Documente Academic
Documente Profesional
Documente Cultură
Index Windows XP Overview Active Directory Directory Structure User profile (Start Menu, Desktop, My documents, App Data etc.,) Advantage of NTFS (Sharing and Security, Encryption, Disk Quota etc.,) Users and Groups overview System Tools (Backup, Disk Cleanup, Schedule Task, System restore etc.,) Computer Manager(Event Viewer, Disk Management, Defrag, Device Manager etc.,) Registry Overview ( about Hives and data types) Control Panel Overview Internal and External Commands "Run" commands
A 64-bit version of Windows XP was announced officially of Microsoft in April 2003. The RC2 was available in February 2005. Windows XP Professional x64 was published in April 2005. At most 16 gbyte RAM are utilizably with that, the virtual address range enlarges to 16 byte. Same will be the product activation at all versions, which is needed at every new installation or extensive upgrade of the PC devices. Company customers can use can so-called corporate version by a special licensing option without this product activation. As the most visual innovation the revised Windows interface with the new design is well done, the design called Luna (as of beta 2428) can display window elements in high color. The return to the interface as of Windows 2000
Active Directory What is Active Directory? Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security and distributed resources and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. Active Directory was new to Windows 2000 Server and further enhanced for Windows Server 2003, making it an even more important part of the operating system. Windows Server 2003 Active Directory provides a single reference, called a directory service, to all the objects in a network, including users, groups, computers, printers, policies and permissions. For a user or an administrator, Active Directory provides a single hierarchical view from which to access and manage all of the network's resources. Why implement Active Directory? There are many reasons to implement Active Directory. First and foremost, Microsoft Active Directory is generally considered to be a significant improvement over Windows NT Server 4.0 domains or even standalone server networks. Active Directory has a centralized administration mechanism over the entire network. It also provides for redundancy and fault tolerance when two or more domain controllers are deployed within a domain. Active Directory automatically manages the communications between domain controllers to ensure the network remains viable. Users can access all resources on the network for which they are authorized through a single signon. All resources in the network are protected by a robust security mechanism that verifies the identity of users and the authorizations of resources on each access.
Group Policy management and Active Directory It's difficult to discuss Active Directory without mentioning Group Policy. Admins can use Group Policies in Microsoft Active Directory to define settings for users and computers throughout a network. These setting are configured and stored in what are called Group Policy Objects (GPOs), which are then associated with Active Directory objects, including domains and sites. It is the primary mechanism for applying changes to computers and users throughout a Windows environment. Through Group Policy management, administrators can globally configure desktop settings on user computers, restrict/allow access to certain files and folders within a network and more. It is important to understand how GPOs are used and applied. Group Policy Objects are applied in the following order: Local machine policies are applied first, followed by site policies, followed by domain policies, followed by policies applied to individual organizational units. A user or computer object can only belong to a single site and a single domain at any one time, so they will receive only GPOs that are linked to that site or domain.
boot.ini
ntdetect.com Detects the major components of the computer before NTLDR selects a configuration and loads the Kernel. bootsect.dos Present only on dual-boot systems. NTLDR uses this file when the selected operating system is not Windows XP. Bootsect.dos in turn seeks out the OS-specific operating system loader file, such as io.sys for MS-DOS or os2ldr.exe for OS/2. ntbootdd.sys Used only on systems with SCSI drives that do not have on-board BIOS translation enabled. It is a copy of the device driver for your particular SCSI drive. hiberfil.sys NOTE Available if hibernation is enabled on the computer.
Documents This folder is used to hold the configurations for each user who accesses the system. In Windows NT, this information was and Settings stored in the \Windows\profiles folder. Program This folder is the default installation location for Windows applications.
This is not a true folder; instead, it is the system-controlled temporary repository for deleted files. You can access its contents by launching the Recycle Bin tool from the desktop. Note that this folder does not appear until a file is deleted. This is the main folder containing all the Windows XP system files, and the default folder for Windows XP.
Windows
The root of the boot partition is also the default location for pagefile.sys, which is the page file the Windows NT virtual memory system uses. NOTE The file and folder structure discussed in this chapter is derived from a fresh installation of Windows XP on an x86 desktop system with Service Pack 1 integrated. The typical installation method was chosen. No other applications from Microsoft or any third-party vendors were present on the system. That means no additional services or applications were installed from the Windows XP distribution CD, no hotfixes were applied, and Internet Explorer was not updated. The Program Files folder is home to 16 subfolders: Common Files. This folder contains files shared with the Microsoft applications. ComPlus Applications. This folder contains files used by ComPlus applications. If there are no ComPlus applications installed on your XP machine, this folder will be empty. COM+ builds on the Microsoft Component Object Model (COM) integrated services and features, making it easier for developers to create and use software components in any language, using any tool. Internet Explorer. This folder contains the files and executables for Internet Explorer, a Web-browsing tool.
The System32 subfolder contains most of the files used by Windows XP. This is the primary storage location for DLLs, Control Panel applets (.cpl), device drivers (.drv), help files (.hlp and .cnt), MS-DOS utilities (.com), language support files (.nls), screensavers (.scr), setup information files (.inf), and a handful of other files used for support, configuration, or operation. The most commonly accessed subfolders in Windows\System32 are described in the following list:
1025, 1028, 1031, 1033, etc. Contains locationization languages files. Most of these folders will be empty. The English language is 1033. The complete list of locale IDs can be found at http://www.microsoft.com/globaldev/reference/loclanghome.mspx. CatRoot. Contains security catalog files. CatRoot2. Contains catalog database files. Com. Contains COM object information. Config. Contains the Registry hives used during bootup and is the storage location for the System, Security, and Application log files viewed through Event Viewer. Config now contains a new folder called \systemprofile that holds a standard profile for the local system. DHCP. This is an empty folder used to hold Dynamic Host Configuration Protocol (DHCP) database files if the host becomes a DHCP server. DirectX. Contains files to support the accelerated performance features of game devices. Dllcache. Contains backup copies of the operating system files that are under the Windows File System Protection system.
Drivers. Contains driver files (.sys); the \etc folder contains sample copies of the TCP/IP text-based configuration files, such as Hosts and LMHosts files. Export. This is an empty folder. IAS. If there is no Internet connection capability, this is an empty folder used to hold configuration files for the Internet Authentication Service. This service is typically found on servers. If the machine has a device capable of connecting to the Internet, the IAS folder should not be empty. It will contain two files: DNARY.MDB (used to phrase IAS log files) and IAS.MDB (used to store remote access policies). Icsxml. Contains files for Univeral Plug and Play. IME. Contains files for Input Method Editors. Intsrv. Contains files used by the World Wide Web service. This folder is empty. Macromedia. Contains a subfolder with the Shockwave Flash .ocx file. MsDTC. Contains Microsoft Distributed Transaction Coordinator files that control transaction output and message delivery between two different applications or processes. MUI. Contains Multilingual-User Interface files that are created by applications, such as Service Pack 1. Os2. Contains drivers used by the OS/2 subsystem. NPP. Contains files to support collecting network traffic from an XP PC by a Network Monitor server. Oobe. Contains "Out of Box Experience" files that prompt users to complete product activation and registration and to create a new user other than Administrator. This feature is activated only after setup. Ras. Contains the default scripts used by Dial-Up Networking. Restore. Contains a list of files to be monitored and saved to an alternative location in case of file corruption. The System Restore service takes snapshots of the XP system periodically to enable the system to be restored from a previous set of data. This folder also contains the machine GUID. Setup. Contains setup files for additional services, such as FrontPage Server Extensions and Microsoft Fax.
ShellExt. By default, this folder is empty. Spool. Used by the printing system to store spooled print jobs and related files. The Printers subfolder is used to store spool files. The other folders found here vary based on printer drivers and configuration. USMT. USMT stands for User State Migration Tool. This folder contains files to support both USMT and the File and Settings Transfer Wizard. Both tools enable user files and settings to be copied to another PC. WBEM. Used by Web Based Enterprise Management to store its data and executable files and utilities. The Microsoft implementation of WBEM is the Windows Management Instrumentation (WMI) Service. With WMI, programmers can create applications that control network devices, using the same commands regardless of platform. Wins. Contains files to support the Windows Internet Name Service (WINS). This folder is empty.
User Profile folders Structure Applies To: Windows Server 2003, Windows Server 2003 R2, Windows Server 2003 with SP1, Windows Server 2003 with SP2 A user profile consists of: A registry hive. The registry is a database used to store computer- and user-specific settings. Portions of the registry can be saved as files, called hives. These hives can then be reloaded for use as necessary. User profiles take advantage of the hive feature to provide roaming profile functionality. The user profile registry hive is the NTuser.dat in file form, and is mapped to the HKEY_CURRENT_USER portion of the registry when the user logs on. The NTuser.dat hive maintains the users environment preferences when the user is logged on. It stores those settings that maintain network connections, Control Panel configurations unique to the user (such as the desktop color and mouse), and application-specific settings. The majority of the settings stored in the registry are opaque to user profiles settings are owned and maintained by individual applications and operating system components.
Table 1 User Profile Locations Operating system Windows Server 2003 clean installation (no previous operating system) Windows Server 2003 upgrade of Location of user profile %SYSTEMDRIVE%\Documents and Settings; for example, C:\Documents and Settings SYSTEMDRIVE%\Documents and Settings;
Configuration Preferences Stored in the Registry Hive The NTuser.dat file contains the following configuration settings: Windows Explorer settings. All user-definable settings for Windows Explorer, as well as persistent network connections. Taskbar settings. Printer settings. All network printer connections. Control Panel. All user-defined settings made in the Control Panel. Accessories. All user-specific application settings affecting the Windows environment, including: Calculator, Clock, Notepad, Paint, and HyperTerminal, among others. Application Settings. Many applications store some per user settings in the users registry hive (HKEY_CURRENT_USER). An example of these types of settings would be Microsoft Word 2000s toolbar settings. Configuration Preferences Stored in Profile Directories Figure 1 below shows the structure of the user profile.
Each users profile contains the following folders: Application data*. Application-specific data, such as a custom dictionary for a word processing program. Application vendors decide what data to store in this directory. Cookies. Internet Explorer cookies. Desktop. Desktop items, including files and shortcuts. Favorites. Internet Explorer favorites Local Settings*. Application settings and data that do not roam with the profile. Usually either machine specific, or too large to roam effectively. Application data. Computer specific application data. History. Internet Explorer history. Temp. Temporary files. Temporary Internet Files. Internet Explorer offline cache. My Documents. The new default location for any documents that the user creates. Applications should be written to save files here by default. My Pictures. Default location for users pictures.
Table 2 Folders that Roam with the Profile Roams with profile by default Yes Redirect with Group Policy Yes
Description Per-user roaming application data. Users Internet Explorer cookies. Desktop items, including files and shortcuts. Users Internet Explorer favorites. Temporary files and peruser non-roaming application data. Users documents. Shortcuts to My Network
Yes
No
Desktop
Yes
Yes
Favorites
Yes
No
Local Settings
No
No
My Documents NetHood
Yes Yes
Yes No
Recent
Yes
No
Send To
Yes
No
Yes Yes
Yes No
Non-Roaming Folders The default behavior of roaming user profiles in Windows NT 4.0 is to include all the folders in the user profile directory. Thus when a user first logs on, all folders within the profile folder are copied from the server to the client at logon and copied back at logoff, Windows 2000 introduced a per-user local settings folder into the user profile that is not copied during log on or logoff. This folder is intended for the storage of operating system components and other applications can store non-roaming per-user data. A typical example of the usage of this folder is for Microsoft Internet Explorer to store a users Favorites in the roaming portion of the user profile but store the Temporary Internet Files in the local (non-roaming) portion of the user profile. This will allow a user to retain access to their favorite URLs, but will save copying of temporary cache files at logon and logoff. On computers running Windows Server 2003, Windows XP or Windows 2000, the History, Local Settings, Temp and Temporary Internet Files folders do not roam by default. Other Non-Roaming Folders are configured using the Group
File Systems You can use FAT16, FAT32, NTFS, or a combination of file systems on a single computer, but each volume can have only one file system installed. When choosing which file system to use, you need to determine the following: How the computer is used (dedicated to Windows XP or multiple-boot). The number and size of locally installed hard disks. Security considerations. Interest in using advanced file system features. Important It is recommended that you format all Windows XP volumes with NTFS except on computers with certain multiple-boot configurations. For more information about NTFS, see NTFS File System later in this chapter. Certain file systems have limitations regarding the minimum and maximum size of volumes that they can format. Additionally, the cluster size of each file system, which depends on the size of the volume and the maximum number of clusters the file system can manage, can affect the choice of file systems. The version of NTFS included with Windows XP can take advantage of many advanced features not available by using other file systems. As such, using NTFS wherever possible is recommended to gain the maximum benefits from Windows XP. The following are some file system size limitations that should also be considered: FAT volumes smaller than 16 megabytes (MB) are formatted as FAT12.
5. To change the name of the folder on the network, type a new name for the folder in the Share name text box. This will not change the name of the folder on your computer. Note The Sharing option is not available for the Documents and Settings, Program Files, and Windows system folders. In addition, you cannot share folders in other users profiles. To set, view, change, or remove file and folder permissions 1. Open Windows Explorer, and then locate the file or folder for which you want to set permissions. To open Windows Explore click Start, point to All Programs, point to Accessories, and then click Windows Explorer. 2. Right-click the file or folder, click Properties, and then click the Security tab as shown in Figure 2 below.
3. To set permissions for a group or user that does not appear in the Group or user names box, click Add. Type the name of the group or user you want to set permissions for and then click OK, as shown in Figure 3 below.
Figure 3. Adding new group or user permissions 4. To change or remove permissions from an existing group or user, click the name of the group or user and do one of the following, as shown in Figure 2 above: To allow or deny a permission, in the Permissions for...box, select the Allow or Deny check box. To remove the group or user from the Group or user names box, click Remove. Notes In Windows XP Professional, the Everyone group no longer includes Anonymous Logon. You can set file and folder permissions only on drives formatted to use NTFS. To change permissions you must be the owner, or have been granted permission to do so by the owner.
User profiles overview A user profile defines customized desktop environments, such as individual display, and network and printer connections settings. You or your system administrator can define your desktop environment. Types of user profiles include: A local user profile, which is created the first time you log on to a computer and is stored on the computer's local hard disk Any changes made to your local user profile are specific to the computer on which the changes are made. A roaming user profile, which is created by your system administrator and is stored on a server This profile is available every time you log on to any computer on the network. Any changes made to your roaming user profile will be updated on the server. A mandatory user profile, which is a roaming profile that can be used to specify particular settings for individuals or an entire group of users. Only system administrators can make changes to mandatory user profiles. Local Users and Groups overview Local Users and Groups is a tool you can use to manage local users and groups. It is available on the following operating systems: Windows 2000 Professional Windows XP Professional Member servers running Windows 2000 Server
System Tools Disk Cleanup The Disk Cleanup tool helps you free up space on your hard disk by searching your disk for files that you can safely delete. You can choose to delete some or all of the files. Use Disk Cleanup to perform any of the following tasks to free up space on your hard disk: Remove temporary Internet files. Remove downloaded program files. For example, ActiveX controls and Java applets that are downloaded from the Internet. Empty the Recycle Bin. Remove Windows temporary files. Remove optional Windows components that you are not using. Remove installed programs that you no longer use. You can start Disk Cleanup, by doing any of the following: Click Start, and then click Run. In the Open box, type cleanmgr, and then click OK. -orClick Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. -orIn Windows Explorer or My Computer, right-click the disk in which you want to free up space, click Properties, click the General tab, and then click Disk Cleanup. Remove Files Stored on Your Hard Disk To remove files stored on your hard disk that you no longer use, follow these steps: 1. Click Start, and then click My Computer. 2. Right-click the disk in which you want to free up space, and then click Properties. 3. Click the General tab, and then click Disk Cleanup.
Administrative tools Component Services Used by system administrators to deploy and administer COM+ programs from a graphical user interface, or to automate administrative tasks using a scripting or programming language. Software developers can use Component Services to visually configure routine component and program behavior, such as security and participation in transactions, and to integrate components into COM+ programs. For more information, see Using Component Services Computer Management Used to manage local or remote computers from a single, consolidated desktop utility. Computer Management combines several Windows XP administrative tools into a single console tree, providing easy access to a specific computer's administrative properties. For more information, see Using Computer Management Data Sources (ODBC) Open Database Connectivity (ODBC) is a programming interface that enables programs to access data in database management systems that use Structured Query Language (SQL) as a data access standard. For more information, see Using Data Sources (ODBC) Event Viewer Used to view and manage logs of system, program, and security events on your computer. Event Viewer gathers information about hardware and software
Windows XP System Restore Microsoft OSs have typically included utilities that help you recover systems that become unstable or crash, but Windows XP's System Restore goes much further. System Restore reinstates the registry, local profiles, the COM+ database, the Windows File Protection (WFP) cache (wfp.dll), the Windows Management Instrumentation (WMI) database, the Microsoft IIS metabase, and files that the utility copies by default into a Restore archive. You can't specify what to restore: it's all or nothing. Understanding System Restore Creating a Restore Point Restoring a System Troubleshooting
Understanding System Restore System Restore's purpose is to return your system to a workable state without requiring a complete reinstallation and without compromising your data files. The utility runs in the background and automatically creates a restore point when a trigger event occurs. Trigger events include application installations, AutoUpdate installations, Microsoft Backup Utility recoveries, unsigned- driver installations, and manual creations of restore points. The utility also creates restore points once a day by default.
Figure 1: Name restore points so that you can easily identify them later. After the utility collected all the information it needed, it displayed the Restore Point Created screen, which Figure 2 shows. I closed the utility to end the process.
Figure 2: Restoring a System Having created a restore point, I could install Crystal Reports on my Windows XP machine with the confidence of knowing that I could restore my system if
Figure 3: I clicked July 23 and saw the Before Crystal Reports restore point that I had created earlier. I selected that restore point and clicked Next, then confirmed the restore point selection and clicked Next again. System Restore closed all programs and proceeded with the restoration. The computer then rebooted. I logged back on, and the Restoration Complete screen appeared to let me know the restore was finished and had succeeded, as Figure 4 shows.
Figure 4: I then checked the hard disk and the registry and found no sign of Crystal Reports. In addition, the files I created between installing and restoring my system remained on my system. My data files were safe, and the system was stable. If your system no longer boots to the OS, start the computer and press the F8 key as Windows begins to run. When the Windows Advanced Options menu appears, choose Last Known Good Configuration and press Enter. If the damage isn't too bad, a boot menu will appear, and you can select Microsoft Windows XP, then press Enter. Windows XP will restore the computer to the most recent restore point. If a restoration fails to resolve a problem, System Restore lets you try to select another restore point or undo the restoration. So, if you chose the wrong restore point earlier, you get a chance to correct your mistake. Remember, performing a restore is one of the events that triggers the system to create a restore point. Now you know why. Troubleshooting I've found System Restore to be stable and reliable. However, as with most programs, you might occasionally experience problems with System Restore. Should you need to disable it, you can do so (for details, see the sidebar "Disabling System Restore"). But first, try troubleshooting: Read any error messages and address any issues that the messages identify.
Event Viewer With Event Viewer, users can monitor events recorded in the Application, Security, and System logs: Understanding Event Viewer Using the event logs in Event Viewer, you can gather information about hardware, software, and system problems. You can also monitor Windows XP security events.
Disk Management You use Disk Management snap-in in Windows XP to perform disk-related tasks, such as creating partitions and volumes, formatting them, and assigning drive letters. On computers running Windows XP or Windows 2003 Server, you can also use Disk Management to perform advanced tasks, such as creating and repairing fault tolerant volumes. Disk Management overview The Disk Management snap-in is a system utility for managing hard disks and the volumes, or partitions, that they contain. With Disk Management, you can initialize disks, create volumes, format volumes with the FAT, FAT32, or NTFS file systems, and create fault-tolerant disk systems. Disk Management enables you to perform most disk-related tasks without shutting down the system or interrupting users; most configuration changes take effect immediately. Disk Management, which replaces the Disk Administrator utility used in Windows NT 4.0, offers many features including: Simplified tasks and intuitive user interface. Disk Management is easy to use. Menus that are accessible from the right mouse button display the tasks you can perform on the selected object, and wizards guide you through creating partitions or volumes and initializing or converting disks. Basic and dynamic disk storage. Basic disks contain basic volumes, such as primary partitions, extended partitions, and logical drives. Use basic disks on portable computers or when you plan to install multiple operating systems in different partitions on the same disk.
Registry Overview Registry Editor is an advanced tool for viewing and changing settings in your system registry, which contains information about how your computer runs. Windows stores its configuration information in a database (the registry) that is organized in a tree format. Although Registry Editor enables you to inspect and modify the registry, normally you do not need to do so, and making incorrect changes can break your system. An advanced user who is prepared to both edit and restore the registry can safely use Registry Editor for such tasks as eliminating duplicate entries or deleting entries for programs that have been uninstalled or deleted. Registry Editor overview Registry Editor is an advanced tool for viewing and changing settings in your system registry, which contains information about how your computer runs.
HKEY_CURRENT_USER
HKEY_USERS
HKEY_LOCAL_MACHINE
HKEY_CLASSES_ROOT
The following table lists the data types currently defined and used by the system. Data type Description Raw binary data. Most hardware component information is stored as binary data and is displayed in Registry Editor in hexadecimal format. Data represented by a number that is 4 bytes long. Many parameters for device drivers and services are this type and are displayed in Registry Editor in binary, hexadecimal, or decimal format. A variable-length data string. This data type includes variables that are resolved when a program or service uses the data. A multiple string. Values that contain lists or multiple values in a form that people can read are usually this type. Entries are separated by spaces, commas, or other marks. A fixed-length text string.
REG_BINARY
REG_DWORD
REG_EXPAND_SZ
REG_MULTI_SZ
REG_SZ
A series of nested arrays designed to REG_FULL_RESOURCE_DESCRIPTOR store a resource list for a hardware component or driver.
Caution Incorrectly editing the registry may severely damage your system. Before making changes to the registry, you should back up any valued data on your computer.
Control Panel overview Control Panel is full of specialized tools that are used to change the way Windows looks and behaves. Some of these tools help you adjust settings that make your computer more fun to use. For example, use Mouse to replace standard mouse pointers with animated icons that move on your screen, or use Sounds and Audio Devices to replace standard system sounds with sounds you choose. Other tools help you set up Windows so that your computer is easier to use. For example, if you are left-handed, you can use Mouse to switch the mouse buttons so that the button on the right performs the primary functions of selecting and dragging.
Joy.cpl
Odbccp32.cpl Open Database Connectivity (ODBC) Data Source Administrator properties Powercfg.cpl Sapi.cpl Power Options properties Speech Properties (located in C:\Program files\Common files\Microsoft Shared\Speech) System properties Phone and Modem Options properties Time and Date properties
Third-party software and hardware manufacturers add Control Panel icons to provide an interface for you to use when you configure settings for their products. An icon is displayed in Control Panel after the program's Setup tool places the .cpl file in the Windows\System32. To create a shortcut to a Control Panel tool, either drag an icon from Control Panel to the desktop or another location or manually create a shortcut, and then specify the path to the .cpl file.
Internal / External commands To find information about a command, on the A-Z button menu at the top of this page, click the letter that the command starts with, and then click the command name. In addition to the tools installed with Windows XP, there are over 40 support tools included on the Windows XP CD. You can use these tools to diagnose and resolve computer problems. For more information about these support tools, see Windows Support Tools For information about installing support tools, see Install Windows Support Tools
o o
at (windows XP/2000) Scheduling utility. bootcfg (XP only) This utility allows you to set up your boot options, such as your default OS and other loading options. cacls (XP, 2000, & NT4.0) Changes the ACLs (security Settings) of files and folders. Very similar to chmod in Linux. comp (XP & 2000) This utility is very similar to diff in Linux. Use the /? switch to get examples of command usage. contig (works with NT4.0 and newer) A great defrag utility for NTFS partitions. control (XP only) - unpublished! Allows you to launch control panel applets from the command line. control userpasswords2, for example will launch a helpful local user admin utility. defrag (XP only - NT4.0 and Win2k use contig) Yes, XP comes with a command line disk defrag utility. If you are running Win2k or NT4.0 there is still hope. Contig is a free defrag program that I describe on the defrag page. diskpart (XP only) Use this command to manage your disk partitions. This is the text version for the GUI Disk Manager. driverquery (XP only) Produces a list of drivers, their properties, and their versions. Great for computer documentation.
o o o
o o
o o o
eudcedit (XP only) - unpublished! Private Character editor. Yes with this program built into Windows XP you can create your own font! findstr Find String - similar to Linux's Grep. fsutil (XP only) - unpublished! This is a utility with a lot of capability. Come back soon for great examples. getmac (XP & 2000) This command gets the Media Access Control (MAC) address of your network cards. gpresult (XP & 2000) This generates a summary of the user settings and computer group policy settings. gpupdate (XP only) Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain. ipconfig (XP, 2000 & NT4.0) This handy tool displays IP settings of the current computer and much more. MMC (XP, 2000 & NT4.0) - Microsoft Management Console This is the master tool for Windows, it is the main interface in which all other tools use starting primarily in Windows 2000 and newer systems. more Utility used to display text output one screen at a time. Ex. more c:\windows\win.ini msconfig (XP only) The ultimate tool to change the services and utilities that start when your Windows machine boots up. You can also copy the executable from XP and use it in Win2k. msinfo32 (XP &smp; 2000) An awesome diagnostic tool. With it you can get a list of running processes, including the residing path of the executable (great for manually removing malware) and get detailed information about hardware and system diagnostics. narrator (XP only) Turns on the system narrator (can also be found in accessibility options in control panel). Will will allow your computer to dictate text to you. netsh (XP & 2000) A network configuration tool console. At the 'netsh>' prompt, use the '?' to list the available commands and type "exit" to get back to a command prompt. netstat (XP) A local network port tool - try netstat -ano. nslookup (all) A DNS name resolution tool. openfiles (XP Only) Allows an administrator to display or disconnect open files in XP professional. Type "openfiles /?" for a list of possible parameters.
o o
Pathping (XP & 2000) A cross between the ping and traceroute utilities. Who needs Neotrace when you can use this? Type "pathping <ip address>" and watch it go. recover (XP & 2000) This command can recover readable information from a damaged disk and is very easy to use. reg (XP & 2000) A console registry tool, great for scripting Registry edits. sc (XP & 2000) A command line utility called the Service Controller. A power tool to make service changes via a logon/logoff or startup/shutdown script. schtasks (XP only) A newer version of the AT command. This allows an administrator to schedule and manage scheduled tasks on a local and remote machines. secedit (XP & 2000) Use this utility to manually apply computer and user policy from your windows 2000 (or newer) domain. Example to update the machine policy: secedit /refreshpolicy machine_policy /enforce To view help on this, just type secedit. NOTE: In Windows XP SP1 and news, this command is superceded by: gpupdate /force sfc (XP & 2000) The system file checker scans important system files and replaces the ones you (or your applications) hacked beyond repair with the real, official Microsoft versions. shutdown (XP & 2000) With this tool, You can shut down or restart your own computer, or an administrator can shut down or restart a remote computer. sigverif (XP only) Microsoft has created driver signatures. A signed driver is Microsoft tested and approved. With the sigverif tool you can have all driver files analyzed to verify that they are digitally signed. Just type 'sigverif' at the command prompt. systeminfo (XP only) Basic system configuration information, such as the system type, the processor type, time zone, virtual memory settings, system uptime, and much more. This program is great for creating an inventory of computers on your network. sysedit (XP/2000) System Configuration File Editor. An old tool that was very handy for the Windows 9X days. msconfig is what you want to use now. tasklist (XP pro only) Tasklist is the command console equivalent to the task manager in windows. It is a must have when fighting scumware and viruses. Try the command: tasklist /svc to view the memory resources your services take up.
Run Commands Program Accessibility Controls Accessibility Wizard Add Hardware Wizard Add/Remove Programs Administrative Tools Adobe Acrobat ( if installed ) Adobe Distiller ( if installed ) Adobe ImageReady ( if installed ) Adobe Photoshop ( if installed ) Automatic Updates Basic Media Player Bluetooth Transfer Wizard Calculator Ccleaner ( if installed ) C: Drive Certificate Manager Character Map Check Disk Utility Clipboard Viewer Command Prompt Command Prompt Component Services Computer Management Compare Files Control Panel Run Command access.cpl accwiz hdwwiz.cpl appwiz.cpl control admintools acrobat acrodist imageready photoshop wuaucpl.cpl mplay32 fsquirt calc ccleaner c: cdrtmgr.msc charmap chkdsk clipbrd cmd command dcomcnfg compmgmt.msc comp control