Quick Search


Tibetan singing bowl music,sound healing, remove negative energy.

528hz solfreggio music -  Attract Wealth and Abundance, Manifest Money and Increase Luck



 
Your forum announcement here!

  Free Advertising Forums | Free Advertising Board | Post Free Ads Forum | Free Advertising Forums Directory | Best Free Advertising Methods | Advertising Forums > Post Your Free Ads Here in English for Advertising .Adult and gambling websites NOT accepted. > Business to Business Ads:

Business to Business Ads: This forum is for posting ads that would be of interest to other Business Owners. Things like Marketing Services, Supply Services, and Business Essentials.

Reply
 
Thread Tools Display Modes
Old 08-16-2011, 08:50 AM   #1
cardyzdw0r
 
Posts: n/a
Thumbs up MBT Women's Kipimo Casual Walking Shoe,Black,39 M EU / 8.5 B(M ...

MBT Women’s Kipimo Casual Walking Shoe,Black,39 M EU / 8.5 B(M) List Price : 245.00 Price : 199.00 Rating : Update Price : MBT ® is the <a href="http://www.maxnike.com/nikefreenikefree30-c-151_152.html"><strong>nike free 3.0</strong></a> first physiological footwear that has a positive effect on the entire body. Functionality and style with the Slip-On ® by MBT Kipimo come. Full-grain leather with an adjustable hook and loop back strap for a snug incredible. Antimicrobial Dry & Cool microfiber lining and foam allows for breathability and assists moisture management. Perforated EVA insole provides added cushioning with antibacterial treatment to reduce odor. Double side TPU and glass fiber shank adds firmness of unique construction and also ensures a natural rolling movement of the foot for even weight distribution. PU midsole with pivot is the balancing section underneath the metatarsus which <a href="http://www.maxnike.com/nikeairclassicbw-c-171.html"><strong>nike air bw</strong></a> requires an active rolling movement with every step. This activates a large number of muscles in the body when walking or standing. Masai Sensor (Masai Barefoot Technology ®) creates a pleasant feeling of walking on a sandy beach or soft moss back. Masai Sensor creates n Women’s MBT, Kipimo The Kipimo clog by Masai Barefoot Technology is not just an ordinary shoe This rocker bottom comfort shoe will help your posture, tone your muscles, Increase blood circulation and help to Relieve aches and pains. MBT shoes have a multi layered sole that simulates walking barefoot in the sand Find More MBT Toning Shoes Products Product Toning Shoes Recommend MBT Men’s Kabisa Casual Walking <a href="http://436100.info/view.php?id=97299"><strong>SEO Groups: Tenness951's blog: nike shox shoes toddler,</strong></a> Shoe,Black,43 M EU / 9-9.5 D(M) Reviews MBT... MBT Women’s Imara Shoe,Black,39 M EU/ 8.5 B(M) Reviews MBT... MBT Men’s Sport 2 Walking Shoe,Black,43 EU (US Men’s 9.5 M) MBT... MBT Women’s Moja Shoe,Black,37 2/3 M EU/ 7.5 B(M)MBT...
  Reply With Quote

Sponsored Links
Old 08-16-2011, 09:01 AM   #2
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:02 AM   #3
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:03 AM   #4
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:08 AM   #5
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:09 AM   #6
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:14 AM   #7
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Old 08-16-2011, 09:15 AM   #8
t1ei2dw8ve
 
Posts: n/a
Default

DOS Disk Operating System is the English acronym, meaning DOS is a class of personal computer operating system. From 1981 until 1995 15 years, DOS on IBM PC compatible market occupies a pivotal position. Moreover, if the part of the DOS-based version of Microsoft Windows,cheap chi straighteners, such as Windows 95,98 and Me are all stats that, then at least you can count its commercial life in 2000.
directory
Detailed composition of the basic overview of the history related to software related to operations 1, 2, disk operations, directory operations 3, 4, file operations, memory operations DOS command line (a) MD - create subdirectory (b) CD - changes the current directory (c) RD - Remove subdirectory command (d) DIR - Display disk directory command (e) PATH - path set command (f) TREE - displays the disk directory structure command (g) DELTREE - Delete the entire directory command class disk operations command (a) FORMAT - disk formatting commands (b) UNFORMAT restore formatted commands (c) CHKDSK - Check the current state of the disk command (d) DISKCOPY - the entire disk copy command (V) LABEL - create the disk label command (vi) REN - file rename command (g) FC - file comparison command (h) ATTRIB - modify file attributes command (ix) DEL - Delete File command (X) UNDELETE - Undelete command other commands (a) CLS - clear screen command (b) VER view the system version number command (c) DATE date set command (d) TIME system clock set command (e) MEM View the current memory status command (f) MSD System Information command displays a variety of common commands under dos DOS (dioctyl sebacate) basic information about the physical properties of the basic profiles of the main uses of toxic
DOS
DOS, including MS-family DOS, PC-DOS, DR-DOS, FreeDOS, PTS-DOS, ROM-DOS, JM-OS, of which the most well-known MS-DOS. Although these systems are often referred to as In addition, there are several, and DOS has nothing to do, in the non-x86 to run on the micro-computer system in the name of the disk operating system also has For example: AmigaDOS, AMSDOS, ANDOS, Apple DOS, Atari DOS, Commodore DOS, CSI-DOS, ProDOS, TRS-DOS, etc.), but these systems running DOS and MS-DOS API files are not compatible. Related Detailed
MS-DOS
As the name implies, DOS is essentially a disk-oriented system software, to put it simpler, DOS is a bridge between man and machine, is cover the outside layer of the hardware in the machine We just need to close to natural language through a number of DOS commands,chi pink dazzle hair straightener, you can easily complete the most routine operations. In addition, DOS can effectively manage a variety of hardware and software resources, reasonable scheduling them, all the software and hardware are in the DOS of the monitoring and management, the orderly conduct of their own work. With the development of computer technology, networks are rapidly in popularity and development. People enjoy the benefits brought to the network, but also by many hackers. Among the many types of attacks, there is a called a DoS (Denial of Service Denial of Service) attack, is a common and effective attacks technology, which through the use of protocols or system defect, by fraud or disguise the network strategy attacks, and ultimately makes the depletion of the victim's system as to properly respond or can not be paralyzed and thus unable to provide normal service to legitimate users. It looks bland, but the attack a wide range of subtle and strong, simple and effective for the network made a powerful attack techniques, which greatly affected the business of the host system network and effective service. Which, DDoS (Distributed Denial of Service Distributed Denial of Service) more for its large, invisible and difficult to prevent known ######. Composition
PC-DOS
the most basic DOS system, by an on MBR [1] of the BOOT boot program and the three files module. The three modules are: input and output modules (IO.SYS), document management module (MSDOS.SYS) and command interpreter module (COMMAND.COM). [2] In addition, Microsoft's DOS system, the retail package also adds a number of standard external program (ie external command), this internal command (ie, interpreted by the COMMAND.COM command) with a built up relatively complete disk operating times in human-computer interaction environment. For a variety of DOS commands, see DOS command list. History DOS1.0 Microsoft bought 86-DOS (QDOS) Copyright, July 1981, becoming the first IBM PC operating system. Microsoft has also developed special versions for the IBM PC PC-DOS, but compared with the generic versions of DOS, in addition to the system file name, and part of the core for the IBM machine design, external commands and utilities, the rest of the code were not in fact large. DOS 1.25 1982 年 6 months, support for double-sided floppy disk and start editing error
DR-DOS
not only IBM, is also widely used in many OEM DOS2.0 1983 年 3 months, joined the UNIX-style file system tree and hard disk support to the point of view the low-level, this is the first major revision of the DOS. In addition to this version is compatible with CP / M in the FCB the file system, the formal adoption of the FAT format, and features extensive use of the Handle with UNIX-style file mode of operation. DOS 2.11 1984 年 3 months, as a major OEM version of the 2.01 version fixes the error, adding non-English language and its international support for file formats MS-DOS 2.25 1985 年 10 months, support for additional expansion of the character set ( Japanese and Korean), also revised an earlier version of the error MS-DOS 3.0 1984 年 8 months, the introduction of PC / AT, it can support the 1.2MB floppy disk, and add a high-capacity hard disk MS-DOS 3.1 1984 年 11 月adding support for Microsoft Network MS-DOS 3.2 1986 年 1 month, added enhanced support for 3.5 floppy disk and start the driver can use the hardware EMS. Taiwan's Acer computers in the Information Industry and the Association's support, and Microsoft DOS3.2 developed on the basis of full Chinese compliance CMEX standard MS-DOS 3.3 1987 年 8 months, Fixed some internal error, increased the number of treatment on the external command file, started to support the floppy disk after, DOS3.3 became the most stable, best-selling version of DOS can be said to the second major revision, one year after the release of 3.3 to 4.0 even less popular. BASIC interpreter inside gradually after the 3.x to enhance the graphics capabilities BASICA GW-BASIC. At this time in previous versions of Heaven BASICA company developed on the basis of the support Chinese drawing mode ETBASIC, almost became the BASIC language learning in Taiwan standard. External command some of the most important is to increase the XCOPY and APPEND, enhanced long overdue, some file management capabilities.
FreeDOS
MS-DOS 4.0 PC MS-DOS 4.0 1988 年 6 months, mainly based on IBM's code base, rather than Microsoft's own code base. Added support for hard disk drives maximum 2GB capacity, the introduction of EMM (software simulation EMS) and the new specifications XMS memory technology, the DOS operating system can use more than 1MB of memory. Began DOSSHELL use. DOSSHELL can be seen as DOS-GUI interface, and a switching capacity of program operations. MS-DOS 4.01 1988 年 12 months, for a series of errors earlier version of the amendment to the existing MS-DOS 5.0 1991 年 6 months, the third major revision, and perhaps the most important revision in the history of DOS. This version 4.0 for the succession of improvements in memory management is the most stable EMM specification, popular version, also added a lot of memory management program, such as EMM386, MEM, etc., as is a good match with the Windows, DOS memory management joint also makes became anxious to meet the many software enhancements in the direction, how to set up DOS memory configuration has become a hot topic. QuickBASIC BASIC interpreter into a simple version of QBASIC, built from the original text editor to edit full-screen editing EDLIN EDIT (in fact, just under a multi-parameter QBASIC.EXE only.) Reduce the external command for the version of the demand, and the repeated calls in, and finally adding DOSKEY, UNDELETE, Quick Format, UNFORMAT capabilities. Another point worth mentioning is that this version of the CONFIG.SYS allow multiple options. MS-DOS 6.0 1993 年 3 months, adding a lot of bells and whistles of the external command. MSD system testing program was added. DoubleSpace compact disk technology has begun to be used, also started to attach a Microsoft's own software VSAFE detoxification and MSAV. Networks began to join the support of LL5 transmission line. For the disk, first joined the sector consolidation and the disk cache software DEFRAG program SMARTDRV. File management, to replace the spring luxury MSBACKUP the BACKUP, addition, and finally joined the DELTREE MOVE utility. Officially support the drive. Memory management configuration is joined MEMMAKER Optimizer. MS-DOS 6.2 1993 年 11 月, DoubleSpace renamed DrvSpace.
MS-DOS 7.1
MS-DOS 6.21 1994 年 2 月 MS-DOS 6.22 1994 年 6 months, the final sales version. Country Joe (KC) to obtain Microsoft and IBM authorized, with the country Qiao Zhongwen system to express their DOS 7.0. MS-DOS 7.0 1995 年 8 月, Windows 95 version brought to support long file names. MS-DOS 7.1 1996 年 8 months, adding a large hard disk and FAT32 partition on the support. MS-DOS 8.0 2000 年 9 月, DOS of the final version, eliminating some features, such as no longer support the SYS command, the printer operation. Related software to run the DOS software is PC compatible as DOS main platform,chi turbo flat iron, there are many known software written for the DOS. Including: Lotus 1-2-3; set in the enterprise market, is widely used spreadsheet software. By many as the main reason for the success of IBM PC WordPerfect; set out in the current Windows platform text editor dBase; one of the first database software Telix; modem communications software Arachne; a DOS version of the web browser DJGPP, gcc's DOS port of 4DOS, to replace the original command-line interface software Borland's integrated development environment, including Turbo Pascal, Turbo BASIC,Chi dazzle flat iron, Turbo C, Turbo Assembler, and dial-up bulletin board (BBS) 架站 software RemoteAccess, Spitfire, Maximus , McBBS, and TAG BASIC language tools, and GW-BASIC program BASICA many first-person shooter game: from Id Software and Apogee Software (later renamed as 3D Realms) joint development of Wolfenstein 3D; Id Software's Doom and Quake; 3D Realms The Duke Nukem 3D, Shadow Warrior, and Rise of the Triad. 3D Realms game developers to use these 3 sets are DOS on the Build engine author Ken Silverman, the engine has also been used to Silverman's game on Ken's Labyrinth. Related operations commonly used 1.1 MS-DOS command: 1, disks, operating parameters fdisk / mbr rebuild the master boot record fdisk / mbr rebuild the master boot record (which can be washed off Restore Wizard) format arguments: / q quick format / u can not be restored / autotest Do not prompt / s MS-DOS boot disk created format c: / q / u / autotest2, directory operations DIR [directory name or file name] [/ S] [/ W] [/ P] [/ A] Parameters listed in the directory : / s find the subdirectory / w display only the file name / p paging / a show hidden files DIR format.exe / s to find the disk file and report the location format.exe CD [directory name] PS: You can use relative directory or Absolute directory entry into the directory CD AA AA under the current folder directory, cd .. into a folder on the cd return root; cd c: windows into c: windows folder MKDIR [directory name] to create the directory MKDIR HELLOWORLD Create HELLOWORLD directory 3, delete the directory and file operations file: rmdir [directory name or file name] [/ S] [/ W] [/ P] [/ A]. Example rmdir c: qqdownload / s to delete C disk qqdownload directory. del [directory name or file name] [/ f] [/ s] [/ q] delete the parameters: / f remove the read-only file / s to delete the directory and all the content / q does not confirm before deleting del c: del / s / q del automatically delete the directory c disk copy [source file or directory] [target directory] copy file copy d: pwin98 *.* c: presetup the d disk pwin98 all the files to c drive The presetup of 4, the memory operation debug debug memory parameter-w [file] binary file write-o [Address 1] [Address 2] output memory-q to exit exp: o 70 10 [return] o 71 01 [return] 01 [return] q [return] to 70-71 in the memory are changed to 01 to clear the AWARDbios password. debug can crack the hard disk protection card, but only in pure DOS, you can use. DOS command line (a) MD - Create a subdirectory 1. Function: Create a new subdirectory 2. Type: Internal command 3. Format: MD [drive:] [path name] 4. Instructions for use: (1) is built in the current directory. (B) CD - 1 to change the current directory. Function: Display the current directory 2. Type: Internal command 3. Format: CD [drive:] [path name] [directory name] 4. Instructions for use: (1) If you omit the path and directory name, displays the current directory; (2) where the level directory. (C) RD - remove directory commands 1. Function: remove the disk from the specified directory. 2. Type: Internal command 3. Format: RD [drive:] [path name] [directory name] 4. Instructions for use: (1) subdirectory must be empty before removal, that need to enter the subdirectory, use the DEL (delete the file command) to delete the empty file subdirectories, and then go back to the previous level directory, with the RD command to delete the directory itself; (2) can not remove the root directory and the current directory. (D) DIR - Display the disk catalog order 1. Function: Display the contents of the disk directory. 2. Type: Internal command 3. Format: DIR [drive:] [path] [filename] [/ A [[:] attributes]] [/ C] [/ D] [/ L] [/ N] [/ O [[:] Categories property ]] [/ P] [/ Q] [/ S] [/ T [[:] time]] [/ W] [/ X] [/ 4] 4. Usage: / A display with the specified properties file. Read-Only file attribute H R D directory Hidden files A Files ready for archiving S System files - said / C in the median file size display thousands separators. This is the default value. With /-C to disable display separator. / D-type with the same width, but the files are listed by category column. / L Uses lowercase. / N New long list format, in which the file name in the far right. / O listed in the order file with the classification. Sort the N by name (alphabetic) S By size (from small to large) E By extension (alphabetic) D by date / time (from first post) G Group directories first - reverse order of the prefix / P in each After the suspension of the information screen. / Q Display the file owner. / S displays the specified directory and all subdirectories. / T control the display of characters used to classify the time domain. A time of C last access time to create time to write the last time W / W with a wide list format. / X show a non-8.3 file names generated short names. Format is / N format, the short name inserted before the long name. If no short name is blank in its place. / 4 years with a four-digit display (e) PATH - set the command path 1. Function: The device search path for executable files, only the file is valid. 2. Type: Internal command 3. Format: PATH [drive 1] directory [drive letter path names 1 2 :]], ...} 4. Instructions for use: (1) when running an executable file, DOS will first search for the file in the current directory, if found, run the; if can not find the file, according to the path set PATH command, one by one in order to search for the file to the directory; (2) PATH command in the path, if two or more, all paths with a semicolon 1:] [path 1] [letter 2:] [Path 2] ... (to set the search path for executable files) PATH: (abolition of all paths) PATH: (shows the current path established) (vi) TREE- - Display disk directory structure commands 1. Function: Displays all the directory path on the drive and the directory of all file names. 2. Type: External command 3. Format: TREE [drive:] [/ F] [> PRN] 4. Instructions for use: (1) the use of / F parameter shows all directories and directory of all documents, omitted, only display the directory, the files do not show directory; (2) use> PRN parameters, listed in the directory put and the file name in the directory printout. (G) DELTREE - Delete the entire directory command 1. Function: the entire directory and its subdirectories and files subordinate to delete. 2. Type: External command 3. Format: DELTREE [drive:] 4. Usage: This command can be the next step will be directory and all files, subdirectories, but the lower subdirectories be deleted, and regardless of file attributes as hidden, system or read-only, as long as the file is deleted directories Next, DELTREE are treated equally, according to delete worthwhile. Be careful when using! ! ! Class disk operations command (a) FORMAT - disk formatting commands 1. Function: to format the disk, track, and sector classification; also check whether the entire disk with defective tracks, filling mark of bad sectors; create the directory area and the file allocation table, so that preparations for DOS disk ready to receive . 2. Type: External command 3. Format: FORMAT [/ S] [/ 4] [/ Q] 4. Instructions for use: (1) command after the drive letter is not the default, if the hard disk formatting, such as the following tips will be: WARNING: ALL DATA ON NON - REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y / N)? (Warning: All data in the C drive, will be lost, really want to continue to format it?) (2) if the format of the floppy disk, then the following prompt: Insert mew diskette for drive A; and press ENTER when ready ... (A-insert a new disk drive, ready to press the Enter key.) (3) use [/ S] parameters, will DOS system files IO.SYS, MSDOS.SYS and COMMAND.COM copied to the disk, so that the disk can serve as a DOS startup disk. If selected / S parameters, formatted disk only to read and write information on drums, and not as the startup disk; (4) use [/ 4] parameters, 1.2MB floppy drive in high-density low-formatted 360KB density disk; (5) use [/ Q] parameters, a quick format, this parameter will not be re-divided the disk track and sector, only the root directory of the disk, boot sector file allocation table, and clear as a blank, so , format is faster. (6) use [/ U] argument that an unconditional format, which destroy all data on the original disk. Without / U, was safe format, first create an image file then save the old FAT table and root directory, if necessary, restore the original data can be UNFORRMAT. (B) UNFORMAT resume formatting commands 1. Function: misuse of to format the disk to recover lost data. 2. Type: External command 3. Format: UNFORMAT [/ L] [/ U] [/ P] [/ TEST] 4. Usage: used to be The root directory or subdirectory is deleted and the disk file system sector (including the FAT, root directory, BOOT sector and partition table) is damaged, it can be used to rescue UNFORMAT. (1) selection / L parameter list to find the subdirectory name, file name, date of great filial piety and other information, but does not really do FORMAT work. (2) selection / P parameters of the report will be displayed on the screen (including the / L parameter information generated) and also sent to the printer. Run-time screen displays: Use this parameter screen will display: (5) selection / PSRTN; repair partition table. If the drive to add / P,cheap chi flat iron, / L, / TEST one, are equivalent to using the / U parameter, UNFORMAT be Note: UNFORMAT for just FORMAT the disk, you can fully recover, but if done after FORMAT write other data, the UNFORMAT can not complete save data. UNFORMAT is not a panacea, the use of UNFORMAT FAT and root directory will rebuild, so it also has a high risk, loss of improper operation may be expanded, if only accidentally deleted a few files or subdirectories, only need to use UNDELETE enough. (C) CHKDSK - Check the current state of the disk commands 1. Function: Display disk status, memory status, and specify the path of the specified file number is not continuous. 2. Type: External command 3. Format: CHKDSK [drive:] [path] [filename] [/ F] [/ V] 4. Instructions for use: (1) use [file] parameter, the disk shows the files take up the case; (2) The Commission [/ F] parameters, correct disk found on the specified logic error; (3) use [/ V] parameters, showing all the files on the disk and path. (D) DISKCOPY - Copy command a whole plate. Function: Copy the format and content of the same floppy disk. 2. Type: External command 3. Format: DISKCOPY [letter 1:] [drive 2:] 4. Instructions for use: (1) If the target disk is not formatted, the system will automatically copy the selected format. (2) If the target disk on the original file, then copy will be lost. (3) If the copy is a single drive, the system will prompt a timely replacement of the source and destination drive, please pay attention to distinguish between operation source and destination disk. (E) LABEL - create the disk label commands 1. Functions: create, change, delete the disk label. 2. Type: External command 3. Format: LABEL [drive:] [volume name] 4. Instructions for use: (1) to establish the label named label name, if the default for this parameter, the system prompt type the label name or asked to delete the original volume name; (2) the volume name from 1 to 11 characters. (F) REN - file rename commands 1. Features: change the file name 2. Type: Internal command 3. Format: REN [drive:] [path] Instructions for use: (1) can not add new file name before the drive letter and path, because the command can only replace the same file on the disk file name; (2) allows the use of wildcards to change a file name or extension. (G) FC - file comparison commands 1. Function: To compare the similarities and differences between files, and lists different place. 2. Type: External command 3. Format: FC [drive:] [path name] [drive:] [pathname] [filename] [/ A] [/ C] [/ N] 4. Instructions for use: (1) selection / A parameters for the ASCII code comparison mode; (2) selection / B parameters for the binary comparison mode; (3) selection / C parameter, the case is the same character as the character. (4) selection / N parameter, comparing the ASCII code mode, the display differences at the line number. (H) ATTRIB - modify file attributes commands 1. Function: to modify the properties of the specified file. (File attributes see 2.5.4 (b) of the file properties section) 2. Type: External command. 3. Format: ATTRIB [filename] [+ R |-R] [+ A |-A] [+ H |-H] [+ S |-S] [/ S] 4. Instructions for use: (1) use + R parameter, specify the file set to read-only attribute, so that the file can only be read, not write or delete data; use-R parameters, remove read-only property; (2) selection + A parameter file is set to file attributes; use-A parameter, remove the file attributes; (3) + H parameter selection, co-ordination for the hidden file attribute; use-H parameters to hidden attribute; (4 ) selected + S parameters, set the file system properties; use-S parameter, remove the system properties; (5) selection / S parameters of the current directory and all subdirectories for files in subdirectories set. (Ix) DEL - Delete File Command 1. Function: delete the specified file. 2. Type: Internal command 3. Format: DEL [drive:] [path] [/ P] 4. Instructions for use: (1) selection / P parameters, the system asks if you really want to delete before delete the file, without using this parameter, it is automatically deleted; (2) the command does not remove the property is hidden or read-only file; (3) in the file name can use wildcard characters; (4) To delete all the files on the disk (DEL *.* or DEL.), will be prompted to: (Are you sure?) (Are you sure?) If the answer is Y, then delete, answer N, then cancel the deletion. (X) UNDELETE - Undelete command 1. Function: Restore accidentally deleted the command 2. Type: External command. 3. Format: UNDELETE [drive:] [path name] [/ DOS] / LIST] [/ ALL] 4. Instructions for use: UNDELETE can use the (1) selection / DOS parameters recorded under the directory to restore the remaining files. Because the file is deleted, the directory file name recorded in the first cut will be replaced by a character E5, DOS E5 beginning of the file that is based on the follow-up of the characters and their wish to restore the files to find, so, UNDELETE will ask the user to enter a character, filled so that the file name. However, this character not the same as the original, only the rules consistent with DOS file name can be. (2) use / LIST only (3) selection / ALL automatically recovered files will be fully recovered, but not one by one to ask the user to use this parameter, if UNDELTE use the directory to the left of the record file recovery, it will automatically select a character to file were filled, and it is not the same as with the existing file name, the preferred order of selection of characters :#%-- 0000123456789A ~ Z. UNDELETE files also have to establish the function of protective measures, beyond the scope of this course, please use these functions the reader access to the DOS manual. Other commands (a) CLS - clear screen command 1 features: clear all displayed on the screen, the screen cursor in the upper left corner. 2 Type: Internal command 3 formats: CLS (b) VER command a view system version features: Displays the current system version 2 Type: Internal command 3 formats: VER (c) DATE date set command a function: to set or display the system date . 2 Type: Internal command 3 format: DATE [mm-dd-yy] 4 use: (1) omitted [mm-dd-yy] display system date and prompted new date, you can not simply press the Enter key to modify , [mm-dd-yy] as the Otherwise, the prompt enter the new date and time. (D) TIME system clock set to command a function: to set or display system time. 2 Type: Internal command 3 formats: TIME [hh: mm: ss: xx] 4 use: (1) omitted [hh: mm: ss: xx], shows the system time and prompts for a new time, you can not change press enter key, [hh: mm: ss: xx] as implementation, the system does not prompt the system date. Otherwise, the prompt enter the new date and time. (E) MEM command to view the current memory status of a feature: Displays the current memory usage two types: external command 3 Format: MEM [/ C] [/ F] [/ M] [/ P] 4 use: (1) optional / C parameter lists into conventional memory and the length of each file CMB, but also shows the usage of memory space and the largest available space; (2) selection / F parameters are listed in the remaining bytes of the current size of conventional memory and the UMB and the size of the area available; (3) The selection / M parameter shows the module uses memory to address, size and nature of the module; (4) selection / P parameter to specify when the output of more than one screen, pause for the user to view. (F) MSD command information display system 1 functions: display system hardware and operating system status. 2 types: external command 3 format: MSD [/ S] 4 use: (1) use / I parameter, does not detect the hardware; (2) selection / B parameter, in black and white start MSD; (3) selection of / S parameters, the system displays the concise report. Network-related commands commonly used DOS, Arp: Display and modify the This command is only installed TCP / IP protocol before it can use the arp-a [inet_addr] [-N [if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] Parameters-a by asking the TCP / IP Displays the current ARP entries. If you specify inet_addr, the computer only displays the specified IP and physical addresses. -G and-a the same. inet_addr to add a little tag specifies the IP address of the decimal. -N displays the network interface specified by the if_addr ARP entries. if_addr need to modify the address specified interface IP address translation table (if any). If not, will use the first applicable interface. -D delete the specified item from the inet_addr. -S add entries in the ARP cache, the IP address and physical address inet_addr ether_addr association. Physical address separated by a hyphen 6 hexadecimal byte given. Use dotted decimal IP address of the specified tag. Item is permanent, that is, after the expiration of the timeout delete items from the cache automatically. ether_addr specify the physical address. Ftp the files to FTP service is running from a remote computer or FTP services running on the remote computer to transfer files (sometimes called the daemon). Ftp can be used interchangeably. Click the This command is only installed TCP / IP protocol before it can use. Ftp is a service that, once started, will be created in which a child can use the ftp command environment, sub-commands by typing quit the environment from the child to return to the Windows 2000 command prompt. When the ftp sub-environment is running, it is representative of the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s: filename] [-a] [-w: windowsize] [computer] parameter-v Suppresses remote server response. -N disable automatic log on to the initial connection. -I send multiple files to close interaction prompts. -D enable debugging, displayed in the client and the server for all ftp commands passed between. -G Disable file name group, which allows local file and path names use the wildcard character (* and?). (Please refer to the online The parameter spaces are not allowed. Use this switch instead of redirection (-A data connection in the bundle to use any local interface. -W: windowsize override the default send buffer size is 4096. computer to connect to the remote computer to specify the computer name or IP address. If specified, the computer must be the last line of argument. -------------------------------------------- Nbtstat the diagnostic command NBT (TCP / IP on a NetBIOS) display protocol statistics and current TCP / IP connection. This command is only installed TCP / IP protocol before it can use. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters-a remotename listed using the name of the remote computer The name of the table. -A IP address using the remote computer's IP address and lists the name of the table. -C given the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists local NetBIOS names. -R remove all the NetBIOS name of the name cache, reload Lmhosts file. -R lists the Windows network name resolution name resolution statistics. Configured to use WINS in the Windows 2000 computer, this option returns to the radio or WINS to resolve the name and registration number. -S displays the client and server sessions, only the IP address listed by the remote computer. -S Display the client and server sessions. Try to convert the remote computer using the IP address of the host name of the file. interval to re-display the selected statistics, pausing between each display interval in seconds. Press CTRL + C to stop re-display statistics. If omitted, nbtstat prints the current configuration information once. -------------------------------------------- Netstat displays protocol statistics and current The TCP / IP network connections. This command is only installed TCP / IP protocol before they can use. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters-a Displays all connections and listening ports. Server connection is usually not displayed. -E Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N display in digital format, the address and port number (instead of trying to find the name). -S displays statistics for each protocol. By default, the display TCP, UDP, ICMP and IP statistics. -P option can be used to specify the default subset. -P protocol shows the protocol specified by the protocol connection; protocol can be tcp or udp. If with the - s option with the use of display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -R display routing table contents. interval to re-display the selected statistics, pausing between each display interval seconds. Press CTRL + B to stop re-display statistics. If omitted, netstat will print the current configuration information. -------------------------------------------- Ping verification and remote computer connection. This command is only installed TCP / IP protocol before they can use. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer-list ] | [-k computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until interrupted. -A to address resolution for the computer name. n count Send count the specified number of ECHO packets. The default value is 4. -L length send messages that contain the specified amount of data by the length of ECHO packets. The default is 32 bytes; maximum is 65,527. -F to send the packet, Packets will not be the gateway route segment. -I ttl the -V tos to -R count in the count can be specified at least one station, up to 9 computer. -S count Specifies count metric specified timestamp. -J computer-list specified by computer-list list of computers to route packets. Continuous computer can be separated by the middle of the gateway (routing sparse source) IP to allow the maximum number is 9. -K computer-list specified by computer-list list of computers to route packets. Continuous computer can not be separated by intermediate gateways (strict source route) IP to allow the maximum number is 9. -W timeout Specifies the timeout interval, in milliseconds. destination-list Specifies ping the remote computer. -------------------------------------------- Rcp on Windows 2000 computers and Remote shell daemon running rshd copy between systems. rcp command is a connection command, issued from a Windows 2000 computer, the command can also be used for other transmission in the two running rshd copy files between computers. rshd daemon can use the UNIX computer, and in Windows 2000 can not be used, so only Windows 2000 computers can be used as an order of the system involved. Remote computer must also be provided by running the rshd rcp utility. rcp [-a |-b] [-h] [-r] source1 source2 ... sourceN destination parameter-a specify the ASCII transfer mode. This mode will be in the outgoing file carriage return / line feeds into carriage return, line feed in the incoming file will be converted to carriage return / line feed. This mode is the default transfer mode. -B specifies binary image transfer mode. Did not perform carriage return / line feed conversion. -H transfer Windows 2000 computer is marked as hidden attribute the source file. Without this option, specified in the rcp command line the effect of hidden files and file does not exist. -R will be the source of the contents of all subdirectories recursively copied to the target. source and destination must be a directory, although even if the source is not a directory, use the-r can work. But there will be no recurrence. source and destination must have the format [computer [. user]:] filename. If you omit the [computer [. User]:] section, the computer will assume that the local computer. If you omit the [. User] section, will use the currently logged on Windows 2000 user name. If you use a fully qualified computer name that contains a period (.) Delimiter, you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If you specify multiple source files, the destination must be a directory. If the file name is not to UNIX forward slash (/) or Windows 2000 system, the backslash () begin with, it is assumed relative to the current working directory. In Windows 2000, which is an order of the directory. In the remote system, this is the remote user's login directory. Period (.) That the current directory. Using the remote path escape character (,CHI Turbo Ceramic Flat Iron, -------------------------------------------- Rexec running the REXEC service run commands on a remote computer. rexec command before running the specified command to verify the user name on the remote computer, only to install the TCP / IP protocol before they can use this command. rexec computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the user name on the remote computer. -N Redirect the input of rexec to NULL. command Specifies the command to run. -------------------------------------------- Route control network routing table. This command is only installed TCP / IP protocol before they can use. route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]] Parameters-f Clears all gateway routing table entry. If this parameter is used in combination with a command, the routing table will be removed before running the command. -P add command with the parameters used, the system will route between the persistence of the boot process. By default, the system restarts without reservation route. When used in conjunction with the print command to display a list of registered persistent routes. Ignore all the other routes are always the order of the corresponding persistent. Specify the following command a command. Print print route add command to add the purpose of routing the routing change delete to delete an existing route destination Specifies to change the computer to send command. mask subnetmask designated route entry associated with the subnet mask. If not specified, will use 255.255.255.255. gateway Specifies gateway. The network database called Networks Hosts file and the name of the computer name in the database file all the destination or gateway are referenced using the symbolic name. If the command is print or delete, destination and gateway can also use wildcards, you can omit the gateway parameters. metric metric costmetric assigned integer (from 1 to 9999) in calculating the fastest, most reliable, and (or) use the cheapest route. -------------------------------------------- Rsh running the RSH service run commands on a remote computer. This command is only installed TCP / IP protocol before they can use. rsh computer [-l username] [-n] command to run the specified command parameter computer remote computer. -L username Specifies the remote computer using the user name. If omitted, the logged on user name. -N Redirect the input of rsh to NULL. command Specifies the command to run. -------------------------------------------- Tftp transfer files to is TFTP service is running or from a remote computer running TFTP service on the remote computer to transfer files. This command is only installed TCP / IP protocol before they can use. tftp [-i] computer [get | put] source [destination] parameter-i Specifies binary image transfer mode (also known as In binary image mode, the file one byte by one byte to literally move. When sending binary files using this model. If you omit the-i, the file will be ASCII mode transfer. This is the default transfer mode. This mode will convert the EOL characters carriage return and UNIX-PC carriage return / line feed. Should be used when sending a text file in this mode. If the file transfer is successful, data transfer rate. computer designated local or remote computer. put the file on the local computer to the remote destination file on the computer source. get a file on the remote computer to send to the destination file on the local computer source. If the files on the local computer to the remote file-two files on the computer file-one, please specify the put. If the remote computer to send the file to a remote file-two files on the computer file-one, please specify the get. Because the tftp protocol does not support user authentication, the user must log on the remote computer and the file must be written. source Specifies the file transfer. If the local file is specified as -, then the remote file on stdout to print out (if available), or from stdin (if placed) to read. destination Specifies the location of the file to. If you omit the destination, will assume the same name with the source. -------------------------------------------- Tracert diagnostic utility of the contains different survival time (TTL) value of the Internet Control Message Protocol (ICMP) echo packets to the target, to determine the route used to reach a goal. To forward packets at least until the TTL decrement 1, the necessary path for each router, TTL is a valid hop count. TTL on a packet reaches 0, the router should be Tracert sends the TTL of 1 echo packets, and in the subsequent process each time you send TTL incremented by 1, until the target response or the maximum TTL to determine the route. Routing by checking the intermediate routers send back the However, some routers silently expired TTL values include underground transmission of data packets, and tracert can not see. tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name parameter / d specifies not to address resolution for the computer name. -H maximum_hops search target specified maximum number of hops. -J computer-list specifies the sparse along computer-list source routing. -W timeout Wait timeout specified response time the number of microseconds. target_name target computer's name. DOS, restore registry command on the 5 Scanreg / restoredos of various common command ▲ dir ▲ attrib ▲ cd ▲ copy ▲ xcopy ▲ del ▲ undelete ▲ deltree ▲ dos = high ▲ doskey ▲ emm386.exe ▲ fc ▲ format ▲ unformat ▲ interlnk ▲ intersvr ▲ memmaker ▲ memitem other ▲ mscdex ▲ msd ▲ prompt ▲ ramdrive ▲ subst ▲ mem ▲ . msc ▲ services.msc ▲ oobe / msoobe / a ▲ logoffDOS (dioctyl sebacate) abbreviation of a plasticizer. Industry often called dioctyl sebacate. Basic Information Chemical Name: sebacate (2 - ethylhexyl). English name: dioctyl sebacate; bis (2-ethylhexyl) sebacate Synonym: dioctyl sebum CAS: 122-62-3 【Molecular formula: C26H50O4 Molecular Weight: 426.66 Structure: Physical Properties Appearance: Light yellow liquid. Melting point (℃): -55 Boiling Point (℃): 248 (1.20kPa) relative density (water = 1): 0.91 Relative vapor density (air = 1): 14.7 Saturated vapor pressure (kPa): 1.20 (248 ℃) Solubility : not soluble in water, soluble in alcohol, ether, ketone, aromatic hydrocarbons, aliphatic hydrocarbons and other organic solvents. Partially soluble in some of the amines and polyols. With polyvinyl chloride, vinyl chloride copolymers, ethyl cellulose, polystyrene, poly methyl methacrylate and synthetic rubber compatible. This product is mainly used cold plasticizer. DBS plasticized performance and similar but low volatility, water extraction, good products, good low temperature flexibility and durability. Toxicity of the low toxicity, toxicity coefficient T = 1000. The United States, the Netherlands permit the production of food packaging materials products. Atlas Atlas entry for more extended reading: 1
DOS command Daquan http://www.zou114.com/dos/
2
http://blog.csdn.net/ctu_85/ archive/2008/01/03/2023205.aspx
3
http://doshome.com/soft/
4
http://publish.it168.com/cword/514 . shtml
5
http://hi.baidu.com/% BD% BA% CB% AE502/blog/category /% A2% E2dos
6
(under 2002 copies) Release
8
, operating systems, computer I have to perfect
  Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off


All times are GMT. The time now is 11:29 PM.

 

Powered by vBulletin Version 3.6.4
Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Free Advertising Forums | Free Advertising Message Boards | Post Free Ads Forum