMD Help provides a help screen CLS clears the screen Switch- text you add to end of command to do something else /? Exit to exit command line Run as administrator- start -> command prompt (admin) Dir to see what is in the current folder/directory, is a folder Dir /W shows less detail with more files and folders on screen Dir /p shows 1 page at a time “Press and key to continue..” = press control + c Cd to point/change to a different directory/folder Cd \ puts you at the root of your directory Cd .. to bring you up one folderWorking with folders and files Md to make a directory/folder Rd used to remove directory Type in the drive you want to access ex. d: or c: Copy [destination] to copy files, files must be in quotations Del and erase are identical commands used to delete * is a wildcard that means any and all characters Ex. Copy * .doc d: – copies all files in a directory that is a .doc to the D drive mind movement machine. windows command prompt. | 2 Del * .doc to delete all files that are .doc Move to move files around to another directory *.* means everything Fancy copying Xcopy used for large amount copies for files and folders xcopy /s copies current and populated subdirectories Xcopy /e copies empty directories Ex. Xcopy *.* d: /s copies everything to the d: drive Robocopy is faster and more robust than xcopy, used more for folders and not files Working with drives Format will format drives from the command line Format d: will format the d drive; don’t format your c: drive. Diskpart used to Partition hard drives List disk will list the disks -> select disk -> List partition will show the partitions on a drive -> select partition -> delete partition *Deleting a partition will remove it’s data Chkdsk will check the individual clusters/blocks on a hard drive and only works on unmounted drives Chkdsk /f fixes files but will take awhile and requires a reboot of the system Chkdsk /f /x unmounts the volume and fixes files System File Checker SFC /scannow looks at critical files and detects if there is a problem, used for corrupted files or boot problems Advanced Windows Command Line Gpupdate forces immediate application of group policy settings, make your group policy mind movement machine. windows command prompt. | 3 update then run Gpresult displays group policy information, shows everything a single user is able to do on a system Tasklist lists running processes on system and assigns a number (PID) to each Taskkill /pid ### to kill a process after running tasklist Windows Recovery Console Boot errors are things that pop up that prevent Windows from starting. “Ntldr is missing” is a boot error, use recovery console with Windows XP installation cd. Fixboot tool rewrites a new boot sector onto your partition Fixmbr tool puts a new master boot record into that boot sector, used only if there is no virus Windows Recovery Environment/WinRE Access through Windows Installation Media or a bootable drive. Startup Repair reinstalls your boot files System Restore will search for system restore points System Image Recovery restores from a backup Memory Diagnostic is a RAM tester to check your RAM Repair your Computer options will bring you into WinRE Refresh your PC will check many functions in your computer Reset your PC will bring your system back to factory settings Advanced Options- System Restore, System Image Recovery, Command Prompt, Startup Repair Advanced Startup Options Press F8 when your system is booting up to access advanced startup options mind movement machine. windows command prompt. | 4 Safe Mode will boot Windows in the most basic mode, system will run slowly in safe mode Safe Mode with Networking will turn on networking Enable Boot Logging will create a file bootlog.txt that will keep track of Windows as it loads Enable VGA Mode can be used if you have video card issues Last Known Configuration will configure based on the last configuration Debugging will allow you to watch Windows at it loads and generate a debugging list Disable Driver Signature Enforcement will force device drivers to need a signature Access Startup Options- (Windows 8.1) Charm bar -> Settings -> Change PC Settings -> Update and Recovery -> Recovery -> Advanced Startup Restart Now -> Troubleshoot -> Advanced Options -> Startup Settings Access Startup Options (Windows 10) Start -> Power -> Hold Shift Key and click Restart -> Troubleshoot -> Advanced Options -> Startup Settings To be able to access Startup Options on Windows 8/8.1/10 with F8 option- command prompt -> bcdedit /set {default} bootmenupolicy legacy Boot Problems Hardware- Ensure storage device is functioning properly, ensure all device cables are plugged in and working BIOS- Boot order, device disabled Desktop- missing operating system, missing BCD, boot into recovery environment to fix Autostart- slow startup, check autostarting and use msconfig to troubleshoot issue Event Viewer / Action Center Access through Administrative Tools for Event Viewer mind movement machine. windows command prompt. | 5 Check your basic logs such as application logs, security logs, setup logs, system logs Information- somethings has happened and Windows is letting you know Warning- found a problem that has been fixed Error- found a problem and cannot fix Critical- something has happened and it is a critical issue Views are custom filtered logs where you can segment the logs Create custom view within in event viewer to create a view Action Center is a utility to notify you when you are doing something wrong and reports real time issues, appeared in Windows Vista first Access through Control Panel, shows security issues and maintenance issues Application troubleshooting Missing DLL- your program cannot find a dynamic link library, DLL’s are subroutines saved in a file, research the missing DLL as it may just be a virus attempting to get into your system. If it is not a virus, then use sfc /scannow to allow Windows to check for automatic DLL updates. If that doesn’t work, then try reinstalling the program. If that does not work then find a DLL repository online for the DLL you are missing. REGSVR32 is used to register a DLL through Windows. Missing Service- check services to ensure the service is running, then enable the service with msconfig, if that does not work then you have to reinstall the program, and if that doesn’t work then you need to do more research in depth Compatibility error- try troubleshoot compatibility first by right clicking on the application To fix manually, right click on the application and choose Properties and go to Compatibility mind movement machine. windows command prompt. | 6 tab and choose which Windows you want to run the program and other options. You can also use virtualization to get an old program if this doesn’t work! System lockup- See if it is an application that locks up your system first, reboot into safe mode and uninstall the program, do research on the application to see what common problems Kernel panics When operating system is not working, a kernel panic screen will pop up. It is also known as a blue screen of death or stop error. Driver, incompatibility, new hardware issue can cause kernel panic. A corrupted driver will also cause kernel panic. Research the error message Spinning pinwheel of death means your Mac is stuck on something, just reboot your system to fix. Windows Install options Unattended installation- from windows, precreate answer file that windows asks during installation. Setup manager asks you the questions and then will save in a text file known as unattend.txt Network installation- PXE is a feature built into BIOS level, and boots off the network, you need a PXE server. In the BIOS ensure you find the PXE boot option and enable it as first boot device. PXE can be used for diskless workstation. PXE is also used from Apple netboot. Image deployment- not a classic installation. Symantic ghost is a server that is going to distribute the image copies to the client machines. Boot client from flash drive and download/install image. They will have the same name and license, so ensure you change the characteristics mind movement machine. windows command prompt. | 7 Windows upgrade paths Clean install- wipe hard drive clean and can upgrade to everything, downside is everything is wiped out including settings and applications. Upgrade install- very fast and the way to go. Windows Versions Windows Vista- 2006/2012 Windows 7- 2009/2015 Windows 8- 2012 metro desktop Windows 8.1- 2013, start button added Windows 10- 2015, current operating system Windows Edition Home- lacks features important to business Windows Vista Home Basic, Windows Vista Home Premium, Windows 7 Home Basic, Windows 7 Home Premium, Windows 8 (Core), Windows 8.1 (Core), Windows 10 Home Professional Windows Vista Business, Windows 7 Professional, Windows 8 Pro, Windows 8.1 Pro, Windows 10 Pro Ultimate Windows Vista Ultimate, Windows 7 Ultimate Enterprise- customized for large enterprises Windows Vista Business, Windows 7 Professional, Windows 8 Pro, Windows 8.1Pro You can upgrade from edition version to the next. From Windows Vista to Windows 7 Upgrade Home Basic to Home Basic, Home Premium, Ultimate mind movement machine. windows command prompt. | 8 Home Premium to Home Premium, Ultimate Business to Professional, Enterprise, Ultimate Enterprise to Enterprise Ultimate to Ultimate From Windows 7 to Windows 8 Upgrade Starter to Windows 8, Windows 8 Pro Home Basic to Windows 8, Windows 8 Pro Home Premium to Windows 8, Windows 8 Pro Professional to Windows 8 Pro, Windows 8 Enterprise Enterprise to Windows 8 Enterprise Ultimate to Windows 8 Pro From Windows 7/8/8.1 to Windows 8.1 Upgrade Windows 7 to Windows 8.1 Windows 8 to Windows 8.1, 8.1 Pro Windows 8 Pro to Windows 8.1 Pro, 8.1 Enterprise Windows 8 Pro with Media Center to Windows 8.1 Pro, 8.1 Enterprise Windows 8 Enterprise to Windows 8.1 Pro, 8.1 Enterprise Windows 8.1 to Windows 8.1 Pro Windows 8.1 Pro to Windows 8.1 Enterprise 32 bit vs 64 bit Look at the media to determine if it is 32 bit or 64 bit.
Recommended publications
  • Attack Tactics 7! the Logs You Are Looking For
    Attack Tactics 7! The Logs You Are Looking For © Black Hills Information Security @BHInfoSecurity Brought To You By! © Black Hills Information Security| @BHInfoSecurity Brought To You By! Just type “‘Demo,<script>alert(document.cookie);</script> or ‘ 1=1;--” into the Questions box DEMO will work fine too…. © Black Hills Information Security| @BHInfoSecurity Brought To You By! https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to- active-defense-cyber-deception-and-hacking-back-14124 © Black Hills Information Security| @BHInfoSecurity © Black Hills Information Security| @BHInfoSecurity Problem Statement © Black Hills Information Security @BHInfoSecurity JPcert to the rescue… Sort of.. © Black Hills Information Security @BHInfoSecurity A helpful diagram Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Executive Problem Statement Basic Questions: ● Are our tools working? ● What can we detect? ● How can we test this? ● What are our gaps? ● What existing tools can fill them? ● What do we have to buy? ● Can we buy ourselves out of this problem? © Black Hills Information Security @BHInfoSecurity TryingA helpful to diagramtie it all together Forensics Testing Defense © Black Hills Information Security @BHInfoSecurity Adventures in (just enabling proper) Windows Event Logging Important Event IDs ● 4624 and 4634 (Logon / Logoff) ● 4662 (ACL’d object access - Audit req.) ● 4688 (process launch and usage) ● 4698 and 4702 (tasks + XML) ● 4740 and 4625 (Acct Lockout + Src IP) ● 5152, 5154, 5156, 5157 (FW
    [Show full text]
  • Teradici Remote Workstation Card Agent for Windows
    Teradici PCoIP Remote Workstation Card Agent for Windows Documentation Teradici PCoIP Remote Workstation Card Agent for Windows Documentation This documentation is intended for administrators who are installing the Remote Workstation Card Agent for Windows as part of a Teradici Remote Workstation Card system. It assumes thorough knowledge of conventions and networking concepts, including firewall configuration. Although many agent features and settings can be configured using the Windows user interface, some administrative tasks require use of Windows command line tools. Users should be familiar with both cmd and PowerShell. About the PCoIP Remote Workstation Card Agent for Windows The PCoIP Remote Workstation Card Agent for Windows introduces Teradici brokering to a Teradici Remote Workstation Card deployment, allowing the desktop to be managed by Teradici Cloud Access Manager or by third-party brokers like Leostream. A complete PCoIP Remote Workstation Card deployment includes these components: • A physical host machine, which provides the desktop to remote clients. See System Requirements for more information. • A PCoIP Remote Workstation Card installed on the host machine. • The PCoIP Remote Workstation Card software for Windows installed on the host machine. • The Remote Workstation Card Agent for Windows installed on the host machine. About PCoIP Licensing When the Remote Workstation Card Agent for Windows is installed, the Remote Workstation Card can be licensed using a Remote Workstation Card license. With this flexibility, you can
    [Show full text]
  • Bulk Data Migration Using Robocopy
    Bulk Data Migration Using Robocopy Created by: Nasuni Support Last update: 6/14/2011 Contents Overview...................................................................................................................................................................... 2 Using Robocopy to copy data to the Nasuni Filer....................................................................................... 2 2011 © Nasuni Corporation. All Rights Reserved Resizing the Cache and Snapshots Disks in Nasuni Filer v2.7 Robocopy and the Nasuni Filer cache ............................................................................................................. 2 Conclusion ................................................................................................................................................................... 3 Overview The information in this document applies to Nasuni Filer 2.x versions. It explains how to use Robocopy, a Microsoft Windows tool, to migrate data from a Windows file server to the Nasuni Filer. Robocopy has been bundled with Windows operating systems since Vista and Server 2008. Using Robocopy to copy data to the Nasuni Filer Robocopy is a Windows command line tool. To migrate data to the Nasuni Filer using Robocopy follow the steps below. 1. Identify the data set you want to migrate to the Nasuni Filer 2. Create/locate a share on the Nasuni Filer to write your data set to 3. Run cmd.exe 4. Run the command below from the source server’s command line. robocopy (path to source data) (path to Filer share)
    [Show full text]
  • Transaction Insight Reference Manual Contents  I Admin - Filters - Partner Filter
    TIBCO Foresight® Transaction Insight® Reference Manual Software Release 5.2 September 2017 Two-second advantage® Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN LICENSE.PDF) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO and Two-Second Advantage, TIBCO Foresight EDISIM, TIBCO Foresight Instream, TIBCO Foresight Studio, and TIBCO Foresight Transaction Insight are either registered trademarks or trademarks of TIBCO Software Inc. in the United States and/or other countries.
    [Show full text]
  • Run-Commands-Windows-10.Pdf
    Run Commands Windows 10 by Bettertechtips.com Command Action Command Action documents Open Documents Folder devicepairingwizard Device Pairing Wizard videos Open Videos Folder msdt Diagnostics Troubleshooting Wizard downloads Open Downloads Folder tabcal Digitizer Calibration Tool favorites Open Favorites Folder dxdiag DirectX Diagnostic Tool recent Open Recent Folder cleanmgr Disk Cleanup pictures Open Pictures Folder dfrgui Optimie Drive devicepairingwizard Add a new Device diskmgmt.msc Disk Management winver About Windows dialog dpiscaling Display Setting hdwwiz Add Hardware Wizard dccw Display Color Calibration netplwiz User Accounts verifier Driver Verifier Manager azman.msc Authorization Manager utilman Ease of Access Center sdclt Backup and Restore rekeywiz Encryption File System Wizard fsquirt fsquirt eventvwr.msc Event Viewer calc Calculator fxscover Fax Cover Page Editor certmgr.msc Certificates sigverif File Signature Verification systempropertiesperformance Performance Options joy.cpl Game Controllers printui Printer User Interface iexpress IExpress Wizard charmap Character Map iexplore Internet Explorer cttune ClearType text Tuner inetcpl.cpl Internet Properties colorcpl Color Management iscsicpl iSCSI Initiator Configuration Tool cmd Command Prompt lpksetup Language Pack Installer comexp.msc Component Services gpedit.msc Local Group Policy Editor compmgmt.msc Computer Management secpol.msc Local Security Policy: displayswitch Connect to a Projector lusrmgr.msc Local Users and Groups control Control Panel magnify Magnifier
    [Show full text]
  • This Document Explains How to Copy Ondemand5 Data to Your Hard Drive
    Copying Your Repair DVD Data To Your Hard Drive Introduction This document explains how to copy OnDemand5 Repair data to your hard drive, and how to configure your OnDemand software appropriately. The document is intended for your network professional as a practical guide for implementing Mitchell1’s quarterly updates. The document provides two methods; one using the Xcopy command in a DOS window, and the other using standard Windows Copy and Paste functionality. Preparing your System You will need 8 Gigabytes of free space per DVD to be copied onto a hard drive. Be sure you have the necessary space before beginning this procedure. Turn off screen savers, power down options or any other program that may interfere with this process. IMPORTANT NOTICE – USE AT YOUR OWN RISK: This information is provided as a courtesy to assist those who desire to copy their DVD disks to their hard drive. Minimal technical assistance is available for this procedure. It is not recommended due to the high probability of failure due to DVD drive/disk read problems, over heating, hard drive write errors and memory overrun issues. This procedure is very detailed and should only be performed by users who are very familiar with Windows and/or DOS commands. Novice computers users should not attempt this procedure. Copying Repair data from a DVD is a time-consuming process. Depending on the speed of your processor and/or network, could easily require two or more hours per disk. For this reason, we recommend that you perform the actual copying of data during non-business evening or weekend hours.
    [Show full text]
  • Solve Errors Caused by Corrupt System Files
    System File Corruption Errors Solved S 12/1 Repair Errors Caused by Missing or Corrupt System Files With the information in this article you can: • Find out whether corrupt system files could be causing all your PC problems • Manually replace missing system files using your Windows installation CD • Use System File Checker to repair broken Windows system files • Boost the memory available to Windows File Protection for complete system file protection Missing or corrupt system files can cause many problems when using your PC, from cryptic error messages to mysterious system crashes. If one of the key files needed by Windows has gone missing or become corrupt, you may think that the only way to rectify the situation is to re-install Windows. Fortunately, nothing that drastic is required, as Microsoft have included several tools with Windows that allow you to replace corrupt or missing files with new, fresh copies directly from your Windows installation CD. Now, whenever you find that an important .DLL file has been deleted or copied over, you won’t have to go to the trouble of completely re-installing your system – simply replace the offending file with a new copy. Stefan Johnson: “One missing file can lead to your system becoming unstable and frequently crashing. You may think that the only way to fix the problem is to re-install Windows, but you can easily replace the offending file with a fresh copy from your Windows installation CD.” • Solve errors caused by corrupt system files ................... S 12/2 • How to repair your missing system file errors ..............
    [Show full text]
  • Vmware ESX Host Utilities 5.2.1 Installation and Setup Guide
    IBM System Storage N series VMWare ESX Host Utilities 5.2.1 Installation and Setup Guide GC53-1173-03 NA 210-05158_A0 Table of Contents | 3 Contents Supported features ....................................................................................... 7 Getting information, help, and services ...................................................... 9 Before you call ............................................................................................................ 9 Using the documentation ............................................................................................. 9 Web sites ................................................................................................................... 10 Accessing online technical support ........................................................................... 10 Hardware service and support ................................................................................... 10 Supported servers and operating systems .................................................................. 10 Firmware updates ...................................................................................................... 10 How to send your comments ...................................................................... 13 Changes to this document: March 2011 ................................................... 15 Introduction to Host Utilities ..................................................................... 17 What the Host Utilities are .......................................................................................
    [Show full text]
  • Guidelines for Designing Embedded Systems with Windows 10 Iot Enterprise
    Guidelines for Designing Embedded Systems with Windows 10 IoT Enterprise Version 2.0 Published July 15, 2016 Guidelines for designing embedded systems 1 CONFIDENTIAL Contents Overview .................................................................................................................................................................................................... 4 Building a task-specific experience ............................................................................................................................................ 4 General Group Policy settings ....................................................................................................................................................... 4 Application control ................................................................................................................................................................................ 5 Application boot options ................................................................................................................................................................. 5 Auto-boot Universal Windows apps ...................................................................................................................................... 5 Auto-boot Classic Windows apps ........................................................................................................................................... 5 Limit application access with AppLocker ...............................................................................................................................
    [Show full text]
  • Preparation of Papers in Two-Column Format
    Protecting Media Production Companies against Ransomware Rob Gonsalves Avid Technology, Inc. Burlington Massachusetts [email protected] Abstract - Ransomware, a type of malicious software designed to block access to digital assets until a sum of money is paid, represents a growing threat for media production companies, as digital media assets are a valued target for hackers. To protect their media assets and mitigate the risk of these types of attacks, companies can implement a set of security policies, procedures and systems. Deploying and operating Disaster Recovery (DR) systems with specific safeguards against ransomware will help companies retrieve valuable files without having to pay FIGURE 1 - INITIAL RANSOMWARE ATTACK cyber-criminals. This paper will discuss the growing threat of ransomware to media companies and cover the key The initial attack often comes when a user inadvertently concepts for understanding and building security and DR downloads and installs malware from a website. After systems with specific safeguards against ransomware. installation, the ransomware quietly searches for and Using these techniques, critical business functions can encrypts files. Its goal is to stay below the radar until it can continue in the event of an attack. find and encrypt all of the files that could be of value to the user. By the time the company is presented with the RANSOMWARE malware’s message with the ransom demand, the damage has already been done [2]. Ransomware is a form of malware that encrypts data files and holds these files for ransom. After the initial infection, the malware begins encrypting files on local drives, shared storage, and potentially other computers on the network.
    [Show full text]
  • 1. Xcopy 2. No, You Cannot Use the Xcopy Command in Your Assignment
    Intro to Operating Systems CNET 173 Assignment #4 Windows / LINUX Command Line Commands You are to list twenty-five command line commands of each operating system (WINDOWS and LINUX). That’s twenty- five WINDOWS commands and twenty-five LINUX commands. For each command you are to give: 1. The command a. Description/Attribute of the command b. Syntax of the command and c. A maximum of five Parameters used with the command and a description of the parameter. (If there are less than five parameters, list all parameters associated with the command.) Each command should be numbered and grouped (all WINDOWS commands with WINDOWS commands). Command information should be listed in the 1, a, b, c order listed above (i.e. command, description, syntax and parameters). This assignment must be typed and submitted through CANVAS. It should include a title page consisting of your name, course name, number, day and time, assignment name, instructor’s name, and due date and the assignment instructions. Example listed below. Windows Command Line Commands 1. xcopy a) Description - Copies files and directories, including subdirectories. b) Syntax xcopy Source [Destination] [/w] [/p] [/c] [/v] [/q] [/f] [/l] [/g] [/d[:mm-dd-yyyy]] [/u] [/i] [/s [/e]] [/t] [/k] [/r] [/h] [{/a|/m}] [/n] [/o] [/x] [/exclude:file1[+[file2]][+[file3]] [{/y|/-y}] [/z] c) Parameters /w : Displays the following message and waits for your response before starting to copy files: Press any key to begin copying file(s) /p : Prompts you to confirm whether you want to create each destination file. /c : Ignores errors. /v : Verifies each file as it is written to the destination file to make sure that the destination files are identical to the source files.
    [Show full text]
  • Dell Migrate User's Guide
    Dell Migrate User's Guide August 2021 Rev. A03 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Chapter 1: Introduction................................................................................................................. 5 Supported locales................................................................................................................................................................ 6 Chapter 2: Data Migration............................................................................................................. 7 Migrate and erase data from old PC...............................................................................................................................7 Check the network settings ...........................................................................................................................................19 Change the system locale............................................................................................................................................... 23 Device discovery
    [Show full text]