The Windows Command Line, Batch Files, and Scripting- Using the Command Shell
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Network Printing Guide
Network Printing Guide Windows 95/98/Me Configuration Windows 2000 Configuration Windows XP Configuration Windows NT 4.0 Configuration NetWare Configuration Macintosh Configuration Appendix For safe and correct use of this machine, please be sure to read the Safety Information in the Operating Instructions that comes with the machine before you use it. Introduction To get maximum versatility from this machine all operators should carefully read and follow the instruc- tions in this manual. Please keep this manual in a handy place near the machine. Important Contents of this manual are subject to change without prior notice. In no event will the company be li- able for direct, indirect, special, incidental, or consequential damages as a result of handling or oper- ating the machine. Software Version Conventions Used in this Manual • NetWare 3.x means NetWare 3.12 and 3.2. • NetWare 4.x means NetWare 4.1, 4.11 and IntranetWare. Trademarks Apple, AppleTalk, EtherTalk, LaserWriter, Macintosh and Mac are registered trademarks of Apple Computer, Inc. Ethernet is a registered trademark of Xerox Corporation. Microsoft, Windows and Windows NT are registered trademarks of Microsoft Corporation in the United States and/or other countries. Netscape and Netscape Navigator are registered trademarks of Netscape Communications Corpora- tion. Novell, NetWare and NDS are registered trademarks of Novell, Inc. PostScript is a registered trademark of Adobe Systems, Incorporated. Sun is a registered trademark of Sun Microsystems, Inc. SunOS is a trademark of Sun Microsystems, Inc. Other product names used herein are for identification purposes only and might be trademarks of their respective companies. -
Užitečné Postupy Pro Windows a Office Nepublikované V Oficiální Literatuře Artur Cimbálník
UNIVERZITA PARDUBICE Fakulta elektrotechniky a informatiky Užitečné postupy pro Windows a Office nepublikované v oficiální literatuře Artur Cimbálník Bakalářská práce 2011 Prohlášení autora Prohlašuji, ţe jsem tuto práci vypracoval samostatně. Veškeré literární prameny a informace, které jsem v práci vyuţil, jsou uvedeny v seznamu pouţité literatury. Byl jsem seznámen s tím, ţe se na moji práci vztahují práva a povinnosti vyplývající ze zákona č. 121/2000 Sb., autorský zákon, zejména se skutečností, ţe Univerzita Pardubice má právo na uzavření licenční smlouvy o uţití této práce jako školního díla podle § 60 odst. 1 autorského zákona, a s tím, ţe pokud dojde k uţití této práce mnou nebo bude poskytnuta licence o uţití jinému subjektu, je Univerzita Pardubice oprávněna ode mne poţadovat přiměřený příspěvek na úhradu nákladů, které na vytvoření díla vynaloţila, a to podle okolností aţ do jejich skutečné výše. Souhlasím s prezenčním zpřístupněním své práce v Univerzitní knihovně. V Pardubicích dne 29. 04. 2011 Artur Cimbálník Poděkování Tímto bych chtěl poděkovat doc. Ing Milanu Javůrkovi, CSc., vedoucímu mé bakalářské práce za pomoc při shánění materiálu a jeho rady při psaní tohoto textu. Anotace Práce se zabývá testováním postupů racionalizujících práci ve Windows a programech Microsoft Office. Jsou zde popsány jednotlivé pracovní postupy doplněné grafickými obrazovkami a popisem dané problematiky. Dále hodnotí jednotlivé verze kancelářských balíků Microsoft Office. Klíčová slova Office, Word, Excel, Windows, tipy, postupy, rady Title Useful procedures for Windows and Office unpublished in the official literature. Annotation Bachelor thesis deals with the testing of procedures rationalizing work in Windows and Microsoft Office. There are describing individual work procedures with graphic screens. -
Arc Hydro Geoprocessing Tools - Tutorial
Arc Hydro Geoprocessing Tools - Tutorial Version 2.0 – October 2011 ESRI 380 New York St., Redlands, CA 92373-8100, USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Arc Hydro GP Tools v 2.0 – Tutorial Copyright © 2011 Esri All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of Esri. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as expressly permitted in writing by Esri. All requests should be sent to Attention: Contracts Manager, Esri, 380 New York Street, Redlands, CA 92373-8100, USA. The information contained in this document is subject to change without notice. October 2011 i Arc Hydro GP Tools v 2.0 – Tutorial Table of Contents Introduction 5 Objective 5 Loading Arc Hydro Tools Toolbox 5 Accessing the Arc Hydro Geoprocessing Tools Help 7 Arc Hydro Tools Configuration 9 Arc Hydro Setup 10 1. Set Target Locations 10 2. Set Batch Target Locations 13 3. Standard Geoprocessing Configuration 15 Terrain Preprocessing 16 1. Level DEM 17 2. DEM Reconditioning 22 3. Assign Stream Slope 25 4. Burn Stream Slope 27 5. Build Walls 28 6. Sink Prescreening 29 7. Sink Evaluation 29 8. Sink Selection 31 9. Fill Sinks 32 10. Flow Direction 33 11. -
View the Slides (Smith)
Network Shells Michael Smith Image: https://commons.wikimedia.org/wiki/File:Network-connections.png What does a Shell give us? ● A REPL ● Repeatability ● Direct access to system operations ● User-focused design ● Hierarchical context & sense of place Image: https://upload.wikimedia.org/wikipedia/commons/8/84/Bash_demo.png What does a Shell give us? ● A REPL ● Repeatability ● Direct access to system operations ● User-focused design ● Hierarchical context & sense of place Image: https://upload.wikimedia.org/wikipedia/commons/8/84/Bash_demo.png Management at a distance (netsh) Netsh: Configure DHCP servers with netsh -r RemoteMachine -u domain\username [RemoteMachine] netsh>interface [RemoteMachine] netsh interface>ipv6 [RemoteMachine] netsh interface ipv6>show interfaces Reference: https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts Management at a distance (netsh) Netsh: Configure DHCP servers with netsh Location-r RemoteMachine -u domain\username Hierarchical [RemoteMachine] netsh>interfacecontext Simpler [RemoteMachine] netsh interface>ipv6 commands [RemoteMachine] netsh interface ipv6>show interfaces Reference: https://docs.microsoft.com/en-us/windows-server/networking/technologies/netsh/netsh-contexts Management at a distance (WSMan) WSMan (in Powershell): Manage Windows remotely with Set-Location -Path WSMan:\SERVER01 Get-ChildItem -Path . Set-Item Client\TrustedHosts *.domain2.com -Concatenate Reference: https://docs.microsoft.com/en-us/powershell/module/microsoft.wsman.management/about/about_wsman_provider -
Netsh Commands William John Holden 20140411 (Version 2) Interface Configuration Configure an Ipv4 Address with Subnet Mask and Default Gateway
Netsh Commands William John Holden 20140411 (version 2) Interface Configuration Configure an IPv4 address with subnet mask and default gateway. Omitted netmask implies classful addressing. netsh int ipv4 set address "Local Area Connection" static 192.168.1.3 255.255.255.0 192.168.1.1 Remove an IPv4 address and default gateway from an interface. netsh int ipv4 del address "Local Area Connection" 192.168.1.3 192.168.1.1 You can add more than one IP address to an interface. Additional addresses don't show up in ipconfig without /all. netsh int ipv4 add address "Local Area Connection" 192.168.1.4 Add a global unicast IP with prefix. Prefix is optional and defaults to /64. netsh int ipv6 set address "Local Area Connection" 2001:beef::1/64 Add a linklocal IP to an interface. See the similarity to above? netsh int ipv6 add address "Local Area Connection" fe80::6 Delete the IP. Remove a linklocal IP the same way. netsh int ipv6 del address "Local Area Connection" 2001:beef::1 Set an IPv6 default route. netsh int ipv6 add route ::/0 "Local Area Connection" fe80::3 Delete the default route. netsh int ipv6 delete route ::/0 "Local Area Connection" fe80::3 Reset Configuration Reset interface configuration completely (requires restart): netsh int ipv6 reset all netsh int ipv4 reset all shutdown r t 0 Verification (“show commands”) netsh has several commands that are very similar to ipconfig, route print (netstat r), netstat a, and getmac. Poke around netsh int ipv4 show ? and you’ll find lots of interesting stuff. -
How to Cheat at Windows System Administration Using Command Line Scripts
www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies. -
Copyrighted Material
2986IDX.qxd 9/6/01 12:12 AM Page 425 Index Note to the reader: Throughout this index boldfaced page numbers indicate pri- mary discussions of a topic. Italicized page numbers indicate illustrations. A for Local Users and Groups, 171 in Shared Folders, 333 abstracts, from Indexing Service, 140 Active Directory, 7–8 Accessibility, 2–6 for adding programs, 12 Internet Explorer options, 157 ActiveX controls, security settings for, 158 Magnifier, 176–177 Add Counters dialog, 257, 257–258 Narrator, 195–196 Add Excluded Files dialog On-Screen Keyboard, 234, 234–235 (Backup), 35 Options window, 2, 2–3 Add Hardware Wizard, 8–10, 350–351 Utility Manager, 385–386, 386 Add or Remove Programs, 10–13 Accessibility Options dialog, Keyboard address bar tab, 3, 3–4 in Explorer, 101–102, 102 Accessories, 6 in Internet Explorer, 149 Calculator, 37–38 Address Book, 13–25 Command Prompt, 46, 46–47 contact template, 20 Communications, 47 creating contacts, 16–17 Entertainment program group, 92 folders, 22–23 Program Compatibility Wizard, 288, 288–289 groups, 20–22 System Tools, 366. See also Backup identities for, 24–25 Character Map, 40 menus, 15–16 Disk Cleanup, 69–71, 71 retrieving e-mail addresses from, 241 Disk Defragmenter, 71–75 searching for people in, 325–326 File and Settings Transfer toolbar, 14, 15 Wizard, 112 window, 14 Scheduled Tasks, 316, 316–322 Address toolbar, 367 System Information, 361–363COPYRIGHTEDAdministrative Tools, MATERIAL 25–26. See also System Restore, 364, 364–365 Microsoft Management Console (MMC) snap-ins Windows Explorer, 97, 97–106 Active Directory, 7–8 Windows Movie Maker, 406–414, 407 for adding programs, 12 Action menu COM+ (Component Services), 45 for Device Manager, 59–63 Data Sources (ODBC), 51–55 425 2986IDX.qxd 9/6/01 12:12 AM Page 426 ADMINISTRATOR ACCOUNT Event Viewer, 93, 93–96, 94 attrib command, 291 Local Security Policy, 168, 168–170, AU files, 396 168–170 audio. -
Teach Yourself TCP/IP in 14 Days, Second Edition
Teach Yourself TCP/IP in 14 Days Second Edition Preface to Second Edition About the Author Overview Introduction 1. Open Systems, Standards, and Protocols 2. TCP/IP and the Internet 3. The Internet Protocol (IP) 4. TCP and UDP 5. Gateway and Routing Protocols 6. Telnet and FTP 7. TCP/IP Configuration and Administration Basics 8. TCP/IP and Networks 9. Setting Up a Sample TCP/IP Network: Servers 10. Setting Up a Sample TCP/IP Network: DOS and Windows Clients 11. Domain Name Service 12. Network File System and Network Information Service 13. Managing and Troubleshooting TCP/IP 14. The Socket Programming Interface Appendix A: Acronyms and Abbreviations Appendix B: Glossary Appendix C: Commands Appendix D: Well-Known Port Numbers Appendix E: RFCs Appendix F: Answers to Quizzes This document was produced using a BETA version of HTML Transit 2 Teach Yourself TCP/IP in 14 Days, Second Edition The second edition of Teach Yourself TCP/IP in 14 Days expands on the very popular first edition, bringing the information up-to-date and adding new topics to complete the coverage of TCP/IP. The book has been reorganized to make reading and learning easier, as well as to provide a more logical approach to the subject. New material in this edition deals with installing, configuring, and testing a TCP/IP network of servers and clients. You will see how to easily set up UNIX, Linux, and Windows NT servers for all popular TCP/IP services, including Telnet, FTP, DNS, NIS, and NFS. On the client side, you will see how to set up DOS, Windows, Windows 95, and WinSock to interact with a server. -
How Will You Troubleshoot the Issue? What Are the Steps to Followed? A
1. A user in a corporate network contacts service desk saying he/she has lost network connectivity: How will you troubleshoot the issue? What are the steps to followed? A. First I will check the network cable is plugged in or not. Then check the network connections and the ip address is assigned or not. Then check connecting to website or not. IP conflict. 2. A User calls in and complains that her computer and network is running very slow. How would go about troubleshooting it? A. 3. How would you create an email account for a user already in AD? A. Open Microsoft Outlook if you are using office 2000, and click on "Tools" tab. Go to "Email Accounts". There you can find two option like Email and Directory. Click on "Add a new Account" and click next. If you are using Exchange Server then click over there, this depends on that particular Organization. According to the their setup you have to choose. And if you are using POP3 server then next popup will come along with your name, email address POP3 and SMTP IP address, Password etc. and after that click on Next and finish it..... 4. A PC did not receive an update from SMS. What steps would we take to resolve this? A. If SMS not updated in client system. 1. Need to check system getting IPaddress or not. 2. Need to check system in domain or not 3.Ensure that windows firewall should be off. 5. How do you set the IP address by using the command prompt A. -
Nhdplus User Guide Page Ii of 115 This Guide Is Intended for Use with the Following Nhdplus Schema Versions
NNHHDDPPlluuss UUsseerr GGuuiiddee June 1, 2006 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page ii of 115 This guide is intended for use with the following NHDPlus schema versions. NHDPlus Component Schema Version Catchment Grid 01 Catchment Shape 01 Catchment Flowline Attributes 01 Elevation Grid 01 Flow Accumulation & Direction Grids 01 NHD 01 Stream Gage Events 01 2/3/2006 NHDPlus User Guide Page iii of 115 THIS PAGE LEFT BLANK INTENTIONALLY 2/3/2006 NHDPlus User Guide Page iv of 115 Table of Contents Acknowledgments.......................................................................................................................... ix Introduction to NHDPlus ................................................................................................................ 1 Data Package Content and Directory Structure .......................................................................... 3 NHDPlus Schema ....................................................................................................................... 5 Projection Information................................................................................................................ 7 NHDPlus Versioning System ..................................................................................................... 8 Feature Class Descriptions............................................................................................................ 11 Attribute Table Descriptions........................................................................................................ -
Threat Advisory: Eternalrocks
McAfee Labs Threat Advisory EternalRocks June 6, 2017 McAfee Labs periodically publishes Threat Advisories to provide customers with a detailed analysis of prevalent A malware. This Threat Advisory contains behavioral information, characteristics, and symptoms that may be used to n mitigate or discover this threat, and suggestions for mitigation in addition to the coverage provided by the DATs. d To receive a notification when a Threat Advisory is published by McAfee Labs, select to receive “Malware and Threat Reports” at the following URL: https://www.mcafee.com/enterprise/en-us/sns/preferences/sns-form.html. Summary EternalRocks is a network worm which uses the SMB exploits ETERNAL BLUE, ETERNALCHAMPION, ETERNALROMANCE, and ETERNALSYNERGY along with related programs DOUBLEPULSAR, ARCHITOUCH, and SMBTOUCH to spread. McAfee products detect this threat under the following detection names: • Trojan-EtrnlRock • Trojan.EternalRocks • Trojan-Bluedoom • HackTool-Shadowbrokers • RDN/Generic.grp • RDN/Generic.dx • RDN/Trojan-EtrnlRock • RDN/Generic Downloader.x Detailed information about the threat, its propagation, characteristics, and mitigation are in the following sections: • Infection and Propagation Vectors • Mitigation • Characteristics and Symptoms • Restart Mechanism • Remediation • McAfee Foundstone Services Infection and Propagation Vectors Even though this has not been confirmed, the malware’s initial vector is expected to be spam email. The malware spreads by exploiting shares and uses the EternalBlue (MS17-010 Echo Response - SMB vulnerability) vulnerability. The authors have used publicly available exploit code and embedded it as a part of their dropper. On execution, the malware connects to the IPC$ tree and attempts a transaction on FID 0, triggers the vulnerability, and then exploits it. -
The Recovery Console Content
The Recovery Console Content 1. Common .....................................................................................................................3 2. Invoke the Recovery Console......................................................................................3 2.1. Start from Media...................................................................................................3 2.2. Start using RIS .....................................................................................................4 2.3. Installation ............................................................................................................5 2.3.1. Attended ........................................................................................................5 2.3.2. Un-attended...................................................................................................6 2.4. Un-installation.......................................................................................................6 2.5. Windows NT 4.0 ...................................................................................................6 2.6. 64-bits ..................................................................................................................7 3. Commands..................................................................................................................7 3.1. Commands In-depth ...........................................................................................10 3.1.1. BOOTCFG...................................................................................................10