under dos menu order
under the dos demonstration menu is orders with WAT.BAT to write, the menu demonstrates 1, rst 2, qt2000…., you 1 carry out rst.exe according to the keyboard on, according to 2 carries out qt2000.exe, my dos environment is the simple ordinary startup disk which the U plate does, moreover increased Edit.com and so on several to order the U plate
DOS order collection
Arp
The demonstration and the revision “the Address Resolution Protocol” (ARP) uses translates the table to ethernet’s IP or the token link physical address.This order only then after having installed the TCP/IP agreement only then available.
arp – a [inet_addr] [- N [if_addr]
arp – d inet_addr [if_addr]
arp – s inet_addr ether_addr [if_addr]
Parameter
– a
Through inquired that TCP/IP demonstrates the current ARP item.If has assigned inet_addr, then only demonstrated that assigns computer’s IP and the physical address.
– g
Is the same with – a.
inet_addr
Assigns the IP address by the dot decimal base mark.
– N
Demonstration network contact surface ARP item which assigns by if_addr.
if_addr
Assigns to need to revise its address translation table connection the IP address (if any).If does not exist, will use the first suitable connection.
– d
Deletion item which assigns by inet_addr.
– s
Increases the item in the ARP buffer, IP address inet_addr and physical address ether_addr connection.The physical address by assigns by the hyphen separation’s 6 hexadecimal system byte.Uses the belt decimal base mark to assign the IP address.The item is permanent, namely in overtime due consequent automatically from buffer deletion.
ether_addr
Assigns the physical address.
Finger
In moves on the Finger service designated system to demonstrate the concerned user the information.According to remote system output different variable.This order only then after having installed the TCP/IP agreement only then available.
finger [- l] [user]@computer […]
Parameter
– l
By long tabulation form displayed information.
user
Assigns to obtain the related information the user.The abbreviation user parameter demonstrates assigns on the computer all user’s information:
@computer
Ftp
To is moving the FTP service long-distance computer (sometimes the file transfer or from is moving the FTP service long-distance computer transmission document to be called as daemon).Ftp may use alternately.The one-shot “the related subject” in the tabulation “the ftp order” obtains available “ftp” the subcommand description.This order only then after having installed the TCP/IP agreement only then available.Ftp is one kind of service, once starts, will found in may use the ftp order the sub-environment, through enters the quit subcommand to be possible to obey the son the environment to return to the Windows 2000 order prompt symbol.When ftp sub-environment movement, it orders prompt symbol representative by ftp.
ftp [- v] [- n] [- i] [- d] [- g] [- s:filename] [- a] [- w:windowsize] [computer]
Parameter
– v
Forbids to demonstrate the long-distance server response.
– n
Forbids to register the initial connection automatically.
– i
When many file transfers closes prompts alternately.
– d
Begins using the debugging, the demonstration all ftp order which transmits between the client side and the server.
– g
Is forbid the filename group, it permits in the local document and the way name uses the wildcard character character (* the sum? ).(please refer to-line “the order reference” the glob order.)
– s:filename
Assigns to contain the ftp order the text document; After ftp start, these orders will move automatically.In this parameter does not allow to have the blank space.Uses this switch, but is not the heavy direction detection (>).
– a
When bundle data connection uses any local connection.
– w:windowsize
The substitution default size is 4096 transmission buffers.
computer
Assigns to connect the long-distance computer’s computer name or the IP address.If assigns, the computer must be the good last parameter.
Nbtstat
This diagnosis order uses NBT (on TCP/IP NetBIOS) to demonstrate the agreement statistics and the current TCP/IP connection.This order only then after having installed the TCP/IP agreement only then available.
nbtstat [- a remotename] [- A IP address] [- c] [- n] [- R] [- r] [- S] [- s] [interval]
Parameter
– a remotename
Uses the long-distance computer’s name to list its terminology chart.
– A IP address
Uses the long-distance computer’s IP address to juxtapose the terminology chart.
– c
Assigns each name the IP address to juxtapose the NetBIOS name buffer the content.
– n
Lists the local NetBIOS name.“has registered” indicated that this name has been broadcast (Bnode) or WINS (other node type) registers.
– R
After eliminating in the NetBIOS name buffer all names, resume load Lmhosts document.
– r
Lists the Windows network name analysis name analysis statistics.In the disposition uses WINS on the Windows 2000 computers, this option returns must analyzes and the registration name number through the broadcast or WINS.
– S
Demonstrated that the client side and the server talk, only lists the long-distance computer through the IP address.
– s
Demonstrates the client side and the server conversation.Attempt long-distance computer IP address translation use main engine document name.
interval
Demonstrated selects the statistics, suspend the interval second between each revealing.Stops according to CTRL+C demonstrating the statistical information.If abbreviates this parameter, nbtstat prints a time current disposition information.
Netstat
Demonstrates the agreement statistics and the current TCP/IP network connections.This order only then after having installed the TCP/IP agreement only then may use.
netstat [- a] [- e] [- n] [- s] [- p protocol] [- r] [interval]
Parameter
– a
Demonstrates all connections and the interception port.The server connection usually did not demonstrate.
– e
Demonstrates the ethernet statistics.This parameter may with – the s option union use.
– n
By number format explicit address and port number (, but is not attempts search name).
– s
Demonstrates each agreement the statistics.In the default situation, demonstrated that TCP, UDP, ICMP and the IP statistical.- p option may use for to assign the default the subset.
– p protocol
Demonstration agreement connection which assigns by protocol; protocol may be tcp or udp.If uses together with – the s option demonstrated that each agreement the statistics, protocol may be tcp, udp, icmp or ip.
– r
Demonstrates the routing list the content.
interval
Demonstrated elects statistics, in each time demonstrated that between suspends the interval second.Stops according to CTRL+B demonstrating the statistics.If abbreviates this parameter, netstat will print a time current disposition information.
Ping
Confirmation and long-distance computer’s connection.This order only then after having installed the TCP/IP agreement only then may use.
ping [- t] [- a] [- n count] [- l length] [- f] [- i ttl] [- v tos] [- r count] [- s count] [- j computer-list] | [- k computer-list] [- w timeout] destination-list
Parameter
– t
Ping assigns computer until interrupt.
– a
Address analysis for computer.
– n count
Transmits ECHO data packet number which count assigns.The default value is 4.
– l length
The transmission contains the data quantity ECHO data packet which assigns by length.The default is 32 bytes; The maximum value is 65,527.
– f
Transmits in the data packet “do not partition” the symbol.The data packet not by route’s on gateway partition.
– i ttl
“The life” the field establishment will be the value which ttl assigns.
– v tos
“The service type” the field establishment will be the value which tos assigns.
– r count
In “records the route” in the field to record spreads with the returns data packet route.count may assign least 1, most 9 computers.
– s count
Assigns leap points time stamp which count assigns.
– j computer-list
Computer tabulation route data packet which assigns using computer-list.The continuously acting computer may by the middle gateway separation (route sparse source) the IP permission greatest quantity be 9.
– k computer-list
Computer tabulation route data packet which assigns using computer-list.The continuously acting computer cannot by the middle gateway separation (route strict source) the IP permission greatest quantity be 9.
– w timeout
Assigns the overtime gap, the unit for the millisecond.
destination-list
Assigns to want ping the long-distance computer.
Rcp
Duplicates the document in the Windows 2000 computers and between the movement long-distance outer covering port monitor routine rshd system.the rcp order is a bind command, when issues this order from the Windows 2000 computers, may also use in other transmissions, in two move between the rshd computer to duplicate the document.the rshd port monitor routine may use on the UNIX computer, but on 2000 cannot use in Windows, therefore the Windows 2000 computers only may take issue the order the system participation.The long-distance computer must also through move rshd to provide the rcp utility program.
rcp [- a | – b] [- h] [- r] source1 source2… sourceN destination
Parameter
– a
Assigns the ASCII mode of transmission.This pattern in spreads document general the carriage return/to line feed the symbol to transform into the carriage return symbol, will spread to the document to line feed the symbol to transform/line feeds the symbol for the carriage return.This pattern for default mode of transmission.
– b
Assigns the binary system image transmission pattern.Has not carried out the carriage return/to line feed the symbol transformation.
– h
Transmits on the Windows 2000 computers to mark for the hideaway attribute source document.If does not have this option, assigns the hideaway document on the rcp command line the effect and the document does not exist is the same.
– r
Duplicates the goal the source all child directory content recursion.source and destination must be tables of contents, even if although the source is not a table of contents, use – r can also work.But will not have the recursion.
source and destination
The form must be [computer [.user]:]filename.If has neglected [computer [.user]:] The part, the computer the hypothesis will be the local computer.If has abbreviated [.user] the part, will use Windows 2000 user which current registers.If has used completely qualified computer, contains the period (.) Separating character, then must contain [.user].Otherwise, a computer final part will explain for user.If has assigned many source documents, then destination must be a table of contents.
If the filename is not by the UNIX slanting bar (/) or the Windows 2000 system’s counter-slanting bars (\) the drivehead, then supposes is opposite in the current job category.In Windows in 2000, this is issues the order the table of contents.In remote system, this is the remote subscriber registers the table of contents.Period (.) Expression current catalog.Uses the figurative meaning character in the long-distance way (\, “or ‘), in order to uses the wildcard character in the long-distance computer.
Rexec
In moves on the REXEC service long-distance computer the run command.the rexec order before the execution assigns the order, on confirmation long-distance computer’s user, only then after having installed the TCP/IP agreement, only then may use should order.
rexec computer [- l username] [- n] command
Parameter
computer
Assigns to move the command long-distance computer.
– l username
Assigns on long-distance computer’s user.
– n
Rexec input heavy direction detection to NULL.
command
Assigns order which must move.
Route
Directed net routing list.This order only then after having installed the TCP/IP agreement only then may use.
route [- f] [- p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]
Parameter
– f
Eliminates all gateway entrance the routing list.If this parameter with some order combination use, the routing list will eliminate in the run command Ching Dynasty.
– p
When this parameter and the add order use together, will cause the route between the system vectoring procedure the lasting existence.In the default situation, the system starts when does not retain the route.Uses together when with the print order, demonstrated already registers lasting route tabulation.Neglects other all always affects the corresponding lasting route’s order.
command
Assigns a following order.
Order goal
print printing route
add increase route
delete deletion route
change changes the extant route
destination
Assigns to transmit command the computer.
mask subnetmask
Assigns with this route clause connection subnet mask.If has not assigned, will use 255.255.255.255.
gateway
Assigns the gateway.
The named Networks network database file and in the named Hosts computer famous database file quotes completely destination or the gateway use mark name.If the order is print or delete, the goal and the gateway may also use the wildcard character, may also abbreviate the gateway parameter.
metric costmetric
Designation integer leap points (from 1 to 9999) when the computation is fastest, is most reliable and (or) the cheapest route uses.
Rsh
In moves on the RSH service long-distance computer the run command.This order only then after having installed the TCP/IP agreement only then may use.
rsh computer [- l username] [- n] command
Parameter
computer
Assigns to move the command long-distance computer.
– l username
Assigns user which on the long-distance computer uses.If abbreviates, then uses user which registers.
– n
Rsh input heavy direction detection to NULL.
command
Assigns order which must move.
Tftp
Is moving the TFTP service long-distance computer the file transfer or from is moving the TFTP service long-distance computer transmission document.This order only then after having installed the TCP/IP agreement only then may use.
tftp [- i] computer [get | put] source [destination]
Parameter
– i
Assigns the binary system transmission of image pattern (also to be called “eight bytes”).In the binary image pattern, a document byte meets byte place to move word by word.When transmits the binary file uses this pattern.
If has abbreviated – i, document by ASCII pattern transmission.This is the default transmission pattern.This pattern is the UNIX carriage return symbol and personal computer’s carriage return symbol/line feeds the symbol the EOL character conversion.When transmits the text document should use this pattern.If file transfer successfully, will demonstrate the data transfer rate.
computer
Assigns local or the long-distance computer.
put
Transmits local computer’s on document destination to long-distance computer’s on document source.
get
Transmits long-distance computer’s on document destination to local computer’s on document source.
If transmits local computer’s on document file-two to long-distance computer’s on document file-one, please assign put.If transmits long-distance computer’s on document file-two to long-distance computer’s on document file-one, please assign get.
Because the tftp agreement does not support the user identification authentication, therefore the user must register, and the document must be possible to read on the long-distance computer.
source
Assigns document which must transmit.If the local document assigns for -, then the long-distance document prints on stdout (, if gain), or from stdin (if laying aside) reads.
destination
Assigns the file transfer position.If has abbreviated destination, will suppose and source of the same name.
Tracert
This diagnosis utility program will contain different life (TTL) value Internet control news agreement (ICMP) to return to obviously the data packet to transmit the goal, decided that arrives at the goal to use the route.Must before the repeater data wraps TTL decreases progressively at least 1, in essential way each router, therefore TTL is an effective leap counting.The data wraps TTL arrives at 0:00, the router should “the ICMP already overtime” the news transmits the source system.Tracert transmits TTL is first 1 returns to obviously the data packet, and increases progressively in afterward sending process each time TTL 1, until target response or TTL maximizing, thus definite route.Route transmits “the ICMP already overtime” through the inspection intermediate router news definite route.However, some routers download quietly contain the expired TTL value the data packet, but tracert does not look.
tracert [- d] [- h maximum_hops] [- j computer-list] [- w timeout] target_name
Parameter
/d
Does not assign the address analysis for computer.
– h maximum_hops
Assigns the search goal the biggest leap points.
– j computer-list
Assigns along the computer-list sparse source route.
– w timeout
Each time the reply waited for timeout assigns microsecond number.
target_name
Target computer’s name.NET order essential usage
Net
Following synthesized WINDOWS 98, WINDOWS WORKSTATION and WINDOWS the SERVER three operating systems about the NET order explanation, the hope may more comprehensive somewhat.
Said some first:
the (1)NET order is a command line order.
(2) management network environment, service, user, debarkation….And so on local information
(3)WIN 98, WIN WORKSTATION and WIN NT built-in NET order.
(4) but WIN 98 NET orders and WORKSTATION, NT NET order differently.
in (5)WORKSTATION and SERVER NET order basically same.
(6) obtains HELP
(1) may use the graph under NT the way, starts -” helps -” the index -” inputs NET
(2) may use the character mode under COMMAND, NET/? Either NET or NET HELP obtain some method corresponding method help NETCOMMAND /HELP either NET HELP COMMAND or NET COMMAND/? In addition regarding wrong NET HELPMSG MESSAGE# is 4 figures
(7) compulsion parameter all net order accepts option /yes and /no (may condense is /y and /n).[said simply is gives a system’s inquiry answer in advance]
(8) has some orders has the function and the permanent preservation immediately, use time must be prudent
(9) might find the corresponding graph tool’s solution regarding the NET order’s function
(10) order composition command parameter option | Parameter option | Parameter option |……In Luo said inarticulately a big pile, is actually 6 and 7 useful, ha-ha.In addition has two matters:
(1) has some parameters in the NT NET order is only then can use in the SERVER environment
(2) has some parameters in the WIN98 NET order not to be able to use in DOS-WIN, can only use in the DOS environment
Below makes some preliminary introductions to the NET order’s different parameter’s essential usage:
First, NET VIEW
Function:Demonstrated that the territory tabulation, the computer tabulation or assign computer’s shared resource tabulation.
Forms of field orders:net view [\ \ computername | /domain [:domainname]
Parameter introduction:
(1) enters does not bring parameter net the view demonstration works as the domain the computer tabulation.
(2) \ \ computername assigns to examine its shared resource the computer.
(3)/domain[:domainname] assigns to examine its available computer’s territory.
Simple instance:
(1)net view \ \ YFANG examines YFANG the shared resource tabulation.
(2)net view /domain:LOVE examines in the LOVE territory the machine tabulation.
Second, NET USER
Function:Increase either change user account or demonstration user account information.This order may also write is net users.
Forms of field orders:net user [username [password | *] [options] [/domain]
Parameter introduction:
(1) enters does not bring parameter net on the user examination computer’s user account tabulation.
(2)username increases, the deletion, the change or the examination user account name.
(3)password is the user account assignment or the change password.
(4)* prompt input password.
(5)/domain carries out the operation in the computer main territory’s main territory controller.
Simple instance:
(1)net user yfang examination user YFANG information
Third, NET USE
Function:Connects the computer or separates the computer and the shared resource connection, or demonstrates computer’s linkage information.
Forms of field orders:net use [devicename | *] [\ \ computername \ sharename [\ volume] [password | *] [/user:[domainname \] username] [/delete] | [/persistent:{yes | no]}
Parameter introduction:
Enters does not bring parameter net use to list the network connections.
the equipment name which devicename assigns to connect the resources name which or must separate.
\ \ computername \ sharename server and shared resource name.
password visit shared resource password.
* the prompt enters the password.
/user assigns to carry on the connection other user.
domainname assigns another territory.
username assigns user which registers.
/home connects the user its host table of contents.
/delete cancels assigns the network connections.
/persistent controls the permanent network connections the use.
Simple instance:
(1)net use e:\ \ YFANG \ TEMP \ \ YFANG \ the TEMP table of contents establishment is the E plate
(2)net use e:\ \ YFANG \ the TEMP /delete separates the connection
Fourth, NET TIME
Function:Causes computer’s clock and another computer or the territory time synchronism.
Forms of field orders:net time [\ \ computername | /domain [:name] [/set]
Parameter introduction:
(1) \ \ computername must inspect or synchronized server.
(2)/domain[:name] assigns to with its time synchronism territory.
(3)/set causes this computer clock with to assign the computer or the territory clock synchronization.
The following these 4 parameters are related, therefore introduced together
Fifth, Net Start
Function:The start service, or the demonstration started the service the tabulation.
Forms of field orders:net start service
Sixth, Net Pause
Function:The suspension is moving service.
Forms of field orders:net pause service
Seventh, Net Continue
Function:Activates the service which hangs up.
Forms of field orders:net continue service
Eighth, NET STOP
Function:Stops Windows the NT network service.
Forms of field orders:net stop service
Parameter introduction:We have a look at these services are anything
(1) alerter (warning)
(2)client service for netware (Netware client side service)
(3)clipbook server (scrap-book server)
(4)computer browser (computer browser)
(5)directory replicator (table of contents reduplication)
(6)ftp publishing service (ftp) (ftp release service)
(7)lpdsvc
(8)net logon (network registers)
(9)network dde (network dde)
(10)network dde dsdm (network dde dsdm)
(11)network monitor agent (network monitor and control proxy)
(12)nt lm security support provider (NT LM security support provides)
(13) ole (object link and inserting)
(14)remote access connection manager (long-distance access connection supervisor)
(15)remote access isnsap service (long-distance access isnsap service)
(16)remote access server (remote access server)
(17)remote procedure call (rpc) locator (long-distance procedure call locator)
(18)remote procedure call (rpc) service (long-distance procedure call service)
(19) schedule (dispatch)
(20) server (server)
(21)simple tcp/ip services (simple TCP/IP service)
(22)snmp
(23) spooler (background printing procedure)
(24)tcp/ip netbios helper (TCP/IP NETBIOS auxiliary means)
(25)ups
(26) workstation (workstation)
(27) messenger (messenger)
(28)dhcp client
below (29)eventlog these SERVICE can only use on NT SERVER
(1)file server for macintosh
(2)gateway service for netware
(3)microsoft dhcp server
(4)print server for macintosh
(5)remoteboot
(6)windows internet name service
Ninth, Net Statistics
Function:Demonstrates the local workstation or the server service statistical record.
Forms of field orders:net statistics [workstation | server]
Parameter introduction:
(1) enters does not bring parameter net statistics to list its statistical information available movement service.
(2)workstation demonstrates the local workstation service the statistical information.
(3)server demonstrates the local server service the statistical information.
Simple instance:
(1)net statistics server | more demonstrates the server service the statistical information
Tenth, Net Share
Function:Foundation, deletion or demonstration shared resource.
Forms of field orders:net share sharename=drive:path [/users:number | /unlimited] [/remark:“text”]
Parameter introduction:
(1) enters does not bring parameter net share to demonstrate on the local computer all shared resource information.
(2)sharename is the shared resource network name.
(3)drive:path assigns the shared directory the absolute way.
the (4)/users:number establishment may simultaneously visit the shared resource the biggest number of users.
(5)/unlimited does not limit simultaneously visits the shared resource the number of users.
(6)/remark:“text “the increase about the resources annotation, the annotation writing directs with the quotation mark.
Simple instance:
(1)net share mylove= c:\temp /remark:“my first share ” as sharing shares C:\temp take mylove
(2)net share the mylove /delete stops sharing the mylove table of contents
11th, Net Session
Function:Lists or the separation local computer and with it connection client side conversation, may also write is net sessions or net sess.
Forms of field orders:net session [\ \ computername] [/delete]
Parameter introduction:
(1) enters does not bring parameter net session to demonstrate all and the local computer’s conversation information.
(2) \ \ the computername marking needs to list or the separation conversation computer.
the (3)/delete conclusion and \ \ the computername computer talked and closes this conversation period computer’s possessing.
Simple instance:
(1)net session \ \ YFANG must demonstrate computer named YFANG the client side conversation information tabulation.
12th, Net Send
Function:To network other users, computer or correspondence sending a message.
Forms of field orders:net send {name | * | /domain [:name] | /users} message
Parameter introduction:
(1)name must receive sending a message the user name, the computer name or the correspondence name.
(2)* transmits the news to the group in all names.
(3)/domain[:name] transmits the news to the computer territory in all names.
(4)/users transmits the news to all users who connects with the server.
(5)message as news transmission text.
Simple instance:
(1)net send /users server will shutdown in 5 minutes.for all connects server’s user sending a message
13th, Net Print
Function:Demonstration or control print job and Print queue.
Forms of field orders:net print [\ \ computername] job# [/hold | /release | /delete]
Parameter introduction:
(1)computername shared printer formation’s computer.
(2)sharename Print queue name.
(3)job# assigns in the printer formation for the print job marking number.
when (4)/hold uses job#, causes the print job waiting in the printer formation.
the (5)/release release retains print job.
(6)/delete deletes the print job from the printer formation.
Simple instance:
(1)net print \ \ YFANG \ SEEME lists \ \ on the YFANG computer the SEEME printer formation’s table of contents
14th, Net Name
Function:(Sometimes the increase or deletion news also calls alias), or demonstration computer receive news name tabulation.
Forms of field orders:net name [name [/add | /delete]
Parameter introduction:
(1) enters does not bring parameter net name to list the current use name.
(2)name assigns the receive news the name.
(3)/add increases the name to the computer.
(4)/delete deletes the name from the computer.
15th, Net Localgroup
Function:Increase, demonstration or change local group.
Forms of field orders:net localgroup groupname {/add [/comment:“text”] | /delete} [/domain]
Parameter introduction:
(1) enters does not bring parameter net the localgroup demonstration server name and computer’s local group name.
(2)groupname must increase, the expansion or the deletion local group name.
(3)/comment:“text “for newly built or existing group increase annotation.
(4)/domain, when the domain main territory controller carries out the operation, otherwise only carries out the operation on the local computer?
(5)name […]Lists must increase to the local group either deletes or many user names or the set name from the local group.
(6)/add increases the overall situation set name or user to the local group.
(7)/delete deletes the set name or user from the local group.
Simple instance:
(1)net localgroup the love /add increases the named love local group to the local subscriber account number database
(2)n @echo off
choice /C rqe /M “rst, qt2000, end”
if errorlevel 3 goto end
if errorlevel 2 goto qt2000
if errotlevel 1 goto rst
:rst
rst.exe
goto end
:qt2000
qt2000.exe
goto end
:end
echo good bye
After this batch run movement, will demonstrate “rst, qt2000, end[R, Q, E]?” , the user may choose r q e, then the if sentence makes the judgment according to user’s choice, r indicated that carries out the marking is the rst segment, q indicated carries out the marking is the qt2000 segment, e indicated carries out the marking is the end segment, each segment jumps finally by goto end the procedure to the end marking place, then the procedure will demonstrate good bye, the batch run movement to finish.
If the batch run as the startup disk, may join in AUTOEXEC.BAT.
Leave a Reply
You must be logged in to post a comment.