Specifies a program for opening a specific file type. Skips the execution within a batch program to a specific line marker. Represents a conditional statement and executes expressions within batch files only under certain conditions.
Compresses files without loss in CAB format you can also use the diantz command. Creates a symbolic link to a file. Moves a file or multiple files from one directory to another. Displays and separates open system files and folders. Restores readable files that were on a defective data drive. Changes the name of a particular file. Replaces the selected file or files with one or more other files.
Allows so-called robust file copying. Manages media on removable storage devices. Limits the valid range of changes to batch files or scripts. Starts the WinSxs Tracing Utility, a tool for programming diagnostics.
Restores administrator access rights to a file that have been lost when reassigning a user. When enabled, checks whether files are written correctly on a data drive. Finds files that match a particular search topic. Copies files and entire directory structures. Starts commands and programs at a particular time. Creates backups of files. Allows users to make changes to start configuration data storage the command is a new version of bootcfq.
Prepares a hard drive for BitLocker Drive Encryption. Creates, edits, or displays the content of boot. Edits and displays the access control list. Changes or displays the data driver check at startup.
Changes the standard input and output for the system. Creates or configures compresses drives a newer version of the command is called drvspace. Defragments all or only specified drives. Manages, creates, and deletes partitions from the hard drive.
Allows users to remotely control the disk performance counter. Creates or configures compressed drives. Manages databases within the extensible storage engine. Creates an entry ID and message in an event log. Creates, deletes, and manages partitions on the hard drive. Allows users to manage and display filter drivers. Installs additional Windows features. Formats a drive to the file system specified by the user. Provides numerous features related to the file system, such as disk removal.
Compiles self-created dictionaries for handwriting recognition. Installs a compiled dictionary for handwriting recognition. Loads a program into the high memory area UMB — has the same function as loadhigh. Locks a drive so that only a user-selected program can access it directly. Updates all registry entries that have to do with performance indicators.
Creates and manages event trace sessions and performance logs. Configures drive encryption with BitLocker. Displays information about the RAM and indicates which programs are currently loaded in it. Creates and deletes mount points for drives and displays them.
Starts Microsoft Backup replaces backup and restores. Starts the program Microsoft Diagnostics, with which system information can be displayed.
Starts the Windows installer, with which Windows can be installed and configured. Starts an automatic setup process for the multilingual user interface MUI. Installs the minimal operating system Microsoft Windows PE. Recognizes floating point division errors in Pentium chips, starts floating point emulation, and disables floating point hardware.
Installs, uninstalls, and configures packages and functions for Windows. Installs plug-and-play devices from the command prompt. Uses the IDLE status of a processor to reduce energy consumption. Provides information on the currently logged-in users. Configures the Windows recovery environment, with which you can repair the installation of the operating system. Creates a user-defined Windows image to restore the system. Manages the registry of the command prompt. Registers a common information model provider CIM provider in Windows.
Creates new performance indicator protocols from the data in the existing protocols. Repairs and decrypts defective drives that are encrypted with BitLocker. Resets a session. Restores backups that were created with the backup command replaced by msbackup. Manages services by connecting to the Service Controller.
Repairs the registry and allows a backup to be created of it. Analyzes the security settings by comparing the current configurations with templates. Creates or changes environmental variable in the user of system environment. Checks all important and protected system files. Displays information about the Windows installation, including all installed service packages. Creates and deletes TPM virtual smart cards.
Processes logs or real-time data generated during the tracing of computer programs. Displays performance counter data or writes it into a file. Undoes the drive formatting done by the format command. Unlocks a drive that was locked with the lock command. Deletes names as well as descriptions for extensible performance counters in the Windows registry.
Creates, deletes, and displays saved registration information. Manages the volume shadow copy services that can be used to store different versions snapshots of drives. Creates backups of the operating system and delivers information to the created backup copies. Provides information about the current user.
Manages WMI repositories. Evaluates various system factors — for example, processor performance or graphical capabilities. Starts the Windows Management Instrumentation in the command prompt. Displays and edits entries in the Address Resolution Protocol cache. Displays information on asynchronous transfer mode ATM.
Manages and creates certificate registration requirements for certification authorities. Manages services related to certificate authentication. Changes the settings of a terminal server and can be used together with the parameters logon, port, or user replaces the commands chglogon, chgport, and chgusr.
Checks the network capability of apps from the Windows Store. Enables, disables, or adjusts logins for terminal server sessions. Changes the installation mode of a terminal server.
Installs or uninstalls profiles for the connection manager. Provides information about users on remote devices using the Finger service. Displays the MAC address of all network adapters. Connects two computers via serial or parallel connection to share files or printers. Starts an interlnk server and transfers data from one computer to another via serial or parallel connection.
Provides information on the IP of each used network adapter. Changes and displays information on the IPX routing tables. Transfers files via infrared connection, if one is available. Displays all tickets authenticated by the Kerberos service.
Enables network sharing under the Network File System. Starts the network shell, which allows for network settings to be changed on local and remote computers. Provides information on forwarding and package loss when sending over a network and also specifies the latency.
Displays all available remote computers in the network. Displays information on the open remote desktop sessions.
Starts and ends network connections for Microsoft clients. Displays routing tables and makes it possible to change, add, or delete entries. Sends a ping via remote procedure call RPC and checks whether a connection is possible. Creates, deletes, and changes SPNs. Monitors a session on a remote computer. Enables communication with another computer that also uses the telnet protocol. Manages a telnet server on a local or remote computer to be able to use the command, the telnet server functions first have to be enabled in the system settings.
Tracks a data package on the way through the network to a server. Connects the current local user session with a session on a remote computer. Ends the connection between a local user session and a session on a remote computer. Shuts down or restarts a remote terminal server. Removes mounted network file system drives. Manages the Windows time service that synchronizes dates and times on all computers that share an AD DS domain.
Sends or waits on a single. Improve this answer. Sign up or log in Sign up using Google. Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. The Overflow Blog. Podcast Making Agile work for data science. Stack Gives Back Featured on Meta. There are different methods of printing a listing of files.
On this page, we cover how to send output to a file, which can be printed, instead of outputting directly to a printer.
To only display a directory, see: How to list files in a directory or folder on the computer. Microsoft Windows has no easy method of printing the output of a directory to a file or printer. Outputting to a file and printing that file is the next best solution. The command above takes all output of the dir command and writes it to the print.
0コメント