The Net View command is a command that you can use to test TCP/IP connec-
tions. To use the command, log on with the proper credentials that are required to
view shares on a remote or local computer, open a command prompt, and type
net view \\ComputerName or net view \\IP Address.
The resulting report lists the file and print shares on the computer. If there are no file or print shares on the computer, you see the message There Are No Entries In The List.
Do you want to fix your pc problems yourself ? Maybe I can help :)
Tuesday, June 30, 2009
Monday, June 29, 2009
File Encription with Cipher
The Cipher command provides the capability to encrypt and decrypt files and folders
from a command prompt. The following example shows the available switches for the
Cipher command:
cipher [/e | /d] [/s:folder_name] [/a] [/i] [/f] [/q] [/h] [/k] [file_name [...]]
/e Encrypts the specified folders. Folders are marked so any files that are added later are encrypted.
/d Decrypts the specified folders. Folders are marked so any files that are added later are not encrypted.
/s Performs the specified operation on files in the given folder and all subfolders.
/a Performs the specified operation on files as well as folders. Encrypted files could be decrypted when modified if the parent folder is not encrypted. Encrypt the file and the parent folder to avoid problems.
/i Continues performing the specified operation even after errors have occurred. By default, Cipher stops when an error is encountered.
/f Forces the encryption operation on all specified files, even those that are already encrypted. Files that are already encrypted are skipped by default.
/q Reports only the most essential information.
/h Displays files with the hidden or system attributes, which are not shown by
default.
/k Creates a new file encryption key for the user running the Cipher command. Using this option causes the Cipher command to ignore all other options.
file_name specifies a pattern, file, or folder.
from a command prompt. The following example shows the available switches for the
Cipher command:
cipher [/e | /d] [/s:folder_name] [/a] [/i] [/f] [/q] [/h] [/k] [file_name [...]]
/e Encrypts the specified folders. Folders are marked so any files that are added later are encrypted.
/d Decrypts the specified folders. Folders are marked so any files that are added later are not encrypted.
/s Performs the specified operation on files in the given folder and all subfolders.
/a Performs the specified operation on files as well as folders. Encrypted files could be decrypted when modified if the parent folder is not encrypted. Encrypt the file and the parent folder to avoid problems.
/i Continues performing the specified operation even after errors have occurred. By default, Cipher stops when an error is encountered.
/f Forces the encryption operation on all specified files, even those that are already encrypted. Files that are already encrypted are skipped by default.
/q Reports only the most essential information.
/h Displays files with the hidden or system attributes, which are not shown by
default.
/k Creates a new file encryption key for the user running the Cipher command. Using this option causes the Cipher command to ignore all other options.
file_name specifies a pattern, file, or folder.
Labels:
windows
Saturday, June 27, 2009
Create a Run Shortcut
You can create a shortcut to the Run command. Simply select the Run command on the Start menu, and drag it to the Quick Launch toolbar or to Desktop. The new shortcut uses the same icon, so it's easy to identify.
Labels:
windows
Friday, June 26, 2009
Hot to use Run As in Comman Prompt
About runas
Enables a user to execute a program on another computer as yourself or as another user.
syntax
RUNAS [/profile] [/env] [/netonly] /user: program
/profile if the user's profile needs to be loaded
/env to use current environment instead of user's.
/netonly use if the credentials specified are for remote access only.
/user should be in form USER@DOMAIN or DOMAIN\USER
program command line for EXE. See below for examples
Examples:
runas /profile /user:mymachinename\administrator cmd
runas /profile /env /user:mydomain\admin "mmc %windir%\system32\gpedit.msc"
runas /env /user:user@domain.microsoft.com "notepad \"my file.txt\""
Enables a user to execute a program on another computer as yourself or as another user.
syntax
RUNAS [/profile] [/env] [/netonly] /user:
/profile if the user's profile needs to be loaded
/env to use current environment instead of user's.
/netonly use if the credentials specified are for remote access only.
/user
program command line for EXE. See below for examples
Examples:
runas /profile /user:mymachinename\administrator cmd
runas /profile /env /user:mydomain\admin "mmc %windir%\system32\gpedit.msc"
runas /env /user:user@domain.microsoft.com "notepad \"my file.txt\""
Labels:
windows
How to permit restricted users to creat shared folders
Create permanent shared objects
This user right determines which accounts can be used by processes to create a directory object in the Windows 2000 Server, Windows 2000 Professional, Windows XP Professional, and Windows Server 2003 family object manager.
You can configure this security setting by opening the appropriate group policy object and expanding the console tree as such: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create Permanent Shared Objects (add users group or domain users group).Reboot PC done.
This user right determines which accounts can be used by processes to create a directory object in the Windows 2000 Server, Windows 2000 Professional, Windows XP Professional, and Windows Server 2003 family object manager.
You can configure this security setting by opening the appropriate group policy object and expanding the console tree as such: Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment\Create Permanent Shared Objects (add users group or domain users group).Reboot PC done.
Labels:
windows
Tuesday, June 2, 2009
How to use 7 zip in ubuntu linux
Type: sudo aptitude install p7zip p7zip-full p7zip-rar
You can Right Click and Extract or in Shell .
How to extract files in Shell:
Extracting
Extracting is simple. From the shale, navigate to the folder where the arhive(rar,zip etc.) are located (type "cd /path/to/folder" for example without quotes). Then, type:
7z x YourFileName.rar
If your archive is split into multiple volumes, specify the lowest numbered volume.
7z x YourFileName.7z.001
If you want to extract to another location simply add "-o" follow by that location to the end of the command:
7z x FileName.7z -o/home/user/Desktop/foldername
You can Right Click and Extract or in Shell .
How to extract files in Shell:
Extracting
Extracting is simple. From the shale, navigate to the folder where the arhive(rar,zip etc.) are located (type "cd /path/to/folder" for example without quotes). Then, type:
7z x YourFileName.rar
If your archive is split into multiple volumes, specify the lowest numbered volume.
7z x YourFileName.7z.001
If you want to extract to another location simply add "-o" follow by that location to the end of the command:
7z x FileName.7z -o/home/user/Desktop/foldername
Labels:
linux
Subscribe to:
Posts (Atom)