Wednesday, June 27, 2012

Windows 8 Command Line List and Reference



One of the bugs in the beta version seems to be that this entry for the command prompt sometimes gets greyed out. Another route to the command prompt is to place the mouse on the bottom-left corner of the screen and right-click the tile that pops up. The context menu contains an entry both for the regular command line and for the commannd line run as administrator.

Another way to the command prompt will be familiar. Use the keyboard shortcut Winkey+R to open the Run line and then enter "cmd" (without quotes).

Once the command shell is open, it looks pretty similar to previous versions

List of commands in Windows 8

ASSOC Displays or modifies file extension associations.
ATTRIB Displays or changes file attributes.
BREAK Sets or clears extended CTRL+C checking.
BCDBOOT Used to copy critical files to the system partition and to create a new system BCD store.
BCDEDIT Sets properties in boot database to control boot loading.
CACLS Displays or modifies access control lists (ACLs) of files.
CALL Calls one batch program from another.
CD Displays the name of or changes the current directory.
CHCP Displays or sets the active code page number.
CHDIR Displays the name of or changes the current directory.
CHKDSK Checks a disk and displays a status report.
CHKNTFS Displays or modifies the checking of disk at boot time.
CHOICE Batch file command that allows users to select from a set of options.
CIPHER Displays or alters the encryption of directories [files] on NTFS partitions.
CLIP Redirects output of another command to the Windows clipboard.
CLS Clears the screen.
CMD Starts a new instance of the Windows command interpreter.
CMDKEY Creates, lists and deletes stored user names and passwords or credentials.
COLOR Sets the default console foreground and background colors.
COMP Compares the contents of two files or sets of files byte-by-byte
COMPACT Displays or alters the compression of files on NTFS partitions.
CONVERT Converts FAT volumes to NTFS. You cannot convert the current drive.
COPY Copies one or more files to another location.
DATE Displays or sets the date.
DEFRAG Disk defragmenter accessory.
DEL Deletes one or more files.
DIR Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DISKPART Displays or configures Disk Partition properties. A separte command interpreter with a sub-set of commands.
DOSKEY Edits command lines, recalls Windows commands, and creates macros.
DRIVERQUERY Displays current device driver status and properties.
ECHO Displays messages, or turns command echoing on or off.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE Deletes one or more files.
EXIT Quits and closes the command shell.
EXPAND Expands one or more compressed files.
FC Compares two files or sets of files, and displays the differences between them.
FIND Searches for a text string in a file or files.
FINDSTR Searches for strings in files.
FOR Runs a specified command for each item in a set.
FORFILES Selects files in a folder for batch processing.
FORMAT Formats a disk for use with Windows.
FSUTIL Displays or configures the file system properties.
FTYPE Displays or modifies file types used in file extension associations.
GOTO Directs the Windows command interpreter to a labeled line in a batch program.
GPRESULT Displays Group Policy information for machine or user.
GRAFTABL Enables Windows to display an extended character set in graphics mode.
HELP Provides Help information for Windows commands.
ICACLS Display, modify, backup, or restore ACLs for files and directories.
 IF Performs conditional processing in batch programs.
IPCONFIG Displays all current TCP/IP network configuration values
LABEL Creates, changes, or deletes the volume label of a disk.
MD Creates a directory.
MKDIR Creates a directory.
MKLINK Creates Symbolic Links and Hard Links
MODE Configures a system device.
MORE Displays output one screen at a time.
MOVE Moves one or more files from one directory to another directory.
OPENFILES Queries, displays, or disconnects open files or files opened by network users.
PATH Displays or sets a search path for executable files.
PAUSE Suspends processing of a batch file and displays a message.
POPD Restores the previous value of the current directory saved by PUSHD.
PRINT Prints a text file.
PROMPT Changes the Windows command prompt.
PUSHD Saves the current directory then changes it.
RD Removes a directory.
RECOVER Recovers readable information from a bad or defective disk.
REM Designates comments (remarks) in batch files
REN Renames a file or files.
RENAME Renames a file or files.
REPLACE Replaces files.
RMDIR Removes a directory.
ROBOCOPY Advanced utility to copy files and directory trees
SET Displays, sets, or removes environment variables for current session.
SETLOCAL Begins localization of environment changes in a batch file.
SETX Sets environment variables.
SC Displays or configures services (background processes).
SCHTASKS Schedules commands and programs to run on a computer.
SHIFT Shifts the position of replaceable parameters in batch files.
SHUTDOWN Allows proper local or remote shutdown of machine.
SORT Sorts input.
START Starts a separate window to run a specified program or command.
SUBST Associates a path with a drive letter.
SYSTEMINFO Displays machine specific properties and configuration.
TAKEOWN Allows an administrator to take ownership of a file.
TASKLIST Displays all currently running tasks including services.
TASKKILL Kill or stop a running process or application.
TIME Displays or sets the system time.
TIMEOUT Pauses the command processor for the specified number of seconds.
TITLE Sets the window title for a CMD.EXE session.
TREE Graphically displays the directory structure of a drive or path.
TYPE Displays the contents of a text file.
VER Displays the Windows version.
VERIFY Tells Windows whether to verify that your files are written correctly to a disk.
VOL Displays a disk volume label and serial number.
VSSADMIN Volume Shadow Copy Service administration tool
WHERE Displays the location of files that match a search pattern.
XCOPY Copies files and directory trees.
WMIC Displays WMI information inside interactive command shell. 
 
Share your Thoughts..

25 comments:

Anonymous said...

Very helpful dude.. Thanks man..

Anonymous said...

Admiring the time and effort you put into your blog and in depth information
you provide. It's awesome to come across a blog every once in a while that isn't
the same outdated rehashed information. Fantastic read!
I've saved your site and I'm adding your RSS feeds to my Google account.



my web-site: safe diets

Anonymous said...

Right for You, it is really less about him and more about you.
Unfortunately, the percentage of these people who actually find a real
romance as a direct result of their site memberships is very low -
probably less than 10%. Be prepared to go on a series of good and bad dates before finding a potential mate.

Feel free to surf to my weblog: The Tao of Badass

Anonymous said...

I blog quite often and I genuinely appreciate your information.
Your article has really peaked my interest. I'm going to bookmark your site and keep checking for new information about once per week. I subscribed to your RSS feed too.

Here is my weblog - binary options

Anonymous said...

I think this is among the most vital information for me.
And i am glad reading your article. But should remark on few general things,
The website style is wonderful, the articles is really great : D.
Good job, cheers

Here is my webpage money for medical bills

Anonymous said...

Howdy! This is my first visit to your blog! We are a collection of volunteers
and starting a new initiative in a community in the
same niche. Your blog provided us beneficial information to work on.
You have done a marvellous job!

Review my page; cedar finance review

Anonymous said...

I read this paragraph completely on the topic of the resemblance of newest and previous technologies,
it's remarkable article.

Feel free to surf to my homepage ... twitter password reset

Anonymous said...

I am truly delighted to read this web site posts which
carries tons of useful information, thanks for providing such statistics.



My homepage ... http://dickgirlporn.info

Anonymous said...

The program comes with full warranty 60 days money back,
so everyone can actually try this muscle building system for
a few weeks and see the results without any risk at all.

If you would definitely be a true beginner to figuring out to gain muscular,
you will need to begin your workouts inside the gym or health and fitness center to use trainers and other staff to support and teach anyone setup your schooling routine.

No make a difference what sort of fat coaching regimen you.



My site: muscle Maximizer reviews

CHEAPTAP.CO.UK -- Enjoy the water, enjoy your life! said...

It is indeed a wonderful LED taps for you to consider as your daily usage. You will love to enjoy the Shower Taps from then on. It will bring you an all new feeling. As can see that Antique Basin Taps flow decentralizes or sprayed, just spin the button on the head.

Unknown said...

Wow! Amazing Post …………keep posting!!
Customize pendrives

Unknown said...

Joyfulhackingmaster are the best when it comes to hacking. We pictured the best for you who actually needs our helps, be

careful of whom you contact to help you, We are special hackers which have is own ways of hacking that know body has ever

imagine in this hacking world with our spare idea we can hack anything. We are totally secured and your security comes

first. Hacking a website is a job for pro like Cyberwizard (Tyler) A-Change school grade. Bank jobs, flipping cash hack

and control any robot. B-Database hack. Remove criminal records. facebook hack. C-gmail hack D-whatsapp hack E-website

hack F-tracking calls G-online hacking lectures H-Cloning of phones I-online records changes J-Twitter hack K-retrival of

hacked social media accounts l- Hacking classes with legit certificate. ANY HACKING SERVICE. we are experienced hacker,

we are at your service we do not mistakes in our jobs, and we make all work successful our work is 100% guarantee. we are

here to put smile upon sad faces. contact Us at :JOYFULHACKINGMASTER @ GMAIL.COM

Text whatsapp: +1(317)7941276

Anonymous said...


VERIFIED HACKERS
Finding a true hacker could be almost an impossible task these days, but with the help of our over a decade survey you are 100% safe...
visit this site below so your not misled...Avoid being cheated, hire a VERIFIED HACKER only.
hireverifiedhacker.wordpress.com/hire-a-hacker

MariamGates said...

I am writing this as a thank you to this pro Russian hacker Arthur Vitali. He helped my best friend remove so many negative records of his online. Now my friend has finally been hired for a great job in the U.S. If you need help, Arthur is the man. Contact him EMAIL- quickarturhack@gmail.com WHATSAPP- +380683017209 OR KIK- Arturquickhack

He also helped me hack an entire iPhone without physical access. I could view all cellphone activities on my laptop. He offers so many services I can't mention them all. Contact him for more info.

webmasterbagwan@gmail.com said...

viager saint mandé
viager levallois peret
viager saint tropez
viager neuilly sur seine
viager courbevoie
viager levallois
viager chamonix
vendre en viager avec héritiers

David Smith said...

If you need an effective, efficient, brilliant hacker to spy on your cheating spouse,boyfriend/girlfriend contact brillianthackers800@gmail.com,he is a reliable hacker who is trustworthy, he helped me to settle bank loans,he also helped me to spy on my ex wife's WhatsApp and I got to know about all her little secrets, thanks to him I am now a free man,contact him and thank me later.

martin velly said...

Today, online presence is as significant as your offline identity. Social media, online bank portals, and even blogs require registration. Your email evolved to an actual identification method online. Some of our most sensitive information is stored in our gmail account from hackers imagine what an imposter would find if they got a hold of your password. The contacts in your address book, your schedule, confidential attachments, and private conversations would all be compromised. Additionally, they may find access to your Facebook, Amazon, and other such accounts.

HELP@PYTHONAX.TECH said...

🔷 GET ALL THE CASH 💵💶YOU NEED TROUGH OUR BITCOIN MINING PROCESS‼️

Instead of taking loans and be in debt, why not engage in Bitcoin💰 Mining⛏⚒ and get all the cash you need. Bitcoin💰has been a top crypto currency in the world today, and most people only know little about. People feel the only way to get Bitcoin💰 is by buying it. But that’s a LIE❗️

BITCOIN💰 can also be gotten by Mining ⛏⚒ them with Mining softwares and Hardwares. Most people know of these method and really don’t engage in doing to because the Mining ⛏⚒ process is very slow. And that’s why you need our service.

We have have developed a way in speeding up the Bitcoin💰 Mining⛏⚒ with the help of our technologists. Thousand of Bitcoin💰 can be mined in a single day with out methods.

For more enquiry, please contact us via our Email and customer care service.
Copetechs@gmail.com
+1 (808) 600-0773




Scott Witcher said...

I decided to take a chance to know, knowing is better than self doubts and it was exactly what happened when I employed the services of this particular group I came across by chance to help check his phone out intoto. Now I know when he’s telling the truth and how to curtail him, I think it is not a drastic step if it'll make you feel better. My life got better, I stopped using my precious time to bother about his indiscretions and channelled my energy positively. Their services includes: phone calls, messages, contacts, social media(viber, whatsapp,facebook,kik e.t.c), emails, all other hacking and web hacking issues. You can reach him via Gmail at;
(HACKMARVEL4 @ GMAIL . COM)
Telegram; (+1 610-455-5011)

jasonbob said...

jordan shoes
supreme shirt
supreme clothing
coach outlet store online
fitflops sale clearance
louboutin shoes
louboutin shoes
ferragamo belt
jordan retro
off white jordan 1
xiaofang20191225

Blog27999 said...

Did you realize there's a 12 word sentence you can speak to your crush... that will induce deep feelings of love and impulsive attraction to you buried inside his chest?

Because hidden in these 12 words is a "secret signal" that fuels a man's impulse to love, cherish and guard you with his entire heart...

12 Words That Fuel A Man's Love Response

This impulse is so hardwired into a man's brain that it will drive him to try harder than ever before to take care of you.

As a matter of fact, triggering this powerful impulse is so binding to getting the best ever relationship with your man that as soon as you send your man one of these "Secret Signals"...

...You will instantly find him expose his mind and heart for you in such a way he's never expressed before and he will see you as the one and only woman in the universe who has ever truly interested him.

Blogger said...

Do you realize there is a 12 word phrase you can tell your partner... that will trigger deep emotions of love and impulsive attraction for you deep within his heart?

Because hidden in these 12 words is a "secret signal" that triggers a man's instinct to love, worship and guard you with all his heart...

===> 12 Words Who Fuel A Man's Desire Response

This instinct is so built-in to a man's brain that it will drive him to work better than ever before to make your relationship as strong as it can be.

In fact, triggering this dominant instinct is so important to achieving the best possible relationship with your man that once you send your man a "Secret Signal"...

...You will soon find him expose his mind and soul to you in a way he never experienced before and he will perceive you as the only woman in the world who has ever truly understood him.

jane holly said...

My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. I contacted a private investigator that linked me with onlineghost who took care of the hack job. He hacked his iPhone,Facebook,Instagram, Whats app, twitter and email account. I got all I wanted as proof . I”m glad i had a proven truth he was cheating . Contact him for any hack job. Tell him i referred you to him, he will surely meet your hack need. Contact: onlineghosthacker247@ gmail .com

Kimberly Iverson said...


In my next world I will still choose anonymousmaskhat@gmail.com as the best. Imagine a hacker breaking into your school website and changing your bad grades to good grades without your school knowing of such a hack done on the school website, that's exactly what anonymousmaskhat@gmail.com did for me at a very affordable price that came with a very clean and smooth job. kudos to you anonymousmaskhat@gmail.com.

Andrea Robertson said...

He is no scam,i tested him and he delivered a good job,he helped me settle bank loans,he also helped my son upgrade his scores at high school final year which made him graduate successfully and he gave my son free scholarship into the college,all i had to do was to settle the bills for the tools on the job,i used $500 to get a job of over $50000 done all thanks to Walt,he saved me from all my troubles,sharing this is how i can show gratitude in return for all he has done for me and my family

Gmail; Brillianthackers800@gmail.com
Whatsapp number; +1(224)2140835

Post a Comment

 
Design by Secure Hackers