How to Remove Windows Genuine Advantage Notifications


How to Remove Windows Genuine Advantage Notifications

Windows genuine advantage notifications occur when your computer hasn't passed the validation test. The validation test can be failed due to being sold a pirated (non-genuine) copy of XP, or because you have changed your XP product key to a software-generated key. The failed validation installs three types of notifications on your computer: one on the log in screen, one log in timer, and one balloon. It also stops updates from Microsoft and disables your ability to install IE7 and Windows Media Player 11. This solution can get rid of all three notifications, even though you will still not be able to update. Unfortunately, you can only update if you buy a valid Microsoft product key again.

Steps

  1. If you have only just installed Windows Genuine Advantage notifications, simply using the system restore function will remove the program. Then refuse to accept the WGA update next time Windows updates... otherwise, proceeed as detailed below. There is also a software that will do all the below for you automatically, see external links at the bottom of this page.
  2. # Open System32 by either A or B of the following methods:

    • a)
      Click "Start", "Run", then type-in "System32". Click "Okay".
    • b) Find System32 manually by clicking "Start" > "My Computer" > "(X:)" (Replacing "X" with the drive letter of the host of Windows) > "Windows" > "System32".

  3. In "System32", go to "Tools" > "Folder options" > click on the tab, "View" > Uncheck "Hide extensions for known file types". Now you can begin...
  4. Check to make sure the window that comes up has a full screen of various files. The files are in alphabetical order, which makes it easier to locate the specific file.
  5. Find "WgaLogon.dll" and rename it "WgaLogon.dll.bak".
  6. Create an empty copy of WgaLogon.dll:

    • Right click on a blank space in System32 and select "New" > "Text Document".
    • Leave the text document empty and label it "WgaLogon.dll". Press Enter (on your keyboard).
    • You may get a warning from the above step that says, "If you change a file name extension, the file may become unusable. Are you sure you want to change it?". Click "Yes" on this warning.
  7. Be ready to complete the next two steps very quickly! Find "WgaTray.exe" in "System32" and delete it. You will then have 5 seconds to find "WgaTray.exe" in the Task Manager (the next step).
  8. Immediately open Task Manager. You can do this by pressing the Ctrl, Shift, and Esc keys simultaneously or right clicking the Taskbar and selecting "Task Manager". Click on the process tab and end "WgaTray.exe".
  9. Restart your computer once you have finished. All the notification messages should be gone.
  10. Disable the Windows Genuie Advantage notification permanentaly. Windows will immediately redownload WGA. You will get a notification "Updates are ready to install". Click the ntofication and then click on Advanced. Disable Windows Genuine Advantage permanentaly.


Tips

  • This process will only get rid of the notifications, and will not validate your copy of XP. It will remove the timer at the beginning of your XP log on, the white notice on the log on screen, and the annoying yellow star that appears in the bottom right corner of the screen.
  • This is easier to do if you have someone reading the steps to you while you do it.
  • You may need to Find Hidden Files and Folders in Windows to get to System32 manually.
  • If task manager programs are moving, click the title of the "user name" column to freeze them.
  • If you are having problems after this, disable the updates before rebooting.
  • There is a program called RemoveWGA which does all of this for you. Just run the program, click yes, and you're done. (See External Links, below.)
  • If you have problems changing files in the System32 directory, you will have to turn off "system restore". "Start" -> "Control Panel" -> "System" -> "System Restore" -> Check the "Turn off system restore" check box.


Warnings

  • Do not edit anything but this in System32, or it could cause system start up failure.
  • If you are new to computers, do not attempt this because if you modify the wrong file you may crash your computer.

Google Trends Re-viewed


Google Trends Re-viewed

A new Google product have just been announced and entered the Labs his name is Google Trends. Google trends builds on the idea behind the Google Zeitgeist, allowing you to sort through several years of Google search queries from around the world to get a general idea of everything from user preferences on ice-cream flavors to the relative popularity of politicians in their respective cities or countries.

Hmm!! A Good tool... Check it out...

Yahoo Tech

Yahoo Tech

Yahoo has came up with this new Stuff after a long time.
This is a good Site for tech savy guys and gals!

For those who really want to know it also has a column where you can ask the Experts! So check out!

BTW For the Indian guys I have heard that Yahoo is looking to accquire some space in India! So keep Shouting Yahoooooo!

Yotophoto : Search Free Photos !

Yotophoto is the first internet search engine for finding free-to-use photographs and images.
Now indexing over 150 000 Creative Commons, Public Domain, GNU FDL, and various other ‘copyleft’ images.

It looks a really good Stuff specially for the Developers and Designers! Yotophoto searches many top websites for images, like sxc.hu, Wikipedia, flickr etc.

I am looking forward to use it for my sites!!



Good comparison of MVS and Unix terms

Comparing MVS and UNIX Concepts and Terms

Topics in the following table were collected from the MVS-OE mailing list. The first column identifies a task or concept, in platform-independent terms; the second column describes the task or concept in MVS terms, the third column describes the task or concept in terms of AIX (the UNIX that runs on RS/6000), and the fourth column describes the task or concept for OS/390 UNIX. Note that the table is in random order; the disparate nature of the tasks and concepts in the table makes logical ordering and consistent phrasing difficult.

Task or concept

MVS

AIX

OS/390 UNIX

Part of the system that Interact with

the processor

BCP (including the hardware configuration definition – HCD) and the DFSMSdfp element

The kernel

BCP (including the hardware configuration definition – HCD) and the DFSMSdfp element

Virtual storage

the system gives each user

MVS address space; each OS/390 user gets 2 gigabytes of virtual storage; some of that storage contains system code that is common for all users.

Users get whatever virtual storage they need to reference, within the limits of the hardware and operating system.

OS/390 UNIX work runs in MVS address spaces. In IBM manuals, "a UNIX address space" typically refers to an address space created (with WLM managing the initiators) by a fork or spawn function.

Data storage

Data sets

Files

Files

System configuration data

Parameters in members of SYS1.PARMLIB (also called parmlib) control how the system IPLs and how address spaces behave.

The /etc file system controls characteristics. Also, the Object Data Manager (ODM) stores system configuration information.

The /etc file system contains configuration files, product defaults, and information that is used during system IPL and at other times, such as when daemons (tasks) are started. Unlike parmlib, it cannot be shared or concatenated, nor can it be shared among systems for searching purposes.

Bit bucket

DD DUMMY

/dev/null file

/dev/null file

Locating data sets and files

Catalogs (master and user) and PDS directories

Directories

Directories

Locating file systems

The volume table of contents (VTOC) lists all data sets, but not members within the data sets.

Because the file system is hierarchical, files can be located by the directories above them; the directories by the directories above them - right up to the root itself.

Because the file system is hierarchical, files can be located by the directories above them; the directories by the directories above them - right up to the root itself.

Shared libraries

Every address space can run a single copy of a program in the link pack area (LPA) for common use.

Shared libraries are dynamic. When the first user loads a shared program, it is brought into storage. If no one is using a program, it can be freed.

With OS/390 R9, shared libraries, similar to AIX. An HFS program that has the sticky bit on can invoke a program in the LPA.

Text data

representation

MVS's use of EBCDIC originated with the holes in punched cards. MVS does not care whether data is EBCDIC or ASCII. The applications themselves must handle the data, whatever the form. However, most MVS programs that work with data expect it in EBCDIC; an example is ISPF edit, which works only on EBCDIC data.

When you use telnet to access TSO/E, the data you enter is converted from ASCII to EBCDIC before TSO/E processes it.

AIX programs expect data to be in ASCII.

OS/390 UNIX does not care whether data is EBCDIC or ASCII. All IBM-shipped OS/390 UNIX programs that work with data expect it in EBCDIC. Most programs that work with data in other UNIX systems produce it in ASCII. Therefore, if you port a program from another UNIX platform, you might have to convert the data, which you can do through the pax or iconv utilities.

When you use telnet or rlogin to access the shell, the data you enter is converted from ASCII to EBCDIC before the shell processes it.

When you use file transfer program (FTP) and do a text transfer on ASCII text, the file automatically converts to EBCDIC.

Data format

Record orientation, often an 80-byte record, reflecting the traditional punched card image.

Byte orientation; organization of the data is provided by the application

Byte orientation; organization of the data is provided by the application

Data access methods

VSAM, BSAM, QSAM, and others; also HFS

File organization is application's responsibility.

File organization is application's responsibility; see also MVS.

Case sensitivity

MVS can require uppercase (as in JCL and data set names); sometimes it folds to uppercase (as in commands and parmlib parameters.)

Commands and file names are case sensitive.

Commands and file names are case sensitive.

Program language

supported

COBOL, HLL Assembler, PL/I, C/C++, Fortran, APL2, and others

C/C++, Java, and MicroFocus COBOL

C/C++, Java, HLL Assembler, PL/I.

Scripting language

TSO/E CLISTs and REXX execs

Shell scripts, Perl, TCL or TK, awk

Shell scripts, REXX execs, awk, and Perl

Online help

TSO/E HELP, ISPF help (PF1 key)

man (for manual) is a UNIX shell command that provides on-line help (called man pages) for shell commands and functions. Also, there is online help for Graphical User Interfaces and TaskGuides.

man provides on-line help for shell commands and functions. Also, OHELP (an interface to Book Manager) is a UNIX shell command that provides on-line help for the TSO/E UNIX commands.

Smallest element

that performs work

A task (represented by an MVS control block called a TCB). MVS supports multiple tasks.

A thread. The kernel supports multiple threads.

When users start a unit of work, they are executing a process, and functions like exec and fork create new processes. A process can have several threads.

A thread is implemented as a task. The kernel supports multiple threads in an address space.

When users start a unit of work, they are executing a process, and functions like exec and fork create new processes. A process can have several threads.

A long-run unit of work

A started task; sometimes a long-running job

A daemon

A daemon or a started task.

Order in which

the system

searches for

programs to run

The search order for programs in libraries is usually: TASKLIB, STEPLIB, JOBLIB, LPALST, and LNKLST.

Programs are loaded from the file system according to the user's PATH environmental variable (a list of directories to be searched). For dynamic link library (DLL) programs, programs are loaded from LIBPATH.

Programs are loaded from the file system according to the user's PATH environmental variable. If the kernel encounters a program with the sticky bit enabled, the search order reverts to the MVS search order.

Backups

Backups are done concurrently in the background on a single instance of the data, while other work continues to run with the required response times and service levels. Data being archived cannot change during the archive process.

An AIX system can mirror at the logical disk volume level. If a disk fails, it can be removed and a new disk added. This method is only available locally.

Another backup technique is to use tools that copy data to another media, usually tape. The tools require that data being archived not change during the archive process.

Backups and recoveries are done concurrently in the background, on a single instance of the data, while other work continues to run with the required response times and service levels. Data being archived cannot change during the archive process.

Backup and

recovery utilities

Hierarchical Storage Manager (DFSMShsm) and DFSMSdss elements; IBM product Automated Data Storage Management (ADSM).

The pax, tar, and cpio utilities.

The pax, tar, and cpio utilities, and ADSM.

Availability

of the system

Unscheduled outages are rare. Systems generally run fully available. When backups, database reorganizations, and other software housekeeping occur, they typically run concurrently alongside diverse production workloads, such as online processing, query, and web-serving.

Unscheduled outages tend to be more frequent on UNIX systems; the outages are tolerable if a reboot takes a short time and if backup and recovery procedures are not required to ensure the integrity of data. Reorganizations of databases might require a scheduled outage.

Unscheduled outages are rare. Systems generally run fully available. When backups, database reorganizations, and other software housekeeping occur, they typically run concurrently alongside diverse production workloads, such as online processing, query, and web-serving.

Assigning

physical

storage

Allocate storage using dynamic allocation (through ISPF), the TSO/E ALLOCATE command, and the DD statement in JCL.

A system administrator assigns file systems to logical volumes that are mapped to physical storage.

A system administrator allocates HFS data sets associated with file systems.

Accounting

for use

of

system

resource

SMF (system measurement facility) or a non-IBM product, at an address space level

AIX provides system accounting utilities.

SMF, at an address space level

Balancing

workload

Workload manager (WLM) policy or settings in parmlib members IEAICSxx and IEAIPSxx.

AIX uses process priorities that can be assigned by the nice command.

A WLM policy or settings in IEAIPSxx.

Monitoring

performance

The RMF element.

Performance tools check the hardware resources, CPU utilization, memory, I/O throughput, and disks.

Non-IBM vendor products provide monitoring tools that allow you to see what is going on and take actions against user processes. RMF only provides operator commands that allow you to view output on the system console.

Determining

problems

TSO TEST or the IBM Debug Tool that comes with the C/C++ element. MVS has console messages, a hardcopy log, dumps, and abend codes. You can set SLIP traps; also, you can use generalized trace facility (GTF) and component trace.

With JES2, use SDSF to view the system log.

Errnos, visual source-level debuggers, syslog, core dumps; also dbx symbolic debugger and errpt for system errors, and core dumps.

Errnos and errnojrs, which are return codes and reason codes, the dbx debugger, or VA Debugger for C/C++ and Java.The syslog daemon SYSLOGD creates the UNIX log, which you can browse; SYSLOGD stores log output in HFS files.Set SLIP traps to get dumps, identifying which jobname to set the trap for; component trace and LE dumps and utilities.

Managing product installation and service

The SMP/E element manages product iinstallation and service.

AIX system commands manage administrative operations. The system management interface tool (SMIT) is a menu interface to some of these commands.

SMP/E manages product installation and service

Using the system

interactively

Users log on to the system through TSO/E; the ISPF element provides a panel-driven interface to TSO/E. A userid can have only one logon session active at a time.

Users login to systems and execute shell sessions in the shell environment. They can issue rlogin and telnet commands to connect to an operating system.

Additionally, AIX users have a graphical interface called aixterm. AIX users can have many logins open at once.

OS/390 userids can use the rlogin and telnet commands and have multiple login sessions. Additionally, they can log on to TSO/E and enter the OMVS command.

Starting a program

to run in the background

Submit a batch job through the job's JCL.

Shell commands that use the "&" parameter; cron command

Shell commands that use the "&" parameter, cron, and the BPXBATCH interface to submit shell commands and utilities.

Scheduling a program

JES2, JES3, System Automation for OS/390

cron, programs (typically daemons) started at boot time, which are listed in /etc/inittab; also, the System Resource Controller (SRC) starts and restarts daemons.

cron or /etc/rc or another facility for starting and restarting daemons.

Starting a program

to run in the

foreground

You can use ISPF or TSO/E to run a job in the foreground.

Issue the name of the shell script or program.

Issue the name of the shell script or program.

Starting a process

Use an ATTACH or XCTL macro, invoke a CALL from an already-running program, EXECUTE in TSO/E, or submit a batch job.

fork/exec functions and p_thread create

fork/exec functions and p_thread create

Creating a new address space

ASCRE macro, logging on to TSO/E, issuing the START command, submitting a batch job, APPC, the scheduler, and WLM.

AIX does not have the same concept of address spaces as MVS does.

fork, sometimes spawn functions, or a login command start an address space.

Creating an

executable program

Program binder and compilers

makefiles, program binders, compilers, gnu, emacs, lexx, yacc, make

makefiles, program binders, compilers, lexx, yacc

Editing data or code

ISPF editor

Many editors exist, such as vi, ed, sed, and emacs.

vi, ed, oedit (an ISPF editor), and sed:

- Those coming from TSO/E would probably use oedit (in OMVS under TSO/E and ISPF).

- Those coming from UNIX could use vi (only from rlogin or telnet sessions).

To convert ASCII/EBCDIC, download and use nedit, an X Windows-based editor with a GUI interface. Emacs and Visula slickedit are available from vendors.

Managing programs

For JES2 users, the SDSF element allows you to view jobs and purge jobs.

The ps shell command allows you to view processes and threads, and kill jobs. The kill command terminates a process. To terminate an interactive process, use ctrl-C to send a SIGKILL interrupt to the process.

The ps shell command allows you to view processes and threads, and kill jobs. The kill command terminates a process. To terminate an interactive process, use ctrl-C to send a SIGKILL interrupt to the process. Also, SDSF.

Authorizing access to do certain function

FACILITY classes in RACF

Through the execute permission bit with UID and GID definitions.Also, access control lists through security mechanisms, such as Kerberos and DCE.

Through permission bits, UIDs, and GIDs. Use of UNIXPRIV FACILITY class grants certain privileges. There are no access control lists.

Serializing use of data

Global resource serialization, which processes RESERVE or ENQ/DEQ macros; latches and locks; compare and swap operations

byte-range locking of files

byte-range locking of files

Changing from unauthorized to authorized

supervisor call (SVC), PC instruction, or MODESET macro

setuid bit

setuid bit

Windows: Windows XP Command Line Tools - Xoc Software (RVBA Conventions, Maya Calendar, et.al.)

Windows: Windows XP Command Line Tools - Xoc Software (RVBA Conventions, Maya Calendar, et.al.):
"

You can examine the Windows XP command line tools by selecting Start Run, then typing:

hh.exe ntcmds.chm

This will start a help file that enumerates and gives details on all of the Windows XP command line tools. Most of these also apply to previous versions of Windows, such as Windows 2000.

Arp

Displays and modifies entries in the Address Resolution Protocol (ARP) cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter installed on your computer. Used without parameters, arp displays help.

Assoc

Displays or modifies file name extension associations. Used without parameters, assoc displays a list of all the current file name extension associations.

At

Schedules commands and programs to run on a computer at a specified time and date. You can use at only when the Schedule service is running. Used without parameters, at lists scheduled commands.

Atmadm

Monitors connections and addresses that are registered by the ATM Call Manager on an asynchronous transfer mode (ATM) network. You can use atmadm to display statistics for incoming and outgoing calls on ATM adapters. Used without parameters, atmadm displays statistics for monitoring the status of active ATM connections.

Attrib

Displays, sets, or removes the read-only, archive, system, and hidden attributes assigned to files or directories. Used without parameters, attrib displays attributes of all files in the current directory.

Batch files

With batch files, which are also called batch programs or scripts, you can simplify routine or repetitive tasks. A batch file is an unformatted text file that contains one or more commands and has a .bat or .cmd file name extension. When you type the file name at the command prompt, Cmd.exe runs the commands sequentially as they appear in the file.

Bootcfg

Configures, queries, or changes Boot.ini file settings.

Break Windows XP does not use this command. It is accepted only for compatibility with MS-DOS files.
Cacls

Displays or modifies discretionary access control list (DACL) files.

Call

Calls one batch program from another without stopping the parent batch program. The call command accepts labels as the target of the call. Call has no effect at the command-line when used outside of a script or batch file.

Change Terminal Services change commands
Chcp

Displays the number of the active console code page, or changes the console's active console code page. Used without parameters, chcp displays the number of the active console code page.

Chdir

Displays the name of the current directory or changes the current folder. Used with only a drive letter (for example, chdir C:), chdir displays the names of the current drive and folder. Used without parameters, chdir displays the current drive and directory.

Chkdsk

Creates and displays a status report for a disk based on the file system. Chkdsk also lists and corrects errors on the disk. Used without parameters, chkdsk displays the status of the disk in the current drive.

Chkntfs

Displays or specifies whether automatic system checking is scheduled to be run on a FAT, FAT32, or NTFS volume when the computer is started.

Cipher

Displays or alters the encryption of folders and files on NTFS volumes. Used without parameters, cipher displays the encryption state of the current folder and any files it contains.

Cls

Clears the Command Prompt window.

Cmd

Starts a new instance of the command interpreter, Cmd.exe. Used without parameters, cmd displays Windows XP version and copyright information.

Cmstp

Installs or removes a Connection Manager service profile. Used without optional parameters, cmstp installs a service profile with default settings appropriate to the operating system and to the user's permissions.

Color

Changes the Command Prompt window foreground and background colors for the current session. Used without parameters, color restores the default Command Prompt window foreground and background colors.

Comp

Compares the contents of two files or sets of files byte by byte. Comp can compare files on the same drive or on different drives, and in the same directory or in different directories. When comp compares the files, it displays their locations and file names. Used without parameters, comp prompts you to enter the files to compare.

Compact

Displays and alters the compression of files or directories on NTFS partitions. Used without parameters, compact displays the compression state of the current directory.

Convert

Converts FAT and FAT32 volumes to NTFS.

Copy

Copies one or more files from one location to another.

Cprofile

Cleans specified profiles of wasted space and, if user-specific file associations are disabled, removes these associations from the registry. Profiles that are currently in use are not modified.

CScript overview

Cscript.exe is a command-line version of the Windows Script Host that provides command-line options for setting script properties.

Date

Displays the current system date setting. Used without parameters, date displays the current system date setting and prompts you to type a new date.

Defrag

Locates and consolidates fragmented boot files, data files, and folders on local volumes.

Del

Deletes specified files.

Dir

Displays a list of a directory's files and subdirectories. Used without parameters, dir displays the disk's volume label and serial number, followed by a list of directories and files on the disk, including their names and the date and time each was last modified. For files, dir displays the name extension and the size in bytes. Dir also displays the total number of files and directories listed, their cumulative size, and the free space (in bytes) remaining on the disk.

Diskcomp

Compares the contents of two floppy disks. Used without parameters, diskcomp uses the current drive for both disks that you want to compare.

Diskcopy

Copies the contents of the floppy disk in the source drive to a formatted or unformatted floppy disk in the destination drive. Used without parameters, diskcopy uses the current drive for the source disk and the destination disk.

DiskPart

DiskPart.exe is a text-mode command interpreter that enables you to manage objects (disks, partitions, or volumes) by using scripts or direct input from a command prompt. Before you can use DiskPart.exe commands on a disk, partition, or volume, you must first list and then select the object to give it focus. When an object has focus, any DiskPart.exe commands that you type act on that object.

Doskey

Calls Doskey.exe, which recalls Windows XP commands, edits command lines, and creates macros.

Driverquery

Displays a list of all installed device drivers and their properties.

Echo

Turns the command-echoing feature on or off, or displays a message. Used without parameters, echo displays the current echo setting.

Endlocal

Ends localization of environment changes in a batch file, restoring environment variables to their values before the matching setlocal command.

Eventcreate

Enables an administrator to create a custom event in a specified event log.

Eventquery

Lists the events and event properties from one or more event logs.

Eventtriggers

Displays and configures event triggers on local or remote machines.

Evntcmd

Configures the translation of events to traps, trap destinations, or both based on information in a configuration file.

Exit

Exits the current batch script or the Cmd.exe program (that is, the command interpreter) and returns to the program that started Cmd.exe or to the Program Manager.

Expand

Expands one or more compressed files. This command is used to retrieve compressed files from distribution disks.

Fc

Compares two files and displays the differences between them.

Filter commands

Used in conjunction with the command redirection pipe character (|), a command filter is a command within a command that reads the command's input, transforms the input, and then writes the output. Filter commands help you sort, view, and select parts of a command output.

Find

Searches for a specific string of text in a file or files. After searching the specified file or files, find displays any lines of text that contain the specified string.

Findstr

Searches for patterns of text in files using regular expressions.

Finger

Displays information about a user or users on a specified remote computer (typically a computer running UNIX) that is running the Finger service or daemon. The remote computer specifies the format and output of the user information display. Used without parameters, finger displays help.

Flattemp

Enables or disables flat temporary folders.

For

Runs a specified command for each file in a set of files.

Format

Formats the disk in the specified volume to accept Windows files.

Fsutil

Fsutil is a command-line utility that you can use to perform many FAT and NTFS file system related tasks, such as managing reparse points, managing sparse files, dismounting a volume, or extending a volume. Because fsutil is quite powerful, it should only be used by advanced users who have a thorough knowledge of Windows XP. In addition, you must be logged on as an administrator or a member of the Administrators group in order to use fsutil.

Ftp

Transfers files to and from a computer running a File Transfer Protocol (FTP) server service such as Internet Information Services. Ftp can be used interactively or in batch mode by processing ASCII text files.

Ftp subcommands
Ftype

Displays or modifies file types used in file name extension associations. Used without parameters, ftype displays the file types that have open command strings defined.

Getmac

Returns the media access control (MAC) address and list of network protocols associated with each address for all network cards in each computer, either locally or across a network.

Goto

Within a batch program, directs Windows XP to a line identified by a label. When the label is found, it processes the commands that begin on the next line.

Gpresult

Displays Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer.

Gpupdate

Refreshes local and Active Directory�based Group Policy settings, including security settings. This command supersedes the now obsolete /refreshpolicy option for the secedit command.

Graftabl Enables the ability to display an extended character set in graphics mode.
Help

Provides online information about system commands (that is, non-network commands). Used without parameters, help lists and briefly describes every system command.

Helpctr

Starts Help and Support Center. Used without parameters, helpctr displays the Help and Support Center home page.

Hostname

Displays the host name portion of the full computer name of the computer.

If

Performs conditional processing in batch programs.

Ipconfig

Displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Used without parameters, ipconfig displays the IP address, subnet mask, and default gateway for all adapters.

Ipseccmd

Configures Internet Protocol Security (IPSec) policies in a directory service or in a local or remote registry. Ipseccmd is a command-line alternative to the IP Security Policies Microsoft Management Console (MMC) snap-in. Ipseccmd has three modes: dynamic mode, static mode, and query mode.

Ipxroute

Displays and modifies information about the routing tables used by the IPX protocol. Used without parameters, ipxroute displays the default settings for packets that are sent to unknown, broadcast, and multicast addresses.

Irftp

Sends files over an infrared link. Used without parameters or used with /s, irftp opens the Wireless Link dialog box, where you can select the files that you want to send without using the command line.

Label

Creates, changes, or deletes the volume label (that is, the name) of a disk. Used without parameters, label changes the current volume label or deletes the existing label.

Lodctr

Registers new Performance counter names and Explain text for a service or device driver, and saves and restores counter settings and Explain text.

Logman

Manages and schedules performance counter and event trace log collections on local and remote systems.

Lpq

Displays the status of a print queue on a computer running Line Printer Daemon (LPD). Used without parameters, lpq displays command-line help for the lpq command.

Lpr

Sends a file to a computer running Line Printer Daemon (LPD) in preparation for printing. Used without parameters, lpr displays command-line help for the lpr command.

Macfile

Use the macfile commands at the command prompt to manage File Server for Macintosh servers, volumes, directories, and files. You can automate administrative tasks by including a series of commands in batch files and starting them manually or at predetermined times.

Mkdir (md)

Creates a directory or subdirectory.

Mmc

Opens Microsoft Management Console (MMC). Using the mmc command-line options, you can open a specific MMC console, open MMC in author mode, or specify that the 32-bit or 64-bit version of MMC is opened..

Mode Displays system status, changes system settings, or reconfigures ports or devices. Used without parameters, mode displays all the controllable attributes of the console and the available COM devices. Because you can use mode to perform many different tasks, the syntax you need to use to carry out each task is different.
More

Displays one screen of output at a time.

Mountvol

Creates, deletes, or lists a volume mount point. Mountvol is a way to link volumes without requiring a drive letter.

Move

Moves one or more files from one directory to the specified directory.

MS-DOS subsystem configuration commands Windows XP includes 16-bit commands (nonnative) for the MS-DOS subsystem and other subsystems. These include older commands, such as edlin or graphics, and MS-DOS-specific commands, such as debug or exe2bin. These 16-bit commands are included to maintain MS-DOS and MS OS/2 version 1.x compatibility.

Other MS-DOS subsystem commands, such as share, perform functions that are now inherent to Windows XP or the MS-DOS subsystem. The commands are accepted to preserve compatibility with existing files, but they have no effect at the command line because the functionality is automatic.

Msiexec

Provides the means to install, modify, and perform operations on Windows Installer from the command line.

Msinfo32

Displays a comprehensive view of your hardware, system components, and software environment.

Nbtstat

Displays NetBIOS over TCP/IP (NetBT) protocol statistics, NetBIOS name tables for both the local computer and remote computers, and the NetBIOS name cache. Nbtstat allows a refresh of the NetBIOS name cache and the names registered with Windows Internet Name Service (WINS). Used without parameters, nbtstat displays help.

Net services overview Many services use networking commands that begin with the word net.
Net services commands Net services commands
Netsh command overview

Netsh is a command-line scripting utility that allows you to, either locally or remotely, display or modify the network configuration of a computer that is currently running. Netsh also provides a scripting feature that allows you to run a group of commands in batch mode against a specified computer. Netsh can also save a configuration script in a text file for archival purposes or to help you configure other servers.

Netsh commands for AAAA

You can use commands in the Netsh AAAA context to show and set the configuration of the authentication, authorization, accounting, and auditing (AAAA) database used by the Internet Authentication Service (IAS) and the Routing and Remote Access service. The AAAA database is also known as the IAS database (Ias.mdb). The primary use of commands in the Netsh AAAA context is to export the configuration of one IAS server as a Netsh script and then to import that configuration using the netsh exec command on another IAS server.

Netsh commands for DHCP The Netsh commands for DHCP offer a command-line tool that helps with the administration of DHCP servers and provides an equivalent alternative to console-based management.
Netsh diagnostic (diag) commands You can use the Netsh Network Diagnostics commands, or diag context, to administer and troubleshoot operating system and network service parameters from the command line.
Netsh commands for Interface IP

You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information.

Netsh commands for RAS

You can administer remote access servers by typing commands at the command prompt for the Netsh RAS context. By using the Netsh RAS command prompt, you can administer servers more quickly over slow network connections, and you can create scripts that automate the administration of many servers.

Netsh commands for Routing You can use the Netsh commands for Routing to administer routing servers from the command line, rather than through the Routing and Remote Access console.
Netsh commands for WINS The Netsh commands for WINS offer a command-line tool for administering WINS servers that can be used as an equivalent alternative to console-based management.
Netstat

Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, IPv4 statistics (for the IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for the IPv6, ICMPv6, TCP over IPv6, and UDP over IPv6 protocols). Used without parameters, netstat displays active TCP connections.

Nslookup

Displays information that you can use to diagnose Domain Name System (DNS) infrastructure. Before using this tool, you should be familiar with how DNS works. The Nslookup command-line tool is available only if you have installed the TCP/IP protocol.

Nslookup subcommands
Ntbackup

Perform backup operations at a command prompt or from a batch file using the ntbackup command followed by various parameters.

Ntcmdprompt

Runs the command interpreter Cmd.exe, rather than Command.com, after running a TSR or after starting the command prompt from within an MS-DOS application.

Ntsd

Ntsd is included as a courtesy to software developers. Only system developers should use this command. For more information, see the help file included with NTSD.

Openfiles

Queries or displays open files. Also queries, displays, or disconnects files opened by network users.

Pagefileconfig

Enables an administrator to display and configure a system's paging file Virtual Memory settings.

Path

Sets the command path in the PATH environment variable, which is the set of directories used to search for executable files. Used without parameters, path displays the current command path.

Pathping

Provides information about network latency and network loss at intermediate hops between a source and destination. Pathping sends multiple Echo Request messages to each router between a source and destination over a period of time and then computes results based on the packets returned from each router. Because pathping displays the degree of packet loss at any given router or link, you can determine which routers or subnets might be having network problems. Pathping performs the equivalent of the tracert command by identifying which routers are on the path. It then sends pings periodically to all of the routers over a specified time period and computes statistics based on the number returned from each. Used without parameters, pathping displays help.

Pause

Suspends processing of a batch program and displays a message prompting the user to press any key to continue.

Pbadmin

Administers phone books. Used without parameters, pbadmin starts Phone Book Administrator.

Pentnt

Detects floating point division error (if present) in the Pentium chip, disables floating point hardware, and turns on floating point emulation.

Perfmon

Allows you to open a Windows XP Performance console configured with settings files from Windows NT 4.0 version of Performance Monitor.

Ping

Verifies IP-level connectivity to another TCP/IP computer by sending Internet Control Message Protocol (ICMP) Echo Request messages. The receipt of corresponding Echo Reply messages are displayed, along with round-trip times. Ping is the primary TCP/IP command used to troubleshoot connectivity, reachability, and name resolution. Used without parameters, ping displays help.

Popd

Changes the current directory to the directory stored by the pushd command.

Print

Sends a text file to a printer.

Prncnfg

Configures or displays configuration information about a printer. Used without parameters, prncnfg.vbs displays command-line help for the prncnfg.vbs command.

Prndrvr

Adds, deletes, and lists printer drivers. Used without parameters, prndrvr.vbs displays command-line help for the prndrvr.vbs command.

Prnjobs

Pauses, resumes, cancels, and lists print jobs. Used without parameters, prnjobs.vbs displays command-line help for the prnjobs.vbs command.

Prnmngr

Adds, deletes, and lists printers or printer connections, in addition to setting and displaying the default printer. Used without parameters, prnmngr.vbs displays command-line help for the prnmngr.vbs command.

Prnport

Creates, deletes, and lists standard TCP/IP printer ports, in addition to displaying and changing port configuration. Used without parameters, prnport.vbs displays help for the prnport.vbs command.

Prnqctl

Prints a test page, pauses or resumes a printer, and clears a printer queue. Used without parameters, prnqctl.vbs displays command-line help for the prnqctl.vbs command.

Prompt

Changes the Cmd.exe prompt. Used without parameters, prompt resets the command prompt to the default setting, the current drive letter followed by the current directory and a greater-than symbol (>).

Pushd

Stores the name of the current directory for use by the popd command before changing the current directory to the specified directory.

Query Terminal Services query commands
Rasdial

Automates the connection process for any Microsoft client. Used without options, rasdial displays the status of current connections.

Rcp

Copies files between a Windows XP computer and a system running rshd, the remote shell service (daemon). Windows XP and Windows 2000 do not provide rshd service. Used without parameters, rcp displays help.

Recover

Recovers readable information from a bad or defective disk.

Redirection operators

You can use redirection operators to redirect command input and output streams from the default locations to different locations. The input or output stream location is referred to as a handle.

Reg

Adds, changes, and displays registry subkey information and values in registry entries.

Regsvr32

This command-line tool registers .dll files as command components in the registry.

Relog

Extracts performance counters from performance counter logs into other formats, such as text-TSV (for tab-delimited text), text-CSV (for comma-delimited text), binary-BIN, or SQL.

Rem

Enables you to include comments (remarks) in a batch file or in your configuration files.

Rename

Changes the name of a file or a set of files.

Replace

Replaces files in the destination directory with files in the source directory that have the same name. You can also use replace to add unique file names to the destination directory.

Reset session

Enables you to reset (delete) a session from the terminal server.

Rexec

Runs commands on remote computers running the Rexec service (daemon). The rexec command authenticates the user name on the remote computer before executing the specified command. Windows XP and Windows 2000 do not provide the Rexec service. Used without parameters, rexec displays help.

Rmdir (rd)

Removes (that is, deletes) a directory.

Route

Displays and modifies the entries in the local IP routing table. Used without parameters, route displays help.

Rsh

Runs commands on remote computers running the RSH service or daemon. Windows XP and Windows 2000 do not provide an RSH service. An RSH service called Rshsvc.exe is provided with the Windows 2000 Server Resource Kit. Used without parameters, rsh displays help.

Rsm

Manages media resources using Removable Storage. Using the rsm command, you can run batch scripts for applications that do not currently support the Removable Storage API.

Runas

Allows a user to run specific tools and programs with different permissions than the user's current logon provides.

Sc

Communicates with the Service Controller and installed services. SC.exe retrieves and sets control information about services. You can use SC.exe for testing and debugging service programs. Service properties stored in the registry can be set to control how service applications are started at boot time and run as background processes. SC.exe parameters can configure a specific service, retrieve the current status of a service, as well as stop and start a service. You can create batch files that call various SC.exe commands to automate the startup or shutdown sequence of services. SC.exe provides capabilities similar to Services in the Administrative Tools item in Control Panel.

Schtasks

Schedules commands and programs to run periodically or at a specific time. Adds and removes tasks from the schedule, starts and stops tasks on demand, and displays and changes scheduled tasks.

Secedit

Configures and analyzes system security by comparing your current configuration to at least one template.

Set

Displays, sets, or removes environment variables. Used without parameters, set displays the current environment settings.

Setlocal

Starts localization of environment variables in a batch file. Localization continues until a matching endlocal command is encountered or the end of the batch file is reached.

Shift

Changes the position of batch parameters in a batch file.

Shutdown

Allows you to shut down or restart a local or remote computer. Used without parameters, shutdown will logoff the current user.

Sort

Reads input, sorts data, and writes the results to the screen, to a file, or to another device

Start

Starts a separate Command Prompt window to run a specified program or command. Used without parameters, start opens a second command prompt window.

Subst

Associates a path with a drive letter. Used without parameters, subst displays the names of the virtual drives in effect.

Systeminfo

Displays detailed configuration information about a computer and its operating system, including operating system configuration, security information, product ID, and hardware properties, such as RAM, disk space, and network cards.

System File Checker (sfc)

Scans and verifies the versions of all protected system files after you restart your computer.

Taskkill

Ends one or more tasks or processes. Processes can be killed by process ID or image name.

Tasklist

Displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer.

Tcmsetup

Sets up or disables the TAPI client.

TCP/IP utilities and services

TCP/IP utilities offer network connections to other computers, such as UNIX workstations. You must have the TCP/IP network protocol installed to use the TCP/IP utilities. For information about starting TCP/IP services from the command prompt, see Net start<. For information about stopping TCP/IP services from the command prompt, see Net stop<.

Telnet commands

The telnet commands allow you to communicate with a remote computer that is using the Telnet protocol. You can run telnet without parameters in order to enter the telnet context, indicated by the Telnet prompt (telnet>). From the Telnet prompt, use the following commands to manage a computer running Telnet Client.

Terminal Services commands
Tftp

Transfers files to and from a remote computer, typically a computer running UNIX, that is running the Trivial File Transfer Protocol (TFTP) service or daemon. Used without parameters, tftp displays help.

Time

Displays or sets the system time. Used without parameters, time displays the system time and prompts you to enter a new time.

Title

Creates a title for the command prompt window.

Tracerpt

Processes event trace logs or real-time data from instrumented event trace providers and allows you to generate trace analysis reports and CSV (comma-delimited) files for the events generated.

Tracert

Determines the path taken to a destination by sending Internet Control Message Protocol (ICMP) Echo Request messages to the destination with incrementally increasing Time to Live (TTL) field values. The path displayed is the list of near-side router interfaces of the routers in the path between a source host and a destination. The near-side interface is the interface of the router that is closest to the sending host in the path. Used without parameters, tracert displays help.

Tree

Graphically displays the directory structure of a path or of the disk in a drive.

Type

Displays the contents of a text file. Use the type command to view a text file without modifying it.

Typeperf

Writes performance counter data to the command window, or to a supported log file format. To stop Typeperf, press CTRL+C.

Unlodctr

Removes Performance counter names and Explain text for a service or device driver from the system registry.

Ver

Displays the Windows XP version number.

Verify Windows XP does not use this command. It is accepted only for compatibility with MS-DOS files.
Vol

Displays the disk volume label and serial number, if they exist. A serial number is displayed for a disk formatted with MS-DOS version 4.0 or later.

Vssadmin

Displays current volume shadow copy backups and all installed shadow copy writers and providers in the command window.

W32tm

A tool used to diagnose problems occuring with Windows Time

Winnt

Performs an installation of or upgrade to Windows XP. If you have hardware that is compatible with Windows XP, you can run winnt at a Windows 3.x or MS-DOS command prompt.

Winnt32

Performs an installation of or upgrade to Windows XP. You can run winnt32 at the command prompt on a computer running Windows 95, Windows 98, Windows Millennium Edition, Windows NT, Windows 2000, or Windows XP.

WMIC overview

The Windows Management Instrumentation Command-line (WMIC) is a command-line and scripting interface that simplifies the use of Windows Management Instrumentation (WMI) and systems managed through WMI.

Xcopy

Copies files and directories, including subdirectories.