Wednesday, March 9, 2011
【 Weak current College 】 dos commands Daquan---Power By 【 China power house network 】
MD a) — build subdirectory
1. function: create a new subdirectory
2. type: internal commands
3. format: MD [drive:] [path name] page〈 subdirectory name >
4. instructions for use:
(1) the "letter": specify to create a subdirectory of the disk drive letters, if omitted, the current drive;
(2) the "pathname": to create a subdirectory of the parent directory, if the default is built in the current directory.
Case study: (1) in the root directory of drive c to create a subdirectory named FOX; (2) in the subdirectory and then create a FOX USER subdirectories.
C:, > MDFOX (on the current drive c: create subdirectories under FOX)
C:, > MDFOX, USER (in the subdirectory and then create a FOX USER subdirectories)
(2) CD — change the current directory
1. function: displays the current directory
2. type: internal commands
3. format: CD [drive:] [path] [subdirectory name]
4. instructions for use:
(1) If you omit the path, and the subdirectory name displays the current directory;
(2) such as "CD," formatting, you return to the root directory;
(3) if the use of "CD. " Format is returned to the top level directory.
Case study: (1) access to USER subdirectories; (2) to return from a subdirectory to the subdirectory USER; (3) back to the root directory.
C:, > CDFOX, USER (enter FOX USER subdirectories under a subdirectories)
C:、FOX、USER>CD.。 (Back up one level in the root directory)
C:, FOX > CD, (return to the root directory)
C:、>
(3) of the RD-delete subdirectories command
1. function: remove from the specified disk directory.
2. type: internal commands
3. format: RD [drive:] [path] [subdirectory name]
4. instructions for use:
(1) before deleting the subdirectories must be empty, which means that you need to enter the subdirectories, use the DEL (delete file command) to its subdirectory files by deleting the blank, and then return to top level directory, delete the RD command with the directory itself;
(2) you cannot remove the root directory and the current directory.
Example: requires the C disk FOX USER subdirectories under a subdirectories, operates as follows:
Step 1: first USER subdirectory files by deleting empty;
C、>DELC:、FOX、USER、*。 *
The second step, the deleted USER subdirectories.
C、>RDC:、FOX、USER
(4) DIR — displays disk directory command
1. function: displays the contents of the disk directory.
2. type: internal commands
3. format: DIR [drive] [path] [/P] [/W]
4.
Instructions for use:/P; when you wish to view the directory too much, can not be finished in a screen display screen will roll up straight, not easy to see, together with the/P parameter, the screen will face a display 23 rows of file information, and then pause and tips; Press
anykeytocontinue
Use:/W added/W displays only the file name, file size and creation date and time you are omitted. Plus parameters, each row can be displayed five file name.
PATH — the path to the Setup command
1. function: device search path for executable files, only the file is valid.
2. type: internal commands
3. format: PATH [letter 1] directory [path name 1] {[; letter 2:], page〈 directory pathname 2 > ...}
4. instructions for use:
(1) when you run an executable file, DOS will first search the current directory to the file, if found; if the running of the file is not found, then depending on the PATH command, order a set path to the directory one by one to search for the file;
(2) the path in the PATH command, if there are two or more, all paths to a semicolon-separated by ";";
(3) PATH command has three methods:
PATH [letter 1:] [path1] [letter 2:] [path 2] ... (Sets the search path for executable files) PATH: (cancel all paths)
PATH: (displays the path of the currently set)
(6) TREE — displays disk directory structure command
1. function: displays the specified drive all directory path and the directory of all of the file.
2. type: external commands
3. format: TREE [drive:] [/F] [code PRN]
4. instructions for use:
(1) use the/F parameter to display all the directories and directory all the files that omits, only display the directory does not display files in the directory;
(2) choose > PRN parameter, you put the directory and file name in the directory print output.
(VII) DELTREE — delete the entire directory command
1. function: the entire directory and its subdirectories and files deleted.
2. type: external commands
3. format: DELTREE [drive:] page〈 pathname >
4. instructions for use: this command can be a step in the directory and all files and subdirectories and the lower one and delete the subdirectory, and regardless of the file attributes to hidden, system, or read-only, so long as the file is deleted, DELTREE alike, according to delete. Use caution when!!!
5. disk operation class command
(A) formAT-disk formatting command
1. function: to format the disk, the split tracks and sectors; also check out the entire disk, there are no tracks, with defects on bad road charging tag; setting up directory and file allocation table, so that the disk to receive DOS ready.
2. type: external commands
3. format: formAT page〈 letter: > [/S] [4] [/Q]
4. instructions for use:
(1) after the letter of the command is not the default, if you format the hard disk, such as the following tip: WARNING: ALLDATAONNON
——REMOVABLEDISK
DRIVEC:WILLBELOST!
Proceedwithformat(Y/N)?
(Warning: all data in the C disk, you will lose the formatting, are you sure you want to continue?)
(2) if it is on the floppy disk is formatted, the following prompt: InsertmewdiskettefordriveA;
andpressENTERwhenready…
(In A new disc is inserted in the drive, press ENTER when ready).
(3) selection [/S] parameter, the DOS system files IO.SYS
, MSDOS.SYS and command.com copied to disk, so the disk can do as a DOS boot disk. If you do not choose the/S parameter,formatted gun spare only reading and writing information, not as a boot disk;
(4) [4] parameter, in high density floppy drive 1.2MB formatted 360KB of low density disc;
(5) selection [/Q] parameter, a quick format, this parameter will not redistribute the disk's magnetic pretend and sector, only disk root directory, file allocation table, and boot sector winding into blank, formatted, faster.
(6) selection [/U] parameter that represents unconditional format, i.e. the destruction of all data on the original disk. Without the/U safe format, first establish an image file to save the original FAT tables and root directory, if necessary, restore the original UNFORRMAT available data.
(Ii) resume format command UNformAT
1. function: to format the error data loss recovery disk.
2. type: external commands
3. format: UNformAT page〈 letter > [/L] [/U] [/P] [/TEST]
4. instructions for use: used to be "non-destructive" formatted disk recovery. The root directory of the deleted files or subdirectories and disk system sectors (including FAT and root directory, BOOT sectors and a hard disk partition table) damaged, can also be used to rescue UNformAT.
(1) choose the/L parameter lists to find the name of the subdirectory, the file name, date and other information, daxiao but don't really do the formAT.
(2) choose the/P parameter is displayed to the screen of the report (containing the/L parameter produces information) also sent to the printer. Run-time screen shows: "Printoutwill
besenttoLPT1”
(3) selection of/TEST parameter only do simulation test (TEST) cannot be written to the action. Using this parameter will be displayed: "Simulationonly"
(4) selects the/U parameter does not use a MIRROR image of the data, directly under the disk status UNformAT.
(5) select hard drive/PSRTN; repair partition table.
If the letter with/P,/L, one of the quite/TEST to use the/U parameter, UNformAT "assumes" disk not MIRROR image files at this time.
Note: the formAT for just UNformAT disk, you can fully recover, but the formAT has made after other data is written, the UNformAT cannot complete to save the data. UNformAT is not a panacea, due to the use of FAT and UNformAT will rebuild the root directory, so it also has a high risk, improper operation of the loss may be expanded, if only the wrong a few files or subdirectories, you only need to use UNDELETE is enough.
3) CHKDSK check disk-current status command
1. function: displays the disk's status, memory status, and specify the path Specifies the file number is not continuous.
2. type: external commands
3. format: CHKDSK [drive:] [path] [filename] [/F] [/V]
4. instructions for use:
(1) select [file name] argument, displays the file occupies disk;
(2) selected [/F] parameter, to correct the specified disk logical errors found;
(3) selection [/V] argument, displays all the files on the disc and the path.
(4) DISKCOPY — — the whole disk copy command
1. function: copy is identical to the format and content of the floppy disk.
2. type: external commands
3. format: DISKCOPY [letter 1:] [letter 2:]
4. instructions for use:
(1) if the target disk is not formatted, replication automatically selected when the system.
(2) if the target disk on the original file, the copy will be lost.
(3) If a single-drive copy, you are prompted to replace the source and destination in a timely mannerDisc, please do pay attention to distinguish between source and destination disks.
(5) LABEL — establish the disk volume label command
1. function: to establish, change, delete the disk volume label.
2. type: external commands
3. format: LABEL [drive:] [volume label name]
4. instructions for use:
(1) volume label name in order to establish the volume label name, if the default this parameter, the system prompts you to type the volume label name or ask if you want to delete the original volume label name;
(2) volume label name from 1 to 11 characters.
(6) VOL — displays a disk volume label command
1. function: view the disk volume label.
2. type: internal commands
3. format: VOL [drive:]
4. instructions for use: omit letter to display the current drive volume label.
(VII) SCANDISK — detect, repair disk command
1. function: detect disk FAT tables, directory structure, file system, such as whether there are problems, and can detect problems be fixed.
2. type: external commands
3. format: SCANDISK [letter 1:] {[letter 2:] ...} [/ALL]
4. instructions for use:
(1) CCANDISK apply to hard disk and floppy disks, you can specify more than one at a time or disk [/ALL] parameter specifies all the disk;
(2) can automatically detect the disks in the cross-connect, lost clusters, and directory structure of the logical errors, and repair.
(8): reforming the disk DEFRAG commands
1 £ ®. Function: finishing disk, eliminating disk pieces.
2. type: external commands
3. format: DEFRAG [drive:] [/F]
4. instructions for use: use/F parameter, the file exists on the Elimination of debris, and adjust the disk file, ensure that no gaps between files. Thus speeding up the reading of the disk speed and save disk space.
(9) SYS--system copy command
1. function: adds the current drive in DOS system files IO.SYS, MSDOS.SYS, and command.com to the specified drive.
2. type: external commands
3. format: SYS [drive:]
* Note: If the remaining disk space to hold the system file, the Tip: Noroomforondestinationdisk.
File operation class command
(A) COPY the file copy command
1. function: copies one or more files to the specified disk.
2. type: internal commands
3. format: COPY [source] [path] page〈 source file name > [destination] [path] [filename]
4. instructions for use:
(1) COPY the file to the file before copying the data, copy the target disk must be formatted;
(2), the destination file name on the same old files are source files;
(3) when you copy a file, you must first determine the target so there is enough space, otherwise it will appear; insufficient error prompt is not enough disk space;
(4) the filename allows you to use wildcard-lift "*" and "?", you can copy multiple files at the same time;
(5) the COPY command in the source file name must be pointed out that cannot be omitted.
(6), the destination file name can be the same as with the source file name, known as "copy" of the same name where the target file name can be omitted;
(7), the destination file name can also vary with the source file name, known as "synonyms", in which case the copy destination filename cannot be omitted;
(8) replication, you can also combine several files into one file, called a "merged copy", format: COPY; [source] [path] page〈 source file name 1 > page〈 source file name 2 > ... [Destination] [Path] page〈 destination filename >;
(9) using the COPY command, you can also enter data from the keyboard, the establishment of file format: COPYCON [drive:] [path] page〈 filename >;
(10) Note: the COPY command from the format, the source file name and destination file names must be separated with spaces!
(2) the XCOPY-directory replication command
1. function: copy the specified directory and all files under the directory with the directory structure.
2. type: external commands
3. format: XCOPY [source:] page〈 source pathname > [destination letter:] [path] [/S] [/V] [/E]
4. instructions for use:
(1) COPY of XCOPY is extended to the specified directory with files and directory structure and copies, but does not copy hidden and system files;
(2) use source letter, source destination path, specify at least one source file name;
(3) when use/S for source directory and its subdirectories for all file COPY. Unless you specify the/E parameter, otherwise/S do not copy the empty directory, if you do not specify the XCOPY/S parameter, you only copy the source files of the directory itself, without involving the subdirectories under it;
(4) selects the/V parameter, on the copies of the sector are a surveyor, but speed is reduced.
(3) TYPE — displays the contents of the file command
1. function: displays the contents of the ASCII file.
2. type: internal commands.
3. format: TYPE [drive:] [path] page〈 filename >
4. instructions for use:
(1) shows the ASCII text file, for consisting of. Exe.com, extension files, its display of the content is not readable, not the actual significance of 2;
(2) this command only once to display the contents of a file, you cannot use wildcard characters;
(3) if the file has an extension, you must write the extension;
(4) when the file is long, screen display, the display can be in the following format; TYPE [drive:] [path] page〈 filename > | MORE, MORE, for split-screen display command parameters using some will pause when full, press any key to continue to be displayed.
(5) If you want to print the contents of the file, use the following format:
TYPE [drive:] [path], > page〈 filename > PRN
At this point, the printer should be online.
(4) REN-file rename command
1. feature: change the file name
2. type: internal commands
3. format: REN [drive:] [path] page〈 old filename > page〈 new filename >
4. instructions for use:
(1) before the new file name may not be combined with the drive letter and path, because the command is only available on the same disk filename of a file replacement;
(2) allows the use of wildcards to change a file name or extension.
(5) FC-file comparison command
1. function: compare the similarities and differences between files, listing the differences.
2. type: external commands
3. format: FC [drive:] [path name] page〈 filename > [drive:] [path] [filename] [/A] [/B] [/C] [/N]
4. instructions for use:
(1) use the/a switch, as an ASCII comparison mode;
(2) choose the/B parameter as a binary comparison mode;
(3) choose the/C parameter, the uppercase and lowercase characters as the same character.
(4) use/N parameter in an ASCII comparison, display line numbers for different services.
(6) ATTRIB-modify file properties command
1. function: modify the properties of the specified file. (File properties see 2.5.4 (2) the file properties section)
2. type: external commands.
3. format: ATTRIB [filename] [R] [-R] [A] [-A] [H] [-H] [-S]
4. instructions for use:
(1) choose the R parameter, the specified file as read-only property, so the files can only be read, can't write data or remove; selection-R parameter to remove the read-only property;
(2) select A parameter and sets the file attributes for the file; select — A parameter that removing archives property; (3) choose the H parameter, the file transfer protocol to suppress attribute; selection — H parameter to suppress the property;
(4) the selection of the S parameter, the file is set to system properties; selection-S parameter to remove the system attribute; (5) selection of the/s parameter to the current directory and all subdirectories.
7) DEL: delete file command
1. function: delete the specified file.
2. type: internal commands
3. format: DEL [drive:] [path] page〈 filename > [/P]
4. instructions for use:
(1) choose the/P parameter, the system asks whether you want to delete before you really want to delete the file, if you do not use this parameter, you automatically delete;
(2) this command does not delete the attribute to suppress or read-only files;
(3) in the file name you can use a wildcard character;
(4) If you want to delete all the files on the disk (DEL * · * or DEL ·), you will be prompted: (Areyousure?) (are you sure?) to answer Y, you remove it, answer n, then cancel the delete operation.
(8) UNDELETE-recover delete command
1. function: restore mistakenly deleted command
2. type: external commands.
3. format: UNDELETE [drive:] [path name] page〈filename > [/DOS]/LIST] [/ALL]
4. instructions for use: use UNDELETE can use "*" and "?" wildcards.
(1) selection parameters according to the directory where/DOS residual records to recover the files. Because the file is deleted, the directory is first recorded Tsam filename characters will be converted to DOS that is based on the E5, the beginning of a file and its subsequent E5 to locate a file to recover, UNDELETE, therefore, will require the user to enter a character, to complement the file name. But the characters do not have to and original, just need to conform to the DOS filename rules.
(2) choose "listed"/LIST only that meets the specified criteria of a file without recovery, disk content will not be affected.
(3) use will automatically complete/ALL recovered files full restoration, not a one to ask the user, use this parameter when you use directory UNDELTE residual records to recover the files, you will automatically select a character name complement, and that it is not the same as the existing file name, choose the optimal order of characters: #% — 0000123456789A ~ Z.
UNDELETE also has set up a file the function of protection measures, is beyond the scope of this course session, the reader is in use some features access to DOS manual.
VII. other commands
(A) of the CLS — clear screen command
1 features: clear all the display on the screen, place the cursor in the upper left corner of the screen.
2 types: internal commands
3 formats: CLS
(2) the version command VER view system
1: display the current system version number
2 types: internal commands
VER 3 formats:
(3) DATA date settings command
1 function: set or display the system date.
2 types: internal commands
3 format: DATE [mm-dd-yy]
4 instructions for use:
(1) omitted [mm-dd-yy] show the system date and prompts for the new date, not modify directly press return, [mm-dd-yy] as "monthly — every day — every year" format;
(2) when the machine starts, it is automatically processed file (AUTOEXEC.BAT) is executed, you are not prompted to enter the system date. Otherwise, the prompt for a new date and time.
(4) TIME system clock settings command
1 function: set or display the system time.
2 types: internal commands
3 format: TIME [hh: mm: ss: xx]
4 instructions for use:
(1) omitted [hh: mm: ss: xx] to display the system time and prompts for a new time, not modify directly press return, [hh: mm: ss: xx] "hours: minutes: seconds: fractions of a second" format;
(2) when the machine starts, it is automatically processed file (AUTOEXEC.BAT) is executed, you are not prompted to enter the system date. Otherwise, the prompt for a new date and time.
(5) view the current memory state MEM command
1 function: displays the current memory usage
2 types: external commands
3 formats: MEM [/C] [/F] [/M] [/P]
4 instructions for use:
(1) choose the/C parameter lists into conventional memory and the file of the CMB length and also memory space usage and most free space;
(2) choose the/F parameter lists current conventional memory remaining byte size and UMB available area and size;
(3) use/M parameter displays the module uses memory to address, size and nature of the module;
(4) selects the/P parameter to specify the output more than one screen, pause for a user to view.
(6) MSD display system information command
1: display the system hardware and operating system.
2 types: external commands
3 formats: MSD [/I] [/B] [/S]
4 instructions for use:
(1) use the/i parameter, does not detect hardware;
(2) choose the/B parameter, start MSD in black and white;
(3) choose the/S parameter, the system displays a concise report.
The ping command in Visual FoxPro
For Windows ping command as you already familiar with, but can ping functionality to maximize human and not a lot, I certainly did not mean that I can ping the most functional, I only ping this tool often used also summarizes some small experiences, now share with you.
And now I'm going to refer to the ping command help instructions to give everybody to say I use ping is used techniques, ping only the TCP/IP protocol is installed before you can use:
ping[-t][-a][-ncount][-llength][-f][-ittl][-vtos][-rcount][-scount][[-jcomputer-list]|[ -kcomputer-list]][-wztimeout]destination-list
Options:
-tPingthespecifiedhostuntilstopped.Toseestatisticsandcontinue-typeControl-Break;Tostop-typeControl-C.
Continuously ping the local host, until you press the Control-C.
This function does not have any special skills, but can be used with other parameters, mentioned below.
-aResolveaddressestohostnames.
Resolve computer NetBios name.
Example: C:\ > ping-a192.168.1.21
Pingingiceblood.yofor.com[192.168.1.21]with32bytesofdata:
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Pingstatisticsfor192.168.1.21:
Packets:Sent=4,Received=4,Lost=0(0%loss),Approximateroundtriptimesinmilli-seconds:
Minimum=0ms,Maximum=0ms,Average=0ms
From the above you can know the IP for the computer NetBios name 192.168.1.21 iceblood.yofor.com.
-ncountNumberofechorequeststosend.
Send count specifies the number of Echo packets.
By default, generally only four packets sent, by this command you can define the number sent, to measure the network speed to be helpful, for example, I want to test sending 50 packet returned average time for how many, how much time is the fastest, slowest time as much as you can get:
C:\>ping-n50202.103.96.68
Pinging202.103.96.68with32bytesofdata:
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Requesttimedout.
………………
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Pingstatisticsfor202.103.96.68:
Packets:Sent=50,Received=48,Lost=2(4%loss),Approximateroundtriptimesinmilli-seconds:
Minimum=40ms,Maximum=51ms,Average=46ms
From above I can know to send 50 packets 202.103.96.68 the returned 48 consisting of two lost due to unknown reasons, this 48 packets which returns the fastest to slowest to 40ms, with an average speed of 51ms 46ms.
-lsizeSendbuffersize.
Define echo packet size.
By default Windows ping packets size 32byt, we can also define the size of its own, but there is a size limit is the maximum you can only send 65500byt, some people might ask why you want to restrict to 65500byt because Windows series system has a security vulnerability (may also include other system) is when to send packets at a time is greater than or equal to the other when 65532 is most likely blocking machine, so Microsoft to address this security vulnerability and so limits the ping packet size. Although Microsoft has done this limit, but the parameter with the other parameters after the damage is still very strong, for example, we can tie-t parameter to a command with offensive: (here with risk, only for testing, please do not easily applied to other machines, otherwise the consequences)
C:\>ping-l65500-t192.168.1.21
Pinging192.168.1.21with65500bytesofdata:
Replyfrom192.168.1.21:bytes=65500time<10msTTL=254
Replyfrom192.168.1.21:bytes=65500time<10msTTL=254
………………
So it will keep your computer sends to the 192.168.1.21 65500byt packet size, if you have only one computer may have no effect, but if you have a lot of your computer so you can make each other completely paralyzed, I have done such a test when I use 10 or more computers to ping one Win2000Pro system when the computer is less than 5 minutes of each other's network has been completely paralyzed, network jams, HTTP and FTP service completelystopped, this shows the power of no small matter.
-fSetDon’tFragmentflaginpacket.
In the packet send "don't fragment" flag.
In general you send packets will be sent via route segment to the other party, and this parameter after the routing will not be segmented.
-iTTLTimeToLive.
Specifies the TTL value in each other's systems over time.
This parameter also help you check the functioning of the network.
-vTOSTypeOfService.
"The service type" field is set to the value specified by the tos.
-rcountRecordrouteforcounthops.
In "record route" field in the outgoing and return packet routing.
Under normal circumstances you send packet routing only through one by oneReach each other, but what is the result of which routing? this parameter you can set you want to detect the number of routing, but limited to nine, meaning you can only track to nine routes, if you want to detect more, you can use other commands, I will be in a future article for everyone. The following is the example:
C:\ > ping-n1-r9202.96.105.101 (send a packet, the maximum number of recording 9 route)
Pinging202.96.105.101with32bytesofdata:
Replyfrom202.96.105.101:bytes=32time=10msTTL=249
Route:202.107.208.187->
202.107.210.214->
61.153.112.70->
61.153.112.89->
202.96.105.149->
202.96.105.97->
202.96.105.101->
202.96.105.150->
61.153.112.90
Pingstatisticsfor202.96.105.101:
Packets:Sent=1,Received=1,Lost=0(0%loss),
Approximateroundtriptimesinmilli-seconds:
Minimum=10ms,Maximum=10ms,Average=10ms
From above I can see from my computer to have adopted the 202.107.208.187 202.96.105.101, 202.107.210.214, 61.153.112.70, 61.153.112.89, 202.96.105.149, 202.96.105.97 this several routes.
-scountTimestampforcounthops.
Specifies the count specifies the number of hops.
This parameter and the-r almost just to this parameter does not log the packet back tothe routing, best records 4.
-jhost-listLoosesourceroutealonghost-list.
Use the list of computers specified computer-list routing packets. Continuous computer can be separated by intermediate gateways (loose source route) IP allows a maximum of 9.
-khost-listStrictsourceroutealonghost-list.
Use the list of computers specified computer-list routing packets. Continuous computer cannot be separated by intermediate gateways (strict source route) IP allows a maximum of 9.
-wtimeoutTimeoutinmillisecondstowaitforeachreply.
Specifies the time-out interval in milliseconds.
This parameter does not have any other skills.
Other techniques for ping command: under normal circumstances you can ping each other so that each other is returned to your TTL value size, roughly determine the target host system type is Windows series or UNIX/Linux series, General Windows series system returns TTL values between 100-130, and UNIX/Linux series system returns TTL value in the 240-255, of course, TTL value in each other's host is that you can modify the Windows series systems can modify the following registry key:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
"DefaultTTL"=dword:000000ff
255---FF
128---80
64-40
32-20
Well, the ping command is basically completely explain the finished, there are-j,-k parameter I also did not specify, for some reason also include my own the information collected is not too small here to share with you details, please forgive me, if you read this article to friends who know more than me, and the other using skills also want you to tell me, and in this first thanked him.
For Windows ping command as you already familiar with, but can ping functionality to maximize human and not a lot, I certainly did not mean that I can ping the most functional, I only ping this tool often used also summarizes some small experiences, now share with you.
And now I'm going to refer to the ping command help instructions to give everybody to say I use ping is used techniques, ping only the TCP/IP protocol is installed before you can use:
ping[-t][-a][-ncount][-llength][-f][-ittl][-vtos][-rcount][-scount][[-jcomputer-list]|[ -kcomputer-list]][-wtimeout]destination-list
Options:
-tPingthespecifiedhostuntilstopped.Toseestatisticsandcontinue-typeControl-Break;Tostop-typeControl-C.
Continuously ping the local host, until you press the Control-C.
This function does not have any special skills, but can be used with other parameters, mentioned below.
-aResolveaddressestohostnames.
Resolve computer NetBios name.
Example: C:\ > ping-a192.168.1.21
Pingingiceblood.yofor.com[192.168.1.21]with32bytesofdata:
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Replyfrom192.168.1.21:bytes=32time<10msTTL=254
Pingstatisticsfor192.168.1.21:
Packets:Sent=4,Received=4,Lost=0(0%loss),Approximateroundtriptimesinmilli-seconds:
Minimum=0ms,Maximum=0ms,Average=0ms
From the above you can know the IP for the computer NetBios name 192.168.1.21 iceblood.yofor.com.
-ncountNumberofechorequeststosend.
Send count specifies the number of Echo packets.
By default, generally only four packets sent, by this command you can define the number sent, to measure the network speed to be helpful, for example, I want to test sending 50 packet returned average time for how many, how much time is the fastest, slowest time as much as you can get:
C:\>ping-n50202.103.96.68
Pinging202.103.96.68with32bytesofdata:
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Requesttimedout.
………………
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Replyfrom202.103.96.68:bytes=32time=50msTTL=241
Pingstatisticsfor202.103.96.68:
Packets:Sent=50,Received=48,Lost=2(4%loss),Approximateroundtriptimesinmilli-seconds:
Minimum=40ms,Maximum=51ms,Average=46ms
From above I can know to send 50 packets 202.103.96.68 the returned 48 consisting of two lost due to unknown reasons, this 48 packets which returns the fastest to slowest to 40ms, with an average speed of 51ms 46ms.
-lsizeSendbuffersize.
Define echo packet size.
By default Windows ping packets size 32byt, we can also define the size of its own, but there is a size limit is the maximum you can only send 65500byt, some people might ask why you want to restrict to 65500byt because Windows series system has a security vulnerability (may also include other system) is when to send packets at a time is greater than or equal to the other when 65532 is most likely blocking machine, so Microsoft to address this security vulnerability and so limits the ping packet size. Although Microsoft has done this limit, but the parameter with the other parameters after the damage is still very strong, for example, we can tie-t parameter to a command with offensive: (following introductionWith risk, only for testing, please do not easily applied to other machines, otherwise the consequences)
C:\>ping-l65500-t192.168.1.21
Pinging192.168.1.21with65500bytesofdata:
Replyfrom192.168.1.21:bytes=65500time<10msTTL=254
Replyfrom192.168.1.21:bytes=65500time<10msTTL=254
………………
So it will keep your computer sends to the 192.168.1.21 65500byt packet size, if you have only one computer may have no effect, but if you have a lot of your computer so you can make each other completely paralyzed, I have done such a test when I use 10 or more computers to ping one Win2000Pro system when the computer is less than 5 minutes of each other's network has been completely paralyzed, network jams, HTTP and FTP service completely stopped, this shows the power of no small matter.
-fSetDon’tFragmentflaginpacket.br>In the packet send "don't fragment" flag.
In general you send packets will be sent via route segment to the other party, and this parameter after the routing will not be segmented.
-iTTLTimeToLive.
Specifies the TTL value in each other's systems over time.
This parameter also help you check the functioning of the network.
-vTOSTypeOfService.
"The service type" field is set to the value specified by the tos.
-rcountRecordrouteforcounthops.
In "record route" field in the outgoing and return packet routing.
Under normal circumstances you send packets are routed through one by one to get to each other, but what is the result of which routing? this parameter you can set you want to detect the number of routing, but limited to nine, meaning you can only track to nine routes, if you want to detect more, you can use other commands, I will be in a future article for everyone. The following is the example:
C:\ > ping-n1-r9202.96.105.101 (send a packet, the maximum number of recording 9 route)
Pinging202.96.105.101with32bytesofdata:
Replyfrom202.96.105.101:bytes=32time=10msTTL=249
Route:202.107.208.187->
202.107.210.214->
61.153.112.70->
61.153.112.89->
202.96.105.149->
202.96.105.97->
202.96.105.101->
202.96.105.150->
61.153.112.90
Pingstatisticsfor202.96.105.101:
Packets:Sent=1,Received=1,Lost=0(0%loss),
Approximateroundtriptimesinmilli-seconds:
Minimum=10ms,Maximum=10ms,Average=10ms
From above I can see from my computer to have adopted the 202.107.208.187 202.96.105.101, 202.107.210.214, 61.153.112.70, 61.153.112.89, 202.96.105.149, 202.96.105.97 this several routes.
-scountTimestampforcounthops.
Specifies the count specifies the number of hops.
This parameter and the-r almost just to this parameter does not log the packet back to the routing, best records 4.
-jhost-listLoosesourceroutealonghost-list.
Usethe list of computers specified computer-list routing packets. Continuous computer can be separated by intermediate gateways (loose source route) IP allows a maximum of 9.
-khost-listStrictsourceroutealonghost-list.
Use the list of computers specified computer-list routing packets. Continuous computer cannot be separated by intermediate gateways (strict source route) IP allows a maximum of 9.
-wtimeoutTimeoutinmillisecondstowaitforeachreply.
Specifies the time-out interval in milliseconds.
> This parameter has no other skills.
Other techniques for ping command: under normal circumstances you can ping each other so that each other is returned to your TTL value size, roughly determine the target host system type is Windows series or UNIX/Linux series, General Windows series system returns TTL values between 100-130, and UNIX/Linux series system returns TTL value in the 240-255, of course, TTL value in each other's host is that you can modify the Windows series systems can modify the following registry key:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters]
"DefaultTTL"=dword:000000ff
255---FF
128---80
64-40
32-20
Well, the ping command is basically completely explain the finished, there are-j,-k parameter I also did not specify, for some reason also include my own the information collected is not too small here to share with you details, please forgive me, if you read this article to friends who know more than me, and the other using skills also want you to tell me, and in this first thanked him.
FTP commands Daquan
FTP: file transfer protocol. First talk about his function, mainly from running FTP server computer to transfer files. You can interact with. Here, note that tcp/ip protocol is installed a machine in order to use ftp commands.
Command format: ftp [-v] [-d] [-I] [-n] [-g] [-s:filename] [-a] [-w:windowsize] [computer]
Said that their meanings.
-V does not display remote server response
-N ban first connect automatically login when
-I in multiple file transfer period close interaction tips
-D allows debugging, shows the client and server between all FTP commands
-G filename wildcard characters are not allowed, filename wildcard is allowed in local file and path names in the use of wildcard characters
-S:filename Specifies a text file that contains the ftp command. After starting the FTP command is automatically run these commands. In the add parameters cannot have spaces.
-A binding data connection, use any of the local port
-W:windowsize ignore default 4096 transmit buffer
Specifies the computer to connect to the remote computer's ip address
Oh, and understand the above, it said that some specific commands, I personally think that although it is easy to use tools, but to understand these commands in many places is still very useful, just like now nt command prompt under the
1)?
Description: displays a description of the ftp command. Later you can add parameters, is combined with the need to interpret the command name, not the displayed list contains all the commands.
2)append
Description: use the current file type settings to a local file to attach to a remote computer. About format is
Appendlocal-file [remote-file] which is said to be local-file added local files.
Remote-file mean specifying local-file attached to a remote computer file, if the province that is using the local file name do remote file name.
3)ascii
Description: by default, the file transfer type to ASCII
4)bell
Description: ring-switch, meaning that the file transfer is complete if lingsheng remind. The default is off.
5)binary
Description: the file transfer type to binary.
6)bye
Description: end and the remote computer's ftp session, also is to safely disconnect, exit ftp.
7)cd
Description: change the remote computer's working directory. Ifdata cddata which is to enter the directory of the remote computer.
8)close
Description: end and the remote server, the FTP session and returns to the command interpreter.
9)dir
Description: displays the remote files and subdirectories in the list. If dirdatalocal-file
Which data is to specify the directory you want to view the list, not specified, then the current directory. Local-file is specified to save a list of local files, do not specify words on the screen output.
10)debug
Description: debug switch, open print each when sent to the remote computer's command, the command before-->
The default is off.
11)disconnnect
Description: disconnect from the remote computer, but also maintains the FTP command prompt.
12)get
Description: use the current file transfer type to remote files are copied to the local computer.
If getremote-filelocal-file
Remote-file is assigned to the copied file, local-File is to specify the name of the file on the local computer,
If you don't specify a remote-file have the same name.
13)glob
Description: filename switch
14)hash
Description: convert each transfer data quickly print a hash mark (#). data quickly size is 2048 bytes. Default is off,
15)help
Note: display the ftp commands, such as helpcommmand which command is the command you want to explain, if you do not add this parameter command would display a list of all commands
16)!
Description: this command I almost forgot:) feature is on the local computer, run the specified command. If! command where command is the command to run, if you do not add this parameter, the command will display the local command prompt when you enter the exit command to return to ftp.
17)lcd
Description: change the local computer's local directory, the default is start ftp directory should not feel that this is useless, in time for you to use ftp to transfer files is not a constant change inlocal and remote computers directory?:)
If the lcd [directory] where [directory] is specified to enter the directory of the local computer, if you do not add this parameter, it will show the working directory on the local computer.
18)literal
Description: send to a remote ftp server, the report negotiation parameters.
If lireralargument [...] One argument is specified to send to the remote server negotiation parameters.
19)ls
Description: displays the remote directory's files and Word directory.
If lsremote-directorylocal-file
Which remote-directory refers to view a list of directories that do not specify, then displays the current working directory. Local-file is specified to save a list of local file is specified, then no screen output.
20)mdelete
Description: Deletes a file on a remote computer as mdeleteremote-file ...
Remote-file must be the file you want to delete, you can delete multiple.
21)mdir
Description: displays the remote directory's files and subdirectories in the list, he allows you to specify multiple files.
If mdirremote-file...local-file
Parameter I think we should know what I mean? do not understand that look similar to the front of the command bar.
22)mget
Description: with the current file transfer type to multiple remote file copied to the local computer.
If mgetremote-files ...
In fact, you can specify multiple remote-files, he is to be copied to the local computer for remote files.
23)mkdir
Description: create remote directory.
If this command and mkdirdirectory nt command prompt under mddirectory in, do not more.
24)mls
Description: displays the remote directory's files and directories in the summary table
If mlsremote-file...local-file
Which this argument is must remote-file to add, ', '-', ' is to use the remote computer's current working directory.
25)mput
Description: with the current file transfer type, copy a local fileto the remote computer.
If mputlocal-files ...
26)open
Description: the connection to the specified ftp server,
If one computer is generally opencomputerport remote computer's IP address, port goes without saying that the specified port.
27)prompt
Description: conversion tips, in multiple file transfer, ftp prompts can selectively retrieve or save the file, if you turn off the prompt that you mget and mput commands to transfer all files, default is open.
28)put
Description: with the current file transfer type copy a local file to a remote computer,
If putlocal-fileremote-file
It is specified to copy local-file local files,
Remote-file is to specify that you want to copy the file on a remote computer, it is not specified and the file name on the local computer with the same name.
29)pwd
Description: display a sense of distance that the current directory on the computer.
30)quit
Description: end of the remote computer and exits ftp sessions, ftp.
31)quote
Description: the remote ftp server protocol, reports. looks forward to ftp-code answer, this command is identical to the functionality and literal.
32)recv
Description: with the current file transfer type to remote file copied to the local computer, and the get command.
33)remotehelp
Description: displays the remote command help-the help command usage and, as you can reference the him! of usage.
34)rename
Description: change the file name of the remote computer.
This command and the nt command prompt, such as ren renamefilenamenewfilename
35)rmdir
Description: Deletes a remote directory.
This command and the nt command prompt, such as rm rmdirdirectory
36)send
Description: with the current file transfer type copy a local file to the remote computer .send and put commands.
If sendlocal-fileremote-file
37)status
Description: displays the FTP connection and the current state ofthe conversion
38)trace
Description: converting message tracking, run the ftp command, the trace will display each packet.
39)type
Description: set or display the file transport type.
If the type [type-name]
Which type-name mean file transfer types, the default is ASCII, not with this argument is to display the current transport type.
40)user
Description: Specifies a connection to the remote computer of the user.
If useruser-name [passwd] [account]
Which user-name alone is used to login to your computer's user name,
Passwd is the password for the specified user-name, do not specify what ftp prompts for the password.
Account is specified for login, such as the computer account is not specified, ftp prompts for the account.
41)verbose
Description: convert redundant mode. Here if open, displays all the ftp response, the end of the file transfer will display the transport efficiency and statistical information, the default is open.
Oh, the command would describe these, you can familiarize yourself with, in fact, many ftp software, very easy, but you said these commands useless is not possible, just like Windows did still command prompt.:) _ Special sometimes ftp software in many places do that.? Somewhere.
For example, I have gone through a secured ftp user name is admin's invasion of the hearing, to use his. Oh, not much to say here, just write here.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment