On the creation of service industry in sc.exe.

After executing SCANREG in DOS, select the REG file that was backed up five days ago for recovery.

DOS common commands and formats

A, DIR command format:

Directory [D:][ path] [name ][[/A][:attrib]][/o:[ sorted ][/s][/b][/l][/c[h]

(1)dir /a:attrib includes all files (system files. Hidden files).

Attrib[:][h/-h] shows only implied files or non-implied files.

[r/-r] Only read-only files or unreadable files are displayed.

[s/-s] Only system files or non-system files are displayed.

[a/-a] Only the files to be archived or not are displayed.

(2)/o[:] Sorting: By default, it is completely sorted alphabetically, and subdirectories are displayed before files.

/o[n/-n]: display/reverse in alphabetical order or file name order.

[e/-e]: It is displayed in reverse alphabetical order/by extension.

[d/-d]: display in chronological order/in reverse.

[s/-s]: from large to small or/and vice versa.

[g/-g]: Depending on the subdirectory, the file comes first or the file comes before the subdirectory.

(3)/s parameter: list all files in the current directory and its subdirectories.

Column name: dir/s/a/o: NC: \ \ > PRN

Print and output all subdirectories and files on disk C according to the affiliation and alphabetical order.

(4)/B parameter: only the file name and extension are displayed.

(5)/L parameter: All files or subdirectories will be listed in lowercase letters.

Training:

The Dir /a column lists all files (including implicit files and system files) in the current directory.

Dir /ah column implicit file (including subdirectory (implicit) dir /a-h

Directory /as column system file directory /a-s

Directory /ad column subdirectory directory /a-d

Alphabetical directory/operation

Directory /B only displays file names and extensions.

2.attrib[+r |-r][+a |-a][+s |-s][+h |-h][d:][name][/s]

The default attribute name shows the (file) attribute of the file.

Attrib io.sys (or subdirectory)

Shr c:\\ io.sys is designated as a system implicit read-only file.

You can also attrib *. Sys displays file properties with the extension sys.

Parameter [+r|-r] sets or cancels the read-only attribute of the file.

[+a|-a] Set or cancel the archive file properties.

[+h|-h] Set or unhide file properties (especially subdirectories)

The /s parameter will affect all files in the current and current subdirectories.

Can be used to find files.

Example:

Attrib news86 column news86 document properties

Attrib +r report.txt is set to read-only attrib -s -h record.txt

Attribute +a a:*. *

Attribute a a:*. bak

Xcopy a: b: /a Copy all files marked as archive attributes on disk A to disk B.

Xcopy a: b: /m copies all files on disk A to disk B, and deletes the archive attribute.

Third, CD introduction: CD ... returns to the parent directory, representing the current directory and the parent directory.

Cadmium ... \ \ ... returns to the parent directory (ancestor directory) of the parent directory.

Cd A:\\ Change the current directory of disk A to the root directory.

Cd A:\\xx change the current directory of disk a to subdirectory xx.

Cadmium .. \\98 returns to the parent directory first, and then enters the 98 subdirectory under the parent directory.

Cadmium .. Return to parent directory

Cd\\98 enters the 98 subdirectory under the root directory.

Fourth, copy [/y][/-y][/v][ /B]

Copy /y overwrites all files without prompting.

/-y Prompt all documents (yes or no question)

/v copy and check later.

/B is displayed in binary.

Copy w 1.wps con/b can display wps files on the screen without entering the wps state.

Copy .. \\98 Copy all files in the 98 subdirectory under the parent directory to the current subdirectory.

Roger that. \\97 Copy all files in 97 subdirectories in the current directory to the current directory.

Roger that. C:\\ Copy all files in the current directory to the root directory of drive C..

. It means *. :: Documents

Copy Nul a. ABCClear the a.abc file (the file length is changed to 0).

Copy the file name +con to attach the command or content to a text file.

Copy the file name to create a text file (F6 save and exit)

The copy control detects the switch of the printer.

V xcopy command

xcopy[source][d:date][/p][/s][/e][/v][/y]

Xcopy [d: date] xcopy a: b: \ \/d: 08/18/98/s/v Copy files after 98.08. 18.

Xcopy [/p] prompts to create a subdirectory.

Xcopy [/s] is copied with subdirectories. Note: If this subdirectory is not on the target disk, it is on the target disk.

If the disk terminator does not end with \ \ ",you will be prompted:

Does the target specify a file name or directory name on the target?

[f = file, d = directory]?

Create a file on the target disk [press] or create a subdirectory [press d]? You should choose the d key.

Xcopy[/v] band comparison

*:( 1) xcopy does not copy the system and hidden files, and the properties should be modified before copying.

Xcopy [/y] Is there a prompt when overwriting? /y does not prompt.

If the destination disk or subdirectory name is omitted, it will be copied to the current directory.

Intransitive verb del /p

Add /p to prompt before deleting.

If you add a subdirectory name after del, all files under the subdirectory (except hidden files, system files and read-only files) will be deleted.

Add /p to confirm.

Seven. Undelete [name] /au

Without prompting, restore all eligible files (can be restored) and set the initial letter to #, if it has been set.

Exists, please press #%&; 0 1 2-9 a-z are arranged in sequence.

For example, cancel deleting *. Dbf/au restores all files with dbf extension and treats them as files starting with #.

Name, /list only lists recoverable files, and does not recover them.

Cancel Delete/Load Loads the deleted content into memory.

/unload unloads from memory to cancel deletion.

/s[drive] monitors and manages the specified drive.

Undelete /sc

Store undeletion in memory. And create an implied sentry subdirectory to delete the files on drive C.

Manage undelete /ds recovery

The corresponding restore command can use undelete to completely restore the file name (very complete).

The most commonly used cancel delete *. *

deltree /y [drive:path]

Deltree deletes subdirectories and files, although some files are system files or hidden files.

It can have wildcards. When it has wildcards, it will delete eligible files and subdirectories.

For example:? Cancel the deletion *. Dbf/au restores all files with the extension dbf, and takes # as the file.

Name.

/list only lists recoverable files, and there is no recovery operation.

Cancel Delete/Load Loads the deleted content into memory.

/unload unloads from memory to cancel deletion.

/s[drive] monitors and manages the specified drive.

Undelete/sc will store Undelete in memory and create an implied sentry subdirectory to delete drive C.

File management. The corresponding restore command can use undelete/ds to completely restore the file name (perfect).

The most commonly used is undelete *. *

Eight, deltree /y [drive:path]

Deltree deletes subdirectories and files, although some files are systematic or implicit.

It can have wildcards, in which case it will delete qualified files or subdirectories.

For example, there are L 1 files, L2 subdirectories, L3 files and L4 subdirectories.

Deltry Lake *. * All the above files and subdirectories will be deleted, but please confirm before deleting them. If they are not deleted,

You can enter n.

When deleting the /y parameter, you can operate without confirmation.

The files it deleted can be recovered by canceling the deletion. But you can't restore subdirectories and files under them, so you can use special

Special tools such as Norton 8.0.

If undelete/s is used in advance, you can find the complete file in the sentry subdirectory, but the name is already

It has changed.

Nine, dos = high [| low [umb|noumb]]

Dos=high, umb, dos loads itself into high-end memory (high) and can manage upper-level memory (umb).

Noumb does not manage upper memory.

Device=himem.sys should be loaded before writing dos=high and umb.

In order to load the program or driver into the upper memory, dos=umb must be used, which can save most of the conventional memory.

You can write dos=high, umb anywhere in config.sys

If hma is not available or load down low is displayed, high-end memory cannot be used.

X.doskey records the dos commands that have been entered before, which can be displayed by F7, selected by ↑↓, and entered by F9.

The selected command number.

Doskey/restall is reloaded and the previous command line is cancelled.

Doskey/history displays all commands in memory, which can be >; Display to other files, abbreviated as/h.

Doskey dir=cls, typing dir is equivalent to cls.

Doskey/macros can display all macro definitions, and you can use >; Redefine into a file, which can be abbreviated as/m.

Doskey dir= macro definition of dir can be revoked.

doskey p=dir$tdir*。 exe/p$tdir c:\\t$tdir c:\\t$*

$t is the delimiter of the command and $ * is the terminator of the command.

doskey/insert(overstrike)? When re-entering the command, do you want to insert or overwrite the old command?

Cover status (default).

XI。 emm386.exe

Provides management of extended memory so that applications can use it like regular memory.

Common usage is in config.sys

device=c:\\dos\\himem.sys

device=c:\\dos\\emm386.exe ram

D=64 Set the amount of DMA memory to 64K.

Noems provides access to upper memory, but does not provide access to extended memory.

It should be noted that it is best not to use it in windows, because windows manages its own extended memory.

You should use the manager in windows.

Twelve. Fc command fc/b dt.datdt2.dat > B (for binary code comparison)

Compare two files, which are generally used to access progress and modify game storage files.

The actual code position should be added with 0 100, such as: 00005E4: 0067.

When debugging, add 0 100, that is, 0006e4: 0067-e is actually used for modification.

Add redirection file >; P can output the comparison results to a p file.

Thirteen. Format /q/u/s/n: sector /f: size /c

/q parameter: quick format, only scanning file allocation table and root directory area, only valid for formatted disks.

When using, please make sure that no new bad tracks are added after formatting.

/u parameter: format unconditionally. Don't save the information on the original disk, which can prevent unformat.

/s parameter: format it as a system disk, or you can use the sys command.

/f: the size can be160180 320 360 72012001440 2800.

/n: Sector n can be a single-sided disk with 1 format and capacity of 160k 180k.

It can be 4. It can format 360k disks on 5-inch high-density drives.

It can be 8, and 8 sectors can be formatted on a 5-inch high-density drive.

/c retest bad sectors. By default, if a sector is marked as bad, it will not be retested in future formats.

Try, only the flag, you can retest when using/c.

Fourteen Unformatted command

It is suitable for formatted commands that do not use the /u parameter, and can be used to repair corruption.

Hard disk partition table is not good, but not on network disk.

Unformatted drive: [/l][/test][/p]

/l Displays each file and subdirectory found by unformat. If there is no such switch, only those will be displayed.

Corrupted files and subdirectories can be paused by ctrl+s and resumed by any key.

/test only does a test, does not do actual repair work, and does a simulation process.

/p Print during test.

Note: This method cannot guarantee to repair all files, especially formatted disks with added data.

The restored file is stored in a subdirectory, such as subdir 1...2...3.

Interlink syntax interlnk g = e, which can communicate between two computers through serial port or parallel port.

Map the server-side e drive to the client-side g drive. For the client, all G drives will

Operation means accessing the server, and the way of unmapping is interlnk g =

Entering interlnk alone will display all mappings.

Note: interlnk can only be used if the interlnk.exe device driver is loaded.

The drive symbol used is the same as the configuration. ? The number of lastdrv.exe settings in the system. You can make one.

One end is a 25-pin serial line, and the other end is a 9-pin serial line. The specific connection method is as follows:

5 - 7 2 - 15

3 - 2 3 - 13

7 - 4 4 - 12

6 - 6 5 - 10

3 - 3 6 - 1 1

8 - 5 15 - 2

4 - 20 13 - 3

9 stitches and 25 stitches 12-4

10 - 5

1 1 - 6

25 - 25

25 stitches, 25 stitches.

Sixteen. Interlnk.exe and intersvr.exe.

Interlnk.exe redirects a request for a client driver or print interface to another server driver.

Device or printer.

Syntax: add:

device = c:\ \ dos \ \ interlink . exe[drive:n][/no printer][com][LPT]

Seventeen. memmaker[/b][/batch][session][/swap:drive]

Memmaker can be used to optimize memory allocation. And write the configuration to autoexec.bat and config.sys

During this process, the machine needs to be restarted several times.

Eighteen, memitem memcolor memdefault submenu menu options include

In autoexec.bat, it is as follows: in config.sys, it is as follows:

Path c: \ \ dos; C:\ \ ucdos[ menu]

Doskeymenucolor = 15, 1 (foreground color 15, background color 1)

\ \ mouse \ \ mouse menu = base _ config, which is a base.

Go to% config %-& gt;; Option menuitem = cced _ config, which is a cced.

Option prompt

: Basic Configuration Menu Default = Basic Configuration, 5

Go to exit-> The default value of jumping out is base_config, and the delay time is 5 seconds.

:cced_config [common]

c:\ \ dos \ \ smart drv . exe/l device = c:\ \ dos \ \ himem . sys

Goto exit Every project contains the same part of * * *

: exit->; End[ basic configuration]

device=c:\\dos\\emm386.exe ram

Dos = high level, umb

[cced_config]

device = c:\ \ dos \ \ smart drv . exe/double _ buffer

Include=base_config contains the base_config setting.

It can be selected according to the configuration requirements of the computer in different situations.

Nineteen. Mscdex.exe provides programs for reading and writing optical drives.

MSC dex/D:drive[/D:drive][/e][/k][/s][/l:letter]

Typical: device = c: \ \ cdrom \ \ cdrom.sys/d: mscd000inconfig.sys.

In autoexec.bat, c: \ \ dos \ \ mscdex/d: mscd000/l: g.

A CD-ROM drive with the symbol g is configured.

Parameter /d:drive 1 is the ID number of the CD-ROM drive, which must be consistent with the symbol in config.sys, and there can be more than one.

/d:mscd000 /d:mscd00 1

/e: Load CD-ROM driver with extended memory.

/s: whether the CD-ROM drive is set to * * * in ms_net or windows.

Whether to display memory when /V is loaded.

/L:letter The letter assigned to the optical disk drive.

/m:number Specifies the number of buffers.

It should be noted that if smartdrv.exe is used to speed up the reading and writing ability of CD-ROM drive, it should be in autoexec.

Master's degree in Bat Captain. Exe was written in smartdrv.exe, and it can be greatly improved by using smartdrv.exe.

Ability to read and write on a drive.

Twenty, the use of msd

With msd, you can check the computer configuration and system information as a whole.

Including:? Driver parameters, computer cpu parameters, memory size parameters, display type, serial and parallel port conditions, and

And the occupancy of each IRQ, according to which we can analyze whether the new equipment conflicts with the original equipment.

At the same time, you can also judge whether there is a virus in the memory by analyzing the memory resident program, and if there is, mark it as.

Twenty-one, prompt dos prompt

$q equals number $ t Current time $d Current date $p Current driver symbol

$ $ $ prompt $ nThe current drive $g is greater than $l and less than $b | shows the pipeline number.

$h hide prompt $E display

In other words, the prompt ljw of the text itself is displayed directly, and it is displayed as ljw prompt.

The prompt only displays the current drive letter and the greater than sign.

22.ramdrive.sys uses memory as a virtual disk.

It should be noted that all data are stored in memory and should be saved to the hard disk in time, otherwise it will crash after power failure.

All data will be lost after that. The advantage is that it runs fast, but it can't be used in windows.

Example: config.sys: device = c: \ \ dos \ \ ramdrive.sys/size [/e | a]

Size is the number of bytes in k, that is, the size of the virtual disk created.

/e or /a both use extended memory to create virtual disks. The premise of adding parameters is that memory management must be loaded first.

Himem.sys and emm386.exe.

23.subst connects the drive with the subdirectory.

For example, if the request for A:\\l 1\\l2 subdirectory is mapped to disk S, enter.

Subst s: a:\\l 1\\l2 is enough.

Use dir like this? Like other replication modes, commands such as "a:\\l 1\\l2" will be displayed.

Subst s: d can be used to cancel this mapping.

Subst can be used to display various connection conditions.

Attention:? Subst a: c:a can be used to create a read-write disk for A. For some installed software,

For,? It must be installed with disk A, so you can use it to copy all the software to be installed to the C:a sub first.

Directory, then enter subst a: c:a, and then go to a: install software.

Twenty-four, mem /c /m /p /d conventional memory display program

/c shows the occupancy of all memory resident programs, which are divided into regular memory and advanced memory.

High-end memory occupancy, and display the total occupancy (regular high-end reserved extended memory)

/p Pagination display, pause between pages

Add the module name after /m, such as /m msdos, to indicate the memory occupation of dos system.

/d gives a detailed example of conventional high-end reserved extended memory.

Through the analysis, we can see whether the memory occupation is reasonable and whether all kinds of programs are loaded normally.

Based on memmaker, a memory optimization tool, various management can be carried out, and some program crashes can be analyzed at the same time.

If it is shown in some places, it can be concluded that there is a virus in the memory, which is conducive to discovery and elimination.

25. Use of various pipeline tools ><& gt& gt& lt& lt < <

Redirect the output or required input caused by various commands.

Such as: dir *. bat/b & gt; P You can output the file name with dir * as an example. Bat to a p file.

time

& gt bat

There is only one carriage return in the p file, so the time can be appended to the p.bat file.

& gt& gt& gt is to redirect the output generated by the command to a file or printer.

The content generated by>& gt will be attached to the file. > then the original file content will be overwritten.

& lt& lt& lt is what the redirection command needs to input.

Such as: time

It should be noted that prn is a printer and null is an empty device.

A scam is a show.

P.bat & gtPrn can print out p.bat.

Copying an empty p can delete the p file.

Copy con p can edit the p file on the screen, F6 can save and exit.

P & gtPp completes the copy of P file to PP.

Type p|more to pause the display when the screen is full.

Twenty-six, mobile command

Move [y/-y] file name 1 file name 2

Move the file 1 to file 2.

Such as: move c:\\dos\\*. * c:\\cced

Move all files in the dos subdirectory to the cced subdirectory.

The target directory does not exist. Do you want to prompt the /y|-y parameter when creating it?

You can use this command to modify the subdirectory name, such as move dos cced.

Change dos directory name to cced

27.append specifies the storage location of some special data files, such as user.datpe2.pro. exe *。 com *。 Bat file.

Format: append [:] terminates the specified directory that existed before append displayed the specified situation.

Append [path] append c:\\user, etc.

28.call calls another batch file in the batch command.

(1) Do not terminate the running of the existing file, and return immediately after executing the abandoned program.

(2) The called batch command must take bat as the extension.

(3) When calling the batch file, you can add parameters (%1-%9) and environment variables, such as %baud%.

(4) Pipeline tools and redirection tools cannot be used.

Twenty-nine, equipment device high load.

Loads the specified device driver into memory.

Devicehigh loads the specified device driver into high-end memory.

Loadhigh loads the specified device driver into high-end memory.

Thirty, defragmentation optimization disk

Legend optimization the loss fragment.

Execute this command to optimize the specified disk (including checking the file allocation table, the status of each file and correcting errors). When executing, you can sort files according to file name size, time and extension.

First of all, dir

Before DOS5.0, dir had only two parameters /p,/w.

Dir/a: You can view all files in the current directory, including hidden files, system files and read-only files.

Dir/s: You can view files in the current directory, including files in subdirectories.

However, dir/a/s can be used to view the hidden directory under the current directory, but not the files under the hidden directory.

Second, xcopy

/e: If the subdirectory is empty, copy it.

/s: Only non-empty directories are copied.

Third, erasure =del

Four. Football Club (football club)

Used the most when modifying the game.

Verb (abbreviation for verb) format

/t:tracks is used with /n, which means that the floppy disk will be formatted as tracks tracks/faces. If you want the capacity of floppy disk to be larger than 1.44M, you should use /t and/n. /t:80/n: 18 is1.44m.

/1: format only one side (compatible with previous single-sided floppy disks)

/4: Format it as a low-density disk.

Six: ramdrive.sys

/e and /a One uses EMS and the other uses XMS.

Responder: Tom 2427- Trainee Magician Level 3 2-4 12:07

The questioner's evaluation of the answer:

Thank you.

Rating has been turned off, and there are currently 0 people rating it.

okay

50% (0) is not good

50% (0)

Comments on the best answer

DOS is the original operating system.

Commentator: xjjy- Tong Sheng level

Other answers *** 1

I have an e-book about DOS study here, and I can send it to you if necessary.

The following is relatively simple:

Encyclopedia of dos commands

Directory Column File Name deltree Delete Directory Tree cls Clear Screen cd Change the current directory.

Copy Copy File Disk Copy Disk Delete File Format Format Disk

Edit text Edit memory View memory status Create subdirectories Move files and change directory names.

Multi-split-screen display type display file content rd delete directory sys make DOS system disk

Ren change file name xcopy copy directory and file chkdsk check disk properties set file properties.

Fdisk hard disk partition date display and revision date label setting volume label defragmentation disk defragmentation

Msd system detects path settings, searches directories and shared files * * * and enjoys the optimized memory management of memmaker.

Help restore the backup file set, set the time display and modification time of environment variables.

Tree Column Directory Tree Debugging Random Debugger doskey Calling DOS Command Prept Set Prompt Cancel Delete Restore Deleted File scandisk Detect and Repair Disk.

Abnormal DOS command

Diskcomp disk comparison additional settings executable file path.

Expand the recovery DOS file quick help to quickly display help information.

Fc file comparison interconnection startup server

Setver installation version intersvr startup client

Subst path replaces qbasic basic integration environment

Vsafe anti-virus unformatted recovery formatted disk

Ver display DOS version number smartdrv set disk accelerator

Vol displays the disk volume number lh and loads the program into high-end memory.

Extended memory management of ctty change control device emm386

Specific introduction of common commands:

First of all, Dir

Display the list of directory files and subdirectories, hehe, of course, everyone should know this.

You can use wildcards (? And *),? Table wildcard with one character, * table wildcard with any character.

*. Suffix

Specify the file to view the suffix. In fact, it can also be one. " Suffix ",such as dir *. Exe equals dir.exe.

/p

Displays one list screen at a time. To see the next screen, press any key on the keyboard.

/w

Displays the list in a wide format, with a maximum of 5 file or directory names per line.

/s

Lists each specified file name that appears in the specified directory and all subdirectories. This is much faster than searching in win environment.

dir *。 *-& gt; A.txt writes the current directory file list into a.txt.

dir *。 */s-& gt; A.txt writes the current directory file list into a.txt, including files in subdirectories.

Second, attributes

Displays, sets, or deletes read-only, archive, system, and hidden attributes assigned to a file or directory. If used without parameters, attrib will display the properties of all files in the current directory.

+r

Set the read-only property.

-r

Clear the read-only attribute.

+a

Set archive file properties.

[Ancient names or Latin modern names of animals and plants]

Clear archive file properties.

+s

Set system properties.

Constitute noun plural

Clear system properties.

+h

Set hidden properties.

-h

Clear hidden attributes.

Three. Cls

Clear all information displayed in the command prompt window and return to an empty window, namely "Clear Screen".

Fourth, quit.

Exit the current command interpreter and return to the system.

Verb (abbreviation for verb) format

formatting

/q

Execute quick format. Delete the file table and root directory of the previously formatted volume, but do not scan the damaged areas between sectors. Using the /q command line option should only format the previously formatted full volume.

The intransitive verb is used to view the IP information of this machine.

Displays all current TCP/IP network configuration values, and refreshes Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) settings. Using ipconfig without parameters can display the IP addresses, subnet masks and default gateways of all adapters.

/all

Displays the complete TCP/IP configuration information of all adapters.

Ipconfig is equivalent to winipcfg, which is available on me, 98 and 95. Although Windows XP does not provide a graphical interface like the winipcfg command, you can use a network connection to view and update the IP address. To do this, open the network connection, right-click the network connection, click Status, and then click the Support tab.

This command is most suitable for computers that are configured to automatically obtain IP addresses. It enables users to determine which TCP/IP configuration values are configured for DHCP, automatic private IP address (APIPA) and other configurations.

VII. Doctor of Medicine

Create a directory or subdirectory

Eight, go

Move one or more files from one directory to the specified directory.

Nine, N * statistics

TCP/IP (NetBT) protocol based on local computer and remote computer displays NetBIOS statistics, NetBIOS name table and NetBIOS name cache. N*stat can refresh NetBIOS name cache and registered Windows Internet Name Service (WINS) names. Use n*stat with no parameters to display help. N*stat command-line parameters are case-sensitive.

-A remote name

Displays the NetBIOS name table of the remote computer, where RemoteName is the NetBIOS computer name of the remote computer.

-an IP address.

Displays a table of NetBIOS names of remote computers, whose names are specified by IP addresses of remote computers (separated by decimal points).

X.Netstat

Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, IP routing table, IPv4 statistics (for IP, ICMP, TCP and UDP protocols) and IPv6 statistics (for IPv6, ICMPv6, TCP over IPv6 and UDP over IPv6 protocols). When used without parameters, netstat displays active TCP connections.

[Ancient names or Latin modern names of animals and plants]

Displays all active TCP connections and TCP and UDP ports that the computer listens to.

Xi。 thump

Verify the IP-level connection with another TCP/IP computer by sending an "Internet Message Control Protocol (ICMP)" echo request message. Receiving a response reply message

The status will be displayed with the number of round trips. Ping is the main TCP/IP command, which is used to detect network connectivity, reachability and name resolution. If there are no parameters, ping will display help. Name and Ip address resolution is the simplest application and the most commonly used.

Equivalent to -ED

Specifies that ping can continuously send response request information to the target before interruption. To interrupt and display statistics, press CTRL-BREAK. To interrupt and exit ping, press CTRL-C.

-lSize

Specifies the length (in bytes) of the data field in the sent echo request message. The default value is 32. The maximum size is 65,527.

Twelve. rename

Change the name of the file.

Such as Ren *. abc *.cba