The Disk Operating System of Microsoft Corporation
synonymMS-DOS operating system(MS-DOS operating system) generally refers to MS-DOS
MS-DOS (Microsoft Disk Operating System)MicrosoftProvided by the companyDisk Operating System。Before Microsoft introduced Windows 1.0, Windows 3.0, and Windows 95, the operating system launched on August 24, 1995,diskThe operating system is IBM PC andCompatible computerWhile MS-DOS is the most commonly used PCDisk Operating Systemone of.
The most basic MS-DOS system consists of aMaster Boot Record(Hard diskOnly thenMaster Boot Record, no floppy diskMaster Boot Record)The boot sector is located in the sector of track 0, which is composed of a BOOT boot program and three file modules that are slightly different from the MBR of the hard disk.These three modules are I/O modules(IO.SYS)、file managementModule(MSDOS.SYS)AndcommandExplain the module.(However, in MS-DOS 7.0, MSDOS.SYS is changed to the startup configuration file, and IOMSDOS has been added to SYSSYS function),MicrosoftSeveral standard external programs (i.eExternal commands), which is the same asInternal commandsTogether to build adiskRelatively complete human-computer interaction environment in the operation era.Various about MS-DOScommand, see MS-DOS command list.
The MS-DOS user can edit two switches in theDisk root directoryTo achieve the control systemconfigurationThey are CONFIGSYS and AUTOEXECBAT, IO.SYS will check CONFIGSYS to load the specified hardwareDriver, AUTOEXEC will be executed automaticallyBatch instructions contained in BAT.
General use of MS-DOScommand lineInterface to acceptuserHowever, in the later MS-DOS version, the DOS program can also enter the graphics mode by calling the corresponding DOS interrupt, that is, the graphical interface program under DOS.
Previous versions of MS-DOS do not supportFAT32、Long file nameAnd largeHard disk。Since MS-DOS 7.0, especially MS-DOS 7.10, these have been fully supported.
In 1980,SeattleTim Paterson, a 24-year-old programmer from Seattle Computer Products, spent four months writing86-DOSOperating system.In July 1981,MicrosoftBuy all the copyright of this product from Seattle Company at the price of 50000 dollars, and rename it MS-DOS.
At the end of 1979, Seattle Computer developed the first operating system based on 8086 chipCP/M-86, launched QDOS after improvement, and launched86-DOSVersion 0.3,Bill GatesHe bought the right to sell 86-DOS at a very low price.1981In April, Seattle Computer officially released 86-DOS v1.0,MicrosoftIn July of that year, the copyright of 86-DOS and all other rights were bought out, and it was renamed MS-DOS and released to the market.This isMicrosoftThe first successful operating system product on which to thrive.
The most basic MS-DOS system consists of a BOOT boot program based on MBR and three file modules.The three modules are input/output module (IO. SYS)file managementModule (MSDOS. SYS) andcommandExplain the module.besides,MicrosoftIn addition, several standard external programs (i.e. external commands) have been added to the retail MS-DOS system packageinsideCommands (i.e. commands executed by interpretation) together build a relatively complete human-computer interaction environment in the era of disk operation.
Initially, Windows 1. x/Windows 2. x/Windows 3. x and Windows 9x/Me series are based on MS-DOSgraphical user interfaceProcedure.Only Windows NT series does not need DOS, but Windows NT was not popular before 2000.Until the birth of Windows 2000 (NT 5.0), Windows XP (NT5.1), Windows Vista (NT6), and Windows 7 (NT6.1), Windows can really abandon MS-DOS.
History
Announce
edit
MS-DOS Command Line Interface
1981, MS-DOS 1.0 is available,MicrosoftCooperate with IBM to install DOS on the PCs sold by IBM for bundle sale, supporting 16k memory and 160k 5-inch floppy disks.When hardware is expensive,SoftwareIn an era that was not noticed by people, Bill Gates acted asMicrosoftThe key figure of the company seized this excellent opportunity with great foresight.
1983MS-DOS 2.0 was released with IBM XT, expandingcommandAnd began to support 5MHard disk。The 2.25 released in the same year made some bug fixes to version 2.0.
In 1984, MS-DOS 3.0 added support for the new IBM AT and began to support some LAN functions.
In 1986, MS-DOS 3.2 supported 720K 5-inch floppy disks.
In 1987, MS-DOS 3.3 supported IBM PS/2 devices and 1.44M 3-inch floppy disks, and supportedcharacter set。
In 1988, MS-DOS 4.0 added DOS shell operating environment, and there were some other enhancements and updates.
In 1991, MS-DOS 5.0 was released, which added DOS shell functions and enhancedmemory management And macro functions.
In 1993, MS-DOS 6. x added many GUI programs, such as Scandisk, Defrag, Msbackup, etc., added disk compression, and enhanced support for Windows.
MS-DOS 7.1 Startup Interface
In 1995, MS-DOS 7.0 addedLong file nameSupport, large LBAHard disksupport.This version of DOS is not sold independently, but is embedded in Windows 95.Later MS-DOS 7.1 fully supports FAT32 partitions, largeHard disk, large memory support, and support for four digit yearsMillennium bugQuestion.
In August 1996, MS-DOS 7.1. (The independent version of MSDOS7.1, that is, the ISO and IMG image version, was not actually developed by Microsoft, but was jointly developed by some CN-DOS netizens. The extension function was added and included the Tianhui Chinese character processing system.)
In 2000, MS-DOS 8.0, the last version of MS-DOS.becauseMicrosoftSeeing the dawn of Windows, he gave up DOS.
form
Announce
edit
MS-DOS adopts module structure, which consists of five parts: BIOS module in ROM, IO.SYS module, MSDOS.SYS module, COMMAND.COM module and boot program.
Basic input/output module
On PCa main boardThere is a read-only memory (foreign language abbreviation: ROM) chip on theTest procedure, complementary metal oxide semiconductor (CMOS) setup program and basic input/output program (foreign language abbreviation: BIOS).BIOS is a set of programs and parameter lists, in which the program part can beInterrupt modeA group of callsDriverThe parameter gives the address and parameters of the peripheral.BIOS is the interface between the computer hardware and the operating system, through which the operating system is managedcomputer hardwareresources.
IO.SYS module
IO.SYS is the interface program between MS-DOS and ROMBIOS.It completes the management of system devices together with ROM BIOS.
MSDOS.SYS
MSDOS.SYS is used to implementfile management, including file management, directory managementmemory management And other functions.It is implemented in the form of function calluserProgram level interface with MS-DOS.
COMMAND.COM
COMMAND.COM is mainly responsible for receiving, identifying, interpreting and executinguserMS-DOS entered from keyboardcommand。
Bootstrap
Bootstrap is also called“Boot Record”, which is used to check whether there are twoSystem filesIf there is a system file, the DOS system will be transferred fromdiskLoad memory.a sheetSystem diskIt should contain:Boot Record, IO.SYS, MSDOS.SYS and COMMANDCOM and other modules.
File directory
Announce
edit
Document concept
A file is a collection of related information recorded on a storage medium (such as a disk or optical disc).
Document identification
Drive letter+path+file name (1 to 8 characters)+Extension(1 to 3 characters represent the type of file).
wildcard
*Represents one or more legal characters from this position;?Any legal character representing the location.
Tree directory
DOS adoptsTree directoryStructure.By aroot directoryAnd several layersSubdirectoryform.This directory structure can solve the problem of file name duplication, that is, different directories can contain the same file name or directory name;Second, it can solve the problem of many filesroot directoryProblems caused by limited capacity.Looking for aSubdirectoryNext file, useDirectory Path。
There are two ways to specify a path:Absolute pathandRelative path。Absolute pathIs fromroot directoryStart the path to the directory where the file is located.For example, to find UCDOSSubdirectoryThe README.TXT file under the secondary subdirectory DATA under the,Absolute pathIs: UCDOS DATA.The first "" symbol in the path representsroot directory。Relative pathIs fromcurrent directoryStart the path to the directory where the file is located.current directoryRefers to DOS without specifying the pathcommandThe directory being processed.For example, if the system prompt is "C: UCDOS DATA>;", then DATA is the current directory.
⑴SubdirectoryIt must be empty before deletion, that is to say, you need to enter the subdirectory first, and use DEL (thecommand)Delete the files under its subdirectory, and then return to the upper directory, and delete the directory itself with RD command;
(2) Cannot be deletedroot directoryAnd the current directory.
Example: It is required to FOX the C diskSubdirectoryDelete the USER subdirectory under as follows:
Step 1: First put USERSubdirectoryDelete the file under;
C:\>DEL C:\FOX\USER\*.*
Step 2: Delete the USER subdirectory.
C:\>RD C:\FOX\USER
(4) DIR -- Display Disk Directory Command
1. Function: display the contents of the disk directory.
/B Use empty format (no title information or summary).
/C Display thousands in file sizeSeparator。This is the default value.Deactivate with/- CSeparatorDisplay.
/D is the same as wide format, but the documents are listed by column.
/L is in lower case.
/N New long list format, with the file name on the right.
/O List documents in sort order.
Sort by category:
N by name (alphabetical order) S by size (from small to large) E byExtension(alphabetical order) D by date/time (first to last)
Group G directory precedence - prefix in reverse order
/P Pauses after each information screen.
/Q Displays the file owner.
/S Display the specified directory and allSubdirectoryFiles in.
/T controls the time displayed or used for classificationcharacterDomain.
Time:
C Creation time A Last access time W Last write time
/W uses wide list format.
/X displays short names generated for non 8.3 file names.The format is/N, and the short name is inserted before the long name.If there is no short name, it will be blank in its position.
/4 Display the year in four digits
(5) PATH -- Path setting command
1. Function: equipmentExecutableSearch forroute, valid only for files.
(1) When running aExecutableDOS will first search the current directory for the file, and if it is found, run it;If the file cannot be found, then according to PATHcommandThe path set is to search for the file in the directory one by one;
⑵PATHcommandIf there are more than two paths in, each path is separated by a semicolon ";";
⑴ When the/F parameter is used, all directories and all files under the directory will be displayed. If it is omitted, only the directory will be displayed, and no files under the directory will be displayed;
⑵ When the parameter>PRN is selected, the listed directory and the file name in the directory will be printed out.
(2) DELTREE -- Delete the entire directory command
1. Function: set the entire directory and its subordinatesSubdirectoryAnd file deletion.
2. Type: external command
3. Format: DELTREE [Drive letter:]<;Pathname>
4. Instructions:commandThe directory and all its filesSubdirectoryThe subdirectories at the lower level are deleted at the same time. Regardless of whether the file attribute is hidden, system or read-only, as long as the file is under the deleted directory, DELTREE will treat the file as if it were deleted.Be careful when using!!!
(3) FORMAT -- Disk format command
1. Function: format and partition disksTrackanda sector;At the same time, check whether there are defective tracks on the whole diskBad trackFilling mark;Create directory area andDocument Allocation TableMake the disk ready to receive DOS.2. Type: external command 3. Format: FORMAT<;Drive letter:>[/S] [/4] [/Q] 4. Operating instructions: ⑴ The drive letter after the command cannot be defaultedHard diskWhen formatting, the following prompt will appear: WARNING: ALL DATA ON NON -- REMOVABLE DISK DR Ⅳ E C: WILL BE LOST!
Proceed with Format (Y/N)?
(Warning: All data on disk C will be lost. Are you sure you want to continue formatting?)
⑵ If the floppy disk is formatted, the following prompt will appear:
Insert mew diskette for drive A;
and press ENTER when ready…
(Insert a new disk in drive A, and pressenter key)。
⑶ Select [/S] parameter, and DOSSystem filesIO.SYS, MSDOS.SYS and copy todisk, so that the disk can be used as DOSStartup Disk。If the/S parameter is not selected, the formatted roller disk can only read and write information, and cannot be used as a startup disk;
⑷ Select the [/4] parameter to format a 360KB low-density disk in a 1.2MB high-density floppy drive;
(5) Select the [/Q] parameter and quickly format it. This parameter does not re divide the disk's track appearance and sector, but only the disk's root directory, file allocation table andboot sectorClear to blank, so formatting is faster.
(6) [/U] parameter is selected, which means unconditional formatting, i.e. destroying the originaldiskAll data on.If no/U is added, it is a security format. At this time, first create an image file to save the original FAT table androot directoryIf necessary, use UNFORRMAT to restore the original data.
(4) UNFORMAT Resume Format Command
1. Function: for data lost due to formatting error operationdiskRestore.
⑴ Select/L parameter to list the foundSubdirectoryName, file name, size date and other information, but will not really do the FORMAT work.
⑵ Select the/P parameter to send the report displayed on the screen (including the information generated by the/L parameter) to the printer at the same time.When running, the screen will display: "Print out will be sent to LPT1"
⑶ The/TEST parameter is only used for simulation test (TEST) without real writing action.Use this parameterscreen"Simulation only" will be displayed
⑷ Select/U parameter instead of MIRRORImage fileUnformat the data according to the status quo of the disk.
If atDrive letterAdding one of/P,/L, and/TEST is equivalent to using the/U parameter. UNFORMAT "assumes" that there is no MIRROR image file on the disk at this time.
Note: UNFORMAT can completely recover the disk that has just been formatted, but if other data is written after the format, UNFORMAT cannot completely save the data.UNFORMAT is not omnipotent, because using UNFORMAT will rebuild FAT androot directoryTherefore, it is also highly dangerous. Improper operation may increase losses. If only a few files are deleted by mistake orSubdirectory, just use UNDELETE.
(5) Check Disk Current Status Command
1. Function: Display the disk status, memory status and the number of discontinuities in the specified file under the specified path.
⑴ If the target floppy disk is not formatted, the system will automatically select format when copying.
⑵ If the original files on the target floppy disk are copied, they will be lost.
⑶ If it is a singleDriverWhen copying, the system will prompt you to replace the source disk and target disk at the right time. Please pay attention to distinguish the source disk and target disk during operation.
⑴ The volume label name is the volume label name to be created. If this parameter is defaulted, the system will prompt you to type the volume label name or ask whether to delete the original volume label name;
⑵ The volume label name is composed of 1 to 11 characters.
4. Instructions: Select the/F parameter to eliminate the fragments on the disk in the file, and adjust the disk file arrangement to ensure that there is no space between files.To speed upDisk readingSpeed and save disk space.
(11) SYS - System copy command
1. Function: convert the DOS on the current driveSystem filesIO.SYS, MSDOS.SYS and transfer to the specified drive.
⑴ COPY is the file to file method of copying data. Before copying, the target disk must be formatted;
⑵ During the copy process, the old files with the same file name on the target disk will be replaced by the source files;
⑶ When copying files, make sure that there is enough space for the target, otherwise it will appear;The error message of insufficient indicates that the disk space is insufficient;
⑷ It is allowed to use "*" and "?" in the file name, and multiple files can be copied at the same time;
⑸COPYcommandThe source file name in must be indicated and cannot be omitted.
(6) When copying, the target file name can be the same as the source file name, which is called "copy with the same name". In this case, the target file name can be omitted;
(7) When copying, the target file name can also be different from the source file name, which is called "copy with different name". In this case, the target file name cannot be omitted;
(8) When copying, you can also combine several files into one file, which is called "merged copy". The format is as follows: COPY [source disk] [path]<;Source file name 1>+<;Source file name 2>+...+<;Source file name n>[destination disk] [path]<;Destination file name>;;
(9) Use COPYcommandYou can also enter data from the keyboard to create a file in the following format: COPY CON[Drive letter:] [Path]<;File name>;;
(10) Note: COPYcommandThere must be a space between the source file name and the target file name!
(2) XCOPY -- directory copy command
1. Function: copy the specified directory and all files under the directory together withdirectory structure。
⑴ XCOPY is an extension of COPY, which can copy the specified directory together with the file and directory structure, but cannot copy hidden files andSystem files;
⑵ Source during useDrive letterSpecify at least one source target path name and source file name;
⑶ When/S is selected, check the source directory andSubdirectoryCOPY all files under.Unless the/E parameter is specified,/S will not copy the empty directory. If the/S parameter is not specified, XCOPY will only copy the files of the source directory itself, not the files under itSubdirectory;
⑷ When the/V parameter is selected, the copied sectors of are compared, but the speed will be reduced.
(3) TYPE -- Display file content command
1. Function: display the content of ASC II code file.
⑴ Display the text file composed of ASCII code.EtcExtensionThe content displayed in the file is unreadable and has no practical significance2;
⑵ ThiscommandOnly the contents of one file can be displayed at a time, and wildcards cannot be used;
⑶ If the document hasExtension, the extension must be written;
⑷ When the file is too long to be displayed on one screen, it can be displayed in the following format:;TYPE[Drive letter:] [Path]<;File name>| MORE, MORE is split screen displaycommandAfter using some parameters, it will pause when the screen is full, and press any key to continue the display.
(5) If the document content needs to be printed, the following format can be used:
⑴ Select the+R parameter, and set the specified file as read-only, so that the file can only be read and cannot be written or deleted;Select the - R parameter to remove the read-only attribute;
⑵ Select the+A parameter and set the file as the file attribute;Select the - A parameter to remove the file attribute;
⑶ Select the+H parameter to coordinate the file as an implicit attribute;Select the - H parameter to remove hidden attributes;
⑷ Select the+S parameter to set the file as the system attribute;Select - S parameter to remove system attributes;
(5) Select the/S parameter, and check allSubdirectoryAnd make settings.
(7) DEL -- Delete File Command
1. Function: delete the specified file.
2. Type: internal command
3. Format: DEL [drive letter:] [path]<;File name>[/P]
4. Instructions:
⑴ Select the/P parameter. The system asks whether to delete the file before deleting it. If this parameter is not used, it will be deleted automatically;
⑵ ThiscommandFiles with implicit or read-only attributes cannot be deleted;
⑶ Wildcard characters can be used in the file name;
⑷ If you want to delete all the files on the disk (DEL *. * or DEL.), you will be prompted: (Are you sure?) If you answer Y, delete them; if you answer N, cancel the deletion job.
(8) UNDELETE -- restore delete command
1. Function: recover from being deleted by mistakecommand
4. Instructions: Use "*" and "?" when using UNDELETEwildcard。
⑴ The/DOS parameter is selected to restore files according to the remaining records in the directory.When a file is deleted, the directory records the first file namecharacterIt will be changed to E5, DOS will find the file to be recovered according to E5 at the beginning of the file and its subsequent characters, so UNDELETE will requestuserEnter a character to complete the file name.But thischaracterIt doesn't have to be the same as the original, just conform to the file name rules of DOS.
⑵ Select/LIST to only "list" files that meet the specified conditions without recovery, so the disk content will not be affected at all.
⑶ Select/ALL to automatically recover the files that can be completely recovered without asking one by oneuserWhen using this parameter, if UNDELTE uses the remaining records in the directory to restore the file, it will automatically select a character to complete the file name and make it different from the existing file name.
UNDELETE also has the function of establishing protective measures for documents, which is beyond the teaching scope of this course. Please refer to the relevant DOS manual when using some functions.
(1) CLS -- Clear screen command
1 Function: ClearscreenThe cursor is placed in the upper left corner of the screen.
(1) Omit [mm dd yy] to display the system date and prompt to enter a new dateAmendmentYou can press Enter directly. [mm dd yy] is in the format of "month day year";
⑵ When the machine starts to start, if an automatic processing file (AUTOEXEC. BAT) is executed, the system will not prompt to enter the system date.Otherwise, you will be prompted for a new date and time.
(4) TIME system clock setting command
1 Function: set or display the system period.
2 Type: internal command
3 Format: TIME [hh: mm: ss: xx]
4 Instructions:
(1) Omit [hh: mm: ss: xx], display the system time and prompt to enter a new time. If it is not modified, press Enter directly. [hh: mm: ss: xx] is in the format of "hour: minute: second: hundredths of a second";
⑵ When starting, if AUTOEXECIf BAT is executed, the system will not prompt you to enter the system date.Otherwise, you need to enter a new date and time.
⑴ Select/C parameter to list loadingGeneral memoryAnd the length of each file in CMB, as well as the usage of memory space and the maximum available space;
⑵ Select the/F parameter to list the remaining conventional memorybyteSize and available area and size of UMB;
⑶/M parameter is selected to display the address, size and module nature of the memory used by the module;
⑷ Select/P parameter to specify that when the output exceeds one screen, the supply ofusersee.
(6) MSD Display System Information Command
1 Function: Display the hardware and operating system of the system.
2 Type: External command
3 Format: MSD [/S]
4 Instructions:
⑴ When the/I parameter is selected, the hardware is not detected;
⑵ When/B parameter is selected, start MSD in black and white mode;
⑶ When the/S parameter is selected, a concise system report will be displayed.
(7) HELP command
1. Function: provide relevant informationcommandHelp for
(1) Arp: Address Translation Table of "Address Resolution Protocol"
Display and modify“Address Resolution Protocol”(ARP) The translation table of IP or token ring physical address to Ethernet used.ThiscommandIt can only be used after the TCP/IP protocol is installed.
arp -a [inet_addr] [-N [if_addr]]
arp -d inet_addr [if_addr]
arp -s inet_addr ether_addr [if_addr]
parameter
-A Display the current ARP item by asking TCP/IP.If inet_addr is specified, only the specified calculation will be displayed
(2) Finger displays information aboutuserInformation for.Different changes according to remote system output
Quantity.ThiscommandAvailable only after the TCP/IP protocol is installed.
finger [-l] [user]@computer[...]
parameter
-L Display information in long list format.
The user specifies theuser。ellipsisuserParameters to display information about all users on the specified computer:
@computer
(3) Ftp transfer file
Transfer files to or from a remote computer running the FTP service
Transfer files (sometimes called daemons).Ftp can be used interactively.Click in the Related Topics list
“ftpcommand”To obtain the available "ftp" subcommand descriptions.This command is available only after the TCP/IP protocol is installed.Ftp is a service. Once it is started, it will be created in which ftp can be usedcommandBy typing the quit subcommandYou can return to Windows 2000 from the sub environmentcommand prompt。When the ftp sub environment runs, it is controlled by ftpcommandThe prompt represents.
-w: Windowsize replaces the default size of 4096buffer。
Computer Specifies the computer name or IP address to connect to the remote computer.If specified, the computer must be the top of the row
Next parameter.
(4) Nbtstat TCP/IP protocol diagnostic command
This diagnosiscommandUse NBT (NetBIOS over TCP/IP) to display protocol statistics and current TCP/IP connections
Connect.This command is available only after the TCP/IP protocol is installed.nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval]
parameter
-A remotename Lists the name table of the remote computer using its name.
-A IP address uses the IP address of the remote computer and lists the name table.
-C Give the IP address of each name and list the contents of the NetBIOS name cache.
-N Lists the local NetBIOS name."Registered" indicates that the name has been broadcast (Bnode) or WINS (its
Other node type).
-R After clearing all the names in the NetBIOS name cache, reload the Lmhosts file.
-R Lists name resolution statistics for Windows network name resolution.When configuring Windows to use WINS
On 2000 computers, this option returns the number of names to be resolved and registered through broadcast or WINS.
-S displays client and server sessions, and lists remote computers only by IP address.
-S Displays client and server sessions.Attempt to transfer the remote computer IPaddress translationTo usehostName of the file
Said.
Interval Redisplays the selected statistics, pausing interval seconds between each display.Press CTRL+C to stop redisplaying statistics.If this parameter is omitted, nbtstat prints the current configuration information once.
(5) Netstat displays protocol statistics and current TCP/IP network connections
Displays protocol statistics and current TCP/IP network connections.This command can only be used after the TCP/IP protocol is installed.
Interval Redisplays the selected statistics, pausing interval seconds between each display.Press CTRL+B to stop redisplaying statistics.If this parameter is omitted, netstat prints the current configuration information once.
(6) Ping Verify Connection to Remote Computer
Verify the connection to the remote computer.This command can only be used after the TCP/IP protocol is installed.
-A Specify ASCII transmission mode.In this mode, the carriage return/line feed character is converted to carriage return character in the outgoing file, and the line feed character is converted to carriage return/line feed character in the incoming file.This mode is the default transmission mode-B Specify the binary image transmission mode.No carriage return/line feed conversion was performed.
-H Transfer source files marked as hidden on Windows 2000 computers.If you do not have this option, you can select it in rcpcommand lineThe effect of specifying a hidden file on the is the same as if the file does not exist.
-R Set allSubdirectoryThe content is copied recursively to the target.Both source and destination must be directories, although - r can work even if the source is not a directory.But there will be no recursion.
Source and destination
The format must be [computer [. user]:] filename.If the [computer [. user]:] section is omitted, the computer is assumed to be the local computer.If the [. user] section is omitted, the currently logged in Windows 2000 will be useduserFirst name.IfA fully qualified computer name was used, including a period (.)Separator, must contain [. user].Otherwise, the last part of the computer name will be interpreted asuserFirst name.If multiple source files are specified, the destination must be a directory.
If the file name does not start with the forward slash (/) of UN Ⅸ or the backslash () of Windows 2000, it is assumed to be relative to the current working directory.In Windows 2000, this is issuedcommandDirectory of.On remote systems, this isremote userThe login directory of.A period (.) indicates the current directory.At remoterouteUse escape characters (, "or ') in to use in remote computerswildcard。
(8) Run commands on the remote machine of the RexecREXEC service
On the remote computer running the REXEC serviceRun Command。rexeccommandWhen specifyingcommandBefore, verify theuserName, which can only be used after the TCP/IP protocol is installedcommand。
rexec computer [-l username] [-n] command
parameter
Computer specifies the remote computer on which to run the command.
-PThis parameter is the same as addcommandWhen used together, will makeroutePersists between system bootstrappers.By default, it is not reserved when the system restartsroute。And printcommandWhen used together, the registeredPersistent routeList.Ignore All Others Always Affects CorrespondingPersistent routeCommand.
Destination specifies the computer that sends the command.The mask subnet mask specifiesrouteItem AssociatedSubnet mask。If not specified, the
255.255.255.255。
Gateway specifies the gateway.
NetworksDatabase fileThe symbolic names used by all destinations or gateways are referenced in the database files of computer names and Hosts.IfcommandIt is print or delete. The target and gateway can also usewildcard, gateway parameters can also be omitted.
Metric costmetric Assign an integerMetric (from 1 to 9999)routeIs used.
(10) Rsh Run command on remote computer
Run the command on the remote computer running the RSH service.This command can only be used after the TCP/IP protocol is installed.
rsh computer [-l username] [-n] command
parameter
Computer specifies the remote computer on which to run the command.
-L username Specifies theuserFirst name.If omitted, the logged inuserFirst name.
takefile transferTo or from the remote computer where the TFTP service is running
Program computer transfers files.This command can only be used after the TCP/IP protocol is installed.tftp [-i] computer [get | put] source [destination]
parameter
-I Specifies the binary image transfer mode (also known as“Octet”)。In binary image mode, the file moves byte by byte word for word.TransferringBinary fileThis mode is used when.
If - i is omitted, the file will be transferred in ASCII mode.This is the default delivery mode.This mode converts EOL characters into carriage return characters of UN Ⅸ and carriage return characters/line feed characters of personal computers.This mode should be used when transferring text files.If the file transfer is successful, the data transfer rate is displayed.
Computer Specifies the local or remote computer.
Put transfers the destination of the file on the local computer to the file source on the remote computer.
Get transfers the destination of the file on the remote computer to the file source on the local computer.
If the file file two on the local computer is transferred to the file one on the remote computer, specify put.If the file file two on the remote computer is transferred to the file one on the remote computer, specify get.Because the tftp protocol does not supportuserAuthentication, so the user must log in and the file must be writable on the remote computer.
Source specifies the file to be transferred.If the local file is specified as -, the remote file will be printed on stdout
(if acquired), or read from stdin (if placed).
Destination specifies the location to which the file is transferred.If destination is omitted, it is assumed to have the same name as source.
(12) Tracert Diagnostic Utility
This diagnostic utility will echo Internet Control Message Protocol (ICMP) with different Time To Live (TTL) valuesdata packetSend to the target to determine the route to reach the target.To forward ondata packetDecrement by at least 1 before TTL on the required pathRouter, so TTL is a valid hop count.When the TTL on the packet reaches 0, the router should send the message "ICMP Timeout" back to the source system.Tracert first sends echo data packets with TTL of 1, and then increases the TTL by 1 in each subsequent transmission process until the target response or TTL reaches the maximum value, thusdetermineroute.routeDetermine the route by checking the message "ICMP timeout" sent back by the intermediate router.However, some routers secretly send outdata packet, but tracert cannot see it.
Start → Run → Input CMD, click OK to entercommandCopy into the CMD window, and then enter to run.
It is divided into four parts:
Proto (connection mode), local address(Local connectionAddress), foreign address (the address to establish a connection with the local), and state (the current port status).Through thiscommandWe can find out whether the computer has been installedTrojansIs it monitored by any program to maintain the security of your system.