Older Operating Systems

Total Page:16

File Type:pdf, Size:1020Kb

Older Operating Systems Older Operating Systems Class Notes # 4 DOS Commands September 16, 2003 The COMMAND.COM is one of the files loaded into memory when DOS boots up. COMMAND.COM is a command interpreter that acts as your interface to DOS services. COMMAND.COM displays the DOS prompt used to indicate that the computer is ready for you to use. COMMAND.COM takes the characters that you type at the DOS prompt and turns them into an action. DOS recognizes and responds to over 80 commands. The most commonly used commands are contained within the DOS command interpreter, COMMAND.COM. The commands provided by COMMAND.COM are called internal commands. For example, the DIR and COPY command are internal commands. Other commands are stored as utility programs in a directory on your hard disk. These stored commands are not built into the command processor and are therefore called external commands. For example, the FORMAT command is an external command and is a file located in the DOS directory. The syntax for most DOS commands are: Commandname drive/files switches or Commandname sourcefile targetfile switches For example: COPY A:myfile.txt C:yourfile.txt Many users are confused about the way the slashes and back slashes are used in commands. The two simply rules are: • Backslash (\) are used as separators when specifying directory and file information. Example, COPY A:\files\myfile.txt C:\files • Slashes (/) are used as signals to DOS that the next character is a command-line switch. DIR/W To access on-line help for the use of a particular command, use one of the following procedures from the DOS prompt: • Type the DOS command, followed by the switch /? (example: DIR/?) • Type HELP, followed by the DOS command (example: HELP DIR) Wildcards When you’re entering DOS commands, you can use wildcards to specify groups of files. DOS recognizes two wildcard characters: question mark (?) and the asterisk (*). The question mark represents a single character. For example, DIR LTR???.TXT produces directory listing of any files in the current directory that have a file name beginning with the letters LTR followed by up to three characters. Also, those files have the TXT extension. 1 The asterisk represents any string of characters. For example, DIR *.* represents all file names and any extension. Files To provide data storage and retrieval, the operating system must provide a common method for file storage and retrieval so that any software package can access information easily and quickly. DOS provides these services without you having to know the internal details of how the disk works and why. When a file is created, either by your software, or a DOS file service routine, information about the physical location of the file is stored in a FAT (File Allocation Table), which is similar to a book’s table of contents. DOS places the name of each file and its attributes in a special structure called a directory. Listed below is the rules for creating a file in DOS: • Each file name in a specific folder must be unique • A name of one to eight characters, an optional extension of one to three characters, and a period between the name and extension (if an extension is used) • The file name may contain: letters A through Z, numerals 0 to 9, and special characters (i.e. $ # @ ! ^ ( ) { } ‘ ~ _ -) • A name cannot use the following: ASCII codes used as commands, space, special characters (i.e. + = / [ ] “ : ; ? * \ < > | ) Many software manufacturers use certain extensions for special file formats created by their application. DOS file names also have extensions. Listed below are some conventional file name extensions and their use: Table one: Common file name extensions Extension Description ARC Archive (compressed file) ASC ASCII text file ASM Assembly source file BAK Backup file BAT DOS batch file C C source file COM Program file DAT Data file DLL Windows dynamic link library DOC Document file (used by many word processors) DRV Device driver file EXE Executable program file INF Information file PIF Program Information File TXT Text file ZIP Compressed file (PKZIP) 2 File Attributes DOS tracks each file on a disk through a directory entry. This entry maintains critical information about the file and where it is stored on disk. One of the pieces of information maintained in the directory entry is the file attribute field. Each characteristic stored in the file attribute field is called the file attribute. Table two lists the attributes and their purpose in DOS: Table two File attributes and their description Attribute Description Archive When DOS writes to a file, it sets the archive attribute on. Hidden This file is bypassed by most DOS file management commands and does not appear in a directory listing. Read only This file can be accessed for information but cannot be erased or modified. Subdirectory This attribute identifies the entry as a directory rather than a standard file. System This file is a DOS system file. Volume label This entry is the volume label for a disk. The entry does not identify an actual file. You can view and modify most attributes using the ATTRIB command. The syntax of the ATTRIB command is: ATTRIB [+R|-R] [+A|-A] [+S|-S] [+H|-H] filespec [/S] To set the attribute use the plus (+) sign and to set the attribute off use the minus (-) sign. The R is to set the read only attribute, the A is to set the archive attribute, the S is to set the system attribute, and the H is to set the hidden attribute. Directories DOS directories keep your files organized. Think of directories as a file folder that may contain may files. The root directory is an important table created by the FORMAT command. DOS uses the directory as a kind of index system for finding files. A directory may contain files and other directories (called subdirectories). Typically, any installation of new programs will create directories. Also it is a good idea to organize your files in a directory structure. Imagine filing every single piece of paper in one folder…This would make it difficult to locate files. Therefore, avoid falling into the trap of creating a flat file structure. DOS uses a path name expression to traverse to find a specified file or group of files. A path name expression has three components: drive, directories, and files. The drive component identifies the disk drive used to store the files. The drive component is made up of three characters: the drive letter, followed by a colon (:) and a backslash (\). For example: C:\ DOS uses the backslash character to separate the directories within a path name expression. The directory component of the path name expression is a list of all the 3 directories that must be traversed to get to the last named directory or the file component. For example: C:\Windows\System\Games\SOL.EXE DOS path name expressions cannot exceed 63 characters in length, including the backslash DOS adds internally. DOS provides the internal MKDIR (or MD) command to create directories. The syntax for the MD command is: MD d:\path\dirname For example: MD e:\brief\games\oldgames DOS naming rules allow a directory name to be up to 11 characters long. You can create a directory names stuff.old, but by convention, DOS users have agreed to keep directory names to eight characters or less. The MD command can only create one directory at a time. Use the CHDIR (or CD) command to change from one directory to another. For example, to change directly to the root directory from any directory on the disk, issue the following command: CD \ DOS enables you to remove empty directories at the end of a directory branch in the directory tree with the RMDIR (or RD) command. If a directory contains files or has anther directory branching form it, the RD command fails. The DELTREE command enables you to delete directories that contain files – even complete branches of a directory tree. The syntax for DELTREE is: DELTREE /Y d:path The /Y parameter is optional. DOS normally displays the following message before deleting: Delete d:path and all its subdirectories? [Y/N] If you use the /Y option, then this message will not be displayed. DOS provides an external command – TREE – that lists all the directories of a disk as a tree structure. The TREE command syntax is: TREE d:\path /F /A The /F switch instructs TREE to display the files contained within directories as part of the visual tree. The /A switch instructs TREE to use printable characters instead of the line drawing characters normally used to indicate branching of directories. 4 Renaming Directories The MOVE command enables you to rename directories from the command line and also moves files from one directory to another. The syntax of the MOVE command is: MOVE d:oldpath d:newpath The MOVE command requires two path name expressions. The first specifies the directory you want to more and/or rename. The second path name expression specifies the new name of the target directory or the name of a directory to be created as a result of the command’s actions. If the directory does not exist, MOVE prompts you to whether the directory should be created. When you issue a DOS command, COMMAND.COM, the command interpreter, looks first to see whether the command is internal to DOS. If the command is not internal, DOS looks on the disk for a file name having the same name as the command. In this regard, both external DOS commands and other executable files have equal status.
Recommended publications
  • Configuring UNIX-Specific Settings: Creating Symbolic Links : Snap
    Configuring UNIX-specific settings: Creating symbolic links Snap Creator Framework NetApp September 23, 2021 This PDF was generated from https://docs.netapp.com/us-en/snap-creator- framework/installation/task_creating_symbolic_links_for_domino_plug_in_on_linux_and_solaris_hosts.ht ml on September 23, 2021. Always check docs.netapp.com for the latest. Table of Contents Configuring UNIX-specific settings: Creating symbolic links . 1 Creating symbolic links for the Domino plug-in on Linux and Solaris hosts. 1 Creating symbolic links for the Domino plug-in on AIX hosts. 2 Configuring UNIX-specific settings: Creating symbolic links If you are going to install the Snap Creator Agent on a UNIX operating system (AIX, Linux, and Solaris), for the IBM Domino plug-in to work properly, three symbolic links (symlinks) must be created to link to Domino’s shared object files. Installation procedures vary slightly depending on the operating system. Refer to the appropriate procedure for your operating system. Domino does not support the HP-UX operating system. Creating symbolic links for the Domino plug-in on Linux and Solaris hosts You need to perform this procedure if you want to create symbolic links for the Domino plug-in on Linux and Solaris hosts. You should not copy and paste commands directly from this document; errors (such as incorrectly transferred characters caused by line breaks and hard returns) might result. Copy and paste the commands into a text editor, verify the commands, and then enter them in the CLI console. The paths provided in the following steps refer to the 32-bit systems; 64-bit systems must create simlinks to /usr/lib64 instead of /usr/lib.
    [Show full text]
  • Command Line Interface Specification Windows
    Command Line Interface Specification Windows Online Backup Client version 4.3.x 1. Introduction The CloudBackup Command Line Interface (CLI for short) makes it possible to access the CloudBackup Client software from the command line. The following actions are implemented: backup, delete, dir en restore. These actions are described in more detail in the following paragraphs. For all actions applies that a successful action is indicated by means of exit code 0. In all other cases a status code of 1 will be used. 2. Configuration The command line client needs a configuration file. This configuration file may have the same layout as the configuration file for the full CloudBackup client. This configuration file is expected to reside in one of the following folders: CLI installation location or the settings folder in the CLI installation location. The name of the configuration file must be: Settings.xml. Example: if the CLI is installed in C:\Windows\MyBackup\, the configuration file may be in one of the two following locations: C:\Windows\MyBackup\Settings.xml C:\Windows\MyBackup\Settings\Settings.xml If both are present, the first form has precedence. Also the customer needs to edit the CloudBackup.Console.exe.config file which is located in the program file directory and edit the following line: 1 <add key="SettingsFolder" value="%settingsfilelocation%" /> After making these changes the customer can use the CLI instruction to make backups and restore data. 2.1 Configuration Error Handling If an error is found in the configuration file, the command line client will issue an error message describing which value or setting or option is causing the error and terminate with an exit value of 1.
    [Show full text]
  • Older Operating Systems (962-038)
    Instructions: This is an open book pretest. Answer all questions. There are three sections. There are a total of five question pages. The time limit is two hours. Section one: Select only one answer for each multiple-choice question. Each question is worth 2 marks. Q1. Determine which of the following is true concerning DOS filters a. A DOS filter is used to modify information as it passes from EBCDIC text files to the screen. False because it for ASCII not EBCDIC b. The sort command is replaced using the command (dir /w) False because to sort you must use Dir /O:order ex. Dir/O:n c. The command (find /C “supervisor” memo1.txt memo2.txt) is an invalid command. False because it’s a valid command d. The command (type readme.doc | more) produces the same output as (more < readme.doc) True Q2. Determine which of the following is true concerning the tree command a. To indicate branching of directories, the tree command only uses the line characters. False because there are lines b. The deltree command is an enhanced version of the tree command. False, deltree erases a directory, tree shows structure. c. We can use the tree command with redirection symbols. True d. The tree command is an internal DOS command. False, it’s external. Internal means it exists in command.com. Tree.exe is external. Q3. Determine which of the following statement is true concerning variables. a. DOS includes built-in variables and therefore do not allow user defined variables. False – you can define your own variable.
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • Attacker Antics Illustrations of Ingenuity
    ATTACKER ANTICS ILLUSTRATIONS OF INGENUITY Bart Inglot and Vincent Wong FIRST CONFERENCE 2018 2 Bart Inglot ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Rock Climber ◆ Globetrotter ▶ From Poland but live in Singapore ▶ Spent 1 year in Brazil and 8 years in the UK ▶ Learning French… poor effort! ◆ Twitter: @bartinglot ©2018 FireEye | Private & Confidential 3 Vincent Wong ◆ Principal Consultant at Mandiant ◆ Incident Responder ◆ Baby Sitter ◆ 3 years in Singapore ◆ Grew up in Australia ©2018 FireEye | Private & Confidential 4 Disclosure Statement “ Case studies and examples are drawn from our experiences and activities working for a variety of customers, and do not represent our work for any one customer or set of customers. In many cases, facts have been changed to obscure the identity of our customers and individuals associated with our customers. ” ©2018 FireEye | Private & Confidential 5 Today’s Tales 1. AV Server Gone Bad 2. Stealing Secrets From An Air-Gapped Network 3. A Backdoor That Uses DNS for C2 4. Hidden Comment That Can Haunt You 5. A Little Known Persistence Technique 6. Securing Corporate Email is Tricky 7. Hiding in Plain Sight 8. Rewriting Import Table 9. Dastardly Diabolical Evil (aka DDE) ©2018 FireEye | Private & Confidential 6 AV SERVER GONE BAD Cobalt Strike, PowerShell & McAfee ePO (1/9) 7 AV Server Gone Bad – Background ◆ Attackers used Cobalt Strike (along with other malware) ◆ Easily recognisable IOCs when recorded by Windows Event Logs ▶ Random service name – also seen with Metasploit ▶ Base64-encoded script, “%COMSPEC%” and “powershell.exe” ▶ Decoding the script yields additional PowerShell script with a base64-encoded GZIP stream that in turn contained a base64-encoded Cobalt Strike “Beacon” payload.
    [Show full text]
  • Powershell Integration with Vmware View 5.0
    PowerShell Integration with VMware® View™ 5.0 TECHNICAL WHITE PAPER PowerShell Integration with VMware View 5.0 Table of Contents Introduction . 3 VMware View. 3 Windows PowerShell . 3 Architecture . 4 Cmdlet dll. 4 Communication with Broker . 4 VMware View PowerCLI Integration . 5 VMware View PowerCLI Prerequisites . 5 Using VMware View PowerCLI . 5 VMware View PowerCLI cmdlets . 6 vSphere PowerCLI Integration . 7 Examples of VMware View PowerCLI and VMware vSphere PowerCLI Integration . 7 Passing VMs from Get-VM to VMware View PowerCLI cmdlets . 7 Registering a vCenter Server . .. 7 Using Other VMware vSphere Objects . 7 Advanced Usage . 7 Integrating VMware View PowerCLI into Your Own Scripts . 8 Scheduling PowerShell Scripts . 8 Workflow with VMware View PowerCLI and VMware vSphere PowerCLI . 9 Sample Scripts . 10 Add or Remove Datastores in Automatic Pools . 10 Add or Remove Virtual Machines . 11 Inventory Path Manipulation . 15 Poll Pool Usage . 16 Basic Troubleshooting . 18 About the Authors . 18 TECHNICAL WHITE PAPER / 2 PowerShell Integration with VMware View 5.0 Introduction VMware View VMware® View™ is a best-in-class enterprise desktop virtualization platform. VMware View separates the personal desktop environment from the physical system by moving desktops to a datacenter, where users can access them using a client-server computing model. VMware View delivers a rich set of features required for any enterprise deployment by providing a robust platform for hosting virtual desktops from VMware vSphere™. Windows PowerShell Windows PowerShell is Microsoft’s command line shell and scripting language. PowerShell is built on the Microsoft .NET Framework and helps in system administration. By providing full access to COM (Component Object Model) and WMI (Windows Management Instrumentation), PowerShell enables administrators to perform administrative tasks on both local and remote Windows systems.
    [Show full text]
  • Linux-PATH.Pdf
    http://www.linfo.org/path_env_var.html PATH Definition PATH is an environmental variable in Linux and other Unix-like operating systems that tells the shell which directories to search for executable files (i.e., ready-to-run programs ) in response to commands issued by a user. It increases both the convenience and the safety of such operating systems and is widely considered to be the single most important environmental variable. Environmental variables are a class of variables (i.e., items whose values can be changed) that tell the shell how to behave as the user works at the command line (i.e., in a text-only mode) or with shell scripts (i.e., short programs written in a shell programming language). A shell is a program that provides the traditional, text-only user interface for Unix-like operating systems; its primary function is to read commands that are typed in at the command line and then execute (i.e., run) them. PATH (which is written with all upper case letters) should not be confused with the term path (lower case letters). The latter is a file's or directory's address on a filesystem (i.e., the hierarchy of directories and files that is used to organize information stored on a computer ). A relative path is an address relative to the current directory (i.e., the directory in which a user is currently working). An absolute path (also called a full path ) is an address relative to the root directory (i.e., the directory at the very top of the filesystem and which contains all other directories and files).
    [Show full text]
  • Where Do You Want to Go Today? Escalating
    Where Do You Want to Go Today? ∗ Escalating Privileges by Pathname Manipulation Suresh Chari Shai Halevi Wietse Venema IBM T.J. Watson Research Center, Hawthorne, New York, USA Abstract 1. Introduction We analyze filename-based privilege escalation attacks, In this work we take another look at the problem of where an attacker creates filesystem links, thereby “trick- privilege escalation via manipulation of filesystem names. ing” a victim program into opening unintended files. Historically, attention has focused on attacks against priv- We develop primitives for a POSIX environment, provid- ileged processes that open files in directories that are ing assurance that files in “safe directories” (such as writable by an attacker. One classical example is email /etc/passwd) cannot be opened by looking up a file by delivery in the UNIX environment (e.g., [9]). Here, an “unsafe pathname” (such as a pathname that resolves the mail-delivery directory (e.g., /var/mail) is often through a symbolic link in a world-writable directory). In group or world writable. An adversarial user may use today's UNIX systems, solutions to this problem are typ- its write permission to create a hard link or symlink at ically built into (some) applications and use application- /var/mail/root that resolves to /etc/passwd. A specific knowledge about (un)safety of certain directories. simple-minded mail-delivery program that appends mail to In contrast, we seek solutions that can be implemented in the file /var/mail/root can have disastrous implica- the filesystem itself (or a library on top of it), thus providing tions for system security.
    [Show full text]
  • Onetouch 4.0 Scanned Documents
    · MUL TICS SYSTEM-PROGRAMMERS' MANUAL SECTION BY.2.03 PAGE 1 Publishe¢: 04/03/67 Identification Delete a subtree of the file system hierarchy. del tree E. Q. Bjorkman+· ,. Purpose I \. Deltree is the procedure used by the delete command (BX.8.07)· to delete an entry which points to a non-empty directory. In order to delete svch an entry delete calls deltree to delete the subtree beneath the entry. The method used in deltree can be easily adapted for other tasks which are repeated at all nodes of some tree structure in the file system. Usaoe call deltree (path, failsw); path is the path name of a directory. Fails\-J is.a 1-bit switch indicating on return that some entry of path could not be deleted. Oeltree starts deleting entries of the tree structure beneath ,path at the end nodes (i.e., directories_ that have no directories inferior to them). Deltree reaches these end nodes by constructing a path name of a directory · . immediately inferior to path and then calling itself recursively with that path name until the end'nbdes are r~ached~ Whendeltree has deleted all the entries in an end-node directory which it can delete~ it returns to its caller. )me lementat ion ca 11 .de ltree (path, fail sw); del path char(')'<), f,:lf lsw bit (1); De 1 tree first obtai i'IS the current. ca landar clock time using the PL/I built-in abnormal function ''c1ock_11 .' This time is used later to determine whether entries were added to the directory ~th after deltree started its I.Mork.
    [Show full text]
  • What Is UNIX? the Directory Structure Basic Commands Find
    What is UNIX? UNIX is an operating system like Windows on our computers. By operating system, we mean the suite of programs which make the computer work. It is a stable, multi-user, multi-tasking system for servers, desktops and laptops. The Directory Structure All the files are grouped together in the directory structure. The file-system is arranged in a hierarchical structure, like an inverted tree. The top of the hierarchy is traditionally called root (written as a slash / ) Basic commands When you first login, your current working directory is your home directory. In UNIX (.) means the current directory and (..) means the parent of the current directory. find command The find command is used to locate files on a Unix or Linux system. find will search any set of directories you specify for files that match the supplied search criteria. The syntax looks like this: find where-to-look criteria what-to-do All arguments to find are optional, and there are defaults for all parts. where-to-look defaults to . (that is, the current working directory), criteria defaults to none (that is, select all files), and what-to-do (known as the find action) defaults to ‑print (that is, display the names of found files to standard output). Examples: find . –name *.txt (finds all the files ending with txt in current directory and subdirectories) find . -mtime 1 (find all the files modified exact 1 day) find . -mtime -1 (find all the files modified less than 1 day) find . -mtime +1 (find all the files modified more than 1 day) find .
    [Show full text]
  • CS101 Lecture 8
    What is a program? What is a “Window Manager” ? What is a “GUI” ? How do you navigate the Unix directory tree? What is a wildcard? Readings: See CCSO’s Unix pages and 8-2 Applications Unix Engineering Workstations UNIX- operating system / C- programming language / Matlab Facilitate machine independent program development Computer program(software): a sequence of instructions that tells the computer what to do. A program takes raw data as input and produces information as output. System Software: • Operating Systems Unix,Windows,MacOS,VM/CMS,... • Editor Programs gedit, pico, vi Applications Software: • Translators and Interpreters gcc--gnu c compiler matlab – interpreter • User created Programs!!! 8-4 X-windows-a Window Manager and GUI(Graphical User Interface) Click Applications and follow the menus or click on an icon to run a program. Click Terminal to produce a command line interface. When the following slides refer to Unix commands it is assumed that these are entered on the command line that begins with the symbol “>” (prompt symbol). Data, information, computer instructions, etc. are saved in secondary storage (auxiliary storage) in files. Files are collected or organized in directories. Each user on a multi-user system has his/her own home directory. In Unix users and system administrators organize files and directories in a hierarchical tree. secondary storage Home Directory When a user first logs in on a computer, the user will be “in” the users home directory. To find the name of the directory type > pwd (this is an acronym for print working directory) So the user is in the directory “gambill” The string “/home/gambill” is called a path.
    [Show full text]
  • Free up Hundreds of Megs of Disk Space!
    Free Up Hundreds Of Megs Of Disk Space! Here's an example of a very simple annotated batch file: This particular file can free up literally *hundreds of megabytes* of extra space on your hard drive by scrubbing away junk and unwanted files that Windows leaves behind (even if you use Windows' "Disk Cleanup Wizard"). I run a file like this every night. There are two ways to get the file on your machine. I'll tell you how you can download it, for free, in a moment, but please read through the following text so you'll be sure you understand what the file does. Better still, manually copy the file, because then you'll have 100%, total control over everything the file does. It's easy! Here's how: Copy and paste the following lines into Notepad, and then save the file; name it something like "CLEANUP.BAT." (Make sure you're naming it ".bat" and not ".txt"). It can reside anywhere, and uses only files and commands that are normally part of a standard Windows installation. @rem The first group of lines clears the screen and displays program information @cls @echo Fred Langa's Cleanup.Bat, a Win9x hard-disk cleanup tool. @echo --------------------------------------------------------- @echo Copyright (c) 2000 Langa Consulting @echo http://www.langa.com @echo --------------------------------------------------------- @echo Use Notepad to view file contents before running! @echo Please also see http://www.langa.com/cleanup_bat.htm @echo for precaution/usage info and for newer versions. @echo ----------- @rem This file is offered as-is and without warranty of any kind.
    [Show full text]