THE SCHOOL OF CISCO NETWORKING (SCN): USEFUL NETWORKING DOS COMMAND REFERENCE:
Contact No:   ### / ###/ ###
Welcome To The IT Knowledge Base Sharing Freeway "Study With The Zero Fees / Zero Money" Web - If We Believe, That If We Have Knowledge, Let Others Light Their Candles With It. - Our Motivation Has Brought Us Together To Offer Our Helping Hands To The Needy Ones Please. "Student Expectations And Satisfaction Is Always Our Highest Priority")

'Love All, Serve All, Help Ever Hurt Never'

Please Welcome To The "Zero Fees And Zero Money SCN Community Study Page"

We Like To Share Our Stuff With Everyone And Hope You Will Find Something Useful Here. Enjoy Our Collection And Come Back Again And Again, We'll Do Our Best To Make It Always Interesting For You. All Our Stuff Always Available May Be 100% Totally Freely. Use Only For Non-Commercial Purposes Only!

THE SCHOOL OF CISCO NETWORKING (SCN) Is A IT Support Community – Based, Non - Profit Volunteer Organizations, Offering Our Assistance And Support To Developmental Our Services Dedicated To All.

Because Large Section Of Our Students In This World, Especially In Villages, Who Are Under Privileged Expecting For Equal Opportunity In Terms Of Money And Education. We Feel The Sufferings Of Talented Students Losing Their Opportunity To Shine Because Of Their Poor Financial Status. So We Thought That Professional Education Will Be Providing Them Freely.

Our Web Site Is To Give An Easy Way To Understand Each And Every Student Who Are Going To Start CISCO Lab Practice Without Any Doubts And Our ARTICLES STUFF Are Always 100% Totally Free For Everyone, Which Is Belongings To THE SCHOOL OF CISCO NETWORKING (SCN).

Also This Guide Provides Technical Guidance Intended To Help All Network Students, Network Administrators And Security Officers Improve Of Their Demonstrated Ability To Achieve Specific objectives Within Set Timeframes.

Hands - On Experience Is An Invaluable Part Of Preparing For The Lab Exam And Never Pass Up An Opportunity To Configure Or Troubleshoot A Router ( If You Have Access To Lab Facilities, Take Full Advantage Of Them) There Is No Replacement For The Experience You Can Gain From Working In A Lab, Where You Can Configure Whatever You Want To Configure And Introduce Whatever Problems You Want To Introduce, Without Risk Of Disrupting A Production Network.

For Better View Of Our Web Page - Please Use Any Latest Web Browser, Such As (Mozilla Firefox, Google Chrome, Opera, Safari, Internet Explorer, Torch, Maxthon, Sea Monkey, Avant Browser, Deepnet Explorer, And Etc ), Because Some Elements Or Scripts Are Not Work In The Old Web Browser (It Might Not Be Displayed Properly Or Are Not Appearing properly!). Thank You For Your Time And Best Of Luck!

Your Sincerely – Premakumar Thevathasan.
"Our Motivation Has Brought Us Together To Offer Our Helping Hands To The Needy Once Please,Thank You."

USEFUL NETWORKING DOS COMMAND REFERENCE:


Some course material on the Teaching Network may still use the command line operating system called DOS (Disk Operating System). This requires the user to type specific
Commands at a prompt.

INTRODUCTION:

The command interpreter for MS DOS runs when no application programs are running. When an application exits, if the command interpreter in memory was overwritten, MS DOS will re-load it from disk. The command interpreter is usually stored in a file called "COMMAND.COM". Some commands are built-into COMMAND.COM; others are stored on disk in the same way as application programs.

Resident commands varied slightly between revisions of MS DOS. Typically, the functions DIR (list directory), ERASE, or DEL (erase a file or directory), COPY (copy files), DATE (display or set date), TIME (display or set time), CD (change working directory), MD (make a directory on the current disk), REN (rename a file or directory) and some others were resident in COMMAND.COM.

FIRST WE ARE GOING TO SEE THE USEFUL NETWORKING DOS COMMAND BELOW:

The Various Network Related Commands Used In MS-DOS, Windows, Linux, UNIX, And Other Operating Systems, Such As:

IPCONFIG:

ipconfig – Windows IP Configuration
This has to the DOS command I use most today. ipconfig will tell you the IP settings for the current computer such as what your current IP is and what subnet/gateway you are on. It is great for troubleshooting. Here are the two most useful commands for ipconfig and usage:

ipconfig /release – This will release any IP information that the computer was given and make your IP address 0.0.0.0
ipconfig /renew – This will ask any DHCP servers (usually your modem/router) for a new IP address.

Examples:

To get your computers local network IP address, subnet mask, and default gateway typing ipconfig alone will display this information as shown below. Keep in mind this is only your local network information.

ipconfig
Ethernet adapter Local Area Connection:

Connection-specific DNS Suffix . : hsd1.ut.comcast.net.
IP Address. . . . . . . . . . . . : 192.168.201.245
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 192.168.201.1
To get all local network information for your computer use the /all switch as shown below, followed by the results that would be seen when using this command.

ipconfig /all

Windows IP Configuration



NETSTAT:

The netstat command is used to display the TCP/IP network protocol statistics and information

netstat – Displays current TCP/IP connections
 
netstat – Will display what connections are currently active on the system. Useful for spotting programs calling back to base such as spyware.
 
NETSTAT.exe      TCP/IP Network Statistics
 
Displays protocol statistics and current TCP/IP network connections.
 
NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]
 
  -a         Displays all connections and listening ports.
 
  -e         Displays Ethernet statistics.  This may be combined with the
             -s option.
 
  -n         Displays addresses and port numbers in numerical form.
 
  -p proto   Shows connections for the protocol specified by proto; proto
             may be TCP or UDP.  If used with the -s option to display
             per-protocol statistics, proto may be TCP, UDP, or IP.
 
  -r         Displays the routing table.
 
  -s         Displays per-protocol statistics.  By default, statistics
             are shown for TCP, UDP and IP; the -p option may be used
             to specify a subset of the default.
 
  interval   Redisplays selected statistics, pausing interval seconds
             between each display.  Press CTRL+C to stop redisplaying
             statistics.  If omitted, netstat will print the current
             configuration information once.


First, I would recommend that you always use the '-a' parameter so you can see UDP 'listening ports' as well (often used by trojans), and not just the active TCP connections; then switch between using the '-a' and no parameters at all, to see the differences. 

When you're offline, you normally shouldn't see any connection data! If you do see an OPEN PORT NUMBER 'listening' for a connection (using the '-a' parameter), it may be that your computer has been infected with a trojan!   Click this link for a few more ideas on how you can check to see if your computer is Trojan Free?

If you're running a server, such as the free XITAMI server, you might see something like this ("My_Comp" is the name of my computer):
 
C:\WINDOWS>netstat -a
 
Active Connections
 
  Proto  Local Address          Foreign Address        State
  TCP    My_Comp:ftp            localhost:0            LISTENING
  TCP    My_Comp:80             localhost:0            LISTENING

Or with the "-an" parameters:
 
C:\WINDOWS>netstat -an
 
Active Connections
 
  Proto  Local Address          Foreign Address        State
  TCP    0.0.0.0:21             0.0.0.0:0              LISTENING
  TCP    0.0.0.0:80             0.0.0.0:0              LISTENING

By simply opening a browser connection to both the HTTP (port 80) and FTP (port 21) servers (while still offline!), I saw the following:
 
C:\WINDOWS>netstat -a
 
Active Connections
 
  Proto  Local Address          Foreign Address        State
  TCP    My_Comp:ftp            localhost:0            LISTENING
  TCP    My_Comp:80             localhost:0            LISTENING
  TCP    My_Comp:1104           localhost:0            LISTENING
  TCP    My_Comp:ftp            localhost:1104         ESTABLISHED
  TCP    My_Comp:1102           localhost:0            LISTENING
  TCP    My_Comp:1103           localhost:0            LISTENING
  TCP    My_Comp:80             localhost:1111         TIME_WAIT
  TCP    My_Comp:1104           localhost:ftp          ESTABLISHED
  TCP    My_Comp:1107           localhost:0            LISTENING
  TCP    My_Comp:1112           localhost:80           TIME_WAIT
  UDP    My_Comp:1102           *:*
  UDP    My_Comp:1103           *:*
  UDP    My_Comp:1107           *:*

This may be a bit confusing to some people, but remember I'm running BOTH the servers and clients on the same machine in these examples. A little later (using both 'a' and 'n') I got this:
 
C:\WINDOWS>netstat -an
 
Active Connections
 
  Proto  Local Address          Foreign Address        State
  TCP    0.0.0.0:21                  0.0.0.0:0              LISTENING
  TCP    0.0.0.0:80                  0.0.0.0:0              LISTENING
  TCP    0.0.0.0:1104              0.0.0.0:0              LISTENING
  TCP    127.0.0.1:21            127.0.0.1:1104     FIN_WAIT_2
  TCP    127.0.0.1:1102         0.0.0.0:0              LISTENING
  TCP    127.0.0.1:1103         0.0.0.0:0              LISTENING
  TCP    127.0.0.1:1104         127.0.0.1:21           CLOSE_WAIT
  TCP    127.0.0.1:1107         0.0.0.0:0              LISTENING
  UDP    127.0.0.1:1102         *:*
  UDP    127.0.0.1:1103         *:*
  UDP    127.0.0.1:1107         *:*

After turning off my server, I ended up with this for a while:
 
C:\WINDOWS>netstat -an
 
Active Connections
 
  Proto  Local Address          Foreign Address        State
  TCP    127.0.0.1:80           127.0.0.1:1150         TIME_WAIT
  TCP    127.0.0.1:80           127.0.0.1:1151         TIME_WAIT

PING:
PING – Check a connection or computer



Ping is used to check the health of a connection. The ping command will tell you whether a network device is responding and how fast it is running. The ping tool can also be used to convert a web address into an IP (eg. www.google.com = 74.125.19.99). Usage:
 
ping www.google.comPings a webserver to see if it can be reached or is responding. I personally use this to see if the computer I am on can reach the internet.
 
ping 192.168.0.1Pings a local address, often a modem, router or another computer.

Ping is one of the most commonly used and known commands. Ping allows a user to ping another network IP address. This can help determine if the network is able to communicate with the network.
C:\PING 192.168.10.9
PING.exe
 
Usage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
            [-r count] [-s count] [[-j host-list] | [-k host-list]]
            [-w timeout] destination-list
 
Options:
    -t             Ping the specifed host until interrupted.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -l size        Send buffer size.
    -f             Set "Don't Fragment" flag in packet.
    -i TTL         Time To Live.
    -v TOS         Type Of Service.
    -r count       Record route for count hops.
    -s count       Timestamp for count hops.
    -j host-list   Loose source route along host-list.
    -k host-list   Strict source route along host-list.
    -w timeout     Timeout in milliseconds to wait for each reply.

There's one special IP number everyone should know about:

127.0.0.1 - localhost (or loopback).

This is used to connect ( through a browser, for example) to a Web server on your own computer. (127 being reserved for this purpose.) You can use this IP number at all times. It doesn't matter if you're connected to the Internet or not.

It's also called the loopback address because you can ping it and get returns even when you're offline (not connected to any network). If you don't get any valid replies, then there's a problem with the computer's Network settings. Here's a typical response to the 'ping' command:
C:\PING 127.0.0.1 (LOOPBACK PING)
Here's another recent example using the name of my computer which I have tied to the IP number 127.0.0.1 in my C:\WINDOWS\HOSTS file:
 
C:\WINDOWS>ping My_Comp
 
Pinging My_Comp [127.0.0.1] with 32 bytes of data:
 
Reply from 127.0.0.1: bytes=32 time=1ms TTL=128
Reply from 127.0.0.1: bytes=32 time=1ms TTL=128
Reply from 127.0.0.1: bytes=32 time<10ms TTL=128
Reply from 127.0.0.1: bytes=32 time=1ms TTL=128
 
Ping statistics for 127.0.0.1:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum =  1ms, Average =  0ms


TRACERT / TRACEROUTE:

The tracert command in MS-DOS / Windows or the traceroute command in Unix / Linux and variants is another commonly used network command to help determine network related issues or slowdowns.
Using this command you can view a listing of how a network packet travels through the network and where it may fail or slow down. 

Using this information you can determine the computer, router, switch or other network device possibly causing your network issues.
 
TRACERT.exe           Trace Route
 
Usage: 
tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] target_name
 
Options:
    -d                 Do not resolve addresses to hostnames.
    -h maximum_hops    Maximum number of hops to search for target.
    -j host-list       Loose source route along host-list.
    -w timeout         Wait timeout milliseconds for each reply.

Example: which traces the route from some ISP in Los Angeles to the main server at UCLA in California ( note how two computers relatively close to each other may be routed way round about! ):
 
C:\WINDOWS>tracert www.yahoo.com
 
Tracing route to www.ucla.edu [169.232.33.129]
over a maximum of 30 hops:
 
  1   141 ms   132 ms   140 ms  wla-ca-pm6.icg.net [165.236.29.85]
  2   134 ms   131 ms   139 ms  whv-ca-gw1.icg.net [165.236.29.65]
  3   157 ms   132 ms   143 ms  f3-1-0.lai-ca-gw1.icg.net [165.236.24.89]
  4   194 ms   193 ms   188 ms  a0-0-0-1.dai-tx-gw1.icg.net [163.179.235.61]
  5   300 ms   211 ms   214 ms  a1-1-0-1.ati-ga-gw1.icg.net [163.179.235.186]
  6   236 ms   237 ms   247 ms  a5-0-0-1.was-dc-gw1.icg.net [163.179.235.129]
  7   258 ms   236 ms   244 ms  163.179.243.205
  8   231 ms   233 ms   230 ms  wdc-brdr-03.inet.qwest.net [205.171.4.153]
  9   240 ms   230 ms   236 ms  wdc-core-03.inet.qwest.net [205.171.24.69]
 10   262 ms   264 ms   263 ms  hou-core-01.inet.qwest.net [205.171.5.187]
 11   281 ms   263 ms   259 ms  hou-core-03.inet.qwest.net [205.171.23.9]
 12   272 ms   229 ms   222 ms  lax-core-02.inet.qwest.net [205.171.5.163]
 13   230 ms   217 ms   230 ms  lax-edge-07.inet.qwest.net [205.171.19.58]
 14   228 ms   219 ms   220 ms  63-145-160-42.cust.qwest.net [63.145.160.42]
 15   218 ms   222 ms   218 ms  ISI-7507--ISI.POS.calren2.net [198.32.248.21]
 16   232 ms   222 ms   214 ms  UCLA--ISI.POS.calren2.net [198.32.248.30]
 17   234 ms   226 ms   226 ms  cbn5-gsr.calren2.ucla.edu [169.232.1.18]
 18   245 ms   227 ms   235 ms  www.ucla.edu [169.232.33.129]
 
Trace complete.

    Note: Unless you're running a network, the following commands won't be of much use to you.

    Furthermore, if you're concerned about Security, my advice is to NEVER use NetBIOS on a computer that connects to the Internet.


NBTSTAT:

The nbtstat MS-DOS utility that displays protocol statistics and current TCP/IP connections using NBT.
NBTSTAT.exe         Net Bios Stats
 
Displays protocol statistics and current TCP/IP connections using NBT
(NetBIOS over TCP/IP).
 
NBTSTAT [-a RemoteName] [-A IP address] [-c] [-n] [-r] [-R] [-s] [S]
        [interval]
 
  -a   (adapter status) Lists the remote machine's name table given its
                        name.
  -A   (Adapter status) Lists the remote machine's name table given its
                        IP address.
 
  -c   (cache)          Lists the remote name cache including the IP
                        addresses.
 
  -n   (names)          Lists local NetBIOS names.
 
  -r   (resolved)       Lists names resolved by broadcast and via WINS
 
  -R   (Reload)         Purges and reloads the remote cache name table
 
  -S   (Sessions)       Lists sessions table with the destination IP
                        addresses.
 
  -s   (sessions)       Lists sessions table converting destination IP
                        addresses to host names via the hosts file.
 
    RemoteName   Remote host machine name.
    IP address   Dotted decimal representation of the IP address.
 
    interval     Redisplays selected statistics, pausing interval seconds
                 between each display. Press Ctrl+C to stop redisplaying
                 statistics.


ROUTE:

The route MS-DOS utility enables computers to view and modify the computer's route table.
ROUTE.exe
 
Manipulates network routing tables.
 
ROUTE [-f] [command [destination] [MASK netmask] [gateway]]
 
 
 
  -f      Clears the routing tables of all gateway entries.  If this is
          used in conjunction with one of the commands, the tables are
          Cleared prior to running the command.
 
  Command      Specifies one of four commands
 
                 PRINT     Prints a route
                 ADD       Adds a route
                 DELETE    Deletes a route
                 CHANGE    Modifies an existing route
 
  destination  Specifies the host to send command.
 
  MASK         If the MASK keyword is present, the next parameter is
                      interpreted as the netmask parameter.
 
  netmask      If provided, specifies a sub-net mask value to be associated
                      with this route entry.  If not specified, if defaults to
                      255.255.255.255.
 
  gateway      Specifies gateway.
 
 All symbolic names used for destination or gateway are looked up in the
 network and host name database files NETWORKS and HOSTS, respectively.
 If the command is print or delete, wildcards may be used for the
 destination and gateway, or the gateway argument may be omitted.
 
Examples:

> route PRINT
>route  ADD 157.0.0.0
                     ^destination
MASK 255.0.0.0
             ^mask
    157.55.80.1  
    ^gateway
METRIC 3
               ^metric
IF 2
     ^Interface

If IF is not given, it tries to find the best interface for a given gateway.

> route PRINT
> route PRINT 157* .... Only prints those matching 157*
> route DELETE 157.0.0.0
> route PRINT

One way to use this would be as follows: You can't ping the server that you are connecting to, but you know the ip address to be 127.16.16.10

>route PRINT

Interface List
0x1 ........................... MS TCP Loopback interface
0x2 ...00 14 a4 c3 44 20 ...... Xircom CardBus Ethernet 10/100 Adapter
0x3 ...00 b0 d0 43 55 a5 ...... 3Com EtherLink PCI
0x4 ...00 01 b0 8f 8f 80 ...... NdisWan Adapter
Active Routes:
 
Network Destination Netmask Gateway Interface Metric
 
0.0.0.0 0.0.0.0 127.16.8.14 127.16.8.14 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.16.0.0 255.255.0.0 127.16.8.14 127.16.8.14 1
127.16.8.14 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.50.0 255.255.255.0 192.168.50.65 192.168.50.65 2
192.168.50.65 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.50.255 255.255.255.255 192.168.50.65 192.168.50.65 1
224.0.0.0 224.0.0.0 127.16.8.14 127.16.8.14 1
224.0.0.0 224.0.0.0 192.168.50.65 192.168.50.65 1
255.255.255.255 255.255.255.255 192.168.50.65 192.168.50.65 1
** notice that no gateway for the current ip goes to 255.255.255.0, so it must be added. Now do the below command.
>route ADD 127.16.0.0 MASK 255.255.255.0 METRIC 1
**Then do the below command:
>route print

Active Routes:
 
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 127.16.8.14 127.16.8.14 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
127.16.0.0 255.255.0.0 127.16.8.14 127.16.8.14 1
** 127.16.0.0 255.255.255.0 127.16.8.14 127.16.8.14 1
127.16.8.14 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.50.0 255.255.255.0 192.168.50.65 192.168.50.65 2
192.168.50.65 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.50.255 255.255.255.255 192.168.50.65 192.168.50.65 1
224.0.0.0 224.0.0.0 127.16.8.14 127.16.8.14 1
224.0.0.0 224.0.0.0 192.168.50.65 192.168.50.65 1
255.255.255.255 255.255.255.255 192.168.50.65 192.168.50.65 1
**Notice the ** ip address gives me the default gateway.
 


ARP:

Display or manipulate the ARP information on a network device or computer.
 
ARP.exe      Address Resolution Protocol
 
ARP -s inet_addr eth_addr [if_addr]
ARP -d inet_addr [if_addr]
ARP -a [inet_addr] [-N if_addr]
 
 -a           Displays current ARP entries by interrogating the current
         protocol data.  If inet_addr is specified, the IP and Physical
         addresses for only the specified computer are displayed.  If
         more than one network interface uses ARP, entries for each ARP
         table are displayed.
 -g                             (Same as -a)
 
  inet_addr   Specifies an internet address.
 
 -N if_addr   Displays the ARP entries for the network interface
              specified by if_addr.
 
 -d           Deletes the host specified by inet_addr.
 
 -s        Adds the host and associates the Internet address inet_addr
         with the Physical address eth_addr.  The Physical address is
         given as 6 hexadecimal bytes separated by hyphens. The entry
         is permanent.
 
  eth_addr    Specifies a physical address.
 
   if_addr    If present, this specifies the Internet address of the
              interface whose address translation table should be
              modified.  If not present, the first applicable interface
              will be used.


FINGER:

The finger command available in Unix / Linux variants allows a user to find sometimes personal information about a user. This information can include the last time the user logged in, when they read their e-mail, etc... If the user creates a .PLAN or other related file the user can also display additional information.



NBTSTAT:

The nbtstat MS-DOS utility that displays protocol statistics and current TCP/IP connections using NBT.
Examples:
nbtstat -a 204.224.150.3

----------------------------------------------

PATHPING:
  
Pathping is a MS-DOS utility available for Microsoft Windows 2000 and Windows XP users. This utility enables a user to find network latency and network loss.

Examples:

pathping computerhope.com
Tracing route to computerhope.com [204.228.150.3]
over a maximum of 30 hops:
 
0 Hope [192.168.120.101]
1 192.168.120.254
2 ...
Computing statistics for 50 seconds...

Hop

RTT
Source to Here
Lost/Sent = Pct
This Node/Link
Lost/Sent = Pct

Address
0

1

2


 0ms

---


0/ 100 = 0%

100/100 = 100%

0/100 = 0%
0/100 = 0%
100/100 = 100%
0/100 = 0%
0 Hope [192.168.120.101]
  |
192.168.120.254
  |
Hope [0.0.0.0]
Trace complete.
-------------------------------------------------------------

NET:

The net command is available in MS-DOS / Windows and is used to set, view and determine network settings.

Examples:

net use z: \\computer\folder

Map the Z: drive to the network path //computer/folder.

net send mrhope "There is hope!"

Send a text message to the computer with a host name of mrhope the message There is hope!. Note: This command only works for Windows versions that support this command.

Note: Many computers today have also disabled the messenger service, if this service is disabled you will be unable to send/receive net send messages.

net send * "There is hope!"

The above command would send There is hope! to all users in your current domain. This command should be used with caution since if you're on a school or work network many of the computers on that network if not all well be sent a message if the messenger service is enabled on the computers.

net config workstation

Display additional information about the network such as the computers name, workgroup, logon domain, DNS, and other useful information.

net view \\hope

View the available computers and their shared resources you may use either of the below commands. The first example displays available computers. The last command would display the shared resources on the hope computer.

net localgroup

Display all groups currently setup on the computer you're running the command on.

--------------------------------------------------------------------------------------------------

NET SHARE:

Display all on your computer.

net share hope=c:\hope\files

Create a share called "hope" for the "c:\hope\files" directory.
Related Q&A documents

--------------------------------------------------------------------------------------------------

NSLOOKUP:

The nslookup MS-DOS utility that enables a user to do a reverse lookup on an IP address of a domain or host on a network.

Examples:

This command is often used to perform a reverse lookup on an IP address as shown in the below example. The first section specifies the server and address of that server that provided you with the domain name and IP address displayed in the second section.

nslookup 204.228.150.3

Server: ns.computerhope.com
Address: 1.1.1.1

Name: www.computerhope.com
Address: 204.228.150.3

nslookup

Running nslookup without specifying an IP address or domain name will display your routers server and address.

--------------------------------------------------------------------------------------------------

WHOIS:

The whois command available in Unix / Linux variants helps allow a user to identify a domain name. This command provides information about a domain name much like the WHOIS on network solutions. In some cases the domain information will be provided from Network Solutions.

Example:

whois [ -h host ] identifier
-h host
Host which holds the identification information.
identifier
Name or host you wish to identify

Examples

whois computerhope.com - doing a whois on computerhope.com, for example, will list information similar to the following.

Whois Server Version 1.3

Domain names in the .com, .net, and .org domains can now be registered
with many different competing registrars. Go to http://www.internic.net
for detailed information.

Domain Name: COMPUTERHOPE.COM
Registrar: NETWORK SOLUTIONS, INC.
Whois Server: whois.networksolutions.com
Referral URL: www.networksolutions.com
Name Server: NS.XMISSION.COM
Name Server: NS2.XMISSION.COM
Name Server: NS1.XMISSION.COM
Updated Date: 21-jun-2000

>>> Last update of whois database: Thu, 22 Feb 2001 07:49:41 EST <<<
The Registry database contains ONLY .COM, .NET, .ORG, .EDU domains and
Registrars

-------------------------------------------------------------------------------------- -----------

WINIPCFG:

The winipcfg command available in Windows allows a user to display network and network adapter information. Here, a user can find such information as an IP address, Subnet Mask, Gateway, etc
The winipcfg command allows a user to Click here related information such as the IP address, Subnet Mask, Default Gateway, DHCP Server, WINS Server, etc.


HOSTNAME

The hostname command displays the host name of the Windows XP computer currently logged into.

Example:

hostname
sethostname: Use the Network Control Panel Applet to set hostname.
hostname -s is not supported.

ALSO YOU CAN SEE USEFUL FILE MANAGEMENT DOS COMMAND:
TYPE – OPEN TEXTS FILES
 
Similar to Unix’s cat command, this command will display the contents of a text file in DOS as read-only. Usage:
 
type c:\sometextfile.txt

ATTRIB – MAKE HIDDEN FILES VISIBLE
 
Attrib can change the attributes of a file, such as whether its a system file or its hidden. This is especially useful to technicians because critical files such as the boot.ini is a hidden system file:
 
attrib -H c:\boot.ini – To unhide the boot.ini
attrib -S c:\boot.ini – To make remove its system file attribute
For more options with this command, type attrib /?

FIND – ADVANCED FILE SEARCH
 
The find command is a very powerful one with many options such as the ability to search for something, but exclude certain files. The following command will find all files with .pdf in their name on C:\
 
dir c:\ /s /b | find ".pdf"
For more information in this command and its usage, type find /?

MOVEMOVE FILES
 
Normal usage of the move command would be:
 
move file.txt c:\TextFiles\
 
However, you can also use it to move only certain files. For example, if I wanted to get all the PDF’s out of a folder and move them to another location, but leave all other file types alone, I would do:
 
move *.pdf c:\WorkPDFs\

TREE – VIEW THE TREE STRUCTURE
 
Type tree to see the folder and file structure of the folder you are currently in. You can also use this command to make prints of the directory structure by sending the information to a text file with the following command tree > textfile.txt

SYSTEM

SYSTEMINFO – Displays information about the system
 
systeinfo – Will display information about the system such as the name, version, uptime, specifications and patches installed.

TASKLIST / TASKKILL – Shows what programs are running on the computer and can kill them
 
tasklist – Will display all the processes running and their memory usage.
taskkill – Will kill a process. Usage would be: taskkill firefox.exe

SFC – Launches Windows’ system file checker utility
 
sfc /scannow – This command will start scanning your computer for any damaged or missing windows system files. Useful to run after a virus, adware or spyware attack has damaged core files. Have an XP CD handy for this one.

CHKDSK – Can check a disk and attempt to recover data in bad sectors.
 
CHKDSK /F /R – This will check a disk for errors and try and fixes information from bad sectors
 
CHKDSK /X – Forces the volume to dismount first.

For further information/usage on any of these commands, you can bring up the help for each one of them by typing: command /?

This Article Written Author By: Premakumar Thevathasan. CCNA, CCNP, CCIP, MCSA, MCSE, MCSA - MSG, CIW Security Analyst, CompTIA Certified A+.

No comments: