MS-DOS Secret And/Or Unknown Commands

Total Page:16

File Type:pdf, Size:1020Kb

MS-DOS Secret And/Or Unknown Commands MS-DOS secret and/or unknown commands Below is a listing of MS-DOS commands that are not listed in any available help manual or in the commands syntax or are commonly unknown commands. Many of these commands that are known can be very useful when using MS-DOS, while some of the other commands are unknown and/or appear to do nothing. Please use these commands cautiously, some of the commands can erase data and/or erase data without warning. ATTRIB , The command is short for ATTRIB -a -h -r - s *.* (removes all attributes of a file). BACKUP /HP Unknown DIR , This lists all files including hidden files, does not work in Windows 95 / 98 / NT / 2000. DIR ... Lists all directories that do not have extensions. In Windows 95 / Windows 98 will list the contents of the directories previous to the directory currently in. DOSKEY /APPEDIT Utilize doskey functions in MS-DOS command utilities such as edlin and debug. DOSKEY Unknown /COMMAND DOSKEY Unknown /PERMANENT DOSKEY /SCRSIZE Unknown DOSKEY Unknown /XHISTORY FDISK /MBR Recreates the Master Boot Record See CH000175 for additional information. FDISK /PRI See FDISK Page for additional information. FDISK /EXT See FDISK Page for additional information. FDISK /LOG See FDISK Page for additional information. FDISK /Q Prevents fdisk from booting the system automatically after exiting fdisk. FDISK /STATUS Shows you the current status of your hard drives. FORMAT Formats the hard drive without any prompting. /AUTOTEST FORMAT /BACKUP Like /AUTOTEST but it will ask you for a volume label. FORMAT /Z:n Command used with FDISK supporting FAT32, used to specify the cluster size in bytes where n is multiplied by 512. MEM /A or /ALL Adds a line into the MEM command tells the available space in HMA. RESTORE /Y Unknown RESTORE /Z Unknown SET DIRCMD=0 Will make all directories hidden however still accessible, to get them back SET DIRCMD= SHARE /NC Unknown TRUENAME When placed before a file, will display the whole directory in which it exists. VER /R Tells you the Revision and if DOS is in HMA..
Recommended publications
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • TRSDOS 6.2 to LS-DOS 6.3.0 Manual Update
    LS-DOSÔ 6.3 UPDATE FOR TRSDOSâ 6.2.X The LS-DOS 6.3 release is an upgrade for the TRSDOS 6.2 operating system. Several important changes have been made to extend and enhance the operating system and its utilities. The date ranging has been expanded to accept dates through the year 1999. Files will now carry a modification time as well as a date. The DATECONV/CMD program is provided to translate version 6.2 or earlier disks to the 6.3 style dating. The user password has been eliminated from the system. The owner password still remains. The library command ID was added to display a customer service number. Several enhancements have been made to BASIC. The new DISKCOPY/CMD program will duplicate 5" double density floppy disks. Because the LS-DOS 6.3 update is a series of enhancements to TRSDOS 6.2, the primary documentation remains the 6.2 manual and Technical Reference manual. If you have a version of TRSDOS earlier than 6.2, you can obtain the manuals from Radio Shack under the catalog numbers 26-0316 (TRSDOS Version 6 [6.2 DOS manual and disk]), 26-2110 (Model 4/4D [6.2] Technical Reference Manual), or 26-1117 (6.2 DOS manual only). This documentation should be treated as an addendum to the TRSDOS 6.2 information. LS-DOS 6.3 installation instructions Before performing the upgrade, it is recommended that you make several backup copies of the 6.3 master disk. The simplest way to do this is to boot your system using the 6.3 diskette, insert a blank diskette to receive the copy in drive 1, and type the command: DISKCOPY :0 :1 When the copy finishes, you can insert another destination diskette and make another copy.
    [Show full text]
  • Experimental Evidence on Predatory Pricing Policies
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian Working Paper Hunting unicorns? Experimental evidence on predatory pricing policies Working Paper, No. 258 Provided in Cooperation with: Department of Economics, University of Zurich Suggested Citation: Edlin, Aaron S.; Roux, Catherine; Schmutzler, Armin; Thöni, Christian (2017) : Hunting unicorns? Experimental evidence on predatory pricing policies, Working Paper, No. 258, University of Zurich, Department of Economics, Zurich, http://dx.doi.org/10.5167/uzh-138188 This Version is available at: http://hdl.handle.net/10419/173418 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu University of Zurich Department of Economics Working Paper Series ISSN 1664-7041 (print) ISSN 1664-705X (online) Working Paper No.
    [Show full text]
  • Measuring the Effectiveness of Generic Malware Models
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 2017 Measuring the Effectiveness of Generic Malware Models Naman Bagga San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Bagga, Naman, "Measuring the Effectiveness of Generic Malware Models" (2017). Master's Projects. 566. DOI: https://doi.org/10.31979/etd.8486-cfhx https://scholarworks.sjsu.edu/etd_projects/566 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. Measuring the Effectiveness of Generic Malware Models A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Naman Bagga December 2017 ○c 2017 Naman Bagga ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled Measuring the Effectiveness of Generic Malware Models by Naman Bagga APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY December 2017 Dr. Mark Stamp Department of Computer Science Dr. Jon Pearce Department of Computer Science Dr. Thomas Austin Department of Computer Science ABSTRACT Measuring the Effectiveness of Generic Malware Models by Naman Bagga Malware detection based on machine learning techniques is often treated as a problem specific to a particular malware family. In such cases, detection involves training and testing models for each malware family.
    [Show full text]
  • Command Window – Basic Commands
    Command Window – Simple Commands help lists all commands p: switch to your P-drive c: switch to the computer’s C-drive dir list all files in a directory (aka “folder”); e.g. dir (list all files in current directory) dir myfolder (list all files in subdirectory myfolder) cd change directory; e.g. cd myfolder (move to subdirectory myfolder) cd .. (move up one directory level) md make (create) a directory; e.g. md myfolder (make a subdirectory called myfolder) copy copy files; e.g. copy oldfile newfile copy source.f90 myfolder\source.f90 ren rename files; e.g. ren oldfile newfile erase erase (delete) a file; e.g. (or del) erase unwanted.txt fc file compare; e.g. fc file1 file2 type list the contents of a file type somefile.txt type somefile.txt ¦ more (list contents, one page at a time) Wildcards (* and ?) Can be used to match length-unspecified strings (*) or individual letters (?); e.g. copy *.f90 *.bak dir solve.f?? Command Syntax and Options Most commands have various options; e.g. dir /p – list files, one page at a time To find the syntax and options available for any particular command use the /? option; e.g. dir /? History Use the and arrows on keyboard to recover previous commands. Use F7 to get a list of previous commands and arrow up and down to choose one to reissue. Editors An editor called notepad comes with the operating system: notepad myfile.f90 Running Programs You can run any program simply by typing its name; e.g. to run windows explorer: explorer Batch Files To avoid having to type a long sequence of commands it is convenient to put them all in a batch file – identified by the .bat extension.
    [Show full text]
  • Session 1171-2017
    Paper 1171-2017 Let SAS® Do Your DIRty Work Richann Watson, Experis ABSTRACT Making sure that you have saved all the necessary information to replicate a deliverable can be a cumbersome task. You want to make sure that all the raw data sets and all the derived data sets, whether they are Study Data Tabulation Model (SDTM) data sets or Analysis Data Model (ADaM) data sets, are saved. You prefer that the date/time stamps are preserved. Not only do you need the data sets, you also need to keep a copy of all programs that were used to produce the deliverable, as well as the corresponding logs from when the programs were executed. Any other information that was needed to produce the necessary outputs also needs to be saved. You must do all of this for each deliverable, and it can be easy to overlook a step or some key information. Most people do this process manually. It can be a time-consuming process, so why not let SAS® do the work for you? INTRODUCTION Making a copy of all information needed to produce a deliverable is time-consuming and is normally done using • Windows® Explorer: copy and paste to a new folder for archiving • Command interpreter (CMD shell)*: copy or move commands Both of these methods require you to create an archive directory and either copy or move the files manually. Most people go the route of using Windows Explorer due to familiarity. This can tie up your computer while the files are being archived. CMD is faster and commands can be set to run in the background if you know how to access CMD and know the necessary commands.
    [Show full text]
  • Pingdirectory Administration Guide Version
    Release 7.3.0.3 Server Administration Guide PingDirectory | Contents | ii Contents PingDirectory™ Product Documentation................................................ 20 Overview of the Server............................................................................. 20 Server Features.................................................................................................................................20 Administration Framework.................................................................................................................21 Server Tools Location....................................................................................................................... 22 Preparing Your Environment....................................................................22 Before You Begin.............................................................................................................................. 22 System requirements..............................................................................................................22 Installing Java......................................................................................................................... 23 Preparing the Operating System (Linux).......................................................................................... 24 Configuring the File Descriptor Limits.................................................................................... 24 File System Tuning.................................................................................................................25
    [Show full text]
  • Doskey Singleton MVP Her Independent, Colleges and Knew She Was in Senior Universities of Wisconsin Operate Trouble When She Year
    WTG Achievers Vol. 11, No. 4 November 2010 About the WTG Basketball star finds her stride again with WTG The twenty private, or Doskey Singleton MVP her independent, colleges and knew she was in senior universities of Wisconsin operate trouble when she year. And without taxpayer support, but fl unked an informa- thanks to a provide an invaluable public tion technology class suggestion service to the state, educating in her fi rst semester from her more than 60,000 students a at Silver Lake Col- basketball year. Many of Wisconsin’s best lege. coach, Dos- and brightest need financial help key visited to attend the college of their Doskey is the fi rst to Silver Lake. choice. admit that she didn't start out as the best Doskey The State of Wisconsin created student. Attend- joined the Wisconsin Tuition Grant ing three different DoskeyDoskey Singleton,Singleton, Milwaukee,Milwaukee, faced her share of chal-chal- the SLC (WTG) in 1965 to help qualified Milwaukee high lenges as a freshman, but says she’s stronger now. basketball Wisconsin citizens to succeed. schools, she fi nally team last fall, Fully one-third of the low-income found the right fi t at a school I would have never made but the transition to college students who apply for the WTG that helped her integrate her it to college,” Doskey says. wasn’t easy as she struggled are turned away every year studies and life goals. “If At Destiny, Doskey was the academically. “When I was for lack of funds. Each month it wasn’t for Destiny High, school’s leading scorer and continued on page 2 WTG Achievers brings you success stories of Wisconsinites for whom the WTG has made a WTG helps senior “pay it forward” as graduation looms significant difference.
    [Show full text]
  • Falcon DOS Portable Terminals Advanced User's Guide
    ! " #$% & " ' ()**%++,,,&% & " !"# $ $ % &' $ % ( ( % )*+ (*,' (% $ )(+ $ - !!. !!/$ 0 1 2 + + 2 3'4 0 5 -../ .+ 0 % &6 (*, % $ & & &/,( % & & ( &/,( 0 &(*, % & ! "#$%#$&#'%#'&( !! ! )!* 0 $ $ 0 3&7 4 8 $ 9 8 % 2 $ : $ 1 0 ; < $ ; * $ , . % $ / ) = ) $ # 0 , $ # 0 ( ( " & > 0 & > ? ! % , < 9 $ ; 0 ++ . 0 + = 0 & 2
    [Show full text]
  • Hardening Windows 2000
    Hardening Windows 2000 Philip Cox ([email protected]) Version 1.3 March 14, 2002 Abstract Determining what steps need to be taken to secure a system is one of the most frustrating things that system administrators have to do. This white paper provides a method for getting a Win2K server to a “secure” baseline. From this baseline you can work forward to install additional services. The focus of this white paper is on the Win2K server, but much of the information is applicable to Win2K Professional as well. This paper is excerpted and modified from Chapter 21 of the “Windows 2000 Security Handbook” (ISBN: 0-07- 212433-4, copyright Osborne/McGraw-Hill) authored by Phil Cox and Tom Sheldon (www.windows2000securityhandbook.com). Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2002. All rights reserved. All trademarks used herein are the property of their respective owners. Original material and content © Osborne/McGraw-Hill, 2000-2001. Supplemental material and updates © SystemExperts Corporation, 1995 - 2001. Table of Contents Abstract......................................................................................................................................................................1 Table Of Contents......................................................................................................................................................2 The Requirements ......................................................................................................................................................3
    [Show full text]
  • [D:]Path[...] Data Files
    Command Syntax Comments APPEND APPEND ; Displays or sets the search path for APPEND [d:]path[;][d:]path[...] data files. DOS will search the specified APPEND [/X:on|off][/path:on|off] [/E] path(s) if the file is not found in the current path. ASSIGN ASSIGN x=y [...] /sta Redirects disk drive requests to a different drive. ATTRIB ATTRIB [d:][path]filename [/S] Sets or displays the read-only, archive, ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] [d:][path]filename [/S] system, and hidden attributes of a file or directory. BACKUP BACKUP d:[path][filename] d:[/S][/M][/A][/F:(size)] [/P][/D:date] [/T:time] Makes a backup copy of one or more [/L:[path]filename] files. (In DOS Version 6, this program is stored on the DOS supplemental disk.) BREAK BREAK =on|off Used from the DOS prompt or in a batch file or in the CONFIG.SYS file to set (or display) whether or not DOS should check for a Ctrl + Break key combination. BUFFERS BUFFERS=(number),(read-ahead number) Used in the CONFIG.SYS file to set the number of disk buffers (number) that will be available for use during data input. Also used to set a value for the number of sectors to be read in advance (read-ahead) during data input operations. CALL CALL [d:][path]batchfilename [options] Calls another batch file and then returns to current batch file to continue. CHCP CHCP (codepage) Displays the current code page or changes the code page that DOS will use. CHDIR CHDIR (CD) [d:]path Displays working (current) directory CHDIR (CD)[..] and/or changes to a different directory.
    [Show full text]
  • 01001100 01001100 01001100 01001100
    01001100 01001100 01001100 01001100 01010100 01010100 01010100 01010100 01000101 01000101 LTER DATABITS 01000101 01000101 01010010 01010010 01010010 01010010 _______________________________________________________________________________________ Summer 1990 Data Management Newsletter of Long-term Ecological Research Welcome to the summer 1990 issue of DATABITS! This issue features the agenda of the upcoming data manager's meeting, a report on the most recent LTER Coordinating Committee meeting, reports from the sites and some hints on using Unix and MSDOS. From the Sites BNZ-- At BCEF field season has caught up with us, and our efforts are concentrated on data acquisition and storage at a fast and furious pace. -- Phyllis Adams, Bonanza Creek LTER HFR-- A busy field season has begun, with help from summer undergraduates: among other things, we're finishing the current forest inventory, mapping trees for the hurricane pull-down and overstory deadening experiments next fall, and resampling hurricane regeneration plots. Data is entered and analyzed on the computers at the end of each field day. Indoors we're setting up new computers, digitizing GIS overlays, continuing analysis of several GIS projects, and beginning the long task of keyboarding data from the past. -- Emery Boose, Harvard Forest LTER NWT-- Recent construction of our climate database represents a level of accessibility previously unknown. Although these data (38-year record for Niwot Ridge) have been reduced and stored on magnetic tape or floppy disks for several years, difficulties associated with use of the data as stored on these media have discouraged all but the most persistent researchers from resorting to hard copies. The new climate database allows for the rapid creation of files, tailored by individual investigators to meet their parti- cular needs, that are easily loaded into a spreadsheet format.
    [Show full text]