Skip to main content

Home/ Windows and Microsoft information/ Group items tagged command

Rss Feed Group items tagged

Jessica Olsen

Use cipher.exe for command line encryption | TechRepublic - 0 views

  • Use the /a switch for encrypting individual files rather than directories.
  • Using the /i switch
  • syntax cipher /e /s: <directory name>
  • ...6 more annotations...
  • The /s switch in conjunction with /e or /d is used to encrypt or decrypt subdirectories within a directory.
  • The /w switch is used to overwrite data in unallocated space on the disk.
  • Using the /r switch to generate a new recovery agent certificate
  • se the /u switch to update encryption keys for existing encrypted files.
  • syntax cipher /e /a <directory path\filename>,
  • Using the /a switch
Jessica Olsen

Cmdkey - 0 views

  • Syntax Copy cmdkey [{/add:<TargetName>|/generic:<TargetName>}] {/smartcard|/user:<UserName> [/pass:<Password>]} [/delete{:<TargetName>|/ras}] /list:<TargetName> Parameters   Parameters Description /add:<TargetName> Adds a user name and password to the list. Requires the parameter of <TargetName> which identifies the computer or domain name that this entry will be associated with. /generic:<TargetName> Adds generic credentials to the list. Requires the parameter of <TargetName> which identifies the computer or domain name that this entry will be associated with. /smartcard Retrieves the credential from a smart card. /user:<UserName> Specifies the user or account name to store with this entry. If UserName is not supplied, it will be requested. /pass:<Password> Specifies the password to store with this entry. If Password is not supplied, it will be requested. /delete{:<TargetName> | /ras} Deletes a user name and password from the list. If TargetName is specified, that entry will be deleted. If /ras is specified, the stored remote access entry will be deleted. /list:<TargetName> Displays the list of stored user names and credentials. If TargetName is not specified, all stored user names and credentials will be listed. /? Displays help at the command prompt.
  • o display a list of all user names and credentials that are stored, type: Copy cmdkey /list
  • To add a user name and password for user Mikedan to access computer Server01 with the password Kleo, type: Copy cmdkey /add:server01 /user:mikedan /pass:Kleo To add a user name and password for user Mikedan to access computer Server01 and prompt for the password whenever Server01 is accessed, type: Copy cmdkey /add:server01 /user:mikedan To delete the credential that remote access has stored, type: Copy cmdkey /delete /ras To delete the credential that is stored for Server01, type: Copy cmdkey /delete:Server01
Jessica Olsen

File shares on iSCSI devices may not be re-created when you restart the computer - 0 views

  • Make the Server service dependent on the iSCSI Initiator service
  • If you have administrative access to the server, you can perform this command from a network computer. To do this, type the following command, and then press ENTER: sc \\computer_name config LanManServer depend= Samss/Srv/MSiSCSI
Jessica Olsen

Windows 7 Manageability Overview - 0 views

  • PowerShell Integrated Scripting Environment PowerShell scripts are standard text files. With Windows Vista and earlier versions of Windows, the built-in editor was Notepad. While Notepad is perfect for quickly editing text files, and it is sufficient for writing scripts, a more robust editor would enable IT professionals to learn, create, and debug scripts more efficiently. Windows 7 includes the PowerShell Integrated Scripting Environment (ISE), a graphical PowerShell development environment with debugging capabilities and an interactive console, as shown in Figure 1.
  • PowerShell Cmdlets Cmdlets (pronounced command-lets) are one of the most powerful features of PowerShell. A cmdlet is a task-oriented command that is used in the Windows PowerShell environment. For example, PowerShell includes cmdlets that: Append text to a file Read and write XML files Manage services Manage files and folders PowerShell 2.0 supports over 500 new cmdlets to manage client computers and servers, edit the registry and file system, perform WMI calls, and connect the powerful .NET Framework development environment. You can also extend PowerShell by creating custom cmdlets or use community-developed extensions.
Jessica Olsen

A Support Guide for Wireless Diagnostics and Troubleshooting - 0 views

  • This article assumes knowledge of IEEE 802.11-based wireless LAN networking including related technologies such as IEEE 802.1X and Wi-Fi Protected Access (WPAâ„¢). This article is not meant to be a detailed explanation of the inner workings of the Windows Wireless Zero Configuration service. For basic knowledge of wireless networking, see the Windows Server 2003 Wireless Networking Web site
  • he first step to take for a wireless issue is to gather information that might be needed to perform a preliminary diagnosis, including the following:
  • Wireless logs. Logging can be enabled through the netsh ras set tracing * en command. After enabling logging, you can either restart the computer or restart the Wireless Zero Configuration (for Windows XP) or Wireless Configuration (for Windows Server 2003) service with the net stop wzcsvc and net start wzcsvc commands. The wireless logs are located in the systemroot\tracing folder. The log files most useful for troubleshooting wireless issues are the following:
  • ...1 more annotation...
  • Symptom Diagnosis For the times that an immediate or trivial solution is not apparent, symptomatic analysis is best used to determine where you should look next. Symptoms and Solutions Table 1 lists common issues, causes, and likely solutions.
Jessica Olsen

Microsoft Fix it Center Online - 0 views

  •  
    "sfc /scannow"
Jessica Olsen

Convert - 0 views

  • convert [<Volume>] /fs:ntfs [/v] [/cvtarea:<FileName>] [/nosecurity] [/x]
  • You must create the placeholder file by using the fsutil file createnew command prior to running convert. Convert does not create this file for you. Convert overwrites this file with NTFS metadata. After conversion, any unused space in this file is freed.
Jessica Olsen

How to analyze the log file entries that the Microsoft Windows Resource Checker (SFC.ex... - 0 views

  • How to view the log file loadTOCNode(3, 'moreinformation'); The SFC.exe program writes the details of each verification operation and of each repair operation to the CBS.log file. Each SFC.exe program entry in this file has an [SR] tag. The CBS.log file is located in the %windir%\Logs\CBS folder.Note The Windows Modules Installer service also writes to this log file. (The Windows Modules Installer service installs optional features, updates, and service packs.)
1 - 15 of 15
Showing 20 items per page