Monday, June 30, 2014

Manual Command Prompt

Hidden deep in the Windows command line is a world that few people know about. In this article, we will guide how to resolve the error and make your computer more secure. 




The time before Windows came out, when you turn on a computer we would not see anything but C: \> prompt with a cursor. It is known, called the command prompt (or sometimes the Dos prompt). For computer can do the job, you'll have to fill in order from memory.

However, the method of using this machine really unattractive and a few people even want to go back to using DOS prompt.

Still, if you believe that line still exists on all versions of Windows? Why is that? The reason is that the command is still quick and powerful way to manage many aspects of Windows without using a graphical interface to complicate.

As in all content will be written, the command line can be useful tools to edit and virtually test, fault monitoring and even improve security.

Nevertheless, we must also admit that the order of the command line tools are free; although they are not always necessary, learning the basics helps users discover the mysterious inner workings of Windows.

Before embarking on the implementation, there are two things you should remember. First, this article is not for beginners or those afraid to change. Monday, computer backup before doing: we are not responsible for any problems that may arise when you use the command line.
Windows Command Prompt

Before the appearance of Windows, the operating system called MS-DOS - shortened from Microsoft's Disk Operating System-has dominated the PC world. It will provide links and connections between users and computer hardware based on handwriting, keyboard only required to operate.

Technically, MS-DOS uses a command-line-like form interface (CLI - command line interface), while the exploit Windows Graphical User Interface (GUI - graphical user interface).

The version of Windows before XP operating system MS-Dos need to operate by the Windows can not access the computer's BIOS. BIOS stands for English phrases (Basic Input / Output System) means the basic entry system.

Users can choose to run DOS or Windows when booting the computer and obviously people choose Windows.

Windows XP introduced a tool called Command Prompt, currently exists in both Windows Vista and Windows 7. It is similar to MS-Dos, but it's actually just a set of MS-DOS emulator running inside Windows.



Also technically, Command Prompt allows access tools and a few lesser-known settings. Because it does not need graphics, Command Prompt fast and in some cases, it can be used to perform tasks that Windows can not perform.

Of course, there are a few flaws, not least of which is the mysterious nature of the command. Microsoft provides a comprehensive list of commands, how to use them and so many different options. Click here to get a list of Windows XP and click here to receive a version for Windows Vista / 7.
When Windows Explorer is the best

Although the Command Prompt is a powerful tool, we believe that it is not easy or method to best perform the task. Some commands may seem a bit complicated, may be due to a long string or have too many parameters.

It would be error-prone because the user does not notice when typing so it's better that you use Windows Explorer to manage files daily.

Besides, the tasks related to the command line and potentially dangerous - there is some confirmation dialog "No, Yes or Cancel" and no Undo command (in Commpand deleted files unrecoverable Prompt back from Recycle Bin), so sometimes the action can not be made ​​to recover it.

Unfortunately misuse parameters and wrong files can be overwritten - even can damage the file system of Windows.
Start with Bios

Remember how we mentioned above Bios? Although not exactly a command line tool, but the BIOS is a very important part of Windows and is dependent on the manufacturer and model computer, it could include some security tools very useful.



To find them, restart your computer, then press the dedicated key to access the BIOS it - usually F2 or Delete key will be (Del). When the BIOS screen appears, look for the section called Security and navigate to it with the arrow keys.

In most cases, there will be options to help users set passwords and security khauUser Supervisor. If you set the User password, this password must be entered before Windows operations (of course, Windows also have a password).

If you set a Supervisor password, this password must be entered before access to the BIOS - help improve security.

Although there are many ways to reset or disable the password, this technique beyond the capacity of most existing techniques, they will provide additional security capabilities are useful. Also for this reason, users should be careful when using the maximum of these tools: forget your password and can lock your computer completely. So be careful.

In addition, look for also named "Boot Sector Virus Protection". When you enable this option, will not have any software capable of recording up to start an important part of your hard drive like some kind of virus done. Even so, note that some software - namely partitioning software - there is good reason to perform this task. So be careful with fake messages.

When finished, exit the BIOS (usually using the Esc key) and choose to save the changes you just created.
Search command line tool

Now run Windows to access the command-line tools, you will find it in the Accessories menu from the All Programs in the Start menu. Alternatively, users can use the Windows key + R, then type cmd.exe in the Open box and click OK.

In Windows Vista / 7, sometimes users will need to use admin rights to open it. To do this, right-click the command line icon and select "Run as administrator".
Inside the box

Command Prompt has some drawbacks. In Windows XP, it boots and displays the C: \ Windows folder (or "directory", as it is often called in this environment) but in Windows Vista / 7, it opens in the address book of all users (C : \ users \ [username]) unless the Administrator mode is used, when it opened in the address book C: \ Windows \ system32. Whether it is open matter where, this address book is considered the path.

However, in Windows Vista / 7 command prompt can be opened in any folder in Windows Explorer by pressing the Shift key while right-clicking on the folder, then choose "Open command window here" from the pop-up menu.

To switch to another folder or path, use the CD command - to change to address book named C: \ My Directory, type cd c: \ My Directory and press Enter. To switch between the drives, just type the name represents the drive letter and a colon (eg D :) and then press enter.

For most commands, type /? after it (or help earlier) displays support information in great detail. "Help" will display a list of all available commands. When switching between the command should be placed before a sign / or - (minus sign); check to see supporting documents should use the command.



Some special text characters commonly used in the command line. Character pipe | will send the results of a particular command to use a different command. In most keyboards, it is typed by pressing Alt Gr key and to the left of the 1 key on the keyboard.

One other character or be used, especially when working with files that asterisk * represents any sequence of characters.

For example, *. Means xls files XLS file extensions are. Letter. * Means any file whose name is the Letter, and *. * Means all files. The question mark represents a single character - so Letter?. * Will include Letter1.doc, Letter2.pdf, ...

Press the Enter key is how to execute the commands, so to not repeat them I will not mention it again. To clear the screen, use the CLS command, type exit to exit the command line (or just click on the seal's red to close the software).
Safe Internet Use

One of the most powerful commands to execute in the command line window net. It has a lot of side orders. For example, execute the command net user, will list all account names, while net config workstation displays the computer name, and workgroup users.

More utility in terms of security, it can also be used to prevent users from logging into a specific number of times. To restrict users Janet computer use in the period from 9 am to 6 pm weekdays and 10 am to 9 pm on weekends, Janet type net user / times: MF 0.09 to 18; Sa-Su from 0.10 to 21.

Net accounts command is great to improve password security. It should be open command line with administrator rights (as explained above) and it will display information about the passwords of existing users.

People tend to pick short passwords and stick with them for a long time. However, net accounts command can be used to eliminate this habit. For example, to capture each user set password length of at least 10 characters and change their passwords within 90 days, type net accounts / MAXPWAGE: 90 / MINPWLEN: 10.

Users use password is too short to be notified must create a new password at next logon. To remove this restriction, type net accounts / MAXPWAGE: unlimited / MINPWLEN: 0. (pay attention to the following paragraph "accounts).

Windows also has a built-in Guest account is available, there is no password on it can not be changed in Windows. Although this account is not enabled by default, password protected it will contribute to security.

In the command line administrator, type net user guest *, then type the password two times when the window appears (the characters will not appear on the screen). To remove the password, press Enter two times when a password entry screen appears. In addition, this command can also be used to change or remove the password of any user by changing guest needs to be replaced with the user name.
Copy safe and faster backups

Although we have the copy, del (delete) the file and move on (command + /? To learn more), xcopy command is more powerful alternative. Users can apply this command to a lot of work and it's even more reliable is to use Windows Explorer.

For beginners, xcopy can copy the entire folder or hard drive, including all hidden files, to the new storage area. It even selectively copy files based on file copies of old or newer.

For example, if you want to copy everything on drive C: to D: drive, use the command xcopy c: d: / d / s. After a few days, use the command xcopy c: d: / d / e / s to copy the new files are created. This is a quick backup and safety.

Still lots of other application users can use the xcopy - to copy hidden files (or file systems), use the / h switch, and to copy only files that already exist in one location, use / u switch.

When using name address book, users will have to close the command with quotes. For example, xcopy "C: \ Old Documents" "D: \ Backup Documents" / f / s. (note, no space after xcopy).
Detect suspicious activity

So far, we've been looking for ways to use the command line to improve security as well as perform some tasks more quickly and safely. However, knowing how to use, operate the computer using the command line will also help to identify and find out what security threats.

For example, find out what software or services that have connection to the internet is a time-consuming task in Windows - but netstat command to help simplify this task. In the administrator command line, type netstat-BDE display all active connections: This software is responsible for each connected display in cotProto.

Foreign Address column displays the URL or IP address of the remote host page (detailed information on any IP address can be captured from the well site or to check IP tool 'whois' Sysinternals).

Meanwhile, the tool logs the launch of Windows offers powerful way to find the driver and service errors or fraudulent activity, such as the service / driver install malicious software (spyware, virus, ...). It does not require the use of specific guidance commands but understand the behavior of the command line, the tool helps easily read and translate files created by boot-logging mode.

To understand this, restart your computer and press F8 before the Windows logo appears. When the Advanced Options menu appears, use the arrow keys to select Enable Boot Logging and press Enter. (In Windows XP, if there are other menu appears just select Enter to continue).

When Windows works, open a command prompt window with administrator rights and type cd% windir% to move to the Windows address book. Next, start typing ntbtlog.txt notepad to open the boot-log file in Notepad.



All the driver load order, repeat the full path, will be listed - and this information is much more useful concept path address book (mentioned above) are accepted. However, how this is useful in terms of security?

If your computer is operating normally, save the log file to somewhere for comparison later when problems arise. Close Notepad and return to the command line. Type del ntbtlog.txt to delete log files (if not removed, boot the next time, the results will be added to the free end of the current file).

If you think your computer has recently been infected virus, this method can be used to indicate the driver or new services that suspicious activity: compare boot-log file (ntbtlog.txt) previous files created with the latest.
Running Windows software using the command line

Nearly all of the Windows software can boot command line. This may sound a little crazy but it's actually very useful.

Many software supports command line switch can enable or disable certain features, whether for better or useful purpose and resolve security problems. The formula is implemented using the start command, followed by the name of the software. For example, to launch Wordpad, write.exe start typing. For Notepad, and use to start notepad.exe start using Word winword.exe.

Some software has special diagnostic mode. To run Internet Explorer with all add-on has been disabled, type iexplore.exe-extoff start and to open Excel in Safe Mode, start typing excel.exe / s.

Besides, to discover the name of a software application, right-click its entry in the All Program menu and select Properties. Target Search box to find the file name extension. Exe.

Maybe you will be disappointed but there is no real easy way to discover orders for a specific software. If software manufacturers do not provide information on their websites, try searching online with keywords "command-line options" along with the name of the software.
Fighting with infection

Similarly, the ongoing task of Windows also listed when users use the tasklist command. This command displays the software is running and the amount of memory they use. This is also a very useful way to detect malware - they can operate without your knowledge.

Using tasklist / svc to list the services associated with each software. Character (>) can be used to save this list into a file - for example, tasklist> tasklist.txt. Use this information to compare with a search engine like Google to find out what tasks or services suspicious.

Finally, there are specially selected Safe Mode can download the command line instead of the Windows Desktop, a useful if malicious software has a graphical mode disable Safe Mode (some antivirus software to accomplish this author making it difficult for users to remove). In the Advanced Options menu select Safe Mode with Command Prompt.

One application for this is to run System Restore. From the command prompt, type cd% windir% \ system32 \ restore.

After pressing Enter, execute rstrui.exe to run System Restore wizard. To run the Windows Desktop, gostart explorer. To turn off the computer using the command shutdown-s used to turn it off or shutdown-r to restart the computer.
Conclusion

In this article we explore how to guide "underworld" of Windows to help improve security for computer as well as perform a few tasks. It sounds a little outdated but it is still one of the best ways to know what is happening with Windows. Spend a bit of time to learn the basics will be returned many times after this if you want to prevent or resolve problems related to security.

Khuyenmaicoupon.biz

No comments:

Post a Comment