Skip to main content

CMD Commands Under Windows

cmd commandDescription
Basics:
callcalls a batch file from another one
cdchange directory
clsclear screen
cmdstart command prompt
colorchange console color
dateshow/set date
dirlist directory content
echotext output
exitexits the command prompt or a batch file
findfind files
hostnamedisplay host name
pausepauses the execution of a batch file and shows a message
runasstart a program as another user
shutdownshutdown the computer
sortsort the screen output
startstart an own window to execute a program or command
taskkillterminate a process or a application
tasklistdisplay applications and related tasks
timedisplay/edit the system time
timeoutwait any time
titleset title for prompt
verdisplay operating system version
w32tmsetting time synchronisation/time server/time zone
Network:
ftptransfer files to a FTP server
ftypedisplay file type and mapping
getmacdisplay MAC address
ipconfigdisplay IP network settings
netshconfigure/control/display network components
netstatdisplay TCP/IP connections and status
nslookupquery the DNS
pathpingtest the connection to a specific IP address
pingpings the network
routedisplay network routing table, add static routes
systeminfodisplays computer-specific properties and configurations
telnetestablish Telnet connection
tftptransfer files to a TFTP server
tracerttrace routes similar to patchping
Files:
attribdisplay file attributes
compcompare file contents
compactdisplay/change file compression
copy / xcopycopy files
diskcompcompare content of two floppy disks
diskcopycopy floppy disc to another one
erase / deldelete one or more files
expandextract files
fccopare files and display the differences
mkdircreate a new directory
movemove/rename files
renamerename files
replacereplace files
rmdir / rddelete directory
treedisplay folder structure graphically
typedisplay content of text files
Media:
chkdskcheck volumes
chkntfsdisplay/change volume check at startup
defragdefragment media
diskpartvolume management
driverquerydisplay installed devices and their properties
formatformat volumes
labelchange volume name
modeconfigure interfaces/devices
mountvolassign/delete drive mountpoints
verifymonitoring whether volumes are written correctly
volshow volume description and serial numbers of the HDDs
Miscellaneous:
forfor loop
gpresultdisplay group policies
gpupdateupdate group policies
perfmonstart performance monitor
promptchange command prompt
regadd/read/import/export registry entries

Comments

Popular posts from this blog

Momo suicide game

Microsoft clamps down on sick 'Momo suicide game' in 'Minecraft' Microsoft is clamping down on the sick “Momo suicide challenge,” which recently infiltrated the wildly popular online game “Minecraft.”The tech giant owns “Minecraft” developer Mojang. The vile “Momo suicide game” has been garnering attention after spreading on WhatsApp, prompting police warnings. "Momo" is a viral challenge that asks people to add a contact via WhatsApp - they are then   urged   to commit self-harm or suicide. The "game" has fueled comparisons to the sinister " Blue Whale challenge " that led to reports of suicides in Russia and the U.S, as well as the online fictional character of "Slender Man." In 2014 two 12-year-old girls in Wisconsin  attempted to kill   a classmate in an attempt to please the horror character. The Buenos Aires Times recently  reported  that police in Argentina are investigating whether “Momo” is linked to the suicide of a 12-y...

Spring Security with JWT for REST API

Spring is considered a trusted framework in the Java ecosystem and is widely used. It’s no longer valid to refer to Spring as a framework, as it’s more of an umbrella term that covers various frameworks. One of these frameworks is Spring Security , which is a powerful and customizable authentication and authorization framework. It is considered the de facto standard for securing Spring-based applications. Despite its popularity, I must admit that when it comes to single-page applications , it’s not simple and straightforward to configure. I suspect the reason is that it started more as an MVC application -oriented framework, where webpage rendering happens on the server-side and communication is session-based. If the back end is based on Java and Spring, it makes sense to use Spring Security for authentication/authorization and configure it for stateless communication. While there are a lot of articles explaining how this is done, for me, it was still frustrating to set it up for the f...

The Java 8 Stream API

1 Overview In this comprehensive tutorial, we'll go through the practical uses of Java 8 Streams from creation to parallel execution. To understand this material, readers need to have a basic knowledge of Java 8 (lambda expressions,   Optional,  method references) and of the Stream API. 2 Stream Creation There are many ways to create a stream instance of different sources. Once created, the instance  will not modify its source,  therefore allowing the creation of multiple instances from a single source. Empty Stream We should use the  empty()  method in case of the creation of an empty stream: Stream<String> streamEmpty = Stream.empty(); We often use the  empty()  method upon creation to avoid returning  null  for streams with no element: public Stream<String> streamOf (List<String> list) { return list == null || list.isEmpty() ? Stream.empty() : list.stream(); } 2.2. Stream of  Collection We can also creat...