{"id":17,"date":"2022-09-11T09:52:29","date_gmt":"2022-09-11T09:52:29","guid":{"rendered":"https:\/\/mustafauzun.co\/blog\/?p=17"},"modified":"2022-09-11T14:55:28","modified_gmt":"2022-09-11T14:55:28","slug":"list-of-cmd-commands-usages","status":"publish","type":"post","link":"https:\/\/mustafauzun.co\/blog\/list-of-cmd-commands-usages\/","title":{"rendered":"List Of CMD Commands &#038; Usages"},"content":{"rendered":"\n<pre class=\"wp-block-code\"><code><strong>What is CMD<\/strong>\nCommand Prompt, also known as CMD, is a command-line interpreter for Windows operating system.\n\nCmd, in short, is used to run commands or scripts on Windows.\n\n<details><summary><strong>ARP<\/strong><\/summary>\nDisplays and modifies the IP-to-Physical address translation tables used by\naddress resolution protocol (ARP).\n\nARP -s inet_addr eth_addr [if_addr]\nARP -d inet_addr [if_addr]\nARP -a [inet_addr] [-N if_addr] [-v]\n\n  -a            Displays current ARP entries by interrogating the current\n                protocol data.  If inet_addr is specified, the IP and Physical\n                addresses for only the specified computer are displayed.  If\n                more than one network interface uses ARP, entries for each ARP\n                table are displayed.\n  -g            Same as -a.\n  -v            Displays current ARP entries in verbose mode.  All invalid \n                entries and entries on the loop-back interface will be shown.\n  inet_addr     Specifies an internet address.\n  -N if_addr    Displays the ARP entries for the network interface specified\n                by if_addr.\n  -d            Deletes the host specified by inet_addr. inet_addr may be \n                wildcarded with * to delete all hosts.\n  -s            Adds the host and associates the Internet address inet_addr\n                with the Physical address eth_addr.  The Physical address is\n                given as 6 hexadecimal bytes separated by hyphens. The entry\n                is permanent.\n  eth_addr      Specifies a physical address.\n  if_addr       If present, this specifies the Internet address of the\n                interface whose address translation table should be modified.\n                If not present, the first applicable interface will be used.\nExample:\n  &gt; arp -s 157.55.85.212   00-aa-00-62-c6-09  .... Adds a static entry.\n  &gt; arp -a                                    .... Displays the arp table.\n \n<\/details><details><summary><strong>APPWIZ.CPL<\/strong><\/summary>\nThis cmd command to open the Add\/Remove Programs or Uninstall a program list on Windows.\n\n<\/details><details><summary><strong>ASSOC<\/strong><\/summary>\nDisplays or modifies file extension associations\n\nASSOC [.ext[=[fileType]]]\n\n  .ext      Specifies the file extension to associate the file type with\n  fileType  Specifies the file type to associate with the file extension\n\nType ASSOC without parameters to display the current file associations.\nIf ASSOC is invoked with just a file extension, it displays the current\nfile association for that file extension.  Specify nothing for the file\ntype and the command will delete the association for the file extension.\n \n<\/details><details><summary><strong>ATTRIB<\/strong><\/summary>\nDisplays or changes file attributes.\n\nATTRIB [+R | -R] [+A | -A] [+S | -S] [+H | -H] [+O | -O] [+I | -I] [+X | -X] [+P | -P] [+U | -U]\n       [drive:][path][filename] [\/S [\/D]] [\/L]\n\n  +   Sets an attribute.\n  -   Clears an attribute.\n  R   Read-only file attribute.\n  A   Archive file attribute.\n  S   System file attribute.\n  H   Hidden file attribute.\n  O   Offline attribute.\n  I   Not content indexed file attribute.\n  X   No scrub file attribute.\n  V   Integrity attribute.\n  P   Pinned attribute.\n  U   Unpinned attribute.\n  B   SMR Blob attribute.\n  [drive:][path][filename]\n      Specifies a file or files for attrib to process.\n  \/S  Processes matching files in the current folder\n      and all subfolders.\n  \/D  Processes folders as well.\n  \/L  Work on the attributes of the Symbolic Link versus\n      the target of the Symbolic Link\n \n<\/details><details><summary><strong>BCDEDIT<\/strong><\/summary>\nBCDEDIT - Boot Configuration Data Store Editor\n\nThe Bcdedit.exe command-line tool modifies the boot configuration data store.\nThe boot configuration data store contains boot configuration parameters and\ncontrols how the operating system is booted. These parameters were previously\nin the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile\nRAM entries (in Extensible Firmware Interface-based operating systems). You can\nuse Bcdedit.exe to add, delete, edit, and append entries in the boot\nconfiguration data store.\n\nFor detailed command and option information, type bcdedit.exe \/? &lt;command&gt;. For\nexample, to display detailed information about the \/createstore command, type:\n\n     bcdedit.exe \/? \/createstore\n\nFor an alphabetical list of topics in this help file, run \"bcdedit \/? TOPICS\".\n\nCommands that operate on a store\n================================\n\/store          Used to specify a BCD store other than the current system default.\n\/createstore    Creates a new and empty boot configuration data store.\n\/export         Exports the contents of the system store to a file. This file\n                can be used later to restore the state of the system store.\n\/import         Restores the state of the system store using a backup file\n                created with the \/export command.\n\/sysstore       Sets the system store device (only affects EFI systems, does\n                not persist across reboots, and is only used in cases where\n                the system store device is ambiguous).\n\nCommands that operate on entries in a store\n===========================================\n\/copy           Makes copies of entries in the store.\n\/create         Creates new entries in the store.\n\/delete         Deletes entries from the store.\n\/mirror         Creates mirror of entries in the store.\n\nRun bcdedit \/? ID for information about identifiers used by these commands.\n\nCommands that operate on entry options\n======================================\n\/deletevalue    Deletes entry options from the store.\n\/set            Sets entry option values in the store.\n\nRun bcdedit \/? TYPES for a list of datatypes used by these commands.\nRun bcdedit \/? FORMATS for a list of valid data formats.\n\nCommands that control output\n============================\n\/enum           Lists entries in the store.\n\/v              Command-line option that displays entry identifiers in full,\n                rather than using names for well-known identifiers.\n                Use \/v by itself as a command to display entry identifiers\n                in full for the ACTIVE type.\n\nRunning \"bcdedit\" by itself is equivalent to running \"bcdedit \/enum ACTIVE\".\n\nCommands that control the boot manager\n======================================\n\/bootsequence   Sets the one-time boot sequence for the boot manager.\n\/default        Sets the default entry that the boot manager will use.\n\/displayorder   Sets the order in which the boot manager displays the\n                multiboot menu.\n\/timeout        Sets the boot manager time-out value.\n\/toolsdisplayorder  Sets the order in which the boot manager displays\n                    the tools menu.\n\nCommands that control Emergency Management Services for a boot application\n==========================================================================\n\/bootems        Enables or disables Emergency Management Services\n                for a boot application.\n\/ems            Enables or disables Emergency Management Services for an\n                operating system entry.\n\/emssettings    Sets the global Emergency Management Services parameters.\n\nCommand that control debugging\n==============================\n\/bootdebug      Enables or disables boot debugging for a boot application.\n\/dbgsettings    Sets the global debugger parameters.\n\/debug          Enables or disables kernel debugging for an operating system\n                entry.\n\/hypervisorsettings  Sets the hypervisor parameters.\n\nCommand that control remote event logging\n=========================================\n\/eventsettings  Sets the global remote event logging parameters.\n\/event          Enables or disables remote event logging for an operating \n                system entry.\n\n \n<\/details><details><summary><strong>BOOTCFG<\/strong><\/summary>\nBOOTCFG \/parameter [arguments]\n\nDescription:\n    This command line tool can be used to configure, query, change or\n    delete the boot entry settings in the BOOT.INI file.\n\nParameter List:\n    \/Copy       Makes a copy of an existing boot entry.\n\n    \/Delete     Deletes an existing boot entry from the BOOT.INI file.\n\n    \/Query      Displays the current boot entries and their settings.\n\n    \/Raw        Allows the user to specify any switch to be added.\n\n    \/Timeout    Allows the user to change the Timeout value.\n\n    \/Default    Allows the user to change the Default boot entry.\n\n    \/EMS        Allows the user to configure the \/redirect switch\n                for headless support.\n\n    \/Debug      Allows the user to specify the port and baudrate for\n                remote debugging.\n\n    \/Addsw      Allows the user to add predefined switches.\n\n    \/Rmsw       Allows the user to remove predefined switches.\n\n    \/Dbg1394    Allows the user to configure 1394 port for debugging.\n\n    \/?          Displays this help message.\n\nExamples:\n    BOOTCFG \/Copy \/?\n    BOOTCFG \/Delete \/?\n    BOOTCFG \/Query \/?\n    BOOTCFG \/Raw \/?\n    BOOTCFG \/Timeout \/?\n    BOOTCFG \/EMS \/?\n    BOOTCFG \/Debug \/?\n    BOOTCFG \/Addsw \/?\n    BOOTCFG \/Rmsw \/?\n    BOOTCFG \/Dbg1394 \/?\n    BOOTCFG \/Default \/?\n    BOOTCFG \/?\n\nWARNING: BOOT.INI is used for boot options on Windows XP and earlier\n         operating systems.  Use the BCDEDIT command line tool to modify\n         Windows Vista boot options.\n\n<\/details><details><summary><strong>BREAK<\/strong><\/summary>\nSets or Clears Extended CTRL+C checking on DOS system\n\nThis is present for Compatibility with DOS systems. It has no effect\nunder Windows.\n\nIf Command Extensions are enabled, and running on the Windows\nplatform, then the BREAK command will enter a hard coded breakpoint\nif being debugged by a debugger.\n \n<\/details><details><summary><strong>CACLS<\/strong><\/summary>\nNOTE: Cacls is now deprecated, please use Icacls.\n\n\n\nDisplays or modifies access control lists (ACLs) of files\n\n\n\nCACLS filename [\/T] [\/M] [\/L] [\/S[:SDDL]] [\/E] [\/C] [\/G user:perm]\n\n        [\/R user [...]] [\/P user:perm [...]] [\/D user [...]]\n\n    filename      Displays ACLs.\n\n    \/T            Changes ACLs of specified files in\n\n                  the current directory and all subdirectories.\n\n    \/L            Work on the Symbolic Link itself versus the target\n\n    \/M            Changes ACLs of volumes mounted to a directory\n\n    \/S            Displays the SDDL string for the DACL.\n\n    \/S:SDDL       Replaces the ACLs with those specified in the SDDL string\n\n                  (not valid with \/E, \/G, \/R, \/P, or \/D).\n\n    \/E            Edit ACL instead of replacing it.\n\n    \/C            Continue on access denied errors.\n\n    \/G user:perm  Grant specified user access rights.\n\n                  Perm can be: R  Read\n\n                               W  Write\n\n                               C  Change (write)\n\n                               F  Full control\n\n    \/R user       Revoke specified user's access rights (only valid with \/E).\n\n    \/P user:perm  Replace specified user's access rights.\n\n                  Perm can be: N  None\n\n                               R  Read\n\n                               W  Write\n\n                               C  Change (write)\n\n                               F  Full control\n\n    \/D user       Deny specified user access.\n\nWildcards can be used to specify more than one file in a command.\n\nYou can specify more than one user in a command.\n\n\n\nAbbreviations:\n\n    CI - Container Inherit.\n\n         The ACE will be inherited by directories.\n\n    OI - Object Inherit.\n\n         The ACE will be inherited by files.\n\n    IO - Inherit Only.\n\n         The ACE does not apply to the current file\/directory.\n\n    ID - Inherited.\n\n         The ACE was inherited from the parent directory's ACL.\n\n \n<\/details><details><summary><strong>CALC<\/strong><\/summary>\nThis cmd command to open Calculator on Windows.\n\n<\/details><details><summary><strong>CALL<\/strong><\/summary>\nCalls one batch program from another.\n\nCALL [drive:][path]filename [batch-parameters]\n\n  batch-parameters   Specifies any command-line information required by the\n                     batch program.\n\nIf Command Extensions are enabled CALL changes as follows:\n\nCALL command now accepts labels as the target of the CALL.  The syntax\nis:\n\n    CALL :label arguments\n\nA new batch file context is created with the specified arguments and\ncontrol is passed to the statement after the label specified.  You must\n\"exit\" twice by reaching the end of the batch script file twice.  The\nfirst time you read the end, control will return to just after the CALL\nstatement.  The second time will exit the batch script.  Type GOTO \/?\nfor a description of the GOTO :EOF extension that will allow you to\n\"return\" from a batch script.\n\nIn addition, expansion of batch script argument references (%0, %1,\netc.) have been changed as follows:\n\n\n    %* in a batch script refers to all the arguments (e.g. %1 %2 %3\n        %4 %5 ...)\n\n    Substitution of batch parameters (%n) has been enhanced.  You can\n    now use the following optional syntax:\n\n        %~1         - expands %1 removing any surrounding quotes (\")\n        %~f1        - expands %1 to a fully qualified path name\n        %~d1        - expands %1 to a drive letter only\n        %~p1        - expands %1 to a path only\n        %~n1        - expands %1 to a file name only\n        %~x1        - expands %1 to a file extension only\n        %~s1        - expanded path contains short names only\n        %~a1        - expands %1 to file attributes\n        %~t1        - expands %1 to date\/time of file\n        %~z1        - expands %1 to size of file\n        %~$PATH:1   - searches the directories listed in the PATH\n                       environment variable and expands %1 to the fully\n                       qualified name of the first one found.  If the\n                       environment variable name is not defined or the\n                       file is not found by the search, then this\n                       modifier expands to the empty string\n\n    The modifiers can be combined to get compound results:\n\n        %~dp1       - expands %1 to a drive letter and path only\n        %~nx1       - expands %1 to a file name and extension only\n        %~dp$PATH:1 - searches the directories listed in the PATH\n                       environment variable for %1 and expands to the\n                       drive letter and path of the first one found.\n        %~ftza1     - expands %1 to a DIR like output line\n\n    In the above examples %1 and PATH can be replaced by other\n    valid values.  The %~ syntax is terminated by a valid argument\n    number.  The %~ modifiers may not be used with %*\n \n<\/details><details><summary><strong>CD<\/strong><\/summary>\nDisplays the name of or changes the current directory.\n\nCHDIR [\/D] [drive:][path]\nCHDIR [..]\nCD [\/D] [drive:][path]\nCD [..]\n\n  ..   Specifies that you want to change to the parent directory.\n\nType CD drive: to display the current directory in the specified drive.\nType CD without parameters to display the current drive and directory.\n\nUse the \/D switch to change current drive in addition to changing current\ndirectory for a drive.\n\nIf Command Extensions are enabled CHDIR changes as follows:\n\nThe current directory string is converted to use the same case as\nthe on disk names.  So CD C:\\TEMP would actually set the current\ndirectory to C:\\Temp if that is the case on disk.\n\nCHDIR command does not treat spaces as delimiters, so it is possible to\nCD into a subdirectory name that contains a space without surrounding\nthe name with quotes.  For example:\n\n    cd \\winnt\\profiles\\username\\programs\\start menu\n\nis the same as:\n\n    cd \"\\winnt\\profiles\\username\\programs\\start menu\"\n\nwhich is what you would have to type if extensions were disabled.\n \n<\/details><details><summary><strong>CERTMGR.MSC<\/strong><\/summary>\nThis cmd command to open Certificate Manager on Windows.\n \n<\/details><details><summary><strong>CHANGE<\/strong><\/summary>\nCHANGE { LOGON | PORT | USER }\n \n<\/details><details><summary><strong>CHARMAP.EXE<\/strong><\/summary>\nThis cmd command to open Character Map on Windows.\n \n<\/details><details><summary><strong>CHCP<\/strong><\/summary>\nDisplays or sets the active code page number.\n\nCHCP [nnn]\n\n  nnn   Specifies a code page number.\n\nType CHCP without a parameter to display the active code page number.\n\n<\/details><details><summary><strong>CHDIR<\/strong><\/summary>\nDisplays the name of or changes the current directory.\n\nCHDIR [\/D] [drive:][path]\nCHDIR [..]\nCD [\/D] [drive:][path]\nCD [..]\n\n  ..   Specifies that you want to change to the parent directory.\n\nType CD drive: to display the current directory in the specified drive.\nType CD without parameters to display the current drive and directory.\n\nUse the \/D switch to change current drive in addition to changing current\ndirectory for a drive.\n\nIf Command Extensions are enabled CHDIR changes as follows:\n\nThe current directory string is converted to use the same case as\nthe on disk names.  So CD C:\\TEMP would actually set the current\ndirectory to C:\\Temp if that is the case on disk.\n\nCHDIR command does not treat spaces as delimiters, so it is possible to\nCD into a subdirectory name that contains a space without surrounding\nthe name with quotes.  For example:\n\n    cd \\winnt\\profiles\\username\\programs\\start menu\n\nis the same as:\n\n    cd \"\\winnt\\profiles\\username\\programs\\start menu\"\n\nwhich is what you would have to type if extensions were disabled.\n \n<\/details><details><summary><strong>CHKDSK<\/strong><\/summary>\nChecks a disk and displays a status report.\n\n\nCHKDSK [volume[[path]filename]]] [\/F] [\/V] [\/R] [\/X] [\/I] [\/C] [\/L[:size]] [\/B] [\/scan] [\/spotfix]\n\n\n  volume              Specifies the drive letter (followed by a colon),\n                      mount point, or volume name.\n  filename            FAT\/FAT32 only: Specifies the files to check for\n                      fragmentation.\n  \/F                  Fixes errors on the disk.\n  \/V                  On FAT\/FAT32: Displays the full path and name of every\n                      file on the disk.\n                      On NTFS: Displays cleanup messages if any.\n  \/R                  Locates bad sectors and recovers readable information\n                      (implies \/F, when \/scan not specified).\n  \/L:size             NTFS only:  Changes the log file size to the specified\n                      number of kilobytes.  If size is not specified, displays\n                      current size.\n  \/X                  Forces the volume to dismount first if necessary.\n                      All opened handles to the volume would then be invalid\n                      (implies \/F).\n  \/I                  NTFS only: Performs a less vigorous check of index\n                      entries.\n  \/C                  NTFS only: Skips checking of cycles within the folder\n                      structure.\n  \/B                  NTFS only: Re-evaluates bad clusters on the volume\n                      (implies \/R)\n  \/scan               NTFS only: Runs an online scan on the volume\n  \/forceofflinefix    NTFS only: (Must be used with \"\/scan\")\n                      Bypass all online repair; all defects found\n                      are queued for offline repair (i.e. \"chkdsk \/spotfix\").\n  \/perf               NTFS only: (Must be used with \"\/scan\")\n                      Uses more system resources to complete a scan as fast as\n                      possible. This may have a negative performance impact on\n                      other tasks running on the system.\n  \/spotfix            NTFS only: Runs spot fixing on the volume\n  \/sdcleanup          NTFS only: Garbage collect unneeded security descriptor\n                      data (implies \/F).\n  \/offlinescanandfix  Runs an offline scan and fix on the volume.\n  \/freeorphanedchains FAT\/FAT32\/exFAT only: Frees any orphaned cluster chains\n                      instead of recovering their contents.\n  \/markclean          FAT\/FAT32\/exFAT only: Marks the volume clean if no\n                      corruption was detected, even if \/F was not specified.\n\nThe \/I or \/C switch reduces the amount of time required to run Chkdsk by\nskipping certain checks of the volume.\n \n<\/details><details><summary><strong>CHKNTFS<\/strong><\/summary>\nDisplays or modifies the checking of disk at boot time.\n\nCHKNTFS volume [...]\nCHKNTFS \/D\nCHKNTFS \/T[:time]\nCHKNTFS \/X volume [...]\nCHKNTFS \/C volume [...]\n\n  volume         Specifies the drive letter (followed by a colon),\n                 mount point, or volume name.\n  \/D             Restores the machine to the default behavior; all drives are\n                 checked at boot time and chkdsk is run on those that are\n                 dirty.\n  \/T:time        Changes the AUTOCHK initiation countdown time to the\n                 specified amount of time in seconds.  If time is not\n                 specified, displays the current setting.\n  \/X             Excludes a drive from the default boot-time check.  Excluded\n                 drives are not accumulated between command invocations.\n  \/C             Schedules a drive to be checked at boot time; chkdsk will run\n                 if the drive is dirty.\n\nIf no switches are specified, CHKNTFS will display if the specified drive is\ndirty or scheduled to be checked on next reboot.\n \n<\/details><details><summary><strong>CIPHER<\/strong><\/summary>\nDisplays or alters the encryption of directories [files] on NTFS partitions.\n\n  CIPHER [\/E | \/D | \/C]\n         [\/S:directory] [\/B] [\/H] [pathname [...]]\n\n  CIPHER \/K [\/ECC:256|384|521]\n\n  CIPHER \/R:filename [\/SMARTCARD] [\/ECC:256|384|521]\n\n  CIPHER \/P:filename.cer\n\n  CIPHER \/U [\/N]\n\n  CIPHER \/W:directory\n\n  CIPHER \/X[:efsfile] [filename]\n\n  CIPHER \/Y\n\n  CIPHER \/ADDUSER [\/CERTHASH:hash | \/CERTFILE:filename | \/USER:username]\n         [\/S:directory] [\/B] [\/H] [pathname [...]]\n\n  CIPHER \/FLUSHCACHE [\/SERVER:servername]\n\n  CIPHER \/REMOVEUSER \/CERTHASH:hash\n         [\/S:directory] [\/B] [\/H] [pathname [...]]\n\n  CIPHER \/REKEY [pathname [...]]\n\n    \/B        Abort if an error is encountered. By default, CIPHER continues\n              executing even if errors are encountered.\n    \/C        Displays information on the encrypted file.\n    \/D        Decrypts the specified files or directories.\n    \/E        Encrypts the specified files or directories. Directories will be\n              marked so that files added afterward will be encrypted. The\n              encrypted file could become decrypted when it is modified if the\n              parent directory is not encrypted. It is recommended that you\n              encrypt the file and the parent directory.\n    \/H        Displays files with the hidden or system attributes. These files\n              are omitted by default.\n    \/K        Creates a new certificate and key for use with EFS. If this\n              option is chosen, all the other options will be ignored.\n\n              Note: By default, \/K creates a certificate and key that conform\n                    to current group policy. If ECC is specified, a self-signed\n                    certificate will be created with the supplied key size.\n\n    \/N        This option only works with \/U. This will prevent keys being\n              updated. This is used to find all the encrypted files on the\n              local drives.\n    \/R        Generates an EFS recovery key and certificate, then writes them\n              to a .PFX file (containing certificate and private key) and a\n              .CER file (containing only the certificate). An administrator may\n              add the contents of the .CER to the EFS recovery policy to create\n              the recovery key for users, and import the .PFX to recover\n              individual files. If SMARTCARD is specified, then writes the\n              recovery key and certificate to a smart card. A .CER file is\n              generated (containing only the certificate). No .PFX file is\n              generated.\n\n              Note: By default, \/R creates an 2048-bit RSA recovery key and\n                    certificate. If ECC is specified, it must be followed by a\n                    key size of 256, 384, or 521.\n\n    \/P        Creates a base64-encoded recovery-policy blob from the passed-in\n              certificate. This blob can be used to set DRA policy for\n              MDM deployments.\n    \/S        Performs the specified operation on the given directory and all\n              files and subdirectories within it.\n    \/U        Tries to touch all the encrypted files on local drives. This will\n              update user's file encryption key or recovery keys to the current\n              ones if they are changed. This option does not work with other\n              options except \/N.\n    \/W        Removes data from available unused disk space on the entire\n              volume. If this option is chosen, all other options are ignored.\n              The directory specified can be anywhere in a local volume. If it\n              is a mount point or points to a directory in another volume, the\n              data on that volume will be removed.\n    \/X        Backup EFS certificate and keys into file filename. If efsfile is\n              provided, the current user's certificate(s) used to encrypt the\n              file will be backed up. Otherwise, the user's current EFS\n              certificate and keys will be backed up.\n    \/Y        Displays your current EFS certificate thumbprint on the local PC.\n    \/ADDUSER  Adds a user to the specified encrypted file(s). If CERTHASH is\n              provided, cipher will search for a certificate with this SHA1\n              hash. If CERTFILE is provided, cipher will extract the\n              certificate from the file. If USER is provided, cipher will\n              try to locate the user's certificate in Active Directory Domain\n              Services.\n    \/FLUSHCACHE\n              Clears the calling user's EFS key cache on the specified server.\n              If servername is not provided, cipher clears the user's key cache\n              on the local machine.\n    \/REKEY    Updates the specified encrypted file(s) to use the configured\n              EFS current key.\n    \/REMOVEUSER\n              Removes a user from the specified file(s). CERTHASH must be the\n              SHA1 hash of the certificate to remove.\n\n    directory A directory path.\n    filename  A filename without extensions.\n    pathname  Specifies a pattern, file or directory.\n    efsfile   An encrypted file path.\n\n    Used without parameters, CIPHER displays the encryption state of the\n    current directory and any files it contains. You may use multiple directory\n    names and wildcards. You must put spaces between multiple parameters.\n\n \n<\/details><details><summary><strong>CLEANMGR.EXE<\/strong><\/summary>\nThis cmd command to open Disk Cleanup Manager on Windows.\n\n<\/details><details><summary><strong>CLS<\/strong><\/summary>\nClears the screen.\n \n<\/details><details><summary><strong>CMD<\/strong><\/summary>\nStarts a new instance of the Windows command interpreter\n\nCMD [\/A | \/U] [\/Q] [\/D] [\/E:ON | \/E:OFF] [\/F:ON | \/F:OFF] [\/V:ON | \/V:OFF]\n    [[\/S] [\/C | \/K] string]\n\n\/C      Carries out the command specified by string and then terminates\n\/K      Carries out the command specified by string but remains\n\/S      Modifies the treatment of string after \/C or \/K (see below)\n\/Q      Turns echo off\n\/D      Disable execution of AutoRun commands from registry (see below)\n\/A      Causes the output of internal commands to a pipe or file to be ANSI\n\/U      Causes the output of internal commands to a pipe or file to be\n        Unicode\n\/T:fg   Sets the foreground\/background colors (see COLOR \/? for more info)\n\/E:ON   Enable command extensions (see below)\n\/E:OFF  Disable command extensions (see below)\n\/F:ON   Enable file and directory name completion characters (see below)\n\/F:OFF  Disable file and directory name completion characters (see below)\n\/V:ON   Enable delayed environment variable expansion using ! as the\n        delimiter. For example, \/V:ON would allow !var! to expand the\n        variable var at execution time.  The var syntax expands variables\n        at input time, which is quite a different thing when inside of a FOR\n        loop.\n\/V:OFF  Disable delayed environment expansion.\n\nNote that multiple commands separated by the command separator '&amp;&amp;'\nare accepted for string if surrounded by quotes.  Also, for compatibility\nreasons, \/X is the same as \/E:ON, \/Y is the same as \/E:OFF and \/R is the\nsame as \/C.  Any other switches are ignored.\n\nIf \/C or \/K is specified, then the remainder of the command line after\nthe switch is processed as a command line, where the following logic is\nused to process quote (\") characters:\n\n    1.  If all of the following conditions are met, then quote characters\n        on the command line are preserved:\n\n        - no \/S switch\n        - exactly two quote characters\n        - no special characters between the two quote characters,\n          where special is one of: &amp;&lt;&gt;()@^|\n        - there are one or more whitespace characters between the\n          two quote characters\n        - the string between the two quote characters is the name\n          of an executable file.\n\n    2.  Otherwise, old behavior is to see if the first character is\n        a quote character and if so, strip the leading character and\n        remove the last quote character on the command line, preserving\n        any text after the last quote character.\n\nIf \/D was NOT specified on the command line, then when CMD.EXE starts, it\nlooks for the following REG_SZ\/REG_EXPAND_SZ registry variables, and if\neither or both are present, they are executed first.\n\n    HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Command Processor\\AutoRun\n\n        and\/or\n\n    HKEY_CURRENT_USER\\Software\\Microsoft\\Command Processor\\AutoRun\n\nCommand Extensions are enabled by default.  You may also disable\nextensions for a particular invocation by using the \/E:OFF switch.  You\ncan enable or disable extensions for all invocations of CMD.EXE on a\nmachine and\/or user logon session by setting either or both of the\nfollowing REG_DWORD values in the registry using REGEDIT.EXE:\n\n    HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Command Processor\\EnableExtensions\n\n        and\/or\n\n    HKEY_CURRENT_USER\\Software\\Microsoft\\Command Processor\\EnableExtensions\n\nto either 0x1 or 0x0.  The user specific setting takes precedence over\nthe machine setting.  The command line switches take precedence over the\nregistry settings.\n\nIn a batch file, the SETLOCAL ENABLEEXTENSIONS or DISABLEEXTENSIONS arguments\ntakes precedence over the \/E:ON or \/E:OFF switch. See SETLOCAL \/? for details.\n\nThe command extensions involve changes and\/or additions to the following\ncommands:\n\n    DEL or ERASE\n    COLOR\n    CD or CHDIR\n    MD or MKDIR\n    PROMPT\n    PUSHD\n    POPD\n    SET\n    SETLOCAL\n    ENDLOCAL\n    IF\n    FOR\n    CALL\n    SHIFT\n    GOTO\n    START (also includes changes to external command invocation)\n    ASSOC\n    FTYPE\n\nTo get specific details, type commandname \/? to view the specifics.\n\nDelayed environment variable expansion is NOT enabled by default.  You\ncan enable or disable delayed environment variable expansion for a\nparticular invocation of CMD.EXE with the \/V:ON or \/V:OFF switch.  You\ncan enable or disable delayed expansion for all invocations of CMD.EXE on a\nmachine and\/or user logon session by setting either or both of the\nfollowing REG_DWORD values in the registry using REGEDIT.EXE:\n\n    HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Command Processor\\DelayedExpansion\n\n        and\/or\n\n    HKEY_CURRENT_USER\\Software\\Microsoft\\Command Processor\\DelayedExpansion\n\nto either 0x1 or 0x0.  The user specific setting takes precedence over\nthe machine setting.  The command line switches take precedence over the\nregistry settings.\n\nIn a batch file the SETLOCAL ENABLEDELAYEDEXPANSION or DISABLEDELAYEDEXPANSION\narguments takes precedence over the \/V:ON or \/V:OFF switch. See SETLOCAL \/?\nfor details.\n\nIf delayed environment variable expansion is enabled, then the exclamation\ncharacter can be used to substitute the value of an environment variable\nat execution time.\n\nYou can enable or disable file name completion for a particular\ninvocation of CMD.EXE with the \/F:ON or \/F:OFF switch.  You can enable\nor disable completion for all invocations of CMD.EXE on a machine and\/or\nuser logon session by setting either or both of the following REG_DWORD\nvalues in the registry using REGEDIT.EXE:\n\n    HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Command Processor\\CompletionChar\n    HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Command Processor\\PathCompletionChar\n\n        and\/or\n\n    HKEY_CURRENT_USER\\Software\\Microsoft\\Command Processor\\CompletionChar\n    HKEY_CURRENT_USER\\Software\\Microsoft\\Command Processor\\PathCompletionChar\n\nwith the hex value of a control character to use for a particular\nfunction (e.g.  0x4 is Ctrl-D and 0x6 is Ctrl-F).  The user specific\nsettings take precedence over the machine settings.  The command line\nswitches take precedence over the registry settings.\n\nIf completion is enabled with the \/F:ON switch, the two control\ncharacters used are Ctrl-D for directory name completion and Ctrl-F for\nfile name completion.  To disable a particular completion character in\nthe registry, use the value for space (0x20) as it is not a valid\ncontrol character.\n\nCompletion is invoked when you type either of the two control\ncharacters.  The completion function takes the path string to the left\nof the cursor appends a wild card character to it if none is already\npresent and builds up a list of paths that match.  It then displays the\nfirst matching path.  If no paths match, it just beeps and leaves the\ndisplay alone.  Thereafter, repeated pressing of the same control\ncharacter will cycle through the list of matching paths.  Pressing the\nShift key with the control character will move through the list\nbackwards.  If you edit the line in any way and press the control\ncharacter again, the saved list of matching paths is discarded and a new\none generated.  The same occurs if you switch between file and directory\nname completion.  The only difference between the two control characters\nis the file completion character matches both file and directory names,\nwhile the directory completion character only matches directory names.\nIf file completion is used on any of the built in directory commands\n(CD, MD or RD) then directory completion is assumed.\n\nThe completion code deals correctly with file names that contain spaces\nor other special characters by placing quotes around the matching path.\nAlso, if you back up, then invoke completion from within a line, the\ntext to the right of the cursor at the point completion was invoked is\ndiscarded.\n\nThe special characters that require quotes are:\n     &lt;space&gt;\n     &amp;()[]{}^=;!'+,`~\n \n<\/details><details><summary><strong>COLOR<\/strong><\/summary>\nSets the default console foreground and background colors.\n\nCOLOR [attr]\n\n  attr        Specifies color attribute of console output\n\nColor attributes are specified by TWO hex digits -- the first\ncorresponds to the background; the second the foreground.  Each digit\ncan be any of the following values:\n\n    0 = Black       8 = Gray\n    1 = Blue        9 = Light Blue\n    2 = Green       A = Light Green\n    3 = Aqua        B = Light Aqua\n    4 = Red         C = Light Red\n    5 = Purple      D = Light Purple\n    6 = Yellow      E = Light Yellow\n    7 = White       F = Bright White\n\nIf no argument is given, this command restores the color to what it was\nwhen CMD.EXE started.  This value either comes from the current console\nwindow, the \/T command line switch or from the DefaultColor registry\nvalue.\n\nThe COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute\nthe COLOR command with a foreground and background color that are the\nsame.\n\nExample: \"COLOR fc\" produces light red on bright white\n \n<\/details><details><summary><strong>COMEXP.MSC<\/strong><\/summary>\nThis cmd command to open Component Services on Windows.\n \n<\/details><details><summary><strong>COMP<\/strong><\/summary>\nCompares the contents of two files or sets of files.\n\nCOMP [data1] [data2] [\/D] [\/A] [\/L] [\/N=number] [\/C] [\/OFF[LINE]] [\/M]\n\n  data1      Specifies location and name(s) of first file(s) to compare.\n  data2      Specifies location and name(s) of second files to compare.\n  \/D         Displays differences in decimal format.\n  \/A         Displays differences in ASCII characters.\n  \/L         Displays line numbers for differences.\n  \/N=number  Compares only the first specified number of lines in each file.\n  \/C         Disregards case of ASCII letters when comparing files.\n  \/OFF[LINE] Do not skip files with offline attribute set.\n  \/M         Do not prompt for compare more files.\n\nTo compare sets of files, use wildcards in data1 and data2 parameters.\n \n<\/details><details><summary><strong>COMPACT<\/strong><\/summary>\nDisplays or alters the compression of files on NTFS partitions.\n\nCOMPACT [\/C | \/U] [\/S[:dir]] [\/A] [\/I] [\/F] [\/Q] [\/EXE[:algorithm]]\n        [\/CompactOs[:option] [\/WinDir:dir]] [filename [...]]\n\n  \/C         Compresses the specified files.  Directories will be marked\n             so that files added afterward will be compressed unless \/EXE\n             is specified.\n  \/U         Uncompresses the specified files.  Directories will be marked\n             so that files added afterward will not be compressed.  If\n             \/EXE is specified, only files compressed as executables will\n             be uncompressed; if this is omitted, only NTFS compressed\n             files will be uncompressed.\n  \/S         Performs the specified operation on files in the given\n             directory and all subdirectories.  Default \"dir\" is the\n             current directory.\n  \/A         Displays files with the hidden or system attributes.  These\n             files are omitted by default.\n  \/I         Continues performing the specified operation even after errors\n             have occurred.  By default, COMPACT stops when an error is\n             encountered.\n  \/F         Forces the compress operation on all specified files, even\n             those which are already compressed.  Already-compressed files\n             are skipped by default.\n  \/Q         Reports only the most essential information.\n  \/EXE       Use compression optimized for executable files which are read\n             frequently and not modified.  Supported algorithms are:\n             XPRESS4K  (fastest) (default)\n             XPRESS8K\n             XPRESS16K\n             LZX       (most compact)\n  \/CompactOs Set or query the system's compression state.  Supported options are:\n             query  - Query the system's Compact state.\n             always - Compress all OS binaries and set the system state to Compact\n                      which remains unless administrator changes it.\n             never  - Uncompress all OS binaries and set the system state to non\n                      Compact which remains unless administrator changes it.\n  \/WinDir    Used with \/CompactOs:query, when querying the offline OS. Specifies\n             the directory where Windows is installed.\n  filename   Specifies a pattern, file, or directory.\n\n  Used without parameters, COMPACT displays the compression state of\n  the current directory and any files it contains. You may use multiple\n  filenames and wildcards.  You must put spaces between multiple\n  parameters.\n \n<\/details><details><summary><strong>COMPMGMT.MSC<\/strong><\/summary>\nThis cmd command to open Computer Management Console on Windows.\n \n<\/details><details><summary><strong>CONVERT<\/strong><\/summary>\nConverts a FAT volume to NTFS.\n\nCONVERT volume \/FS:NTFS [\/V] [\/CvtArea:filename] [\/NoSecurity] [\/X]\n\n\n  volume      Specifies the drive letter (followed by a colon),\n              mount point, or volume name.\n  \/FS:NTFS    Specifies that the volume will be converted to NTFS.\n  \/V          Specifies that Convert will be run in verbose mode.\n  \/CvtArea:filename\n              Specifies a contiguous file in the root directory\n              that will be the place holder for NTFS system files.\n  \/NoSecurity Specifies that the security settings on the converted\n              files and directories allow access by all users.\n  \/X          Forces the volume to dismount first if necessary.\n              All open handles to the volume will not be valid. \n\n<\/details><details><summary><strong>COPY<\/strong><\/summary>\nCopies one or more files to another location.\n\nCOPY [\/D] [\/V] [\/N] [\/Y | \/-Y] [\/Z] [\/L] [\/A | \/B ] source [\/A | \/B]\n     [+ source [\/A | \/B] [+ ...]] [destination [\/A | \/B]]\n\n  source       Specifies the file or files to be copied.\n  \/A           Indicates an ASCII text file.\n  \/B           Indicates a binary file.\n  \/D           Allow the destination file to be created decrypted\n  destination  Specifies the directory and\/or filename for the new file(s).\n  \/V           Verifies that new files are written correctly.\n  \/N           Uses short filename, if available, when copying a file with a\n               non-8dot3 name.\n  \/Y           Suppresses prompting to confirm you want to overwrite an\n               existing destination file.\n  \/-Y          Causes prompting to confirm you want to overwrite an\n               existing destination file.\n  \/Z           Copies networked files in restartable mode.\n  \/L           If the source is a symbolic link, copy the link to the target\n               instead of the actual file the source link points to.\n\nThe switch \/Y may be preset in the COPYCMD environment variable.\nThis may be overridden with \/-Y on the command line.  Default is\nto prompt on overwrites unless COPY command is being executed from\nwithin a batch script.\n\nTo append files, specify a single file for destination, but multiple files\nfor source (using wildcards or file1+file2+file3 format).\n \n<\/details><details><summary><strong>CURL<\/strong><\/summary>\nUsage: curl [options...] &lt;url&gt;\n     --abstract-unix-socket &lt;path&gt; Connect via abstract Unix domain socket\n     --alt-svc &lt;file name&gt; Enable alt-svc with this cache file\n     --anyauth            Pick any authentication method\n -a, --append             Append to target file when uploading\n     --aws-sigv4 &lt;provider1[:provider2[:region[:service]]]&gt; Use AWS V4 signature authentication\n     --basic              Use HTTP Basic Authentication\n     --cacert &lt;file&gt;      CA certificate to verify peer against\n     --capath &lt;dir&gt;       CA directory to verify peer against\n -E, --cert &lt;certificate[:password]&gt; Client certificate file and password\n     --cert-status        Verify the status of the server cert via OCSP-staple\n     --cert-type &lt;type&gt;   Certificate type (DER\/PEM\/ENG\/P12)\n     --ciphers &lt;list of ciphers&gt; SSL ciphers to use\n     --compressed         Request compressed response\n     --compressed-ssh     Enable SSH compression\n -K, --config &lt;file&gt;      Read config from a file\n     --connect-timeout &lt;fractional seconds&gt; Maximum time allowed for connection\n     --connect-to &lt;HOST1:PORT1:HOST2:PORT2&gt; Connect to host\n -C, --continue-at &lt;offset&gt; Resumed transfer offset\n -b, --cookie &lt;data|filename&gt; Send cookies from string\/file\n -c, --cookie-jar &lt;filename&gt; Write cookies to &lt;filename&gt; after operation\n     --create-dirs        Create necessary local directory hierarchy\n     --create-file-mode &lt;mode&gt; File mode for created files\n     --crlf               Convert LF to CRLF in upload\n     --crlfile &lt;file&gt;     Use this CRL list\n     --curves &lt;algorithm list&gt; (EC) TLS key exchange algorithm(s) to request\n -d, --data &lt;data&gt;        HTTP POST data\n     --data-ascii &lt;data&gt;  HTTP POST ASCII data\n     --data-binary &lt;data&gt; HTTP POST binary data\n     --data-raw &lt;data&gt;    HTTP POST data, '@' allowed\n     --data-urlencode &lt;data&gt; HTTP POST data URL encoded\n     --delegation &lt;LEVEL&gt; GSS-API delegation permission\n     --digest             Use HTTP Digest Authentication\n -q, --disable            Disable .curlrc\n     --disable-eprt       Inhibit using EPRT or LPRT\n     --disable-epsv       Inhibit using EPSV\n     --disallow-username-in-url Disallow username in URL\n     --dns-interface &lt;interface&gt; Interface to use for DNS requests\n     --dns-ipv4-addr &lt;address&gt; IPv4 address to use for DNS requests\n     --dns-ipv6-addr &lt;address&gt; IPv6 address to use for DNS requests\n     --dns-servers &lt;addresses&gt; DNS server addrs to use\n     --doh-cert-status    Verify the status of the DoH server cert via OCSP-staple\n     --doh-insecure       Allow insecure DoH server connections\n     --doh-url &lt;URL&gt;      Resolve host names over DoH\n -D, --dump-header &lt;filename&gt; Write the received headers to &lt;filename&gt;\n     --egd-file &lt;file&gt;    EGD socket path for random data\n     --engine &lt;name&gt;      Crypto engine to use\n     --etag-compare &lt;file&gt; Pass an ETag from a file as a custom header\n     --etag-save &lt;file&gt;   Parse ETag from a request and save it to a file\n     --expect100-timeout &lt;seconds&gt; How long to wait for 100-continue\n -f, --fail               Fail fast with no output on HTTP errors\n     --fail-early         Fail on first transfer error, do not continue\n     --fail-with-body     Fail on HTTP errors but save the body\n     --false-start        Enable TLS False Start\n -F, --form &lt;name=content&gt; Specify multipart MIME data\n     --form-escape        Escape multipart form field\/file names using backslash\n     --form-string &lt;name=string&gt; Specify multipart MIME data\n     --ftp-account &lt;data&gt; Account data string\n     --ftp-alternative-to-user &lt;command&gt; String to replace USER [name]\n     --ftp-create-dirs    Create the remote dirs if not present\n     --ftp-method &lt;method&gt; Control CWD usage\n     --ftp-pasv           Use PASV\/EPSV instead of PORT\n -P, --ftp-port &lt;address&gt; Use PORT instead of PASV\n     --ftp-pret           Send PRET before PASV\n     --ftp-skip-pasv-ip   Skip the IP address for PASV\n     --ftp-ssl-ccc        Send CCC after authenticating\n     --ftp-ssl-ccc-mode &lt;active\/passive&gt; Set CCC mode\n     --ftp-ssl-control    Require SSL\/TLS for FTP login, clear for transfer\n -G, --get                Put the post data in the URL and use GET\n -g, --globoff            Disable URL sequences and ranges using {} and []\n     --happy-eyeballs-timeout-ms &lt;milliseconds&gt; Time for IPv6 before trying IPv4\n     --haproxy-protocol   Send HAProxy PROXY protocol v1 header\n -I, --head               Show document info only\n -H, --header &lt;header\/@file&gt; Pass custom header(s) to server\n -h, --help &lt;category&gt;    Get help for commands\n     --hostpubmd5 &lt;md5&gt;   Acceptable MD5 hash of the host public key\n     --hostpubsha256 &lt;sha256&gt; Acceptable SHA256 hash of the host public key\n     --hsts &lt;file name&gt;   Enable HSTS with this cache file\n     --http0.9            Allow HTTP 0.9 responses\n -0, --http1.0            Use HTTP 1.0\n     --http1.1            Use HTTP 1.1\n     --http2              Use HTTP 2\n     --http2-prior-knowledge Use HTTP 2 without HTTP\/1.1 Upgrade\n     --http3              Use HTTP v3\n     --ignore-content-length Ignore the size of the remote resource\n -i, --include            Include protocol response headers in the output\n -k, --insecure           Allow insecure server connections\n     --interface &lt;name&gt;   Use network INTERFACE (or address)\n -4, --ipv4               Resolve names to IPv4 addresses\n -6, --ipv6               Resolve names to IPv6 addresses\n     --json &lt;data&gt;        HTTP POST JSON\n -j, --junk-session-cookies Ignore session cookies read from file\n     --keepalive-time &lt;seconds&gt; Interval time for keepalive probes\n     --key &lt;key&gt;          Private key file name\n     --key-type &lt;type&gt;    Private key file type (DER\/PEM\/ENG)\n     --krb &lt;level&gt;        Enable Kerberos with security &lt;level&gt;\n     --libcurl &lt;file&gt;     Dump libcurl equivalent code of this command line\n     --limit-rate &lt;speed&gt; Limit transfer speed to RATE\n -l, --list-only          List only mode\n     --local-port &lt;num\/range&gt; Force use of RANGE for local port numbers\n -L, --location           Follow redirects\n     --location-trusted   Like --location, and send auth to other hosts\n     --login-options &lt;options&gt; Server login options\n     --mail-auth &lt;address&gt; Originator address of the original email\n     --mail-from &lt;address&gt; Mail from this address\n     --mail-rcpt &lt;address&gt; Mail to this address\n     --mail-rcpt-allowfails Allow RCPT TO command to fail for some recipients\n -M, --manual             Display the full manual\n     --max-filesize &lt;bytes&gt; Maximum file size to download\n     --max-redirs &lt;num&gt;   Maximum number of redirects allowed\n -m, --max-time &lt;fractional seconds&gt; Maximum time allowed for transfer\n     --metalink           Process given URLs as metalink XML file\n     --negotiate          Use HTTP Negotiate (SPNEGO) authentication\n -n, --netrc              Must read .netrc for user name and password\n     --netrc-file &lt;filename&gt; Specify FILE for netrc\n     --netrc-optional     Use either .netrc or URL\n -:, --next               Make next URL use its separate set of options\n     --no-alpn            Disable the ALPN TLS extension\n -N, --no-buffer          Disable buffering of the output stream\n     --no-clobber         Do not overwrite files that already exist\n     --no-keepalive       Disable TCP keepalive on the connection\n     --no-npn             Disable the NPN TLS extension\n     --no-progress-meter  Do not show the progress meter\n     --no-sessionid       Disable SSL session-ID reusing\n     --noproxy &lt;no-proxy-list&gt; List of hosts which do not use proxy\n     --ntlm               Use HTTP NTLM authentication\n     --ntlm-wb            Use HTTP NTLM authentication with winbind\n     --oauth2-bearer &lt;token&gt; OAuth 2 Bearer Token\n -o, --output &lt;file&gt;      Write to file instead of stdout\n     --output-dir &lt;dir&gt;   Directory to save files in\n -Z, --parallel           Perform transfers in parallel\n     --parallel-immediate Do not wait for multiplexing (with --parallel)\n     --parallel-max &lt;num&gt; Maximum concurrency for parallel transfers\n     --pass &lt;phrase&gt;      Pass phrase for the private key\n     --path-as-is         Do not squash .. sequences in URL path\n     --pinnedpubkey &lt;hashes&gt; FILE\/HASHES Public key to verify peer against\n     --post301            Do not switch to GET after following a 301\n     --post302            Do not switch to GET after following a 302\n     --post303            Do not switch to GET after following a 303\n     --preproxy [protocol:\/\/]host[:port] Use this proxy first\n -#, --progress-bar       Display transfer progress as a bar\n     --proto &lt;protocols&gt;  Enable\/disable PROTOCOLS\n     --proto-default &lt;protocol&gt; Use PROTOCOL for any URL missing a scheme\n     --proto-redir &lt;protocols&gt; Enable\/disable PROTOCOLS on redirect\n -x, --proxy [protocol:\/\/]host[:port] Use this proxy\n     --proxy-anyauth      Pick any proxy authentication method\n     --proxy-basic        Use Basic authentication on the proxy\n     --proxy-cacert &lt;file&gt; CA certificate to verify peer against for proxy\n     --proxy-capath &lt;dir&gt; CA directory to verify peer against for proxy\n     --proxy-cert &lt;cert[:passwd]&gt; Set client certificate for proxy\n     --proxy-cert-type &lt;type&gt; Client certificate type for HTTPS proxy\n     --proxy-ciphers &lt;list&gt; SSL ciphers to use for proxy\n     --proxy-crlfile &lt;file&gt; Set a CRL list for proxy\n     --proxy-digest       Use Digest authentication on the proxy\n     --proxy-header &lt;header\/@file&gt; Pass custom header(s) to proxy\n     --proxy-insecure     Do HTTPS proxy connections without verifying the proxy\n     --proxy-key &lt;key&gt;    Private key for HTTPS proxy\n     --proxy-key-type &lt;type&gt; Private key file type for proxy\n     --proxy-negotiate    Use HTTP Negotiate (SPNEGO) authentication on the proxy\n     --proxy-ntlm         Use NTLM authentication on the proxy\n     --proxy-pass &lt;phrase&gt; Pass phrase for the private key for HTTPS proxy\n     --proxy-pinnedpubkey &lt;hashes&gt; FILE\/HASHES public key to verify proxy with\n     --proxy-service-name &lt;name&gt; SPNEGO proxy service name\n     --proxy-ssl-allow-beast Allow security flaw for interop for HTTPS proxy\n     --proxy-ssl-auto-client-cert Use auto client certificate for proxy (Schannel)\n     --proxy-tls13-ciphers &lt;ciphersuite list&gt; TLS 1.3 proxy cipher suites\n     --proxy-tlsauthtype &lt;type&gt; TLS authentication type for HTTPS proxy\n     --proxy-tlspassword &lt;string&gt; TLS password for HTTPS proxy\n     --proxy-tlsuser &lt;name&gt; TLS username for HTTPS proxy\n     --proxy-tlsv1        Use TLSv1 for HTTPS proxy\n -U, --proxy-user &lt;user:password&gt; Proxy user and password\n     --proxy1.0 &lt;host[:port]&gt; Use HTTP\/1.0 proxy on given port\n -p, --proxytunnel        Operate through an HTTP proxy tunnel (using CONNECT)\n     --pubkey &lt;key&gt;       SSH Public key file name\n -Q, --quote &lt;command&gt;    Send command(s) to server before transfer\n     --random-file &lt;file&gt; File for reading random data from\n -r, --range &lt;range&gt;      Retrieve only the bytes within RANGE\n     --raw                Do HTTP \"raw\"; no transfer decoding\n -e, --referer &lt;URL&gt;      Referrer URL\n -J, --remote-header-name Use the header-provided filename\n -O, --remote-name        Write output to a file named as the remote file\n     --remote-name-all    Use the remote file name for all URLs\n -R, --remote-time        Set the remote file's time on the local output\n     --remove-on-error    Remove output file on errors\n -X, --request &lt;method&gt;   Specify request method to use\n     --request-target &lt;path&gt; Specify the target for this request\n     --resolve &lt;[+]host:port:addr[,addr]...&gt; Resolve the host+port to this address\n     --retry &lt;num&gt;        Retry request if transient problems occur\n     --retry-all-errors   Retry all errors (use with --retry)\n     --retry-connrefused  Retry on connection refused (use with --retry)\n     --retry-delay &lt;seconds&gt; Wait time between retries\n     --retry-max-time &lt;seconds&gt; Retry only within this period\n     --sasl-authzid &lt;identity&gt; Identity for SASL PLAIN authentication\n     --sasl-ir            Enable initial response in SASL authentication\n     --service-name &lt;name&gt; SPNEGO service name\n -S, --show-error         Show error even when -s is used\n -s, --silent             Silent mode\n     --socks4 &lt;host[:port]&gt; SOCKS4 proxy on given host + port\n     --socks4a &lt;host[:port]&gt; SOCKS4a proxy on given host + port\n     --socks5 &lt;host[:port]&gt; SOCKS5 proxy on given host + port\n     --socks5-basic       Enable username\/password auth for SOCKS5 proxies\n     --socks5-gssapi      Enable GSS-API auth for SOCKS5 proxies\n     --socks5-gssapi-nec  Compatibility with NEC SOCKS5 server\n     --socks5-gssapi-service &lt;name&gt; SOCKS5 proxy service name for GSS-API\n     --socks5-hostname &lt;host[:port]&gt; SOCKS5 proxy, pass host name to proxy\n -Y, --speed-limit &lt;speed&gt; Stop transfers slower than this\n -y, --speed-time &lt;seconds&gt; Trigger 'speed-limit' abort after this time\n     --ssl                Try SSL\/TLS\n     --ssl-allow-beast    Allow security flaw to improve interop\n     --ssl-auto-client-cert Use auto client certificate (Schannel)\n     --ssl-no-revoke      Disable cert revocation checks (Schannel)\n     --ssl-reqd           Require SSL\/TLS\n     --ssl-revoke-best-effort Ignore missing\/offline cert CRL dist points\n -2, --sslv2              Use SSLv2\n -3, --sslv3              Use SSLv3\n     --stderr &lt;file&gt;      Where to redirect stderr\n     --styled-output      Enable styled output for HTTP headers\n     --suppress-connect-headers Suppress proxy CONNECT response headers\n     --tcp-fastopen       Use TCP Fast Open\n     --tcp-nodelay        Use the TCP_NODELAY option\n -t, --telnet-option &lt;opt=val&gt; Set telnet option\n     --tftp-blksize &lt;value&gt; Set TFTP BLKSIZE option\n     --tftp-no-options    Do not send any TFTP options\n -z, --time-cond &lt;time&gt;   Transfer based on a time condition\n     --tls-max &lt;VERSION&gt;  Set maximum allowed TLS version\n     --tls13-ciphers &lt;ciphersuite list&gt; TLS 1.3 cipher suites to use\n     --tlsauthtype &lt;type&gt; TLS authentication type\n     --tlspassword &lt;string&gt; TLS password\n     --tlsuser &lt;name&gt;     TLS user name\n -1, --tlsv1              Use TLSv1.0 or greater\n     --tlsv1.0            Use TLSv1.0 or greater\n     --tlsv1.1            Use TLSv1.1 or greater\n     --tlsv1.2            Use TLSv1.2 or greater\n     --tlsv1.3            Use TLSv1.3 or greater\n     --tr-encoding        Request compressed transfer encoding\n     --trace &lt;file&gt;       Write a debug trace to FILE\n     --trace-ascii &lt;file&gt; Like --trace, but without hex output\n     --trace-time         Add time stamps to trace\/verbose output\n     --unix-socket &lt;path&gt; Connect through this Unix domain socket\n -T, --upload-file &lt;file&gt; Transfer local FILE to destination\n     --url &lt;url&gt;          URL to work with\n -B, --use-ascii          Use ASCII\/text transfer\n -u, --user &lt;user:password&gt; Server user and password\n -A, --user-agent &lt;name&gt;  Send User-Agent &lt;name&gt; to server\n -v, --verbose            Make the operation more talkative\n -V, --version            Show version number and quit\n -w, --write-out &lt;format&gt; Use output FORMAT after completion\n     --xattr              Store metadata in extended file attributes\n \n<\/details><details><summary><strong>CERTUTIL<\/strong><\/summary>\nUsage:\n  CertUtil [Options] [-dump]\n  CertUtil [Options] [-dump] [File]\n  Dump configuration information or file\n\nOptions:\n  -f                -- Force overwrite\n  -user             -- Use HKEY_CURRENT_USER keys or certificate store\n  -Unicode          -- Write redirected output in Unicode\n  -gmt              -- Display times as GMT\n  -seconds          -- Display times with seconds and milliseconds\n  -Silent           -- (-q) Use silent flag to acquire crypt context\n  -split            -- Split embedded ASN.1 elements, and save to files\n  -v                -- Verbose operation\n  -privatekey       -- Display password and private key data\n  -pin PIN                  -- Smart Card PIN\n  -p Password               -- Password\n  -t Timeout                -- URL fetch timeout in milliseconds\n  -sid WELL_KNOWN_SID_TYPE  -- Numeric SID\n            22 -- Local System\n            23 -- Local Service\n            24 -- Network Service\n\nCertUtil -?              -- Display a verb list (command list)\nCertUtil -dump -?        -- Display help text for the \"dump\" verb\nCertUtil -v -?           -- Display all help text for all verbs\n\n<\/details><details><summary><strong>CHGLOGON<\/strong><\/summary>\nEnable, disable, or drain session logins.\n\nCHANGE LOGON {\/QUERY | \/ENABLE | \/DISABLE | \/DRAIN | \/DRAINUNTILRESTART}\n\n  \/QUERY    Query current session login mode.\n  \/ENABLE   Enable user login from sessions.\n  \/DISABLE  Disable user login from sessions.\n  \/DRAIN    Disable new user logons, but allow reconnections to existing sessions.\n  \/DRAINUNTILRESTART    Disable new user logons until the server is restarted, but allow reconnections to existing sessions.\n \n<\/details><details><summary><strong>CHGUSR<\/strong><\/summary>\nChange Install Mode.\n\nCHANGE USER {\/EXECUTE | \/INSTALL | \/QUERY}\n\n  \/EXECUTE  Enable execute mode (default).\n  \/INSTALL  Enable install mode.\n  \/QUERY    Display current settings.\n\n\n \n<\/details><details><summary><strong>CHOICE<\/strong><\/summary>\nCHOICE [\/C choices] [\/N] [\/CS] [\/T timeout \/D choice] [\/M text]\n\nDescription:\n    This tool allows users to select one item from a list\n    of choices and returns the index of the selected choice.\n\nParameter List:\n   \/C    choices       Specifies the list of choices to be created.\n                       Default list is \"YN\".\n\n   \/N                  Hides the list of choices in the prompt.\n                       The message before the prompt is displayed\n                       and the choices are still enabled.\n\n   \/CS                 Enables case-sensitive choices to be selected.\n                       By default, the utility is case-insensitive.\n\n   \/T    timeout       The number of seconds to pause before a default\n                       choice is made. Acceptable values are from 0 to\n                       9999. If 0 is specified, there will be no pause\n                       and the default choice is selected.\n\n   \/D    choice        Specifies the default choice after nnnn seconds.\n                       Character must be in the set of choices specified\n                       by \/C option and must also specify nnnn with \/T.\n\n   \/M    text          Specifies the message to be displayed before\n                       the prompt. If not specified, the utility\n                       displays only a prompt.\n\n   \/?                  Displays this help message.\n\n   NOTE:\n   The ERRORLEVEL environment variable is set to the index of the\n   key that was selected from the set of choices. The first choice\n   listed returns a value of 1, the second a value of 2, and so on.\n   If the user presses a key that is not a valid choice, the tool\n   sounds a warning beep. If tool detects an error condition,\n   it returns an ERRORLEVEL value of 255. If the user presses\n   CTRL+BREAK or CTRL+C, the tool returns an ERRORLEVEL value\n   of 0. When you use ERRORLEVEL parameters in a batch program, list\n   them in decreasing order.\n\nExamples:\n   CHOICE \/?\n   CHOICE \/C YNC \/M \"Press Y for Yes, N for No or C for Cancel.\"\n   CHOICE \/T 10 \/C ync \/CS \/D y\n   CHOICE \/C ab \/M \"Select a for option 1 and b for option 2.\"\n   CHOICE \/C ab \/N \/M \"Select a for option 1 and b for option 2.\"\n \n<\/details><details><summary><strong>CLIP<\/strong><\/summary>\nDescription:\n    Redirects output of command line tools to the Windows clipboard.\n    This text output can then be pasted into other programs.\n\nParameter List:\n    \/?                  Displays this help message.\n\nExamples:\n    DIR | CLIP          Places a copy of the current directory\n                        listing into the Windows clipboard.\n\n    CLIP &lt; README.TXT   Places a copy of the text from readme.txt\n                        on to the Windows clipboard.\n \n<\/details><details><summary><strong>CSCRIPT<\/strong><\/summary>\nUsage: CScript scriptname.extension [option...] [arguments...]\n\nOptions:\n \/\/B         Batch mode: Suppresses script errors and prompts from displaying\n \/\/D         Enable Active Debugging\n \/\/E:engine  Use engine for executing script\n \/\/H:CScript Changes the default script host to CScript.exe\n \/\/H:WScript Changes the default script host to WScript.exe (default)\n \/\/I         Interactive mode (default, opposite of \/\/B)\n \/\/Job:xxxx  Execute a WSF job\n \/\/Logo      Display logo (default)\n \/\/Nologo    Prevent logo display: No banner will be shown at execution time\n \/\/S         Save current command line options for this user\n \/\/T:nn      Time out in seconds:  Maximum time a script is permitted to run\n \/\/X         Execute script in debugger\n \/\/U         Use Unicode for redirected I\/O from the console\n\n<\/details><details><summary><strong>DATE<\/strong><\/summary>\nDisplays or sets the date.\n\nDATE [\/T | date]\n\nType DATE without parameters to display the current date setting and\na prompt for a new one.  Press ENTER to keep the same date.\n\nIf Command Extensions are enabled the DATE command supports\nthe \/T switch which tells the command to just output the\ncurrent date, without prompting for a new date.\n \n<\/details><details><summary><strong>DEFRAG<\/strong><\/summary>\nDefrag &lt;Volumes&gt; &lt;Operations&gt; [&lt;Options&gt;]\n\nVolumes:\n  \/C | \/AllVolumes      On each volume run only the preferred operations from\n                        the given list of operations.\n  \/E | \/VolumesExcept &lt;volume paths&gt;\n                        Perform all the given operations on each volume except.\n                        those specified. If the exception list is empty, this\n                        behaves as \/AllVolumes.\n  volume paths          Specifies the drive letter followed by a colon, mount point\n                        or volume name. More than one volume can be specified.  Run\n                        all the given operations on each specified volume..\n\nOperations:\n  \/A | \/Analyze         Perform analysis.\n  \/B | \/BootOptimize    Perform boot optimization to increase boot performance.\n  \/D | \/Defrag          Perform traditional defrag (this is the default). On a tiered\n                        volume, traditional defrag is performed only on the Capacity\n                        tier.\n  \/G | \/TierOptimize    On tiered volumes, optimize files to reside on the appropriate\n                        storage tier.\n  \/K | \/SlabConsolidate On thinly provisioned volumes, perform slab consolidation to\n                        increase slab usage efficiency.\n  \/L | \/Retrim          On thinly provisioned volumes, perform retrim to release free\n                        slabs. On SSDs perform retrim to improve write performance.\n  \/O | \/Optimize        Perform the proper optimization for each media type.\n  \/T | \/TrackProgress   Track progress of a running operation for a given volume. An\n                        instance can show progress only for a single volume. To see\n                        progress for another volume launch another instance.\n  \/U | \/PrintProgress   Print the progress of the operation on the screen.\n  \/V | \/Verbose         Print verbose output containing the fragmentation statistics.\n  \/X | \/FreespaceConsolidate\n                        Perform free space consolidation, moves free space towards\n                        the end of the volume (even on thin provisioned volumes). On\n                        tiered volumes consolidation is performed only on the Capacity\n                        tier.\n\nOptions:\n  \/H | \/NormalPriority  Run the operation at normal priority (default is low).\n  \/I | \/MaxRuntime n    Available only with TierOptimize. Tier optimization would\n                        run for at most n seconds on each volume.\n       \/LayoutFile &lt;file path&gt;\n                        Available only with BootOptimize. This file contains the list\n                        of files to be optimized.  The default location is\n                        %windir%\\Prefetch\\layout.ini.\n  \/M | \/MultiThread [n] Run the operation on each volume in parallel in the background.\n                        For TierOptimize, at most n threads optimize the storage tiers\n                        in parallel. Default value of n is 8. All other optimizations\n                        ignore n.\n       \/OnlyPreferred   When volumes are specified explicitly, defrag performs all\n                        the given operations on each specified volume.  This switch\n                        lets defrag run only the preferred operations, from the\n                        given list of operations, on each specified volume.\n\nExamples:\n  Defrag C: \/U \/V\n  Defrag C: D: \/TierOptimize \/MultiThread\n  Defrag C:\\mountpoint \/Analysis \/U\n  Defrag \/C \/H \/V\n \n<\/details><details><summary><strong>DEL<\/strong><\/summary>\nDeletes one or more files.\n\nDEL [\/P] [\/F] [\/S] [\/Q] [\/A[[:]attributes]] names\nERASE [\/P] [\/F] [\/S] [\/Q] [\/A[[:]attributes]] names\n\n  names         Specifies a list of one or more files or directories.\n                Wildcards may be used to delete multiple files. If a\n                directory is specified, all files within the directory\n                will be deleted.\n\n  \/P            Prompts for confirmation before deleting each file.\n  \/F            Force deleting of read-only files.\n  \/S            Delete specified files from all subdirectories.\n  \/Q            Quiet mode, do not ask if ok to delete on global wildcard\n  \/A            Selects files to delete based on attributes\n  attributes    R  Read-only files            S  System files\n                H  Hidden files               A  Files ready for archiving\n                I  Not content indexed Files  L  Reparse Points\n                O  Offline files              -  Prefix meaning not\n\nIf Command Extensions are enabled DEL and ERASE change as follows:\n\nThe display semantics of the \/S switch are reversed in that it shows\nyou only the files that are deleted, not the ones it could not find.\n \n<\/details><details><summary><strong>DESK.CPL<\/strong><\/summary>\nThis cmd command to open Display Settings on Windows.\n \n<\/details><details><summary><strong>DEVMGMT.MSC<\/strong><\/summary>\nThis cmd command to open Disk Manager on Windows.\n \n<\/details><details><summary><strong>DIR<\/strong><\/summary>\nDisplays a list of files and subdirectories in a directory.\n\nDIR [drive:][path][filename] [\/A[[:]attributes]] [\/B] [\/C] [\/D] [\/L] [\/N]\n  [\/O[[:]sortorder]] [\/P] [\/Q] [\/R] [\/S] [\/T[[:]timefield]] [\/W] [\/X] [\/4]\n\n  [drive:][path][filename]\n              Specifies drive, directory, and\/or files to list.\n\n  \/A          Displays files with specified attributes.\n  attributes   D  Directories                R  Read-only files\n               H  Hidden files               A  Files ready for archiving\n               S  System files               I  Not content indexed files\n               L  Reparse Points             O  Offline files\n               -  Prefix meaning not\n  \/B          Uses bare format (no heading information or summary).\n  \/C          Display the thousand separator in file sizes.  This is the\n              default.  Use \/-C to disable display of separator.\n  \/D          Same as wide but files are list sorted by column.\n  \/L          Uses lowercase.\n  \/N          New long list format where filenames are on the far right.\n  \/O          List by files in sorted order.\n  sortorder    N  By name (alphabetic)       S  By size (smallest first)\n               E  By extension (alphabetic)  D  By date\/time (oldest first)\n               G  Group directories first    -  Prefix to reverse order\n  \/P          Pauses after each screenful of information.\n  \/Q          Display the owner of the file.\n  \/R          Display alternate data streams of the file.\n  \/S          Displays files in specified directory and all subdirectories.\n  \/T          Controls which time field displayed or used for sorting\n  timefield   C  Creation\n              A  Last Access\n              W  Last Written\n  \/W          Uses wide list format.\n  \/X          This displays the short names generated for non-8dot3 file\n              names.  The format is that of \/N with the short name inserted\n              before the long name. If no short name is present, blanks are\n              displayed in its place.\n  \/4          Displays four-digit years\n\nSwitches may be preset in the DIRCMD environment variable.  Override\npreset switches by prefixing any switch with - (hyphen)--for example, \/-W.\n \n<\/details><details><summary><strong>DISKMGMT.MSC<\/strong><\/summary>\nThis cmd command to open Disk Management on Windows.\n \n<\/details><details><summary><strong>DISKPART<\/strong><\/summary>\nACTIVE      - Mark the selected partition as active.\nADD         - Add a mirror to a simple volume.\nASSIGN      - Assign a drive letter or mount point to the selected volume.\nATTRIBUTES  - Manipulate volume or disk attributes.\nATTACH      - Attaches a virtual disk file.\nAUTOMOUNT   - Enable and disable automatic mounting of basic volumes.\nBREAK       - Break a mirror set.\nCLEAN       - Clear the configuration information, or all information, off the\n              disk.\nCOMPACT     - Attempts to reduce the physical size of the file.\nCONVERT     - Convert between different disk formats.\nCREATE      - Create a volume, partition or virtual disk.\nDELETE      - Delete an object.\nDETAIL      - Provide details about an object.\nDETACH      - Detaches a virtual disk file.\nEXIT        - Exit DiskPart.\nEXTEND      - Extend a volume.\nEXPAND      - Expands the maximum size available on a virtual disk.\nFILESYSTEMS - Display current and supported file systems on the volume.\nFORMAT      - Format the volume or partition.\nGPT         - Assign attributes to the selected GPT partition.\nHELP        - Display a list of commands.\nIMPORT      - Import a disk group.\nINACTIVE    - Mark the selected partition as inactive.\nLIST        - Display a list of objects.\nMERGE       - Merges a child disk with its parents.\nONLINE      - Online an object that is currently marked as offline.\nOFFLINE     - Offline an object that is currently marked as online.\nRECOVER     - Refreshes the state of all disks in the selected pack.\n              Attempts recovery on disks in the invalid pack, and\n              resynchronizes mirrored volumes and RAID5 volumes\n              that have stale plex or parity data.\nREM         - Does nothing. This is used to comment scripts.\nREMOVE      - Remove a drive letter or mount point assignment.\nREPAIR      - Repair a RAID-5 volume with a failed member.\nRESCAN      - Rescan the computer looking for disks and volumes.\nRETAIN      - Place a retained partition under a simple volume.\nSAN         - Display or set the SAN policy for the currently booted OS.\nSELECT      - Shift the focus to an object.\nSETID       - Change the partition type.\nSHRINK      - Reduce the size of the selected volume.\nUNIQUEID    - Displays or sets the GUID partition table (GPT) identifier or\n              master boot record (MBR) signature of a disk.\n \n<\/details><details><summary><strong>DOSKEY<\/strong><\/summary>\nEdits command lines, recalls Windows commands, and creates macros.\n\nDOSKEY [\/REINSTALL] [\/LISTSIZE=size] [\/MACROS[:ALL | :exename]]\n  [\/HISTORY] [\/INSERT | \/OVERSTRIKE] [\/EXENAME=exename] [\/MACROFILE=filename]\n  [macroname=[text]]\n\n  \/REINSTALL          Installs a new copy of Doskey.\n  \/LISTSIZE=size      Sets size of command history buffer.\n  \/MACROS             Displays all Doskey macros.\n  \/MACROS:ALL         Displays all Doskey macros for all executables which have\n                      Doskey macros.\n  \/MACROS:exename     Displays all Doskey macros for the given executable.\n  \/HISTORY            Displays all commands stored in memory.\n  \/INSERT             Specifies that new text you type is inserted in old text.\n  \/OVERSTRIKE         Specifies that new text overwrites old text.\n  \/EXENAME=exename    Specifies the executable.\n  \/MACROFILE=filename Specifies a file of macros to install.\n  macroname           Specifies a name for a macro you create.\n  text                Specifies commands you want to record.\n\nUP and DOWN ARROWS recall commands; ESC clears command line; F7 displays\ncommand history; ALT+F7 clears command history; F8 searches command\nhistory; F9 selects a command by number; ALT+F10 clears macro definitions.\n\nThe following are some special codes in Doskey macro definitions:\n$T     Command separator.  Allows multiple commands in a macro.\n$1-$9  Batch parameters.  Equivalent to %1-%9 in batch programs.\n$*     Symbol replaced by everything following macro name on command line.\n \n<\/details><details><summary><strong>DRIVERQUERY<\/strong><\/summary>\nDRIVERQUERY [\/S system [\/U username [\/P [password]]]]\n              [\/FO format] [\/NH] [\/SI] [\/V]\nDescription:\n    Enables an administrator to display a list of\n    installed device drivers.\n\nParameter List:\n      \/S     system           Specifies the remote system to connect to.\n\n      \/U     [domain\\]user    Specifies the user context\n                              under which the command should execute.\n\n      \/P     [password]       Specify the password for the given\n                              user context.\n\n      \/FO    format           Specifies the type of output to display.\n                              Valid values to be passed with the\n                              switch are \"TABLE\", \"LIST\", \"CSV\".\n\n      \/NH                     Specifies that the \"Column Header\"\n                              should not be displayed. Valid for\n                              \"TABLE\" and \"CSV\" format only.\n\n      \/SI                     Provides information about signed drivers.\n\n      \/V                      Displays verbose output. Not valid\n                              for signed drivers.\n\n      \/?                      Displays this help message.\n\nExamples:\n    DRIVERQUERY\n    DRIVERQUERY \/FO CSV \/SI\n    DRIVERQUERY \/NH\n    DRIVERQUERY \/S ipaddress \/U user \/V\n    DRIVERQUERY \/S system \/U domain\\user \/P password \/FO LIST\n \n<\/details><details><summary><strong>DXDIAG.EXE<\/strong><\/summary>\nThis cmd command to open DirectX Diagnostic Tool on Windows.\n \n<\/details><details><summary><strong>ECHO<\/strong><\/summary>\nDisplays messages, or turns command-echoing on or off.\n\n  ECHO [ON | OFF]\n  ECHO [message]\n\nType ECHO without parameters to display the current echo setting.\n \n<\/details><details><summary><strong>ENDLOCAL<\/strong><\/summary>\nEnds localization of environment changes in a batch file.\nEnvironment changes made after ENDLOCAL has been issued are\nnot local to the batch file; the previous settings are not\nrestored on termination of the batch file.\n\nENDLOCAL\n\nIf Command Extensions are enabled ENDLOCAL changes as follows:\n\nIf the corresponding SETLOCAL enable or disabled command extensions\nusing the new ENABLEEXTENSIONS or DISABLEEXTENSIONS options, then\nafter the ENDLOCAL, the enabled\/disabled state of command extensions\nwill be restored to what it was prior to the matching SETLOCAL\ncommand execution.\n \n<\/details><details><summary><strong>ERASE<\/strong><\/summary>\nDeletes one or more files.\n\nDEL [\/P] [\/F] [\/S] [\/Q] [\/A[[:]attributes]] names\nERASE [\/P] [\/F] [\/S] [\/Q] [\/A[[:]attributes]] names\n\n  names         Specifies a list of one or more files or directories.\n                Wildcards may be used to delete multiple files. If a\n                directory is specified, all files within the directory\n                will be deleted.\n\n  \/P            Prompts for confirmation before deleting each file.\n  \/F            Force deleting of read-only files.\n  \/S            Delete specified files from all subdirectories.\n  \/Q            Quiet mode, do not ask if ok to delete on global wildcard\n  \/A            Selects files to delete based on attributes\n  attributes    R  Read-only files            S  System files\n                H  Hidden files               A  Files ready for archiving\n                I  Not content indexed Files  L  Reparse Points\n                O  Offline files              -  Prefix meaning not\n\nIf Command Extensions are enabled DEL and ERASE change as follows:\n\nThe display semantics of the \/S switch are reversed in that it shows\nyou only the files that are deleted, not the ones it could not find.\n \n<\/details><details><summary><strong>EUDCEDIT.EXE<\/strong><\/summary>\nThis cmd command to open Private Character Editor on Windows.\n \n<\/details><details><summary><strong>EVENTVWR.EXE<\/strong><\/summary>\nThis cmd command to open Event Viewer on Windows.\n \n<\/details><details><summary><strong>EXIT<\/strong><\/summary>\nQuits the CMD.EXE program (command interpreter) or the current batch\nscript.\n\nEXIT [\/B] [exitCode]\n\n  \/B          specifies to exit the current batch script instead of\n              CMD.EXE.  If executed from outside a batch script, it\n              will quit CMD.EXE\n\n  exitCode    specifies a numeric number.  if \/B is specified, sets\n              ERRORLEVEL that number.  If quitting CMD.EXE, sets the process\n              exit code with that number.\n \n<\/details><details><summary><strong>EXPAND<\/strong><\/summary>\nExpands one or more compressed files.\n\nEXPAND [-R] Source Destination\nEXPAND -R Source [Destination]\nEXPAND -I Source [Destination]\nEXPAND -D Source.cab [-F:Files]\nEXPAND Source.cab -F:Files Destination\n\n  -R\t\tRename expanded files.\n  -I\t\tRename expanded files but ignore directory structure.\n  -D\t\tDisplay list of files in source.\n  Source\tSource file specification.  Wildcards may be used.\n  -F:Files\tName of files to expand from a .CAB.\n  Destination\tDestination file | path specification.\n\t\tDestination may be a directory.\n\t\tIf Source is multiple files and -r is not specified,\n\t\tDestination must be a directory.\n \n<\/details><details><summary><strong>EXPLORER.EXE<\/strong><\/summary>\nThis cmd command to open File Explorer on Windows.\n \n<\/details><details><summary><strong>FC<\/strong><\/summary>\nCompares two files or sets of files and displays the differences between\nthem\n\n\nFC [\/A] [\/C] [\/L] [\/LBn] [\/N] [\/OFF[LINE]] [\/T] [\/U] [\/W] [\/nnnn]\n   [drive1:][path1]filename1 [drive2:][path2]filename2\nFC \/B [drive1:][path1]filename1 [drive2:][path2]filename2\n\n  \/A         Displays only first and last lines for each set of differences.\n  \/B         Performs a binary comparison.\n  \/C         Disregards the case of letters.\n  \/L         Compares files as ASCII text.\n  \/LBn       Sets the maximum consecutive mismatches to the specified\n             number of lines.\n  \/N         Displays the line numbers on an ASCII comparison.\n  \/OFF[LINE] Do not skip files with offline attribute set.\n  \/T         Does not expand tabs to spaces.\n  \/U         Compare files as UNICODE text files.\n  \/W         Compresses white space (tabs and spaces) for comparison.\n  \/nnnn      Specifies the number of consecutive lines that must match\n             after a mismatch.\n  [drive1:][path1]filename1\n             Specifies the first file or set of files to compare.\n  [drive2:][path2]filename2\n             Specifies the second file or set of files to compare. \n\n<\/details><details><summary><strong>FIND<\/strong><\/summary>\nSearches for a text string in a file or files.\n\nFIND [\/V] [\/C] [\/N] [\/I] [\/OFF[LINE]] \"string\" [[drive:][path]filename[ ...]]\n\n  \/V         Displays all lines NOT containing the specified string.\n  \/C         Displays only the count of lines containing the string.\n  \/N         Displays line numbers with the displayed lines.\n  \/I         Ignores the case of characters when searching for the string.\n  \/OFF[LINE] Do not skip files with offline attribute set.\n  \"string\"   Specifies the text string to find.\n  [drive:][path]filename\n             Specifies a file or files to search.\n\nIf a path is not specified, FIND searches the text typed at the prompt\nor piped from another command.\n \n<\/details><details><summary><strong>FINDSTR<\/strong><\/summary>\nSearches for strings in files.\n\nFINDSTR [\/B] [\/E] [\/L] [\/R] [\/S] [\/I] [\/X] [\/V] [\/N] [\/M] [\/O] [\/P] [\/F:file]\n        [\/C:string] [\/G:file] [\/D:dir list] [\/A:color attributes] [\/OFF[LINE]]\n        strings [[drive:][path]filename[ ...]]\n\n  \/B         Matches pattern if at the beginning of a line.\n  \/E         Matches pattern if at the end of a line.\n  \/L         Uses search strings literally.\n  \/R         Uses search strings as regular expressions.\n  \/S         Searches for matching files in the current directory and all\n             subdirectories.\n  \/I         Specifies that the search is not to be case-sensitive.\n  \/X         Prints lines that match exactly.\n  \/V         Prints only lines that do not contain a match.\n  \/N         Prints the line number before each line that matches.\n  \/M         Prints only the filename if a file contains a match.\n  \/O         Prints character offset before each matching line.\n  \/P         Skip files with non-printable characters.\n  \/OFF[LINE] Do not skip files with offline attribute set.\n  \/A:attr    Specifies color attribute with two hex digits. See \"color \/?\"\n  \/F:file    Reads file list from the specified file(\/ stands for console).\n  \/C:string  Uses specified string as a literal search string.\n  \/G:file    Gets search strings from the specified file(\/ stands for console).\n  \/D:dir     Search a semicolon delimited list of directories\n  strings    Text to be searched for.\n  [drive:][path]filename\n             Specifies a file or files to search.\n\nUse spaces to separate multiple search strings unless the argument is prefixed\nwith \/C.  For example, 'FINDSTR \"hello there\" x.y' searches for \"hello\" or\n\"there\" in file x.y.  'FINDSTR \/C:\"hello there\" x.y' searches for\n\"hello there\" in file x.y.\n\nRegular expression quick reference:\n  .        Wildcard: any character\n  *        Repeat: zero or more occurrences of previous character or class\n  ^        Line position: beginning of line\n  $        Line position: end of line\n  [class]  Character class: any one character in set\n  [^class] Inverse class: any one character not in set\n  [x-y]    Range: any characters within the specified range\n  \\x       Escape: literal use of metacharacter x\n  \\&lt;xyz    Word position: beginning of word\n  xyz\\&gt;    Word position: end of word\n\nFor full information on FINDSTR regular expressions refer to the online Command\nReference.\n\n<\/details><details><summary><strong>FOR<\/strong><\/summary>\nRuns a specified command for each file in a set of files.\n\nFOR %variable IN (set) DO command [command-parameters]\n\n  %variable  Specifies a single letter replaceable parameter.\n  (set)      Specifies a set of one or more files.  Wildcards may be used.\n  command    Specifies the command to carry out for each file.\n  command-parameters\n             Specifies parameters or switches for the specified command.\n\nTo use the FOR command in a batch program, specify %%variable instead\nof %variable.  Variable names are case sensitive, so %i is different\nfrom %I.\n\nIf Command Extensions are enabled, the following additional\nforms of the FOR command are supported:\n\nFOR \/D %variable IN (set) DO command [command-parameters]\n\n    If set contains wildcards, then specifies to match against directory\n    names instead of file names.\n\nFOR \/R [[drive:]path] %variable IN (set) DO command [command-parameters]\n\n    Walks the directory tree rooted at [drive:]path, executing the FOR\n    statement in each directory of the tree.  If no directory\n    specification is specified after \/R then the current directory is\n    assumed.  If set is just a single period (.) character then it\n    will just enumerate the directory tree.\n\nFOR \/L %variable IN (start,step,end) DO command [command-parameters]\n\n    The set is a sequence of numbers from start to end, by step amount.\n    So (1,1,5) would generate the sequence 1 2 3 4 5 and (5,-1,1) would\n    generate the sequence (5 4 3 2 1)\n\nFOR \/F [\"options\"] %variable IN (file-set) DO command [command-parameters]\nFOR \/F [\"options\"] %variable IN (\"string\") DO command [command-parameters]\nFOR \/F [\"options\"] %variable IN ('command') DO command [command-parameters]\n\n    or, if usebackq option present:\n\nFOR \/F [\"options\"] %variable IN (file-set) DO command [command-parameters]\nFOR \/F [\"options\"] %variable IN ('string') DO command [command-parameters]\nFOR \/F [\"options\"] %variable IN (`command`) DO command [command-parameters]\n\n    file-set is one or more file names.  Each file is opened, read\n    and processed before going on to the next file in file-set.\n    Processing consists of reading in the file, breaking it up into\n    individual lines of text and then parsing each line into zero or\n    more tokens.  The body of the for loop is then called with the\n    variable value(s) set to the found token string(s).  By default, \/F\n    passes the first blank separated token from each line of each file.\n    Blank lines are skipped.  You can override the default parsing\n    behavior by specifying the optional \"options\" parameter.  This\n    is a quoted string which contains one or more keywords to specify\n    different parsing options.  The keywords are:\n\n        eol=c           - specifies an end of line comment character\n                          (just one)\n        skip=n          - specifies the number of lines to skip at the\n                          beginning of the file.\n        delims=xxx      - specifies a delimiter set.  This replaces the\n                          default delimiter set of space and tab.\n        tokens=x,y,m-n  - specifies which tokens from each line are to\n                          be passed to the for body for each iteration.\n                          This will cause additional variable names to\n                          be allocated.  The m-n form is a range,\n                          specifying the mth through the nth tokens.  If\n                          the last character in the tokens= string is an\n                          asterisk, then an additional variable is\n                          allocated and receives the remaining text on\n                          the line after the last token parsed.\n        usebackq        - specifies that the new semantics are in force,\n                          where a back quoted string is executed as a\n                          command and a single quoted string is a\n                          literal string command and allows the use of\n                          double quotes to quote file names in\n                          file-set.\n\n    Some examples might help:\n\nFOR \/F \"eol=; tokens=2,3* delims=, \" %i in (myfile.txt) do @echo %i %j %k\n\n    would parse each line in myfile.txt, ignoring lines that begin with\n    a semicolon, passing the 2nd and 3rd token from each line to the for\n    body, with tokens delimited by commas and\/or spaces.  Notice the for\n    body statements reference %i to get the 2nd token, %j to get the\n    3rd token, and %k to get all remaining tokens after the 3rd.  For\n    file names that contain spaces, you need to quote the filenames with\n    double quotes.  In order to use double quotes in this manner, you also\n    need to use the usebackq option, otherwise the double quotes will be\n    interpreted as defining a literal string to parse.\n\n    %i is explicitly declared in the for statement and the %j and %k\n    are implicitly declared via the tokens= option.  You can specify up\n    to 26 tokens via the tokens= line, provided it does not cause an\n    attempt to declare a variable higher than the letter 'z' or 'Z'.\n    Remember, FOR variables are single-letter, case sensitive, global,\n    and you can't have more than 52 total active at any one time.\n\n    You can also use the FOR \/F parsing logic on an immediate string, by\n    making the file-set between the parenthesis a quoted string,\n    using single quote characters.  It will be treated as a single line\n    of input from a file and parsed.\n\n    Finally, you can use the FOR \/F command to parse the output of a\n    command.  You do this by making the file-set between the\n    parenthesis a back quoted string.  It will be treated as a command\n    line, which is passed to a child CMD.EXE and the output is captured\n    into memory and parsed as if it was a file.  So the following\n    example:\n\n      FOR \/F \"usebackq delims==\" %i IN (`set`) DO @echo %i\n\n    would enumerate the environment variable names in the current\n    environment.\n\nIn addition, substitution of FOR variable references has been enhanced.\nYou can now use the following optional syntax:\n\n    %~I         - expands %I removing any surrounding quotes (\")\n    %~fI        - expands %I to a fully qualified path name\n    %~dI        - expands %I to a drive letter only\n    %~pI        - expands %I to a path only\n    %~nI        - expands %I to a file name only\n    %~xI        - expands %I to a file extension only\n    %~sI        - expanded path contains short names only\n    %~aI        - expands %I to file attributes of file\n    %~tI        - expands %I to date\/time of file\n    %~zI        - expands %I to size of file\n    %~$PATH:I   - searches the directories listed in the PATH\n                   environment variable and expands %I to the\n                   fully qualified name of the first one found.\n                   If the environment variable name is not\n                   defined or the file is not found by the\n                   search, then this modifier expands to the\n                   empty string\n\nThe modifiers can be combined to get compound results:\n\n    %~dpI       - expands %I to a drive letter and path only\n    %~nxI       - expands %I to a file name and extension only\n    %~fsI       - expands %I to a full path name with short names only\n    %~dp$PATH:I - searches the directories listed in the PATH\n                   environment variable for %I and expands to the\n                   drive letter and path of the first one found.\n    %~ftzaI     - expands %I to a DIR like output line\n\nIn the above examples %I and PATH can be replaced by other valid\nvalues.  The %~ syntax is terminated by a valid FOR variable name.\nPicking upper case variable names like %I makes it more readable and\navoids confusion with the modifiers, which are not case sensitive.\n \n<\/details><details><summary><strong>FORMAT<\/strong><\/summary>\nFormats a disk for use with Windows.\n\nFORMAT volume [\/FS:file-system] [\/V:label] [\/Q] [\/L[:state]] [\/A:size] [\/C] [\/I:state] [\/X] [\/P:passes] [\/S:state]\nFORMAT volume [\/V:label] [\/Q] [\/F:size] [\/P:passes]\nFORMAT volume [\/V:label] [\/Q] [\/T:tracks \/N:sectors] [\/P:passes]\nFORMAT volume [\/V:label] [\/Q] [\/P:passes]\nFORMAT volume [\/Q]\n\n  volume          Specifies the drive letter (followed by a colon),\n                  mount point, or volume name.\n  \/FS:filesystem  Specifies the type of the file system (FAT, FAT32, exFAT,\n                  NTFS, UDF, ReFS).\n  \/V:label        Specifies the volume label.\n  \/Q              Performs a quick format. Note that this switch overrides \/P.\n  \/C              NTFS only: Files created on the new volume will be compressed\n                  by default.\n  \/X              Forces the volume to dismount first if necessary.  All opened\n                  handles to the volume would no longer be valid.\n  \/R:revision     UDF only: Forces the format to a specific UDF version\n                  (1.02, 1.50, 2.00, 2.01, 2.50).  The default\n                  revision is 2.01.\n  \/D              UDF 2.50 only: Metadata will be duplicated.\n  \/L[:state]      NTFS Only: Overrides the default size of file record.\n                  By default, a non-tiered volume will be formatted with small\n                  size file records and a tiered volume will be formatted with\n                  large size file records.  \/L and \/L:enable forces format to\n                  use large size file records and \/L:disable forces format to\n                  use small size file records.\n  \/A:size         Overrides the default allocation unit size. Default settings\n                  are strongly recommended for general use.\n                  ReFS supports 4096, 64K.\n                  NTFS supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,\n                  128K, 256K, 512K, 1M, 2M.\n                  FAT supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,\n                  (128K, 256K for sector size &gt; 512 bytes).\n                  FAT32 supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,\n                  (128K, 256K for sector size &gt; 512 bytes).\n                  exFAT supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,\n                  128K, 256K, 512K, 1M, 2M, 4M, 8M, 16M, 32M.\n\n                  Note that the FAT and FAT32 files systems impose the\n                  following restrictions on the number of clusters on a volume:\n\n                  FAT: Number of clusters &lt;= 65526\n                  FAT32: 65526 &lt; Number of clusters &lt; 4177918\n\n                  Format will immediately stop processing if it decides that\n                  the above requirements cannot be met using the specified\n                  cluster size.\n\n                  NTFS compression is not supported for allocation unit sizes\n                  above 4096.\n\n  \/F:size         Specifies the size of the floppy disk to format (1.44)\n  \/T:tracks       Specifies the number of tracks per disk side.\n  \/N:sectors      Specifies the number of sectors per track.\n  \/P:count        Zero every sector on the volume.  After that, the volume\n                  will be overwritten \"count\" times using a different\n                  random number each time.  If \"count\" is zero, no additional\n                  overwrites are made after zeroing every sector.  This switch\n                  is ignored when \/Q is specified.\n  \/S:state        Specifies support for short filenames (enable, disable)\n                  Short names are disabled by default\n  \/TXF:state      Specifies txf is enabled\/disabled (enabled, disabled)\n                  TxF is enabled by default\n  \/I:state        ReFS only: Specifies whether integrity should be enabled on\n                  the new volume. \"state\" is either \"enable\" or \"disable\"\n                  Integrity is enabled on storage that supports data redundancy\n                  by default.\n  \/DAX[:state]    NTFS Only: Enable direct access storage (DAX) mode for this\n                  volume.  In DAX mode, the volume is accessed via the memory\n                  bus, boosting IO performance.  A volume can be formatted\n                  with DAX mode only if the hardware is DAX capable.\n                  State can specify \"enable\" or \"disable\".  \/DAX is considered\n                  as \/DAX:enable.\n  \/LogSize[:size] NTFS Only: Specifies the size for NTFS log file in kilobytes.\n                  The minimum supported size is 2MB, so specifying size smaller\n                  than 2MB will result in a 2MB log file.  Zero indicates the\n                  default value which generally depend on the volume size.\n  \/NoRepairLogs   NTFS Only: Disables NTFS repair logs.  If the flag is set\n                  spotfix (i.e. chkdsk \/spotfix) will not work.\n \n<\/details><details><summary><strong>FSMGMT.MSC<\/strong><\/summary>\nThis cmd command to open Shared Folders on Windows.\n \n<\/details><details><summary><strong>FTP<\/strong><\/summary>\nTransfers files to and from a computer running an FTP server service\n(sometimes called a daemon). Ftp can be used interactively.\n\nFTP [-v] [-d] [-i] [-n] [-g] [-s:filename] [-a] [-A] [-x:sendbuffer] [-r:recvbuffer] [-b:asyncbuffers] [-w:windowsize] [host]\n\n  -v              Suppresses display of remote server responses.\n  -n              Suppresses auto-login upon initial connection.\n  -i              Turns off interactive prompting during multiple file\n                  transfers.\n  -d              Enables debugging.\n  -g              Disables filename globbing (see GLOB command).\n  -s:filename     Specifies a text file containing FTP commands; the\n                  commands will automatically run after FTP starts.\n  -a              Use any local interface when binding data connection.\n  -A              login as anonymous.\n  -x:send sockbuf Overrides the default SO_SNDBUF size of 8192.\n  -r:recv sockbuf Overrides the default SO_RCVBUF size of 8192.\n  -b:async count  Overrides the default async count of 3\n  -w:windowsize   Overrides the default transfer buffer size of 65535.\n  host            Specifies the host name or IP address of the remote\n                  host to connect to.\n\nNotes:\n  - mget and mput commands take y\/n\/q for yes\/no\/quit.\n  - Use Control-C to abort commands.\n \n<\/details><details><summary><strong>FTYPE<\/strong><\/summary>\nDisplays or modifies file types used in file extension associations\n\nFTYPE [fileType[=[openCommandString]]]\n\n  fileType  Specifies the file type to examine or change\n  openCommandString Specifies the open command to use when launching files\n                    of this type.\n\nType FTYPE without parameters to display the current file types that\nhave open command strings defined.  FTYPE is invoked with just a file\ntype, it displays the current open command string for that file type.\nSpecify nothing for the open command string and the FTYPE command will\ndelete the open command string for the file type.  Within an open\ncommand string %0 or %1 are substituted with the file name being\nlaunched through the assocation.  %* gets all the parameters and %2\ngets the 1st parameter, %3 the second, etc.  %~n gets all the remaining\nparameters starting with the nth parameter, where n may be between 2 and 9,\ninclusive.  For example:\n\n    ASSOC .pl=PerlScript\n    FTYPE PerlScript=perl.exe %1 %*\n\nwould allow you to invoke a Perl script as follows:\n\n    script.pl 1 2 3\n\nIf you want to eliminate the need to type the extensions, then do the\nfollowing:\n\n    set PATHEXT=.pl;%PATHEXT%\n\nand the script could be invoked as follows:\n\n    script 1 2 3\n \n<\/details><details><summary><strong>FORFILES<\/strong><\/summary>\nFORFILES [\/P pathname] [\/M searchmask] [\/S]\n         [\/C command] [\/D [+ | -] {dd.MM.yyyy | dd}]\n\nDescription:\n    Selects a file (or set of files) and executes a\n    command on that file. This is helpful for batch jobs.\n\nParameter List:\n    \/P    pathname      Indicates the path to start searching.\n                        The default folder is the current working\n                        directory (.).\n\n    \/M    searchmask    Searches files according to a searchmask.\n                        The default searchmask is '*' .\n\n    \/S                  Instructs forfiles to recurse into\n                        subdirectories. Like \"DIR \/S\".\n\n    \/C    command       Indicates the command to execute for each file.\n                        Command strings should be wrapped in double\n                        quotes.\n\n                        The default command is \"cmd \/c echo @file\".\n\n                        The following variables can be used in the\n                        command string:\n                        @file    - returns the name of the file.\n                        @fname   - returns the file name without\n                                   extension.\n                        @ext     - returns only the extension of the\n                                   file.\n                        @path    - returns the full path of the file.\n                        @relpath - returns the relative path of the\n                                   file.\n                        @isdir   - returns \"TRUE\" if a file type is\n                                   a directory, and \"FALSE\" for files.\n                        @fsize   - returns the size of the file in\n                                   bytes.\n                        @fdate   - returns the last modified date of the\n                                   file.\n                        @ftime   - returns the last modified time of the\n                                   file.\n\n                        To include special characters in the command\n                        line, use the hexadecimal code for the character\n                        in 0xHH format (ex. 0x09 for tab). Internal\n                        CMD.exe commands should be preceded with\n                        \"cmd \/c\".\n\n    \/D    date          Selects files with a last modified date greater\n                        than or equal to (+), or less than or equal to\n                        (-), the specified date using the\n                        \"dd.MM.yyyy\" format; or selects files with a\n                        last modified date greater than or equal to (+)\n                        the current date plus \"dd\" days, or less than or\n                        equal to (-) the current date minus \"dd\" days. A\n                        valid \"dd\" number of days can be any number in\n                        the range of 0 - 32768.\n                        \"+\" is taken as default sign if not specified.\n\n    \/?                  Displays this help message.\n\nExamples:\n    FORFILES \/?\n    FORFILES\n    FORFILES \/P C:\\WINDOWS \/S \/M DNS*.*\n    FORFILES \/S \/M *.txt \/C \"cmd \/c type @file | more\"\n    FORFILES \/P C:\\ \/S \/M *.bat\n    FORFILES \/D -30 \/M *.exe\n             \/C \"cmd \/c echo @path 0x09 was changed 30 days ago\"\n    FORFILES \/D 01.01.2001\n             \/C \"cmd \/c echo @fname is new since Jan 1st 2001\"\n    FORFILES \/D +11.9.2022 \/C \"cmd \/c echo @fname is new today\"\n    FORFILES \/M *.exe \/D +1\n    FORFILES \/S \/M *.doc \/C \"cmd \/c echo @fsize\"\n    FORFILES \/M *.txt \/C \"cmd \/c if @isdir==FALSE notepad.exe @file\"\n \n<\/details><details><summary><strong>GETMAC<\/strong><\/summary>\nGETMAC [\/S system [\/U username [\/P [password]]]] [\/FO format] [\/NH] [\/V]\n\nDescription:\n    This tool enables an administrator to display the MAC address\n    for network adapters on a system.\n\nParameter List:\n    \/S     system            Specifies the remote system to connect to.\n\n    \/U     [domain\\]user     Specifies the user context under\n                             which the command should execute.\n\n    \/P     [password]        Specifies the password for the given\n                             user context. Prompts for input if omitted.\n\n    \/FO    format            Specifies the format in which the output\n                             is to be displayed.\n                             Valid values: \"TABLE\", \"LIST\", \"CSV\".\n\n    \/NH                      Specifies that the \"Column Header\" should\n                             not be displayed in the output.\n                             Valid only for TABLE and CSV formats.\n\n    \/V                       Specifies that verbose output is displayed.\n\n    \/?                       Displays this help message.\n\nExamples:\n    GETMAC \/?\n    GETMAC \/FO csv\n    GETMAC \/S system \/NH \/V\n    GETMAC \/S system \/U user\n    GETMAC \/S system \/U domain\\user \/P password \/FO list \/V\n    GETMAC \/S system \/U domain\\user \/P password \/FO table \/NH\n \n<\/details><details><summary><strong>GOTO<\/strong><\/summary>\nDirects cmd.exe to a labeled line in a batch program.\n\nGOTO label\n\n  label   Specifies a text string used in the batch program as a label.\n\nYou type a label on a line by itself, beginning with a colon.\n\nIf Command Extensions are enabled GOTO changes as follows:\n\nGOTO command now accepts a target label of :EOF which transfers control\nto the end of the current batch script file.  This is an easy way to\nexit a batch script file without defining a label.  Type CALL \/?  for a\ndescription of extensions to the CALL command that make this feature\nuseful.\n \n<\/details><details><summary><strong>GPEDIT.MSC<\/strong><\/summary>\nThis cmd command to open Group Policy Editor on Windows.\n \n<\/details><details><summary><strong>GPRESULT<\/strong><\/summary>\nGPRESULT [\/S system [\/U username [\/P [password]]]] [\/SCOPE scope]\n           [\/USER targetusername] [\/R | \/V | \/Z] [(\/X | \/H) &lt;filename&gt; [\/F]]\n\nDescription:\n    This command line tool displays the Resultant Set of Policy (RSoP)\n    information for a target user and computer.\n\nParameter List:\n    \/S        system           Specifies the remote system to connect to.\n\n    \/U        [domain\\]user    Specifies the user context under which the\n                               command should run.\n                               Can not be used with \/X, \/H.\n\n    \/P        [password]       Specifies the password for the given user\n                               context. Prompts for input if omitted.\n                               Cannot be used with \/X, \/H.\n\n    \/SCOPE    scope            Specifies whether the user or the\n                               computer settings need to be displayed.\n                               Valid values: \"USER\", \"COMPUTER\".\n\n    \/USER     [domain\\]user    Specifies the user name for which the\n                               RSoP data is to be displayed.\n\n    \/X        &lt;filename&gt;       Saves the report in XML format at the\n                               location and with the file name specified\n                               by the &lt;filename&gt; parameter. (valid in Windows\n                               Vista SP1 and later and Windows Server 2008 and later)\n\n    \/H        &lt;filename&gt;       Saves the report in HTML format at the\n                               location and with the file name specified by\n                               the &lt;filename&gt; parameter. (valid in Windows\n                               at least Vista SP1 and at least Windows Server 2008)\n\n    \/F                         Forces Gpresult to overwrite the file name\n                               specified in the \/X or \/H command.\n\n    \/R                         Displays RSoP summary data.\n\n    \/V                         Specifies that verbose information should\n                               be displayed. Verbose information provides\n                               additional detailed settings that have\n                               been applied with a precedence of 1.\n\n    \/Z                         Specifies that the super-verbose\n                               information should be displayed. Super-\n                               verbose information provides additional\n                               detailed settings that have been applied\n                               with a precedence of 1 and higher. This\n                               allows you to see if a setting was set in\n                               multiple places. See the Group Policy\n                               online help topic for more information.\n\n    \/?                         Displays this help message.\n\n\nExamples:\n    GPRESULT \/R\n    GPRESULT \/H GPReport.html\n    GPRESULT \/USER targetusername \/V\n    GPRESULT \/S system \/USER targetusername \/SCOPE COMPUTER \/Z\n    GPRESULT \/S system \/U username \/P password \/SCOPE USER \/V\n \n<\/details><details><summary><strong>GPUPDATE<\/strong><\/summary>\nDescription:  Updates multiple Group Policy settings.\n\n\n\nSyntax:  Gpupdate [\/Target:{Computer | User}] [\/Force] [\/Wait:&lt;value&gt;]\n\n     [\/Logoff] [\/Boot] [\/Sync] \n\n\n\nParameters:\n\n\n\nValue                      Description\n\n\/Target:{Computer | User}  Specifies that only User or only Computer\n\n                            policy settings are updated. By default,\n\n                            both User and Computer policy settings are\n\n                            updated.\n\n\n\n\/Force                     Reapplies all policy settings. By default,\n\n                            only policy settings that have changed are\n\n                            applied.\n\n\n\n\/Wait:{value}              Sets the number of seconds to wait for policy\n\n                            processing to finish. The default is 600\n\n                            seconds. The value '0' means not to wait.\n\n                            The value '-1' means to wait indefinitely.\n\n                            When the time limit is exceeded, the command\n\n                            prompt returns, but policy processing\n\n                            continues.\n\n\n\n\/Logoff                    Causes a logoff after the Group Policy settings\n\n                            have been updated. This is required for\n\n                            those Group Policy client-side extensions\n\n                            that do not process policy on a background\n\n                            update cycle but do process policy when a\n\n                            user logs on. Examples include user-targeted\n\n                            Software Installation and Folder Redirection.\n\n                            This option has no effect if there are no\n\n                            extensions called that require a logoff.\n\n\n\n\/Boot                      Causes a computer restart after the Group Policy settings\n\n                            are applied. This is required for those\n\n                            Group Policy client-side extensions that do\n\n                            not process policy on a background update cycle\n\n                            but do process policy at computer startup.\n\n                            Examples include computer-targeted Software\n\n                            Installation. This option has no effect if\n\n                            there are no extensions called that require\n\n                            a restart.\n\n\n\n\/Sync                      Causes the next foreground policy application to\n\n                            be done synchronously. Foreground policy\n\n                            applications occur at computer start up and user\n\n                            logon. You can specify this for the user,\n\n                            computer or both using the \/Target parameter.\n\n                            The \/Force and \/Wait parameters will be ignored\n\n                            if specified.\n\n\n\n \n<\/details><details><summary><strong>GPUPDATE<\/strong><\/summary>\nDescription:  Updates multiple Group Policy settings.\n\n\n\nSyntax:  Gpupdate [\/Target:{Computer | User}] [\/Force] [\/Wait:&lt;value&gt;]\n\n     [\/Logoff] [\/Boot] [\/Sync] \n\n\n\nParameters:\n\n\n\nValue                      Description\n\n\/Target:{Computer | User}  Specifies that only User or only Computer\n\n                            policy settings are updated. By default,\n\n                            both User and Computer policy settings are\n\n                            updated.\n\n\n\n\/Force                     Reapplies all policy settings. By default,\n\n                            only policy settings that have changed are\n\n                            applied.\n\n\n\n\/Wait:{value}              Sets the number of seconds to wait for policy\n\n                            processing to finish. The default is 600\n\n                            seconds. The value '0' means not to wait.\n\n                            The value '-1' means to wait indefinitely.\n\n                            When the time limit is exceeded, the command\n\n                            prompt returns, but policy processing\n\n                            continues.\n\n\n\n\/Logoff                    Causes a logoff after the Group Policy settings\n\n                            have been updated. This is required for\n\n                            those Group Policy client-side extensions\n\n                            that do not process policy on a background\n\n                            update cycle but do process policy when a\n\n                            user logs on. Examples include user-targeted\n\n                            Software Installation and Folder Redirection.\n\n                            This option has no effect if there are no\n\n                            extensions called that require a logoff.\n\n\n\n\/Boot                      Causes a computer restart after the Group Policy settings\n\n                            are applied. This is required for those\n\n                            Group Policy client-side extensions that do\n\n                            not process policy on a background update cycle\n\n                            but do process policy at computer startup.\n\n                            Examples include computer-targeted Software\n\n                            Installation. This option has no effect if\n\n                            there are no extensions called that require\n\n                            a restart.\n\n\n\n\/Sync                      Causes the next foreground policy application to\n\n                            be done synchronously. Foreground policy\n\n                            applications occur at computer start up and user\n\n                            logon. You can specify this for the user,\n\n                            computer or both using the \/Target parameter.\n\n                            The \/Force and \/Wait parameters will be ignored\n\n                            if specified.\n\n\n\n \n<\/details><details><summary><strong>HDWWIZ.CPL<\/strong><\/summary>\nThis cmd command to open Add Hardware on Windows.\n \n<\/details><details><summary><strong>HELP<\/strong><\/summary>\nFor more information on a specific command, type HELP command-name\n\nEtc.\n\t$help\n\t$help &lt;command&gt;\n \n<\/details><details><summary><strong>HOSTNAME<\/strong><\/summary>\nPrints the name of the current host.\n\nhostname\n \n<\/details><details><summary><strong>IEXPRESS.EXE<\/strong><\/summary>\nThis cmd command to open IExpress Wizard on Windows.\n \n<\/details><details><summary><strong>IF<\/strong><\/summary>\nPerforms conditional processing in batch programs.\n\nIF [NOT] ERRORLEVEL number command\nIF [NOT] string1==string2 command\nIF [NOT] EXIST filename command\n\n  NOT               Specifies that Windows should carry out\n                    the command only if the condition is false.\n\n  ERRORLEVEL number Specifies a true condition if the last program run\n                    returned an exit code equal to or greater than the number\n                    specified.\n\n  string1==string2  Specifies a true condition if the specified text strings\n                    match.\n\n  EXIST filename    Specifies a true condition if the specified filename\n                    exists.\n\n  command           Specifies the command to carry out if the condition is\n                    met.  Command can be followed by ELSE command which\n                    will execute the command after the ELSE keyword if the\n                    specified condition is FALSE\n\nThe ELSE clause must occur on the same line as the command after the IF.  For\nexample:\n\n    IF EXIST filename. (\n        del filename.\n    ) ELSE (\n        echo filename. missing.\n    )\n\nThe following would NOT work because the del command needs to be terminated\nby a newline:\n\n    IF EXIST filename. del filename. ELSE echo filename. missing\n\nNor would the following work, since the ELSE command must be on the same line\nas the end of the IF command:\n\n    IF EXIST filename. del filename.\n    ELSE echo filename. missing\n\nThe following would work if you want it all on one line:\n\n    IF EXIST filename. (del filename.) ELSE echo filename. missing\n\nIf Command Extensions are enabled IF changes as follows:\n\n    IF [\/I] string1 compare-op string2 command\n    IF CMDEXTVERSION number command\n    IF DEFINED variable command\n\nwhere compare-op may be one of:\n\n    EQU - equal\n    NEQ - not equal\n    LSS - less than\n    LEQ - less than or equal\n    GTR - greater than\n    GEQ - greater than or equal\n\nand the \/I switch, if specified, says to do case insensitive string\ncompares.  The \/I switch can also be used on the string1==string2 form\nof IF.  These comparisons are generic, in that if both string1 and\nstring2 are both comprised of all numeric digits, then the strings are\nconverted to numbers and a numeric comparison is performed.\n\nThe CMDEXTVERSION conditional works just like ERRORLEVEL, except it is\ncomparing against an internal version number associated with the Command\nExtensions.  The first version is 1.  It will be incremented by one when\nsignificant enhancements are added to the Command Extensions.\nCMDEXTVERSION conditional is never true when Command Extensions are\ndisabled.\n\nThe DEFINED conditional works just like EXIST except it takes an\nenvironment variable name and returns true if the environment variable\nis defined.\n\n%ERRORLEVEL% will expand into a string representation of\nthe current value of ERRORLEVEL, provided that there is not already\nan environment variable with the name ERRORLEVEL, in which case you\nwill get its value instead.  After running a program, the following\nillustrates ERRORLEVEL use:\n\n    goto answer%ERRORLEVEL%\n    :answer0\n    echo Program had return code 0\n    :answer1\n    echo Program had return code 1\n\nYou can also use numerical comparisons above:\n\n    IF %ERRORLEVEL% LEQ 1 goto okay\n\n%CMDCMDLINE% will expand into the original command line passed to\nCMD.EXE prior to any processing by CMD.EXE, provided that there is not\nalready an environment variable with the name CMDCMDLINE, in which case\nyou will get its value instead.\n\n%CMDEXTVERSION% will expand into a string representation of the\ncurrent value of CMDEXTVERSION, provided that there is not already\nan environment variable with the name CMDEXTVERSION, in which case you\nwill get its value instead.\n \n<\/details><details><summary><strong>INETCPL.CPL<\/strong><\/summary>\nThis cmd command to open Internet Properties on Windows.\n \n<\/details><details><summary><strong>INTL.CPL<\/strong><\/summary>\nThis cmd command to open Region on Windows.\n \n<\/details><details><summary><strong>IPCONFIG<\/strong><\/summary>\nUSAGE:\n    ipconfig [\/allcompartments] [\/? | \/all | \n                                 \/renew [adapter] | \/release [adapter] |\n                                 \/renew6 [adapter] | \/release6 [adapter] |\n                                 \/flushdns | \/displaydns | \/registerdns |\n                                 \/showclassid adapter |\n                                 \/setclassid adapter [classid] |\n                                 \/showclassid6 adapter |\n                                 \/setclassid6 adapter [classid] ]\n\nwhere\n    adapter             Connection name \n                       (wildcard characters * and ? allowed, see examples)\n\n    Options:\n       \/?               Display this help message\n       \/all             Display full configuration information.\n       \/release         Release the IPv4 address for the specified adapter.\n       \/release6        Release the IPv6 address for the specified adapter.\n       \/renew           Renew the IPv4 address for the specified adapter.\n       \/renew6          Renew the IPv6 address for the specified adapter.\n       \/flushdns        Purges the DNS Resolver cache.\n       \/registerdns     Refreshes all DHCP leases and re-registers DNS names\n       \/displaydns      Display the contents of the DNS Resolver Cache.\n       \/showclassid     Displays all the dhcp class IDs allowed for adapter.\n       \/setclassid      Modifies the dhcp class id.  \n       \/showclassid6    Displays all the IPv6 DHCP class IDs allowed for adapter.\n       \/setclassid6     Modifies the IPv6 DHCP class id.\n\n\nThe default is to display only the IP address, subnet mask and\ndefault gateway for each adapter bound to TCP\/IP.\n\nFor Release and Renew, if no adapter name is specified, then the IP address\nleases for all adapters bound to TCP\/IP will be released or renewed.\n\nFor Setclassid and Setclassid6, if no ClassId is specified, then the ClassId is removed.\n\nExamples:\n    &gt; ipconfig                       ... Show information\n    &gt; ipconfig \/all                  ... Show detailed information\n    &gt; ipconfig \/renew                ... renew all adapters\n    &gt; ipconfig \/renew EL*            ... renew any connection that has its \n                                         name starting with EL\n    &gt; ipconfig \/release *Con*        ... release all matching connections,\n                                         eg. \"Wired Ethernet Connection 1\" or\n                                             \"Wired Ethernet Connection 2\"\n    &gt; ipconfig \/allcompartments      ... Show information about all \n                                         compartments\n    &gt; ipconfig \/allcompartments \/all ... Show detailed information about all\n                                         compartments\n \n<\/details><details><summary><strong>JOY.CPL<\/strong><\/summary>\nThis cmd command to open Game Controllers on Windows.\n \n<\/details><details><summary><strong>LABEL<\/strong><\/summary>\nAccess Denied as you do not have sufficient privileges or\nthe disk may be locked by another process.\nYou have to invoke this utility running in elevated mode\nand make sure the disk is unlocked.\n \n<\/details><details><summary><strong>LOGOFF<\/strong><\/summary>\nLOGOFF [sessionname | sessionid] [\/SERVER:servername] [\/V] [\/VM]\n\n  sessionname         The name of the session.\n  sessionid           The ID of the session.\n  \/SERVER:servername  Specifies the Remote Desktop server containing the user\n                      session to log off (default is current).\n  \/V                  Displays information about the actions performed.\n  \/VM                 Logs off a session on server or within virtual machine. The unique ID of the session needs to be specified.\n \n \n<\/details><details><summary><strong>MAGNIFY.EXE<\/strong><\/summary>\nThis cmd command to open Magnifier on Windows.\n \n<\/details><details><summary><strong>MAIN.CPL<\/strong><\/summary>\nThis cmd command to open Mouse Properties on Windows.\n \n<\/details><details><summary><strong>MKDIR<\/strong><\/summary>\nCreates a directory.\n\nMKDIR [drive:]path\nMD [drive:]path\n\nIf Command Extensions are enabled MKDIR changes as follows:\n\nMKDIR creates any intermediate directories in the path, if needed.\nFor example, assume \\a does not exist then:\n\n    mkdir \\a\\b\\c\\d\n\nis the same as:\n\n    mkdir \\a\n    chdir \\a\n    mkdir b\n    chdir b\n    mkdir c\n    chdir c\n    mkdir d\n\nwhich is what you would have to type if extensions were disabled.\n \n<\/details><details><summary><strong>MKLINK<\/strong><\/summary>\nCreates a symbolic link.\n\nMKLINK [[\/D] | [\/H] | [\/J]] Link Target\n\n        \/D      Creates a directory symbolic link.  Default is a file\n                symbolic link.\n        \/H      Creates a hard link instead of a symbolic link.\n        \/J      Creates a Directory Junction.\n        Link    Specifies the new symbolic link name.\n        Target  Specifies the path (relative or absolute) that the new link\n                refers to.\n \n<\/details><details><summary><strong>MMSYS.CPL<\/strong><\/summary>\nThis cmd command to open Sound Settings on Windows.\n\n<\/details><details><summary><strong>MOBSYNC.EXE<\/strong><\/summary>\nThis cmd command to open Sync Center on Windows.\n \n<\/details><details><summary><strong>MODE<\/strong><\/summary>\nConfigures system devices.\n\nSerial port:       MODE COMm[:] [BAUD=b] [PARITY=p] [DATA=d] [STOP=s]\n                                [to=on|off] [xon=on|off] [odsr=on|off]\n                                [octs=on|off] [dtr=on|off|hs]\n                                [rts=on|off|hs|tg] [idsr=on|off]\n\nDevice Status:     MODE [device] [\/STATUS]\n\nRedirect printing: MODE LPTn[:]=COMm[:]\n\nSelect code page:  MODE CON[:] CP SELECT=yyy\n\nCode page status:  MODE CON[:] CP [\/STATUS]\n\nDisplay mode:      MODE CON[:] [COLS=c] [LINES=n]\n\nTypematic rate:    MODE CON[:] [RATE=r DELAY=d]\n \n<\/details><details><summary><strong>MORE<\/strong><\/summary>\nDisplays output one screen at a time.\n\nMORE [\/E [\/C] [\/P] [\/S] [\/Tn] [+n]] &lt; [drive:][path]filename\ncommand-name | MORE [\/E [\/C] [\/P] [\/S] [\/Tn] [+n]]\nMORE \/E [\/C] [\/P] [\/S] [\/Tn] [+n] [files]\n\n    [drive:][path]filename  Specifies a file to display one\n                            screen at a time.\n\n    command-name            Specifies a command whose output\n                            will be displayed.\n\n    \/E      Enable extended features\n    \/C      Clear screen before displaying page\n    \/P      Expand FormFeed characters\n    \/S      Squeeze multiple blank lines into a single line\n    \/Tn     Expand tabs to n spaces (default 8)\n\n            Switches can be present in the MORE environment\n            variable.\n\n    +n      Start displaying the first file at line n\n\n    files   List of files to be displayed. Files in the list\n            are separated by blanks.\n\n    If extended features are enabled, the following commands\n    are accepted at the -- More -- prompt:\n\n    P n     Display next n lines\n    S n     Skip next n lines\n    F       Display next file\n    Q       Quit\n    =       Show line number\n    ?       Show help line\n    &lt;space&gt; Display next page\n    &lt;ret&gt;   Display next line\n \n<\/details><details><summary><strong>MOUNTVOL<\/strong><\/summary>\nCreates, deletes, or lists a volume mount point.\n\nMOUNTVOL [drive:]path VolumeName\nMOUNTVOL [drive:]path \/D\nMOUNTVOL [drive:]path \/L\nMOUNTVOL [drive:]path \/P\nMOUNTVOL \/R\nMOUNTVOL \/N\nMOUNTVOL \/E\nMOUNTVOL drive: \/S\n\n    path        Specifies the existing NTFS directory where the mount\n                point will reside.\n    VolumeName  Specifies the volume name that is the target of the mount\n                point.\n    \/D          Removes the volume mount point from the specified directory.\n    \/L          Lists the mounted volume name for the specified directory.\n    \/P          Removes the volume mount point from the specified directory,\n                dismounts the volume, and makes the volume not mountable.\n                You can make the volume mountable again by creating a volume\n                mount point.\n    \/R          Removes volume mount point directories and registry settings\n                for volumes that are no longer in the system.\n    \/N          Disables automatic mounting of new volumes.\n    \/E          Re-enables automatic mounting of new volumes.\n    \/S          Mount the EFI System Partition on the given drive.\n\nPossible values for VolumeName along with current mount points are:\n\n    \\\\?\\Volume{153520a2-4226-4a4b-81c2-ecb1eaddf224}\\\n        C:\\\n\n    \\\\?\\Volume{e4e66d56-8432-4538-97c6-aa70af8f8d55}\\\n        *** NO MOUNT POINTS ***\n\n    \\\\?\\Volume{761f187e-7baf-4f40-81b5-c24357b26256}\\\n        *** NO MOUNT POINTS ***\n\n \n<\/details><details><summary><strong>MOVE<\/strong><\/summary>\nMoves files and renames files and directories.\n\nTo move one or more files:\nMOVE [\/Y | \/-Y] [drive:][path]filename1[,...] destination\n\nTo rename a directory:\nMOVE [\/Y | \/-Y] [drive:][path]dirname1 dirname2\n\n  [drive:][path]filename1 Specifies the location and name of the file\n                          or files you want to move.\n  destination             Specifies the new location of the file. Destination\n                          can consist of a drive letter and colon, a\n                          directory name, or a combination. If you are moving\n                          only one file, you can also include a filename if\n                          you want to rename the file when you move it.\n  [drive:][path]dirname1  Specifies the directory you want to rename.\n  dirname2                Specifies the new name of the directory.\n\n  \/Y                      Suppresses prompting to confirm you want to\n                          overwrite an existing destination file.\n  \/-Y                     Causes prompting to confirm you want to overwrite\n                          an existing destination file.\n\nThe switch \/Y may be present in the COPYCMD environment variable.\nThis may be overridden with \/-Y on the command line.  Default is\nto prompt on overwrites unless MOVE command is being executed from\nwithin a batch script.\n \n<\/details><details><summary><strong>MSCONFIG.EXE<\/strong><\/summary>\nThis cmd command to open System Configuration on Windows.\n \n<\/details><details><summary><strong>MSG<\/strong><\/summary>\nSend a message to a user.\n\nMSG {username | sessionname | sessionid | @filename | *}\n    [\/SERVER:servername] [\/TIME:seconds] [\/V] [\/W] [message]\n\n  username            Identifies the specified username.\n  sessionname         The name of the session.\n  sessionid           The ID of the session.\n  @filename           Identifies a file containing a list of usernames,\n                      sessionnames, and sessionids to send the message to.\n  *                   Send message to all sessions on specified server.\n  \/SERVER:servername  server to contact (default is current).\n  \/TIME:seconds       Time delay to wait for receiver to acknowledge msg.\n  \/V                  Display information about actions being performed.\n  \/W                  Wait for response from user, useful with \/V.\n  message             Message to send.  If none specified, prompts for it\n                      or reads from stdin.\n\n<\/details><details><summary><strong>MSHTA<\/strong><\/summary>\nMshta command is a Windows-native binary designed to execute Microsoft HTML Application (HTA) files.\nWith this command, run JavaScript or VBA on Windows.\nEtc.\n$ mshta javascript:alert(\"hi\");close()\n\n<\/details><details><summary><strong>MSIEXEC<\/strong><\/summary>\n msiexec \/Option &lt;Required Parameter&gt; [Optional Parameter]\n\nInstall Options\n\t&lt;\/package | \/i&gt; &lt;Product.msi&gt;\n\t\tInstalls or configures a product\n\t\/a &lt;Product.msi&gt;\n\t\tAdministrative install - Installs a product on the network\n\t\/j&lt;u|m&gt; &lt;Product.msi&gt; [\/t &lt;Transform List&gt;] [\/g &lt;Language ID&gt;]\n\t\tAdvertises a product - m to all users, u to current user\n\t&lt;\/uninstall | \/x&gt; &lt;Product.msi | ProductCode&gt;\n\t\tUninstalls the product\nDisplay Options\n\t\/quiet\n\t\tQuiet mode, no user interaction\n\t\/passive\n\t\tUnattended mode - progress bar only\n\t\/q[n|b|r|f]\n\t\tSets user interface level\n\t\tn - No UI\n\t\tb - Basic UI\n\t\tr - Reduced UI\n\t\tf - Full UI (default)\n\t\/help\n\t\tHelp information\nRestart Options\n\t\/norestart\n\t\tDo not restart after the installation is complete\n\t\/promptrestart\n\t\tPrompts the user for restart if necessary\n\t\/forcerestart\n\t\tAlways restart the computer after installation\nLogging Options\n\t\/l[i|w|e|a|r|u|c|m|o|p|v|x|+|!|*] &lt;LogFile&gt;\n\t\ti - Status messages\n\t\tw - Nonfatal warnings\n\t\te - All error messages\n\t\ta - Start up of actions\n\t\tr - Action-specific records\n\t\tu - User requests\n\t\tc - Initial UI parameters\n\t\tm - Out-of-memory or fatal exit information\n\t\to - Out-of-disk-space messages\n\t\tp - Terminal properties\n\t\tv - Verbose output\n\t\tx - Extra debugging information\n\t\t+ - Append to existing log file\n\t\t! - Flush each line to the log\n\t\t* - Log all information, except for v and x options\n\t\/log &lt;LogFile&gt;\n\t\tEquivalent of \/l* &lt;LogFile&gt;\nUpdate Options\n\t\/update &lt;Update1.msp&gt;[;Update2.msp]\n\t\tApplies update(s)\n\t\/uninstall &lt;PatchCodeGuid&gt;[;Update2.msp] \/package &lt;Product.msi | ProductCode&gt;\n\t\tRemove update(s) for a product\nRepair Options\n\t\/f[p|e|c|m|s|o|d|a|u|v] &lt;Product.msi | ProductCode&gt;\n\t\tRepairs a product\n\t\tp - only if file is missing\n\t\to - if file is missing or an older version is installed (default)\n\t\te - if file is missing or an equal or older version is installed\n\t\td - if file is missing or a different version is installed\n\t\tc - if file is missing or checksum does not match the calculated value\n\t\ta - forces all files to be reinstalled\n\t\tu - all required user-specific registry entries (default)\n\t\tm - all required computer-specific registry entries (default)\n\t\ts - all existing shortcuts (default)\n\t\tv - runs from source and recaches local package\nSetting Public Properties\n\t[PROPERTY=PropertyValue]\n\n<\/details><details><summary><strong>MSINFO32<\/strong><\/summary>\nThis cmd command to open System Information on Windows.\n \n<\/details><details><summary><strong>MSPAINT.EXE<\/strong><\/summary>\nThis cmd command to open Paint on Windows.\n \n<\/details><details><summary><strong>MSTSC<\/strong><\/summary>\nThis cmd command to open Remote Desktop Connection on Windows.\n \n<\/details><details><summary><strong>NARRATOR.EXE<\/strong><\/summary>\nThis cmd command to open Narrator on Windows.\n \n<\/details><details><summary><strong>NETSH<\/strong><\/summary>\nUsage: NETSH [-a AliasFile] [-c Context] [-r RemoteMachine] [-u [DomainName\\]UserName] [-p Password | *]\n             [Command | -f ScriptFile]\n\nThe following commands are available:\n\nCommands in this context:\n?              - Displays a list of commands.\nadd            - Adds a configuration entry to a list of entries.\nadvfirewall    - Changes to the `netsh advfirewall' context.\nbranchcache    - Changes to the `netsh branchcache' context.\nbridge         - Changes to the `netsh bridge' context.\ndelete         - Deletes a configuration entry from a list of entries.\ndhcpclient     - Changes to the `netsh dhcpclient' context.\ndnsclient      - Changes to the `netsh dnsclient' context.\ndump           - Displays a configuration script.\nexec           - Runs a script file.\nfirewall       - Changes to the `netsh firewall' context.\nhelp           - Displays a list of commands.\nhttp           - Changes to the `netsh http' context.\ninterface      - Changes to the `netsh interface' context.\nipsec          - Changes to the `netsh ipsec' context.\nlan            - Changes to the `netsh lan' context.\nmbn            - Changes to the `netsh mbn' context.\nnamespace      - Changes to the `netsh namespace' context.\nnetio          - Changes to the `netsh netio' context.\np2p            - Changes to the `netsh p2p' context.\nras            - Changes to the `netsh ras' context.\nrpc            - Changes to the `netsh rpc' context.\nset            - Updates configuration settings.\nshow           - Displays information.\ntrace          - Changes to the `netsh trace' context.\nwcn            - Changes to the `netsh wcn' context.\nwfp            - Changes to the `netsh wfp' context.\nwinhttp        - Changes to the `netsh winhttp' context.\nwinsock        - Changes to the `netsh winsock' context.\nwlan           - Changes to the `netsh wlan' context.\n\nThe following sub-contexts are available:\n advfirewall branchcache bridge dhcpclient dnsclient firewall http interface ipsec lan mbn namespace netio p2p ras rpc trace wcn wfp winhttp winsock wlan\n\nTo view help for a command, type the command, followed by a space, and then\n type ?.\n \n<\/details><details><summary><strong>NETSTAT<\/strong><\/summary>\nDisplays protocol statistics and current TCP\/IP network connections.\n\nNETSTAT [-a] [-b] [-e] [-f] [-n] [-o] [-p proto] [-r] [-s] [-t] [-x] [-y] [interval]\n\n  -a            Displays all connections and listening ports.\n  -b            Displays the executable involved in creating each connection or\n                listening port. In some cases well-known executables host\n                multiple independent components, and in these cases the\n                sequence of components involved in creating the connection\n                or listening port is displayed. In this case the executable\n                name is in [] at the bottom, on top is the component it called,\n                and so forth until TCP\/IP was reached. Note that this option\n                can be time-consuming and will fail unless you have sufficient\n                permissions.\n  -e            Displays Ethernet statistics. This may be combined with the -s\n                option.\n  -f            Displays Fully Qualified Domain Names (FQDN) for foreign\n                addresses.\n  -n            Displays addresses and port numbers in numerical form.\n  -o            Displays the owning process ID associated with each connection.\n  -p proto      Shows connections for the protocol specified by proto; proto\n                may be any of: TCP, UDP, TCPv6, or UDPv6.  If used with the -s\n                option to display per-protocol statistics, proto may be any of:\n                IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.\n  -q            Displays all connections, listening ports, and bound\n                nonlistening TCP ports. Bound nonlistening ports may or may not\n                be associated with an active connection.\n  -r            Displays the routing table.\n  -s            Displays per-protocol statistics.  By default, statistics are\n                shown for IP, IPv6, ICMP, ICMPv6, TCP, TCPv6, UDP, and UDPv6;\n                the -p option may be used to specify a subset of the default.\n  -t            Displays the current connection offload state.\n  -x            Displays NetworkDirect connections, listeners, and shared\n                endpoints.\n  -y            Displays the TCP connection template for all connections.\n                Cannot be combined with the other options.\n  interval      Redisplays selected statistics, pausing interval seconds\n                between each display.  Press CTRL+C to stop redisplaying\n                statistics.  If omitted, netstat will print the current\n                configuration information once.\n \n<\/details><details><summary><strong>NSLOOKUP<\/strong><\/summary>\nUsage:\n   nslookup [-opt ...]             # interactive mode using default server\n   nslookup [-opt ...] - server    # interactive mode using 'server'\n   nslookup [-opt ...] host        # just look up 'host' using default server\n   nslookup [-opt ...] host server # just look up 'host' using 'server' \n\n<\/details><details><summary><strong>ODBCAD32.EXE<\/strong><\/summary>\nThis cmd command to open ODBC Data Source Administrator on Windows.\n \n<\/details><details><summary><strong>OPENFILES<\/strong><\/summary>\nOPENFILES \/parameter [arguments]\n\nDescription:\n    Enables an administrator to list or disconnect files and folders\n    that have been opened on a system.\n\nParameter List:\n    \/Disconnect      Disconnects one or more open files.\n\n    \/Query           Displays files opened locally or from shared\n                     folders.\n\n    \/Local           Enables \/ Disables the display of local open files.\n\n    \/?               Displays this help message.\n\nExamples:\n    OPENFILES \/Disconnect \/?\n    OPENFILES \/Query \/?\n    OPENFILES \/Local \/?\n \n<\/details><details><summary><strong>OSK.EXE<\/strong><\/summary>\nThis cmd command to open On-Screen Keyboard on Windows.\n \n<\/details><details><summary><strong>PATH<\/strong><\/summary>\nDisplays or sets a search path for executable files.\n\nPATH [[drive:]path[;...][;%PATH%]\nPATH ;\n\nType PATH ; to clear all search-path settings and direct cmd.exe to search\nonly in the current directory.\nType PATH without parameters to display the current path.\nIncluding %PATH% in the new path setting causes the old path to be\nappended to the new setting.\n \n<\/details><details><summary><strong>PATHPING<\/strong><\/summary>\nUsage: pathping [-g host-list] [-h maximum_hops] [-i address] [-n]\n                [-p period] [-q num_queries] [-w timeout]\n                [-4] [-6] target_name\n\nOptions:\n    -g host-list     Loose source route along host-list.\n    -h maximum_hops  Maximum number of hops to search for target.\n    -i address       Use the specified source address.\n    -n               Do not resolve addresses to hostnames.\n    -p period        Wait period milliseconds between pings.\n    -q num_queries   Number of queries per hop.\n    -w timeout       Wait timeout milliseconds for each reply.\n    -4               Force using IPv4.\n    -6               Force using IPv6.\n \n<\/details><details><summary><strong>PAUSE<\/strong><\/summary>\nSuspends processing of a batch program and displays the message\n    Press any key to continue . . . \n \n<\/details><details><summary><strong>PERFMON<\/strong><\/summary>\nThis cmd command to open Performance Monitor on Windows.\n \n<\/details><details><summary><strong>PING<\/strong><\/summary>\nUsage: ping [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]\n            [-r count] [-s count] [[-j host-list] | [-k host-list]]\n            [-w timeout] [-R] [-S srcaddr] [-c compartment] [-p]\n            [-4] [-6] target_name\n\nOptions:\n    -t             Ping the specified host until stopped.\n                   To see statistics and continue - type Control-Break;\n                   To stop - type Control-C.\n    -a             Resolve addresses to hostnames.\n    -n count       Number of echo requests to send.\n    -l size        Send buffer size.\n    -f             Set Don't Fragment flag in packet (IPv4-only).\n    -i TTL         Time To Live.\n    -v TOS         Type Of Service (IPv4-only. This setting has been deprecated\n                   and has no effect on the type of service field in the IP\n                   Header).\n    -r count       Record route for count hops (IPv4-only).\n    -s count       Timestamp for count hops (IPv4-only).\n    -j host-list   Loose source route along host-list (IPv4-only).\n    -k host-list   Strict source route along host-list (IPv4-only).\n    -w timeout     Timeout in milliseconds to wait for each reply.\n    -R             Use routing header to test reverse route also (IPv6-only).\n                   Per RFC 5095 the use of this routing header has been\n                   deprecated. Some systems may drop echo requests if\n                   this header is used.\n    -S srcaddr     Source address to use.\n    -c compartment Routing compartment identifier.\n    -p             Ping a Hyper-V Network Virtualization provider address.\n    -4             Force using IPv4.\n    -6             Force using IPv6.\n \n<\/details><details><summary><strong>POWERCFG<\/strong><\/summary>\nPOWERCFG \/COMMAND [ARGUMENTS]\n\nDescription:\n  Enables users to control power settings on a local system.\n\n  For detailed command and option information, run \"POWERCFG \/? &lt;COMMAND&gt;\"\n\nCommand List:\n  \/LIST, \/L          Lists all power schemes.\n\n  \/QUERY, \/Q         Displays the contents of a power scheme.\n\n  \/CHANGE, \/X        Modifies a setting value in the current power scheme.\n\n  \/CHANGENAME        Modifies the name and description of a power scheme.\n\n  \/DUPLICATESCHEME   Duplicates a power scheme.\n\n  \/DELETE, \/D        Deletes a power scheme.\n\n  \/DELETESETTING     Deletes a power setting.\n\n  \/SETACTIVE, \/S     Makes a power scheme active on the system.\n\n  \/GETACTIVESCHEME   Retrieves the currently active power scheme.\n\n  \/SETACVALUEINDEX   Sets the value associated with a power setting\n                     while the system is powered by AC power.\n\n  \/SETDCVALUEINDEX   Sets the value associated with a power setting\n                     while the system is powered by DC power.\n\n  \/IMPORT            Imports all power settings from a file.\n\n  \/EXPORT            Exports a power scheme to a file.\n\n  \/ALIASES           Displays all aliases and their corresponding GUIDs.\n\n  \/GETSECURITYDESCRIPTOR\n                     Gets a security descriptor associated with a specified\n                     power setting, power scheme, or action.\n\n  \/SETSECURITYDESCRIPTOR\n                     Sets a security descriptor associated with a\n                     power setting, power scheme, or action.\n\n  \/HIBERNATE, \/H     Enables and disables the hibernate feature.\n\n  \/AVAILABLESLEEPSTATES, \/A\n                     Reports the sleep states available on the system.\n\n  \/DEVICEQUERY       Returns a list of devices that meet specified criteria.\n\n  \/DEVICEENABLEWAKE  Enables a device to wake the system from a sleep state.\n\n  \/DEVICEDISABLEWAKE Disables a device from waking the system from a sleep\n                     state.\n\n  \/LASTWAKE          Reports information about what woke the system from the\n                     last sleep transition.\n\n  \/WAKETIMERS        Enumerates active wake timers.\n\n  \/REQUESTS          Enumerates application and driver Power Requests.\n\n  \/REQUESTSOVERRIDE  Sets a Power Request override for a particular Process,\n                     Service, or Driver.\n\n  \/ENERGY            Analyzes the system for common energy-efficiency and\n                     battery life problems.\n\n  \/BATTERYREPORT     Generates a report of battery usage.\n\n  \/SLEEPSTUDY        Generates a diagnostic system power transition report.\n\n  \/SRUMUTIL          Dumps Energy Estimation data from System Resource Usage\n                     Monitor (SRUM).\n\n  \/SYSTEMSLEEPDIAGNOSTICS\n                     Generates a diagnostic report of system sleep transitions.\n\n  \/SYSTEMPOWERREPORT Generates a diagnostic system power transition report.\n\n  \/POWERTHROTTLING   Control power throttling for an application.\n \n<\/details><details><summary><strong>PRINT<\/strong><\/summary>\nPrints a text file.\n\nPRINT [\/D:device] [[drive:][path]filename[...]]\n\n   \/D:device   Specifies a print device.\n\n \n<\/details><details><summary><strong>PROMPT<\/strong><\/summary>\nChanges the cmd.exe command prompt.\n\nPROMPT [text]\n\n  text    Specifies a new command prompt.\n\nPrompt can be made up of normal characters and the following special codes:\n\n  $A   &amp; (Ampersand)\n  $B   | (pipe)\n  $C   ( (Left parenthesis)\n  $D   Current date\n  $E   Escape code (ASCII code 27)\n  $F   ) (Right parenthesis)\n  $G   &gt; (greater-than sign)\n  $H   Backspace (erases previous character)\n  $L   &lt; (less-than sign)\n  $N   Current drive\n  $P   Current drive and path\n  $Q   = (equal sign)\n  $S     (space)\n  $T   Current time\n  $V   Windows version number\n  $_   Carriage return and linefeed\n  $$   $ (dollar sign)\n\nIf Command Extensions are enabled the PROMPT command supports\nthe following additional formatting characters:\n\n  $+   zero or more plus sign (+) characters depending upon the\n       depth of the PUSHD directory stack, one character for each\n       level pushed.\n\n  $M   Displays the remote name associated with the current drive\n       letter or the empty string if current drive is not a network\n       drive.\n \n<\/details><details><summary><strong>POWERSHELL<\/strong><\/summary>\n This cmd command call Powershell.\n\n<\/details><details><summary><strong>RASPHONE.EXE<\/strong><\/summary>\nThis cmd command to open Network Connections on Windows.\n \n<\/details><details><summary><strong>RD<\/strong><\/summary>\nRemoves (deletes) a directory.\n\nRMDIR [\/S] [\/Q] [drive:]path\nRD [\/S] [\/Q] [drive:]path\n\n    \/S      Removes all directories and files in the specified directory\n            in addition to the directory itself.  Used to remove a directory\n            tree.\n\n    \/Q      Quiet mode, do not ask if ok to remove a directory tree with \/<\/details><details><summary><strong>S<\/strong><\/summary>\n \n<\/details><details><summary><strong>RECOVER<\/strong><\/summary>\nRecovers readable information from a bad or defective disk.\n\nRECOVER [drive:][path]filename\nConsult the online Command Reference in Windows Help\nbefore using the RECOVER command.\n \n<\/details><details><summary><strong>REG<\/strong><\/summary>\nREG Operation [Parameter List]\n\n  Operation  [ QUERY   | ADD    | DELETE  | COPY    |\n               SAVE    | LOAD   | UNLOAD  | RESTORE |\n               COMPARE | EXPORT | IMPORT  | FLAGS ]\n\nReturn Code: (Except for REG COMPARE)\n\n  0 - Successful\n  1 - Failed\n\nFor help on a specific operation type:\n\n  REG Operation \/?\n\nExamples:\n\n  REG QUERY \/?\n  REG ADD \/?\n  REG DELETE \/?\n  REG COPY \/?\n  REG SAVE \/?\n  REG RESTORE \/?\n  REG LOAD \/?\n  REG UNLOAD \/?\n  REG COMPARE \/?\n  REG EXPORT \/?\n  REG IMPORT \/?\n  REG FLAGS \/?\n \n<\/details><details><summary><strong>REGEDIT<\/strong><\/summary>\nThis cmd command to open Registry Editor on Windows.\n \n<\/details><details><summary><strong>REGINI<\/strong><\/summary>\nusage: REGINI [-m \\\\machinename | -h hivefile hiveroot]\n              [-i n] [-o outputWidth]\n              [-b] textFiles...\n\nwhere: -m specifies a remote Windows NT machine whose registry is to be manipulated.\n       -h specifies a specify local hive to manipulate.\n       -i n specifies the display indentation multiple.  Default is 4\n       -o outputWidth specifies how wide the output is to be.  By default the\n          outputWidth is set to the width of the console window if standard\n          output has not been redirected to a file.  In the latter case, an\n          outputWidth of 240 is used.\n\n       -b specifies that REGINI should be backward compatible with older\n           versions of REGINI that did not strictly enforce line continuations\n           and quoted strings Specifically, REG_BINARY, REG_RESOURCE_LIST and\n           REG_RESOURCE_REQUIREMENTS_LIST data types did not need line\n           continuations after the first number that gave the size of the data.\n           It just kept looking on following lines until it found enough data\n           values to equal the data length or hit invalid input.  Quoted\n           strings were only allowed in REG_MULTI_SZ.  They could not be\n           specified around key or value names, or around values for REG_SZ or\n           REG_EXPAND_SZ  Finally, the old REGINI did not support the semicolon\n           as an end of line comment character.\n\n       textFiles is one or more ANSI or Unicode text files with registry data.\n\n       Some general rules are:\n           Semicolon character is an end-of-line comment character, provided it\n           is the first non-blank character on a line\n\n           Backslash character is a line continuation character.  All\n           characters from the backslash up to but not including the first\n           non-blank character of the next line are ignored.  If there is more\n           than one space before the line continuation character, it is\n           replaced by a single space.\n\n           Indentation is used to indicate the tree structure of registry keys\n           The REGDMP program uses indentation in multiples of 4.  You may use\n           hard tab characters for indentation, but embedded hard tab\n           characters are converted to a single space regardless of their\n           position\n\n           Values should come before child keys, as they are associated with\n           the previous key at or above the value's indentation level.\n\n           For key names, leading and trailing space characters are ignored and\n           not included in the key name, unless the key name is surrounded by\n           quotes.  Imbedded spaces are part of a key name.\n\n           Key names can be followed by an Access Control List (ACL) which is a\n           series of decimal numbers, separated by spaces, bracketed by a\n           square brackets (e.g.  [8 4 17]).  The valid numbers and their\n           meanings are:\n\n              1  - Administrators Full Access\n              2  - Administrators Read Access\n              3  - Administrators Read and Write Access\n              4  - Administrators Read, Write and Delete Access\n              5  - Creator Full Access\n              6  - Creator Read and Write Access\n              7  - World Full Access\n              8  - World Read Access\n              9  - World Read and Write Access\n              10 - World Read, Write and Delete Access\n              11 - Power Users Full Access\n              12 - Power Users Read and Write Access\n              13 - Power Users Read, Write and Delete Access\n              14 - System Operators Full Access\n              15 - System Operators Read and Write Access\n              16 - System Operators Read, Write and Delete Access\n              17 - System Full Access\n              18 - System Read and Write Access\n              19 - System Read Access\n              20 - Administrators Read, Write and Execute Access\n              21 - Interactive User Full Access\n              22 - Interactive User Read and Write Access\n              23 - Interactive User Read, Write and Delete Access\n\n           If there is an equal sign on the same line as a left square bracket\n           then the equal sign takes precedence, and the line is treated as a\n           registry value.  If the text between the square brackets is the\n           string DELETE with no spaces, then REGINI will delete the key and\n           any values and keys under it.\n\n           For registry values, the syntax is:\n\n              value Name = type data\n\n           Leading spaces, spaces on either side of the equal sign and spaces\n           between the type keyword and data are ignored, unless the value name\n           is surrounded by quotes.  If the text to the right of the equal sign\n           is the string DELETE, then REGINI will delete the value.\n\n           The value name may be left off or be specified by an at-sign\n           character which is the same thing, namely the empty value name.  So\n           the following two lines are identical:\n\n              = type data\n              @ = type data\n\n           This syntax means that you can't create a value with leading or\n           trailing spaces, an equal sign or an at-sign in the value name,\n           unless you put the name in quotes.\n\n           Valid value types and format of data that follows are:\n\n              REG_SZ text\n              REG_EXPAND_SZ text\n              REG_MULTI_SZ \"string1\" \"str\"\"ing2\" ...\n              REG_DATE mm\/dd\/yyyy HH:MM DayOfWeek\n              REG_DWORD numberDWORD\n              REG_BINARY numberOfBytes numberDWORD(s)...\n              REG_NONE (same format as REG_BINARY)\n              REG_RESOURCE_LIST (same format as REG_BINARY)\n              REG_RESOURCE_REQUIREMENTS (same format as REG_BINARY)\n              REG_RESOURCE_REQUIREMENTS_LIST (same format as REG_BINARY)\n              REG_FULL_RESOURCE_DESCRIPTOR (same format as REG_BINARY)\n              REG_QWORD numberQWORD\n              REG_MULTISZ_FILE fileName\n              REG_BINARYFILE fileName\n\n           If no value type is specified, default is REG_SZ\n\n           For REG_SZ and REG_EXPAND_SZ, if you want leading or trailing spaces\n           in the value text, surround the text with quotes.  The value text\n           can contain any number of imbedded quotes, and REGINI will ignore\n           them, as it only looks at the first and last character for quote\n           characters.\n\n           For REG_MULTI_SZ, each component string is surrounded by quotes.  If\n           you want an imbedded quote character, then double quote it, as in\n           string2 above.\n\n           For REG_BINARY, the value data consists of one or more numbers The\n           default base for numbers is decimal.  Hexidecimal may be specified\n           by using 0x prefix.  The first number is the number of data bytes,\n           excluding the first number.  After the first number must come enough\n           numbers to fill the value.  Each number represents one DWORD or 4\n           bytes.  So if the first number was 0x5 you would need two more\n           numbers after that to fill the 5 bytes.  The high order 3 bytes\n           of the second DWORD would be ignored.\n\n       Whenever specifying a registry path, either on the command line\n       or in an input file, the following prefix strings can be used:\n\n            HKEY_LOCAL_MACHINE\n            HKEY_USERS\n            HKEY_CURRENT_USER\n            USER:\n\n          Each of these strings can stand alone as the key name or be followed\n          a backslash and a subkey path.\n \n<\/details><details><summary><strong>REGSVR32<\/strong><\/summary>\nRegsvr32 command is a utility to register and unregister OLE controls, such as DLLs and ActiveX controls in the Windows Registry. \n \n<\/details><details><summary><strong>REM<\/strong><\/summary>\nRecords comments (remarks) in a batch file or CONFIG.SYS.\n\nREM [comment]\n \n<\/details><details><summary><strong>REN<\/strong><\/summary>\nRenames a file or files.\n\nRENAME [drive:][path]filename1 filename2.\nREN [drive:][path]filename1 filename2.\n\nNote that you cannot specify a new drive or path for your destination file.\n \n<\/details><details><summary><strong>RENAME<\/strong><\/summary>\nRenames a file or files.\n\nRENAME [drive:][path]filename1 filename2.\nREN [drive:][path]filename1 filename2.\n\nNote that you cannot specify a new drive or path for your destination file.\n \n<\/details><details><summary><strong>REPAIR-BDE<\/strong><\/summary>\nBitLocker Drive Encryption: Repair Tool version 10.0.19041\nCopyright (C) 2013 Microsoft Corporation. All rights reserved.\n\nUsage:\n\nrepair-bde[.exe] InputVolume\n                  { OutputVolumeOrImage }\n                  { {-RecoveryPassword|-rp} NumericalPassword |\n                    {-RecoveryKey|-rk} PathToExternalKeyFile |\n                    {-Password|-pw} }\n                  [{-KeyPackage|-kp} PathToKeyPackage]\n                  [{-LogFile|-lf} PathToLogFile]\n                  [{-?|\/?}]\n\nDescription:\n  Attempts to repair or decrypt a damaged BitLocker-encrypted volume using the\n  supplied recovery information. If BitLocker was in the process of encryption\n  or decryption or had been suspended prior to volume failure a clear key will\n  be present on the volume. Repair-bde attempts to use this clear key by\n  default if another key is not specified.\n\n  WARNING! To avoid additional data loss, you should have a spare hard drive\n  available. Use this spare drive to store decrypted output or to back up the\n  contents of the damaged volume.\n\nParameters:\n  InputVolume\n                The BitLocker-encrypted volume to repair.\n                Example: \"C:\",\n                         \"\\\\?\\Volume{26a21bda-a627-11d7-9931-806e6f6e6963}\".\n\n  OutputVolumeOrImage\n                The volume to store decrypted contents, or the file\n                location to create an image file of the contents.\n                Examples: \"D:\", \"D:\\imagefile.img\".\n\n                WARNING! All information on this output volume will be\n                overwritten.\n\n  -rk  or -RecoveryKey\n                Provide an external key to unlock the volume.\n                Example: \"F:\\RecoveryKey.bek\".\n\n  -rp  or -RecoveryPassword\n                Provide a numerical password to unlock the volume.\n                Example: \"111111-222222-333333-...\".\n\n  -pw  or -Password\n                Provide a password to unlock the volume.\n\n  -kp  or -KeyPackage\n                Optional. Provide a key package to unlock the volume.\n                Example: \"F:\\ExportedKeyPackage\"\n\n            If this option is blank, the tool will look for the key package\n            automatically. This option is needed only if required by the tool.\n\n  -lf  or -LogFile\n                Optional. Provide a path to a file that will store progress\n                information. Example: \"F:\\log.txt\".\n\n  -f   or -Force\n                Optional. When used, forces a volume to be dismounted even if\n                it cannot be locked. This option is needed only if required by\n                the tool.\n\n  -?   or \/?\n                Shows this screen.\n\nExamples:\n  repair-bde C: D: -rk F:\\RecoveryKey.bek -Force\n  repair-bde C: D: -rp 111111-222222-[...] -lf F:\\log.txt\n  repair-bde C: D: -kp F:\\KeyPackage -rp 111111-222222-[...]\n  repair-bde C: D:\\imagefile.img -kp F:\\KeyPackage -rk F:\\RecoveryKey.bek\n  repair-bde C: D: -pw\n \n<\/details><details><summary><strong>REPLACE<\/strong><\/summary>\nReplaces files.\n\nREPLACE [drive1:][path1]filename [drive2:][path2] [\/A] [\/P] [\/R] [\/W]\nREPLACE [drive1:][path1]filename [drive2:][path2] [\/P] [\/R] [\/S] [\/W] [\/U]\n\n  [drive1:][path1]filename Specifies the source file or files.\n  [drive2:][path2]         Specifies the directory where files are to be\n                           replaced.\n  \/A                       Adds new files to destination directory. Cannot\n                           use with \/S or \/U switches.\n  \/P                       Prompts for confirmation before replacing a file or\n                           adding a source file.\n  \/R                       Replaces read-only files as well as unprotected\n                           files.\n  \/S                       Replaces files in all subdirectories of the\n                           destination directory. Cannot use with the \/A\n                           switch.\n  \/W                       Waits for you to insert a disk before beginning.\n  \/U                       Replaces (updates) only files that are older than\n                           source files. Cannot use with the \/A switch.\n\n<\/details><details><summary><strong>RMDIR<\/strong><\/summary>\nRemoves (deletes) a directory.\n\nRMDIR [\/S] [\/Q] [drive:]path\nRD [\/S] [\/Q] [drive:]path\n\n    \/S      Removes all directories and files in the specified directory\n            in addition to the directory itself.  Used to remove a directory\n            tree.\n\n    \/Q      Quiet mode, do not ask if ok to remove a directory tree with \/S\n \n<\/details><details><summary><strong>ROBOCOPY<\/strong><\/summary>\n-------------------------------------------------------------------------------\n   ROBOCOPY     ::     Robust File Copy for Windows\n-------------------------------------------------------------------------------\n\n  Started : 11 Eyl\u00fcl 2022 Pazar 10:09:18\n              Usage :: ROBOCOPY source destination [file [file]...] [options]\n\n             source :: Source Directory (drive:\\path or \\\\server\\share\\path).\n        destination :: Destination Dir  (drive:\\path or \\\\server\\share\\path).\n               file :: File(s) to copy  (names\/wildcards: default is \"*.*\").\n\n::\n:: Copy options :\n::\n                 \/S :: copy Subdirectories, but not empty ones.\n                 \/E :: copy subdirectories, including Empty ones.\n             \/LEV:n :: only copy the top n LEVels of the source directory tree.\n\n                 \/Z :: copy files in restartable mode.\n                 \/B :: copy files in Backup mode.\n                \/ZB :: use restartable mode; if access denied use Backup mode.\n                 \/J :: copy using unbuffered I\/O (recommended for large files).\n            \/EFSRAW :: copy all encrypted files in EFS RAW mode.\n\n  \/COPY:copyflag[s] :: what to COPY for files (default is \/COPY:DAT).\n                       (copyflags : D=Data, A=Attributes, T=Timestamps, X=Skip alt data streams).\n                       (S=Security=NTFS ACLs, O=Owner info, U=aUditing info).\n\n\n               \/SEC :: copy files with SECurity (equivalent to \/COPY:DATS).\n           \/COPYALL :: COPY ALL file info (equivalent to \/COPY:DATSOU).\n            \/NOCOPY :: COPY NO file info (useful with \/PURGE).\n            \/SECFIX :: FIX file SECurity on all files, even skipped files.\n            \/TIMFIX :: FIX file TIMes on all files, even skipped files.\n\n             \/PURGE :: delete dest files\/dirs that no longer exist in source.\n               \/MIR :: MIRror a directory tree (equivalent to \/E plus \/PURGE).\n\n               \/MOV :: MOVe files (delete from source after copying).\n              \/MOVE :: MOVE files AND dirs (delete from source after copying).\n\n     \/A+:[RASHCNET] :: add the given Attributes to copied files.\n     \/A-:[RASHCNET] :: remove the given Attributes from copied files.\n\n            \/CREATE :: CREATE directory tree and zero-length files only.\n               \/FAT :: create destination files using 8.3 FAT file names only.\n               \/256 :: turn off very long path (&gt; 256 characters) support.\n\n             \/MON:n :: MONitor source; run again when more than n changes seen.\n             \/MOT:m :: MOnitor source; run again in m minutes Time, if changed.\n\n      \/RH:hhmm-hhmm :: Run Hours - times when new copies may be started.\n                \/PF :: check run hours on a Per File (not per pass) basis.\n\n             \/IPG:n :: Inter-Packet Gap (ms), to free bandwidth on slow lines.\n\n                \/SJ :: copy Junctions as junctions instead of as the junction targets.\n                \/SL :: copy Symbolic Links as links instead of as the link targets.\n\n            \/MT[:n] :: Do multi-threaded copies with n threads (default 8).\n                       n must be at least 1 and not greater than 128.\n                       This option is incompatible with the \/IPG and \/EFSRAW options.\n                       Redirect output using \/LOG option for better performance.\n\n \/DCOPY:copyflag[s] :: what to COPY for directories (default is \/DCOPY:DA).\n                       (copyflags : D=Data, A=Attributes, T=Timestamps, E=EAs, X=Skip alt data streams).\n\n           \/NODCOPY :: COPY NO directory info (by default \/DCOPY:DA is done).\n\n         \/NOOFFLOAD :: copy files without using the Windows Copy Offload mechanism.\n\n          \/COMPRESS :: Request network compression during file transfer, if applicable.\n\n::\n:: File Selection Options :\n::\n                 \/A :: copy only files with the Archive attribute set.\n                 \/M :: copy only files with the Archive attribute and reset it.\n    \/IA:[RASHCNETO] :: Include only files with any of the given Attributes set.\n    \/XA:[RASHCNETO] :: eXclude files with any of the given Attributes set.\n\n \/XF file [file]... :: eXclude Files matching given names\/paths\/wildcards.\n \/XD dirs [dirs]... :: eXclude Directories matching given names\/paths.\n\n                \/XC :: eXclude Changed files.\n                \/XN :: eXclude Newer files.\n                \/XO :: eXclude Older files.\n                \/XX :: eXclude eXtra files and directories.\n                \/XL :: eXclude Lonely files and directories.\n                \/IS :: Include Same files.\n                \/IT :: Include Tweaked files.\n\n             \/MAX:n :: MAXimum file size - exclude files bigger than n bytes.\n             \/MIN:n :: MINimum file size - exclude files smaller than n bytes.\n\n          \/MAXAGE:n :: MAXimum file AGE - exclude files older than n days\/date.\n          \/MINAGE:n :: MINimum file AGE - exclude files newer than n days\/date.\n          \/MAXLAD:n :: MAXimum Last Access Date - exclude files unused since n.\n          \/MINLAD:n :: MINimum Last Access Date - exclude files used since n.\n                       (If n &lt; 1900 then n = n days, else n = YYYYMMDD date).\n\n               \/FFT :: assume FAT File Times (2-second granularity).\n               \/DST :: compensate for one-hour DST time differences.\n\n                \/XJ :: eXclude symbolic links (for both files and directories) and Junction points.\n               \/XJD :: eXclude symbolic links for Directories and Junction points.\n               \/XJF :: eXclude symbolic links for Files.\n\n                \/IM :: Include Modified files (differing change times).\n::\n:: Retry Options :\n::\n               \/R:n :: number of Retries on failed copies: default 1 million.\n               \/W:n :: Wait time between retries: default is 30 seconds.\n\n               \/REG :: Save \/R:n and \/W:n in the Registry as default settings.\n\n               \/TBD :: Wait for sharenames To Be Defined (retry error 67).\n\n               \/LFSM :: Operate in low free space mode, enabling copy pause and resume (see Remarks).\n\n               \/LFSM:n[KMG] :: \/LFSM, specifying the floor size in n [K:kilo,M:mega,G:giga] bytes.\n\n::\n:: Logging Options :\n::\n                 \/L :: List only - don't copy, timestamp or delete any files.\n                 \/X :: report all eXtra files, not just those selected.\n                 \/V :: produce Verbose output, showing skipped files.\n                \/TS :: include source file Time Stamps in the output.\n                \/FP :: include Full Pathname of files in the output.\n             \/BYTES :: Print sizes as bytes.\n\n                \/NS :: No Size - don't log file sizes.\n                \/NC :: No Class - don't log file classes.\n               \/NFL :: No File List - don't log file names.\n               \/NDL :: No Directory List - don't log directory names.\n\n                \/NP :: No Progress - don't display percentage copied.\n               \/ETA :: show Estimated Time of Arrival of copied files.\n\n          \/LOG:file :: output status to LOG file (overwrite existing log).\n         \/LOG+:file :: output status to LOG file (append to existing log).\n\n       \/UNILOG:file :: output status to LOG file as UNICODE (overwrite existing log).\n      \/UNILOG+:file :: output status to LOG file as UNICODE (append to existing log).\n\n               \/TEE :: output to console window, as well as the log file.\n\n               \/NJH :: No Job Header.\n               \/NJS :: No Job Summary.\n\n           \/UNICODE :: output status as UNICODE.\n\n::\n:: Job Options :\n::\n       \/JOB:jobname :: take parameters from the named JOB file.\n      \/SAVE:jobname :: SAVE parameters to the named job file\n              \/QUIT :: QUIT after processing command line (to view parameters).\n              \/NOSD :: NO Source Directory is specified.\n              \/NODD :: NO Destination Directory is specified.\n                \/IF :: Include the following Files.\n\n::\n:: Remarks :\n::\n       Using \/PURGE or \/MIR on the root directory of the volume formerly caused\n       robocopy to apply the requested operation on files inside the System\n       Volume Information directory as well. This is no longer the case; if\n       either is specified, robocopy will skip any files or directories with that\n       name in the top-level source and destination directories of the copy session.\n\n       The modified files classification applies only when both source\n       and destination filesystems support change timestamps (e.g., NTFS)\n       and the source and destination files have different change times but are\n       otherwise the same. These files are not copied by default; specify \/IM\n       to include them.\n\n       The \/DCOPY:E flag requests that extended attribute copying should be\n       attempted for directories. Note that currently robocopy will continue\n       if a directory's EAs could not be copied. This flag is also not included\n       in \/COPYALL.\n\n       Using \/LFSM requests robocopy to operate in 'low free space mode'.\n       In that mode, robocopy will pause whenever a file copy would cause the\n       destination volume's free space to go below a 'floor' value, which\n       can be explicitly specified by the LFSM:n[KMG] form of the flag.\n       If \/LFSM is specified with no explicit floor value, the floor is set to\n       ten percent of the destination volume's size.\n       Low free space mode is incompatible with \/MT, \/EFSRAW, \/B, and \/ZB.\n \n<\/details><details><summary><strong>ROUTE<\/strong><\/summary>\nManipulates network routing tables.\n\nROUTE [-f] [-p] [-4|-6] command [destination]\n                  [MASK netmask]  [gateway] [METRIC metric]  [IF interface]\n\n  -f           Clears the routing tables of all gateway entries.  If this is\n               used in conjunction with one of the commands, the tables are\n               cleared prior to running the command.\n\n  -p           When used with the ADD command, makes a route persistent across\n               boots of the system. By default, routes are not preserved\n               when the system is restarted. Ignored for all other commands,\n               which always affect the appropriate persistent routes.\n\n  -4           Force using IPv4.\n\n  -6           Force using IPv6.\n\n  command      One of these:\n                 PRINT     Prints  a route\n                 ADD       Adds    a route\n                 DELETE    Deletes a route\n                 CHANGE    Modifies an existing route\n  destination  Specifies the host.\n  MASK         Specifies that the next parameter is the 'netmask' value.\n  netmask      Specifies a subnet mask value for this route entry.\n               If not specified, it defaults to 255.255.255.255.\n  gateway      Specifies gateway.\n  interface    the interface number for the specified route.\n  METRIC       specifies the metric, ie. cost for the destination.\n\nAll symbolic names used for destination are looked up in the network database\nfile NETWORKS. The symbolic names for gateway are looked up in the host name\ndatabase file HOSTS.\n\nIf the command is PRINT or DELETE. Destination or gateway can be a wildcard,\n(wildcard is specified as a star '*'), or the gateway argument may be omitted.\n\nIf Dest contains a * or ?, it is treated as a shell pattern, and only\nmatching destination routes are printed. The '*' matches any string,\nand '?' matches any one char. Examples: 157.*.1, 157.*, 127.*, *224*.\n\nPattern match is only allowed in PRINT command.\nDiagnostic Notes:\n    Invalid MASK generates an error, that is when (DEST &amp; MASK) != DEST.\n    Example&gt; route ADD 157.0.0.0 MASK 155.0.0.0 157.55.80.1 IF 1\n             The route addition failed: The specified mask parameter is invalid. (Destination &amp; Mask) != Destination.\n\nExamples:\n\n    &gt; route PRINT\n    &gt; route PRINT -4\n    &gt; route PRINT -6\n    &gt; route PRINT 157*          .... Only prints those matching 157*\n\n    &gt; route ADD 157.0.0.0 MASK 255.0.0.0  157.55.80.1 METRIC 3 IF 2\n             destination^      ^mask      ^gateway     metric^    ^\n                                                         Interface^\n      If IF is not given, it tries to find the best interface for a given\n      gateway.\n    &gt; route ADD 3ffe::\/32 3ffe::1\n\n    &gt; route CHANGE 157.0.0.0 MASK 255.0.0.0 157.55.80.5 METRIC 2 IF 2\n\n      CHANGE is used to modify gateway and\/or metric only.\n\n    &gt; route DELETE 157.0.0.0\n    &gt; route DELETE 3ffe::\/32\n \n<\/details><details><summary><strong>RUNAS<\/strong><\/summary>\nRUNAS USAGE:\n\nRUNAS [ [\/noprofile | \/profile] [\/env] [\/savecred | \/netonly] ]\n        \/user:&lt;UserName&gt; program\n\nRUNAS [ [\/noprofile | \/profile] [\/env] [\/savecred] ]\n        \/smartcard [\/user:&lt;UserName&gt;] program\n\nRUNAS \/trustlevel:&lt;TrustLevel&gt; program\n\n   \/noprofile        specifies that the user's profile should not be loaded.\n                     This causes the application to load more quickly, but\n                     can cause some applications to malfunction.\n   \/profile          specifies that the user's profile should be loaded.\n                     This is the default.\n   \/env              to use current environment instead of user's.\n   \/netonly          use if the credentials specified are for remote\n                     access only.\n   \/savecred         to use credentials previously saved by the user.\n   \/smartcard        use if the credentials are to be supplied from a\n                     smartcard.\n   \/user             &lt;UserName&gt; should be in form USER@DOMAIN or DOMAIN\\USER\n   \/showtrustlevels  displays the trust levels that can be used as arguments\n                     to \/trustlevel.\n   \/trustlevel       &lt;Level&gt; should be one of levels enumerated\n                     in \/showtrustlevels.\n   program         command line for EXE.  See below for examples\n\nExamples:\n&gt; runas \/noprofile \/user:mymachine\\administrator cmd\n&gt; runas \/profile \/env \/user:mydomain\\admin \"mmc %windir%\\system32\\dsa.msc\"\n&gt; runas \/env \/user:user@domain.microsoft.com \"notepad \\\"my file.txt\\\"\"\n\nNOTE:  Enter user's password only when prompted.\nNOTE:  \/profile is not compatible with \/netonly.\nNOTE:  \/savecred is not compatible with \/smartcard.\n \n<\/details><details><summary><strong>REPAIR<\/strong><\/summary>\nUsage:\n  repair [flags]\n  repair [command]\n\nAvailable Commands:\n  caches      Invalidate caches when called with `--clear` flag\n  hashes      generates(-g) or checks(-c) IDE installation integrity\n  help        Help about any command\n  log         Check the idea.log file for errors\n  plugins     Check if broken, or old plugins are installed\n  runtime     Check the runtime that starts IDE\n  vmoptions   Check for problems in .vmoptions file used to start the IDE\n\nFlags:\n      --debug         Enable debug\n  -h, --help          help for repair\n  -n, --no            Only check the installation. All the fixes will be skipped.\n      --path string   path to the IDE (default is the IDE where the script is located)\n  -y, --yes           Apply all the suggested fixes automatically\n\nUse \"repair [command] --help\" for more information about a command.\n \n<\/details><details><summary><strong>RESET<\/strong><\/summary>\nRESET { SESSION }\n \n<\/details><details><summary><strong>SC<\/strong><\/summary>\nDESCRIPTION:\n        SC is a command line program used for communicating with the\n        Service Control Manager and services.\nUSAGE:\n        sc &lt;server&gt; [command] [service name] &lt;option1&gt; &lt;option2&gt;...\n\n\n        The option &lt;server&gt; has the form \"\\\\ServerName\"\n        Further help on commands can be obtained by typing: \"sc [command]\"\n        Commands:\n          query-----------Queries the status for a service, or\n                          enumerates the status for types of services.\n          queryex---------Queries the extended status for a service, or\n                          enumerates the status for types of services.\n          start-----------Starts a service.\n          pause-----------Sends a PAUSE control request to a service.\n          interrogate-----Sends an INTERROGATE control request to a service.\n          continue--------Sends a CONTINUE control request to a service.\n          stop------------Sends a STOP request to a service.\n          config----------Changes the configuration of a service (persistent).\n          description-----Changes the description of a service.\n          failure---------Changes the actions taken by a service upon failure.\n          failureflag-----Changes the failure actions flag of a service.\n          sidtype---------Changes the service SID type of a service.\n          privs-----------Changes the required privileges of a service.\n          managedaccount--Changes the service to mark the service account \n                          password as managed by LSA.\n          qc--------------Queries the configuration information for a service.\n          qdescription----Queries the description for a service.\n          qfailure--------Queries the actions taken by a service upon failure.\n          qfailureflag----Queries the failure actions flag of a service.\n          qsidtype--------Queries the service SID type of a service.\n          qprivs----------Queries the required privileges of a service.\n          qtriggerinfo----Queries the trigger parameters of a service.\n          qpreferrednode--Queries the preferred NUMA node of a service.\n          qmanagedaccount-Queries whether a services uses an account with a \n                          password managed by LSA.\n          qprotection-----Queries the process protection level of a service.\n          quserservice----Queries for a local instance of a user service template.\n          delete----------Deletes a service (from the registry).\n          create----------Creates a service. (adds it to the registry).\n          control---------Sends a control to a service.\n          sdshow----------Displays a service's security descriptor.\n          sdset-----------Sets a service's security descriptor.\n          showsid---------Displays the service SID string corresponding to an arbitrary name.\n          triggerinfo-----Configures the trigger parameters of a service.\n          preferrednode---Sets the preferred NUMA node of a service.\n          GetDisplayName--Gets the DisplayName for a service.\n          GetKeyName------Gets the ServiceKeyName for a service.\n          EnumDepend------Enumerates Service Dependencies.\n\n        The following commands don't require a service name:\n        sc &lt;server&gt; &lt;command&gt; &lt;option&gt;\n          boot------------(ok | bad) Indicates whether the last boot should\n                          be saved as the last-known-good boot configuration\n          Lock------------Locks the Service Database\n          QueryLock-------Queries the LockStatus for the SCManager Database\nEXAMPLE:\n        sc start MyService\n\n\nQUERY and QUERYEX OPTIONS:\n        If the query command is followed by a service name, the status\n        for that service is returned.  Further options do not apply in\n        this case.  If the query command is followed by nothing or one of\n        the options listed below, the services are enumerated.\n    type=    Type of services to enumerate (driver, service, userservice, all)\n             (default = service)\n    state=   State of services to enumerate (inactive, all)\n             (default = active)\n    bufsize= The size (in bytes) of the enumeration buffer\n             (default = 4096)\n    ri=      The resume index number at which to begin the enumeration\n             (default = 0)\n    group=   Service group to enumerate\n             (default = all groups)\n\nSYNTAX EXAMPLES\nsc query                - Enumerates status for active services &amp; drivers\nsc query eventlog       - Displays status for the eventlog service\nsc queryex eventlog     - Displays extended status for the eventlog service\nsc query type= driver   - Enumerates only active drivers\nsc query type= service  - Enumerates only Win32 services\nsc query state= all     - Enumerates all services &amp; drivers\nsc query bufsize= 50    - Enumerates with a 50 byte buffer\nsc query ri= 14         - Enumerates with resume index = 14\nsc queryex group= \"\"    - Enumerates active services not in a group\nsc query type= interact - Enumerates all interactive services\nsc query type= driver group= NDIS     - Enumerates all NDIS drivers\n\n \n<\/details><details><summary><strong>SCHTASKS<\/strong><\/summary>\nSCHTASKS \/parameter [arguments]\n\nDescription:\n    Enables an administrator to create, delete, query, change, run and\n    end scheduled tasks on a local or remote system.\n\nParameter List:\n    \/Create         Creates a new scheduled task.\n\n    \/Delete         Deletes the scheduled task(s).\n\n    \/Query          Displays all scheduled tasks.\n\n    \/Change         Changes the properties of scheduled task.\n\n    \/Run            Runs the scheduled task on demand.\n\n    \/End            Stops the currently running scheduled task.\n\n    \/ShowSid        Shows the security identifier corresponding to a scheduled task name.\n\n    \/?              Displays this help message.\n\nExamples:\n    SCHTASKS\n    SCHTASKS \/?\n    SCHTASKS \/Run \/?\n    SCHTASKS \/End \/?\n    SCHTASKS \/Create \/?\n    SCHTASKS \/Delete \/?\n    SCHTASKS \/Query  \/?\n    SCHTASKS \/Change \/?\n    SCHTASKS \/ShowSid \/?\n \n<\/details><details><summary><strong>SECPOL.MSC<\/strong><\/summary>\nThis cmd command to open Local Security Policy on Windows.\n \n<\/details><details><summary><strong>SERVICES.MSC<\/strong><\/summary>\nThis cmd command to open Services on Windows.\n\n<\/details><details><summary><strong>SET<\/strong><\/summary>\nDisplays, sets, or removes cmd.exe environment variables.\n\nSET [variable=[string]]\n\n  variable  Specifies the environment-variable name.\n  string    Specifies a series of characters to assign to the variable.\n\nType SET without parameters to display the current environment variables.\n\nIf Command Extensions are enabled SET changes as follows:\n\nSET command invoked with just a variable name, no equal sign or value\nwill display the value of all variables whose prefix matches the name\ngiven to the SET command.  For example:\n\n    SET P\n\nwould display all variables that begin with the letter 'P'\n\nSET command will set the ERRORLEVEL to 1 if the variable name is not\nfound in the current environment.\n\nSET command will not allow an equal sign to be part of the name of\na variable.\n\nTwo new switches have been added to the SET command:\n\n    SET \/A expression\n    SET \/P variable=[promptString]\n\nThe \/A switch specifies that the string to the right of the equal sign\nis a numerical expression that is evaluated.  The expression evaluator\nis pretty simple and supports the following operations, in decreasing\norder of precedence:\n\n    ()                  - grouping\n    ! ~ -               - unary operators\n    * \/ %               - arithmetic operators\n    + -                 - arithmetic operators\n    &lt;&lt; &gt;&gt;               - logical shift\n    &amp;                   - bitwise and\n    ^                   - bitwise exclusive or\n    |                   - bitwise or\n    = *= \/= %= += -=    - assignment\n      &amp;= ^= |= &lt;&lt;= &gt;&gt;=\n    ,                   - expression separator\n\nIf you use any of the logical or modulus operators, you will need to\nenclose the expression string in quotes.  Any non-numeric strings in the\nexpression are treated as environment variable names whose values are\nconverted to numbers before using them.  If an environment variable name\nis specified but is not defined in the current environment, then a value\nof zero is used.  This allows you to do arithmetic with environment\nvariable values without having to type all those % signs to get their\nvalues.  If SET \/A is executed from the command line outside of a\ncommand script, then it displays the final value of the expression.  The\nassignment operator requires an environment variable name to the left of\nthe assignment operator.  Numeric values are decimal numbers, unless\nprefixed by 0x for hexadecimal numbers, and 0 for octal numbers.\nSo 0x12 is the same as 18 is the same as 022. Please note that the octal\nnotation can be confusing: 08 and 09 are not valid numbers because 8 and\n9 are not valid octal digits.\n\nThe \/P switch allows you to set the value of a variable to a line of input\nentered by the user.  Displays the specified promptString before reading\nthe line of input.  The promptString can be empty.\n\nEnvironment variable substitution has been enhanced as follows:\n\n    %PATH:str1=str2%\n\nwould expand the PATH environment variable, substituting each occurrence\nof \"str1\" in the expanded result with \"str2\".  \"str2\" can be the empty\nstring to effectively delete all occurrences of \"str1\" from the expanded\noutput.  \"str1\" can begin with an asterisk, in which case it will match\neverything from the beginning of the expanded output to the first\noccurrence of the remaining portion of str1.\n\nMay also specify substrings for an expansion.\n\n    %PATH:~10,5%\n\nwould expand the PATH environment variable, and then use only the 5\ncharacters that begin at the 11th (offset 10) character of the expanded\nresult.  If the length is not specified, then it defaults to the\nremainder of the variable value.  If either number (offset or length) is\nnegative, then the number used is the length of the environment variable\nvalue added to the offset or length specified.\n\n    %PATH:~-10%\n\nwould extract the last 10 characters of the PATH variable.\n\n    %PATH:~0,-2%\n\nwould extract all but the last 2 characters of the PATH variable.\n\nFinally, support for delayed environment variable expansion has been\nadded.  This support is always disabled by default, but may be\nenabled\/disabled via the \/V command line switch to CMD.EXE.  See CMD \/?\n\nDelayed environment variable expansion is useful for getting around\nthe limitations of the current expansion which happens when a line\nof text is read, not when it is executed.  The following example\ndemonstrates the problem with immediate variable expansion:\n\n    set VAR=before\n    if \"%VAR%\" == \"before\" (\n        set VAR=after\n        if \"%VAR%\" == \"after\" @echo If you see this, it worked\n    )\n\nwould never display the message, since the %VAR% in BOTH IF statements\nis substituted when the first IF statement is read, since it logically\nincludes the body of the IF, which is a compound statement.  So the\nIF inside the compound statement is really comparing \"before\" with\n\"after\" which will never be equal.  Similarly, the following example\nwill not work as expected:\n\n    set LIST=\n    for %i in (*) do set LIST=%LIST% %i\n    echo %LIST%\n\nin that it will NOT build up a list of files in the current directory,\nbut instead will just set the LIST variable to the last file found.\nAgain, this is because the %LIST% is expanded just once when the\nFOR statement is read, and at that time the LIST variable is empty.\nSo the actual FOR loop we are executing is:\n\n    for %i in (*) do set LIST= %i\n\nwhich just keeps setting LIST to the last file found.\n\nDelayed environment variable expansion allows you to use a different\ncharacter (the exclamation mark) to expand environment variables at\nexecution time.  If delayed variable expansion is enabled, the above\nexamples could be written as follows to work as intended:\n\n    set VAR=before\n    if \"%VAR%\" == \"before\" (\n        set VAR=after\n        if \"!VAR!\" == \"after\" @echo If you see this, it worked\n    )\n\n    set LIST=\n    for %i in (*) do set LIST=!LIST! %i\n    echo %LIST%\n\nIf Command Extensions are enabled, then there are several dynamic\nenvironment variables that can be expanded but which don't show up in\nthe list of variables displayed by SET.  These variable values are\ncomputed dynamically each time the value of the variable is expanded.\nIf the user explicitly defines a variable with one of these names, then\nthat definition will override the dynamic one described below:\n\n%CD% - expands to the current directory string.\n\n%DATE% - expands to current date using same format as DATE command.\n\n%TIME% - expands to current time using same format as TIME command.\n\n%RANDOM% - expands to a random decimal number between 0 and 32767.\n\n%ERRORLEVEL% - expands to the current ERRORLEVEL value\n\n%CMDEXTVERSION% - expands to the current Command Processor Extensions\n    version number.\n\n%CMDCMDLINE% - expands to the original command line that invoked the\n    Command Processor.\n\n%HIGHESTNUMANODENUMBER% - expands to the highest NUMA node number\n    on this machine.\n \n<\/details><details><summary><strong>SETLOCAL<\/strong><\/summary>\nBegins localization of environment changes in a batch file.  Environment\nchanges made after SETLOCAL has been issued are local to the batch file.\nENDLOCAL must be issued to restore the previous settings.  When the end\nof a batch script is reached, an implied ENDLOCAL is executed for any\noutstanding SETLOCAL commands issued by that batch script.\n\n<\/details><details><summary><strong>SETLOCAL<\/strong><\/summary>\n\nIf Command Extensions are enabled SETLOCAL changes as follows:\n\nSETLOCAL batch command now accepts optional arguments:\n        ENABLEEXTENSIONS \/ DISABLEEXTENSIONS\n            enable or disable command processor extensions. These\n            arguments takes precedence over the CMD \/E:ON or \/E:OFF\n            switches. See CMD \/? for details.\n        ENABLEDELAYEDEXPANSION \/ DISABLEDELAYEDEXPANSION\n            enable or disable delayed environment variable\n            expansion. These arguments takes precedence over the CMD\n            \/V:ON or \/V:OFF switches. See CMD \/? for details.\nThese modifications last until the matching ENDLOCAL command,\nregardless of their setting prior to the SETLOCAL command.\n\nThe SETLOCAL command will set the ERRORLEVEL value if given\nan argument.  It will be zero if one of the two valid arguments\nis given and one otherwise.  You can use this in batch scripts\nto determine if the extensions are available, using the following\ntechnique:\n\n    VERIFY OTHER 2&gt;nul\n    SETLOCAL ENABLEEXTENSIONS\n    IF ERRORLEVEL 1 echo Unable to enable extensions\n\nThis works because on old versions of CMD.EXE, SETLOCAL does NOT\nset the ERRORLEVEL value. The VERIFY command with a bad argument\ninitializes the ERRORLEVEL value to a non-zero value.\n \n<\/details><details><summary><strong>SFC<\/strong><\/summary>\nScans the integrity of all protected system files and replaces incorrect versions with\ncorrect Microsoft versions.\n\nSFC [\/SCANNOW] [\/VERIFYONLY] [\/SCANFILE=&lt;file&gt;] [\/VERIFYFILE=&lt;file&gt;]\n    [\/OFFWINDIR=&lt;offline windows directory&gt; \/OFFBOOTDIR=&lt;offline boot directory&gt; [\/OFFLOGFILE=&lt;log file path&gt;]]\n\n\/SCANNOW        Scans integrity of all protected system files and repairs files with\n                problems when possible.\n\/VERIFYONLY     Scans integrity of all protected system files. No repair operation is\n                performed.\n\/SCANFILE       Scans integrity of the referenced file, repairs file if problems are\n                identified. Specify full path &lt;file&gt;\n\/VERIFYFILE     Verifies the integrity of the file with full path &lt;file&gt;.  No repair\n                operation is performed.\n\/OFFBOOTDIR     For offline repair, specify the location of the offline boot directory\n\/OFFWINDIR      For offline repair, specify the location of the offline windows directory\n\/OFFLOGFILE     For offline repair, optionally enable logging by specifying a log file path\n\ne.g.\n\n        sfc \/SCANNOW\n        sfc \/VERIFYFILE=c:\\windows\\system32\\kernel32.dll\n        sfc \/SCANFILE=d:\\windows\\system32\\kernel32.dll \/OFFBOOTDIR=d:\\ \/OFFWINDIR=d:\\windows\n        sfc \/SCANFILE=d:\\windows\\system32\\kernel32.dll \/OFFBOOTDIR=d:\\ \/OFFWINDIR=d:\\windows \/OFFLOGFILE=c:\\log.txt\n        sfc \/VERIFYONLY\n \n<\/details><details><summary><strong>SHIFT<\/strong><\/summary>\nChanges the position of replaceable parameters in a batch file.\n\nSHIFT [\/n]\n\nIf Command Extensions are enabled the SHIFT command supports\nthe \/n switch which tells the command to start shifting at the\nnth argument, where n may be between zero and eight.  For example:\n\n    SHIFT \/2\n\nwould shift %3 to %2, %4 to %3, etc. and leave %0 and %1 unaffected.\n \n<\/details><details><summary><strong>SHRPUBW.EXE<\/strong><\/summary>\nThis cmd command to open Create Shared Folder Wizard on Windows.\n \n<\/details><details><summary><strong>SHUTDOWN<\/strong><\/summary>\nUsage: SHUTDOWN [\/i | \/l | \/s | \/sg | \/r | \/g | \/a | \/p | \/h | \/e | \/o] [\/hybrid] [\/soft] [\/fw] [\/f]\n    [\/m \\\\computer][\/t xxx][\/d [p|u:]xx:yy [\/c \"comment\"]]\n\n    No args    Display help. This is the same as typing \/?.\n    \/?         Display help. This is the same as not typing any options.\n    \/i         Display the graphical user interface (GUI).\n               This must be the first option.\n    \/l         Log off. This cannot be used with \/m or \/d options.\n    \/s         Shutdown the computer.\n    \/sg        Shutdown the computer. On the next boot, if Automatic Restart Sign-On\n               is enabled, automatically sign in and lock last interactive user.\n               After sign in, restart any registered applications.\n    \/r         Full shutdown and restart the computer.\n    \/g         Full shutdown and restart the computer. After the system is rebooted,\n               if Automatic Restart Sign-On is enabled, automatically sign in and\n               lock last interactive user.\n               After sign in, restart any registered applications.\n    \/a         Abort a system shutdown.\n               This can only be used during the time-out period.\n               Combine with \/fw to clear any pending boots to firmware.\n    \/p         Turn off the local computer with no time-out or warning.\n               Can be used with \/d and \/f options.\n    \/h         Hibernate the local computer.\n               Can be used with the \/f option.\n    \/hybrid    Performs a shutdown of the computer and prepares it for fast startup.\n               Must be used with \/s option.\n    \/fw        Combine with a shutdown option to cause the next boot to go to the\n               firmware user interface.\n    \/e         Document the reason for an unexpected shutdown of a computer.\n    \/o         Go to the advanced boot options menu and restart the computer.\n               Must be used with \/r option.\n    \/m \\\\computer Specify the target computer.\n    \/t xxx     Set the time-out period before shutdown to xxx seconds.\n               The valid range is 0-315360000 (10 years), with a default of 30.\n               If the timeout period is greater than 0, the \/f parameter is\n               implied.\n    \/c \"comment\" Comment on the reason for the restart or shutdown.\n               Maximum of 512 characters allowed.\n    \/f         Force running applications to close without forewarning users.\n               The \/f parameter is implied when a value greater than 0 is\n               specified for the \/t parameter.\n    \/d [p|u:]xx:yy  Provide the reason for the restart or shutdown.\n               p indicates that the restart or shutdown is planned.\n               u indicates that the reason is user defined.\n               If neither p nor u is specified the restart or shutdown is\n               unplanned.\n               xx is the major reason number (positive integer less than 256).\n               yy is the minor reason number (positive integer less than 65536).\n\nReasons on this computer:\n(E = Expected U = Unexpected P = planned, C = customer defined)\nType    Major   Minor   Title\n\n U      0       0       Other (Unplanned)\nE       0       0       Other (Unplanned)\nE P     0       0       Other (Planned)\n U      0       5       Other Failure: System Unresponsive\nE       1       1       Hardware: Maintenance (Unplanned)\nE P     1       1       Hardware: Maintenance (Planned)\nE       1       2       Hardware: Installation (Unplanned)\nE P     1       2       Hardware: Installation (Planned)\nE       2       2       Operating System: Recovery (Unplanned)\nE P     2       2       Operating System: Recovery (Planned)\n  P     2       3       Operating System: Upgrade (Planned)\nE       2       4       Operating System: Reconfiguration (Unplanned)\nE P     2       4       Operating System: Reconfiguration (Planned)\n  P     2       16      Operating System: Service pack (Planned)\n        2       17      Operating System: Hot fix (Unplanned)\n  P     2       17      Operating System: Hot fix (Planned)\n        2       18      Operating System: Security fix (Unplanned)\n  P     2       18      Operating System: Security fix (Planned)\nE       4       1       Application: Maintenance (Unplanned)\nE P     4       1       Application: Maintenance (Planned)\nE P     4       2       Application: Installation (Planned)\nE       4       5       Application: Unresponsive\nE       4       6       Application: Unstable\n U      5       15      System Failure: Stop error\n U      5       19      Security issue (Unplanned)\nE       5       19      Security issue (Unplanned)\nE P     5       19      Security issue (Planned)\nE       5       20      Loss of network connectivity (Unplanned)\n U      6       11      Power Failure: Cord Unplugged\n U      6       12      Power Failure: Environment\n  P     7       0       Legacy API shutdown\n \n<\/details><details><summary><strong>SLMGR<\/strong><\/summary>\nThis cmd command to open Windows Licensing Managament Tool on Windows.\n \n<\/details><details><summary><strong>SORT<\/strong><\/summary>\nSORT [\/R] [\/+n] [\/M kilobytes] [\/L locale] [\/REC recordbytes]\n  [[drive1:][path1]filename1] [\/T [drive2:][path2]]\n  [\/O [drive3:][path3]filename3]\n  \/+n                         Specifies the character number, n, to\n                              begin each comparison.  \/+3 indicates that\n                              each comparison should begin at the 3rd\n                              character in each line.  Lines with fewer\n                              than n characters collate before other lines.\n                              By default comparisons start at the first\n                              character in each line.\n  \/L[OCALE] locale            Overrides the system default locale with\n                              the specified one.  The \"\"C\"\" locale yields\n                              the fastest collating sequence and is\n                              currently the only alternative.  The sort\n                              is always case insensitive.\n  \/M[EMORY] kilobytes         Specifies amount of main memory to use for\n                              the sort, in kilobytes.  The memory size is\n                              always constrained to be a minimum of 160\n                              kilobytes.  If the memory size is specified\n                              the exact amount will be used for the sort,\n                              regardless of how much main memory is\n                              available.\n\n                              The best performance is usually achieved by\n                              not specifying a memory size.  By default the\n                              sort will be done with one pass (no temporary\n                              file) if it fits in the default maximum\n                              memory size, otherwise the sort will be done\n                              in two passes (with the partially sorted data\n                              being stored in a temporary file) such that\n                              the amounts of memory used for both the sort\n                              and merge passes are equal.  The default\n                              maximum memory size is 90% of available main\n                              memory if both the input and output are\n                              files, and 45% of main memory otherwise.\n  \/REC[ORD_MAXIMUM] characters Specifies the maximum number of characters\n                              in a record (default 4096, maximum 65535).\n  \/R[EVERSE]                  Reverses the sort order; that is,\n                              sorts Z to A, then 9 to 0.\n  [drive1:][path1]filename1   Specifies the file to be sorted.  If not\n                              specified, the standard input is sorted.\n                              Specifying the input file is faster than\n                              redirecting the same file as standard input.\n  \/T[EMPORARY]\n    [drive2:][path2]          Specifies the path of the directory to hold\n                              the sort's working storage, in case the data\n                              does not fit in main memory.  The default is\n                              to use the system temporary directory.\n  \/O[UTPUT]\n    [drive3:][path3]filename3 Specifies the file where the sorted input is\n                              to be stored.  If not specified, the data is\n                              written to the standard output.   Specifying\n                              the output file is faster than redirecting\n                              standard output to the same file.\n \n<\/details><details><summary><strong>START<\/strong><\/summary>\nStarts a separate window to run a specified program or command.\n\nSTART [\"title\"] [\/D path] [\/I] [\/MIN] [\/MAX] [\/SEPARATE | \/SHARED]\n      [\/LOW | \/NORMAL | \/HIGH | \/REALTIME | \/ABOVENORMAL | \/BELOWNORMAL]\n      [\/NODE &lt;NUMA node&gt;] [\/AFFINITY &lt;hex affinity mask&gt;] [\/WAIT] [\/B]\n      [command\/program] [parameters]\n\n    \"title\"     Title to display in window title bar.\n    path        Starting directory.\n    B           Start application without creating a new window. The\n                application has ^C handling ignored. Unless the application\n                enables ^C processing, ^Break is the only way to interrupt\n                the application.\n    I           The new environment will be the original environment passed\n                to the cmd.exe and not the current environment.\n    MIN         Start window minimized.\n    MAX         Start window maximized.\n    SEPARATE    Start 16-bit Windows program in separate memory space.\n    SHARED      Start 16-bit Windows program in shared memory space.\n    LOW         Start application in the IDLE priority class.\n    NORMAL      Start application in the NORMAL priority class.\n    HIGH        Start application in the HIGH priority class.\n    REALTIME    Start application in the REALTIME priority class.\n    ABOVENORMAL Start application in the ABOVENORMAL priority class.\n    BELOWNORMAL Start application in the BELOWNORMAL priority class.\n    NODE        Specifies the preferred Non-Uniform Memory Architecture (NUMA)\n                node as a decimal integer.\n    AFFINITY    Specifies the processor affinity mask as a hexadecimal number.\n                The process is restricted to running on these processors.\n\n                The affinity mask is interpreted differently when \/AFFINITY and\n                \/NODE are combined.  Specify the affinity mask as if the NUMA\n                node's processor mask is right shifted to begin at bit zero.\n                The process is restricted to running on those processors in\n                common between the specified affinity mask and the NUMA node.\n                If no processors are in common, the process is restricted to\n                running on the specified NUMA node.\n    WAIT        Start application and wait for it to terminate.\n    command\/program\n                If it is an internal cmd command or a batch file then\n                the command processor is run with the \/K switch to cmd.exe.\n                This means that the window will remain after the command\n                has been run.\n\n                If it is not an internal cmd command or batch file then\n                it is a program and will run as either a windowed application\n                or a console application.\n\n    parameters  These are the parameters passed to the command\/program.\n\nNOTE: The SEPARATE and SHARED options are not supported on 64-bit platforms.\n\nSpecifying \/NODE allows processes to be created in a way that leverages memory\nlocality on NUMA systems.  For example, two processes that communicate with\neach other heavily through shared memory can be created to share the same\npreferred NUMA node in order to minimize memory latencies.  They allocate\nmemory from the same NUMA node when possible, and they are free to run on\nprocessors outside the specified node.\n\n    start \/NODE 1 application1.exe\n    start \/NODE 1 application2.exe\n\nThese two processes can be further constrained to run on specific processors\nwithin the same NUMA node.  In the following example, application1 runs on the\nlow-order two processors of the node, while application2 runs on the next two\nprocessors of the node.  This example assumes the specified node has at least\nfour logical processors.  Note that the node number can be changed to any valid\nnode number for that computer without having to change the affinity mask.\n\n    start \/NODE 1 \/AFFINITY 0x3 application1.exe\n    start \/NODE 1 \/AFFINITY 0xc application2.exe\n\nIf Command Extensions are enabled, external command invocation\nthrough the command line or the START command changes as follows:\n\nnon-executable files may be invoked through their file association just\n    by typing the name of the file as a command.  (e.g.  WORD.DOC would\n    launch the application associated with the .DOC file extension).\n    See the ASSOC and FTYPE commands for how to create these\n    associations from within a command script.\n\nWhen executing an application that is a 32-bit GUI application, CMD.EXE\n    does not wait for the application to terminate before returning to\n    the command prompt.  This new behavior does NOT occur if executing\n    within a command script.\n\nWhen executing a command line whose first token is the string \"CMD \"\n    without an extension or path qualifier, then \"CMD\" is replaced with\n    the value of the COMSPEC variable.  This prevents picking up CMD.EXE\n    from the current directory.\n\nWhen executing a command line whose first token does NOT contain an\n    extension, then CMD.EXE uses the value of the PATHEXT\n    environment variable to determine which extensions to look for\n    and in what order.  The default value for the PATHEXT variable\n    is:\n\n        .COM;.EXE;.BAT;.CMD\n\n    Notice the syntax is the same as the PATH variable, with\n    semicolons separating the different elements.\n\nWhen searching for an executable, if there is no match on any extension,\nthen looks to see if the name matches a directory name.  If it does, the\nSTART command launches the Explorer on that path.  If done from the\ncommand line, it is the equivalent to doing a CD \/D to that path.\n \n<\/details><details><summary><strong>SUBST<\/strong><\/summary>\nAssociates a path with a drive letter.\n\nSUBST [drive1: [drive2:]path]\nSUBST drive1: \/D\n\n  drive1:        Specifies a virtual drive to which you want to assign a path.\n  [drive2:]path  Specifies a physical drive and path you want to assign to\n                 a virtual drive.\n  \/D             Deletes a substituted (virtual) drive.\n\nType SUBST with no parameters to display a list of current virtual drives\n \n<\/details><details><summary><strong>SYSTEMINFO<\/strong><\/summary>\nSYSTEMINFO [\/S system [\/U username [\/P [password]]]] [\/FO format] [\/NH]\n\nDescription:\n    This tool displays operating system configuration information for\n    a local or remote machine, including service pack levels.\n\nParameter List:\n    \/S      system           Specifies the remote system to connect to.\n\n    \/U      [domain\\]user    Specifies the user context under which\n                             the command should execute.\n\n    \/P      [password]       Specifies the password for the given\n                             user context. Prompts for input if omitted.\n\n    \/FO     format           Specifies the format in which the output\n                             is to be displayed.\n                             Valid values: \"TABLE\", \"LIST\", \"CSV\".\n\n    \/NH                      Specifies that the \"Column Header\" should\n                             not be displayed in the output.\n                             Valid only for \"TABLE\" and \"CSV\" formats.\n\n    \/?                       Displays this help message.\n\nExamples:\n    SYSTEMINFO\n    SYSTEMINFO \/?\n    SYSTEMINFO \/S system\n    SYSTEMINFO \/S system \/U user\n    SYSTEMINFO \/S system \/U domain\\user \/P password \/FO TABLE\n    SYSTEMINFO \/S system \/FO LIST\n    SYSTEMINFO \/S system \/FO CSV \/NH\n \n<\/details><details><summary><strong>TAKEOWN<\/strong><\/summary>\nTAKEOWN [\/S system [\/U username [\/P [password]]]]\n        \/F filename [\/A] [\/R [\/D prompt]]\n\nDescription:\n    This tool allows an administrator to recover access to a file that\n    was denied by re-assigning file ownership.\n\nParameter List:\n    \/S           system          Specifies the remote system to\n                                 connect to.\n\n    \/U           [domain\\]user   Specifies the user context under\n                                 which the command should execute.\n\n    \/P           [password]      Specifies the password for the\n                                 given user context.\n                                 Prompts for input if omitted.\n\n    \/F           filename        Specifies the filename or directory\n                                 name pattern. Wildcard \"*\" can be used\n                                 to specify the pattern. Allows\n                                 sharename\\filename.\n\n    \/A                           Gives ownership to the administrators\n                                 group instead of the current user.\n\n    \/R                           Recurse: instructs tool to operate on\n                                 files in specified directory and all\n                                 subdirectories.\n\n    \/D           prompt          Default answer used when the current user\n                                 does not have the \"list folder\" permission\n                                 on a directory.  This occurs while operating\n                                 recursively (\/R) on sub-directories. Valid\n                                 values \"Y\" to take ownership or \"N\" to skip.\n\n    \/SKIPSL                      Do not follow symbolic links.\n                                 Only applicable with \/R.\n\n    \/?                           Displays this help message.\n\n    NOTE: 1) If \/A is not specified, file ownership will be given to the\n             current logged on user.\n\n          2) Mixed patterns using \"?\" and \"*\" are not supported.\n\n          3) \/D is used to suppress the confirmation prompt.\n\nExamples:\n    TAKEOWN \/?\n    TAKEOWN \/F lostfile\n    TAKEOWN \/F \\\\system\\share\\lostfile \/A\n    TAKEOWN \/F directory \/R \/D N\n    TAKEOWN \/F directory \/R \/A\n    TAKEOWN \/F *\n    TAKEOWN \/F C:\\Windows\\System32\\acme.exe\n    TAKEOWN \/F %windir%\\*.txt\n    TAKEOWN \/S system \/F MyShare\\Acme*.doc\n    TAKEOWN \/S system \/U user \/F MyShare\\MyBinary.dll\n    TAKEOWN \/S system \/U domain\\user \/P password \/F share\\filename\n    TAKEOWN \/S system \/U user \/P password \/F Doc\\Report.doc \/A\n    TAKEOWN \/S system \/U user \/P password \/F Myshare\\*\n    TAKEOWN \/S system \/U user \/P password \/F Home\\Logon \/R\n    TAKEOWN \/S system \/U user \/P password \/F Myshare\\directory \/R \/A\n \n<\/details><details><summary><strong>TAR<\/strong><\/summary>\nUsage:\n  List:    TAR -tf &lt;archive-filename&gt;\n  Extract: TAR -xf &lt;archive-filename&gt;\n  Create:  TAR -cf &lt;archive-filename&gt; [filenames...]\n  Help:    TAR --help\n \n<\/details><details><summary><strong>TASKKILL<\/strong><\/summary>\nTASKKILL [\/S system [\/U username [\/P [password]]]]\n         { [\/FI filter] [\/PID processid | \/IM imagename] } [\/T] [\/F]\n\nDescription:\n    This tool is used to terminate tasks by process id (PID) or image name.\n\nParameter List:\n    \/S    system           Specifies the remote system to connect to.\n\n    \/U    [domain\\]user    Specifies the user context under which the\n                           command should execute.\n\n    \/P    [password]       Specifies the password for the given user\n                           context. Prompts for input if omitted.\n\n    \/FI   filter           Applies a filter to select a set of tasks.\n                           Allows \"*\" to be used. ex. imagename eq acme*\n\n    \/PID  processid        Specifies the PID of the process to be terminated.\n                           Use TaskList to get the PID.\n\n    \/IM   imagename        Specifies the image name of the process\n                           to be terminated. Wildcard '*' can be used\n                           to specify all tasks or image names.\n\n    \/T                     Terminates the specified process and any\n                           child processes which were started by it.\n\n    \/F                     Specifies to forcefully terminate the process(es).\n\n    \/?                     Displays this help message.\n\nFilters:\n    Filter Name   Valid Operators           Valid Value(s)\n    -----------   ---------------           -------------------------\n    STATUS        eq, ne                    RUNNING |\n                                            NOT RESPONDING | UNKNOWN\n    IMAGENAME     eq, ne                    Image name\n    PID           eq, ne, gt, lt, ge, le    PID value\n    SESSION       eq, ne, gt, lt, ge, le    Session number.\n    CPUTIME       eq, ne, gt, lt, ge, le    CPU time in the format\n                                            of hh:mm:ss.\n                                            hh - hours,\n                                            mm - minutes, ss - seconds\n    MEMUSAGE      eq, ne, gt, lt, ge, le    Memory usage in KB\n    USERNAME      eq, ne                    User name in [domain\\]user\n                                            format\n    MODULES       eq, ne                    DLL name\n    SERVICES      eq, ne                    Service name\n    WINDOWTITLE   eq, ne                    Window title\n\n    NOTE\n    ----\n    1) Wildcard '*' for \/IM switch is accepted only when a filter is applied.\n    2) Termination of remote processes will always be done forcefully (\/F).\n    3) \"WINDOWTITLE\" and \"STATUS\" filters are not considered when a remote\n       machine is specified.\n\nExamples:\n    TASKKILL \/IM notepad.exe\n    TASKKILL \/PID 1230 \/PID 1241 \/PID 1253 \/T\n    TASKKILL \/F \/IM cmd.exe \/T\n    TASKKILL \/F \/FI \"PID ge 1000\" \/FI \"WINDOWTITLE ne untitle*\"\n    TASKKILL \/F \/FI \"USERNAME eq NT AUTHORITY\\SYSTEM\" \/IM notepad.exe\n    TASKKILL \/S system \/U domain\\username \/FI \"USERNAME ne NT*\" \/IM *\n    TASKKILL \/S system \/U username \/P password \/FI \"IMAGENAME eq note*\"\n \n<\/details><details><summary><strong>TASKLIST<\/strong><\/summary>\nTASKLIST [\/S system [\/U username [\/P [password]]]]\n         [\/M [module] | \/SVC | \/V] [\/FI filter] [\/FO format] [\/NH]\n\nDescription:\n    This tool displays a list of currently running processes on\n    either a local or remote machine.\n\nParameter List:\n   \/S     system           Specifies the remote system to connect to.\n\n   \/U     [domain\\]user    Specifies the user context under which\n                           the command should execute.\n\n   \/P     [password]       Specifies the password for the given\n                           user context. Prompts for input if omitted.\n\n   \/M     [module]         Lists all tasks currently using the given\n                           exe\/dll name. If the module name is not\n                           specified all loaded modules are displayed.\n\n   \/SVC                    Displays services hosted in each process.\n\n   \/APPS                   Displays Store Apps and their associated processes.\n\n   \/V                      Displays verbose task information.\n\n   \/FI    filter           Displays a set of tasks that match a\n                           given criteria specified by the filter.\n\n   \/FO    format           Specifies the output format.\n                           Valid values: \"TABLE\", \"LIST\", \"CSV\".\n\n   \/NH                     Specifies that the \"Column Header\" should\n                           not be displayed in the output.\n                           Valid only for \"TABLE\" and \"CSV\" formats.\n\n   \/?                      Displays this help message.\n\nFilters:\n    Filter Name     Valid Operators           Valid Value(s)\n    -----------     ---------------           --------------------------\n    STATUS          eq, ne                    RUNNING | SUSPENDED\n                                              NOT RESPONDING | UNKNOWN\n    IMAGENAME       eq, ne                    Image name\n    PID             eq, ne, gt, lt, ge, le    PID value\n    SESSION         eq, ne, gt, lt, ge, le    Session number\n    SESSIONNAME     eq, ne                    Session name\n    CPUTIME         eq, ne, gt, lt, ge, le    CPU time in the format\n                                              of hh:mm:ss.\n                                              hh - hours,\n                                              mm - minutes, ss - seconds\n    MEMUSAGE        eq, ne, gt, lt, ge, le    Memory usage in KB\n    USERNAME        eq, ne                    User name in [domain\\]user\n                                              format\n    SERVICES        eq, ne                    Service name\n    WINDOWTITLE     eq, ne                    Window title\n    MODULES         eq, ne                    DLL name\n\nNOTE: \"WINDOWTITLE\" and \"STATUS\" filters are not supported when querying\n      a remote machine.\n\nExamples:\n    TASKLIST\n    TASKLIST \/M\n    TASKLIST \/V \/FO CSV\n    TASKLIST \/SVC \/FO LIST\n    TASKLIST \/APPS \/FI \"STATUS eq RUNNING\"\n    TASKLIST \/M wbem*\n    TASKLIST \/S system \/FO LIST\n    TASKLIST \/S system \/U domain\\username \/FO CSV \/NH\n    TASKLIST \/S system \/U username \/P password \/FO TABLE \/NH\n    TASKLIST \/FI \"USERNAME ne NT AUTHORITY\\SYSTEM\" \/FI \"STATUS eq running\"\n \n<\/details><details><summary><strong>ETASKMGR.XE<\/strong><\/summary>\nThis cmd command to open Task Manager on Windows.\n \n<\/details><details><summary><strong>TELNET<\/strong><\/summary>\ntelnet [-a][-e escape char][-f log file][-l user][-t term][host [port]]\n -a      Attempt automatic logon. Same as -l option except uses\n         the currently logged on user's name.\n -e      Escape character to enter telnet client prompt.\n -f      File name for client side logging\n -l      Specifies the user name to log in with on the remote system.\n         Requires that the remote system support the TELNET ENVIRON option.\n -t      Specifies terminal type.\n         Supported term types are vt100, vt52, ansi and vtnt only.\n host    Specifies the hostname or IP address of the remote computer\n         to connect to.\n port    Specifies a port number or service name.\n\n<\/details><details><summary><strong>TIME<\/strong><\/summary>\nDisplays or sets the system time.\n\nTIME [\/T | time]\n\nType TIME with no parameters to display the current time setting and a prompt\nfor a new one.  Press ENTER to keep the same time.\n\nIf Command Extensions are enabled the TIME command supports\nthe \/T switch which tells the command to just output the\ncurrent time, without prompting for a new time.\n \n<\/details><details><summary><strong>TIMEOUT<\/strong><\/summary>\nTIMEOUT [\/T] timeout [\/NOBREAK]\n\nDescription:\n    This utility accepts a timeout parameter to wait for the specified\n    time period (in seconds) or until any key is pressed. It also\n    accepts a parameter to ignore the key press.\n\nParameter List:\n    \/T        timeout       Specifies the number of seconds to wait.\n                            Valid range is -1 to 99999 seconds.\n\n    \/NOBREAK                Ignore key presses and wait specified time.\n\n    \/?                      Displays this help message.\n\nNOTE: A timeout value of -1 means to wait indefinitely for a key press.\n\nExamples:\n    TIMEOUT \/?\n    TIMEOUT \/T 10\n    TIMEOUT \/T 300 \/NOBREAK\n    TIMEOUT \/T -1\n \n<\/details><details><summary><strong>TITLE<\/strong><\/summary>\nSets the window title for the command prompt window.\n\nTITLE [string]\n\n  string       Specifies the title for the command prompt window.\n \n<\/details><details><summary><strong>TRACERT<\/strong><\/summary>\nUsage: tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout]\n               [-R] [-S srcaddr] [-4] [-6] target_name\n\nOptions:\n    -d                 Do not resolve addresses to hostnames.\n    -h maximum_hops    Maximum number of hops to search for target.\n    -j host-list       Loose source route along host-list (IPv4-only).\n    -w timeout         Wait timeout milliseconds for each reply.\n    -R                 Trace round-trip path (IPv6-only).\n    -S srcaddr         Source address to use (IPv6-only).\n    -4                 Force using IPv4.\n    -6                 Force using IPv6.\n \n<\/details><details><summary><strong>TREE<\/strong><\/summary>\nGraphically displays the folder structure of a drive or path.\n\nTREE [drive:][path] [\/F] [\/A]\n\n   \/F   Display the names of the files in each folder.\n   \/A   Use ASCII instead of extended characters.\n \n<\/details><details><summary><strong>TSDISCON<\/strong><\/summary>\nDisconnects a Remote Desktop Services session.\n\nTSDISCON [sessionid | sessionname] [\/SERVER:servername] [\/V] [\/VM]\n\n  sessionid           The ID of the session.\n  sessionname         The name of the session.\n  \/SERVER:servername  Specifies the Remote Desktop Session Host server (default is current).\n  \/V                  Displays information about the actions performed.\n  \/VM                 Disconnects session on server or within virtual machine. The unique ID of the session needs to be specified.\n \n<\/details><details><summary><strong>TSKILL<\/strong><\/summary>\nEnds a process.\n\nTSKILL processid | processname [\/SERVER:servername] [\/ID:sessionid | \/A] [\/V]\n\n  processid           Process ID for the process to be terminated.\n  processname         Process name to be terminated.\n  \/SERVER:servername  Server containing processID (default is current).\n                         \/ID or \/A must be specified when using processname\n                         and \/SERVER\n  \/ID:sessionid       End process running under the specified session.\n  \/A                  End process running under ALL sessions.\n  \/V                  Display information about actions being performed.\n \n<\/details><details><summary><strong>TYPE<\/strong><\/summary>\nDisplays the contents of a text file or files.\n\nTYPE [drive:][path]filename\n \n<\/details><details><summary><strong>TYPEPERF<\/strong><\/summary>\n\nMicrosoft \u00ae TypePerf.exe (10.0.19041.1741)\n\nUsage:\nTYPEPERF &lt;counter [counter ...]&gt; \n                                [options]\n\nParameters:\n  &lt;counter [counter ...]&gt;       Performance counters to monitor.\n\nExamples:\n  typeperf \"\\Processor(_Total)\\% Processor Time\"\n \n<\/details><details><summary><strong>TZUTIL<\/strong><\/summary>\nWindows Time Zone Utility\n\nUsage:\nTZUTIL &lt;\/? | \/g | \/s TimeZoneID[_dstoff] | \/l&gt;\n\nParameters:\n    \/? Displays usage information.\n\n    \/g Displays the current time zone ID.\n\n    \/s TimeZoneID[_dstoff]\n       Sets the current time zone using the specified time zone ID.\n       The _dstoff suffix disables Daylight Saving Time adjustments\n       for the time zone (where applicable).\n\n    \/l Lists all valid time zone IDs and display names. The output will\n       be:\n           &lt;display name&gt;\n           &lt;time zone ID&gt;\n\nExamples:\n    TZUTIL \/g\n    TZUTIL \/s \"Pacific Standard Time\"\n    TZUTIL \/s \"Pacific Standard Time_dstoff\"\n\nRemarks:\n    An exit code of 0 indicates the command completed successfully.\n \n<\/details><details><summary><strong>VER<\/strong><\/summary>\nDisplays the Windows version.\n \n<\/details><details><summary><strong>VERIFIER.EXE<\/strong><\/summary>\nThis cmd command to open Driver Verifier Manager on Windows.\nSYNTAX:\n\n    verifier {\/? | \/help}\n    verifier \/standard \/all\n    verifier \/standard \/driver &lt;name&gt; [&lt;name&gt; ...]\n    verifier {\/ruleclasses | \/rc} &lt;options&gt; [&lt;ruleclass_1&gt; &lt;ruleclass_2&gt; ...] \/all\n    verifier \/flags &lt;options&gt; [&lt;options&gt; ...] \/all\n    verifier \/flags &lt;options&gt; [&lt;options&gt; ...] \/driver &lt;name&gt; [&lt;name&gt; ...]\n    verifier \/rules {query | reset | default &lt;id&gt; | disable &lt;id&gt;}\n    verifier \/query\n    verifier \/querysettings\n    verifier \/bootmode {persistent | resetonbootfail | oneboot | resetonunusualshutdown}\n    verifier \/persistthroughupgrade\n    verifier \/reset\n    verifier \/faults [probability [pool_tags [applications [delay_minutes]]]]\n    verifier \/faultssystematic [&lt;options&gt; ...]\n    verifier \/log &lt;file_name&gt; [\/interval &lt;seconds&gt;]\n    verifier \/volatile \/flags &lt;options&gt; [&lt;options&gt; ...]\n    verifier \/volatile \/adddriver &lt;name&gt; [&lt;name&gt; ...]\n    verifier \/volatile \/removedriver &lt;name&gt; [&lt;name&gt; ...]\n    verifier \/volatile \/faults [probability [pool_tags [applications\n                [delay_minutes]]]]\n    verifier \/domain {wdm | ndis | ks | audio} [rules.all | rules.default ]\n                \/driver ... [\/logging | \/livedump]\n    verifier \/logging\n    verifier \/livedump\n\nPARAMETERS:\n\n    \/? or \/help\n        Displays this help message.\n\n    \/standard\n        Specifies standard Driver Verifier flags.\n\n    \/all\n        Specifies that all installed drivers will be verified after the next\n        boot.\n\n    \/driver &lt;name&gt; [&lt;name&gt; ...]\n        Specifies one or more drivers (image names) that will be verified.\n        Wildcard values (e.g. n*.sys) are not supported.\n\n    \/driver.exclude &lt;name&gt; [&lt;name&gt; ...]\n        Specifies one or more drivers (image names) that will be excluded\n        from verification. This parameter is applicable only if all drivers\n        are selected for verification. Wildcard values (e.g. n*.sys) are not\n        supported.\n\n    \/flags &lt;options&gt; [&lt;options&gt; ...]\n        Specifies one or more options that should be enabled for verification.\n        Flags are applied to all drivers being checked by Driver Verifier. The\n        provided options values must be either in decimal, hexadecimal (\"0x\"\n        prefix), octal (\"0o\" prefix) or binary (\"0b\" prefix) format.\n\n        Standard Flags:\n          Standard Driver Verifier options can be specified using '\/standard'.\n          WDF verification is included in \/standard but is not shown here.\n\n          0x00000001 (bit  0) - Special pool\n          0x00000002 (bit  1) - Force IRQL checking\n          0x00000008 (bit  3) - Pool tracking\n          0x00000010 (bit  4) - I\/O verification\n          0x00000020 (bit  5) - Deadlock detection\n          0x00000080 (bit  7) - DMA checking\n          0x00000100 (bit  8) - Security checks\n          0x00000800 (bit 11) - Miscellaneous checks\n          0x00020000 (bit 17) - DDI compliance checking\n\n        Additional Flags:\n          These flags are intended for specific scenario testing. Flags marked\n          with (*) require I\/O Verification (bit 4) that will be automatically\n          enabled. Flags marked with (**) support disabling of individual\n          rules.\n\n          0x00000004 (bit  2) - Randomized low resources simulation\n          0x00000200 (bit  9) - Force pending I\/O requests (*)\n          0x00000400 (bit 10) - IRP logging (*)\n          0x00002000 (bit 13) - Invariant MDL checking for stack (*)\n          0x00004000 (bit 14) - Invariant MDL checking for driver (*)\n          0x00008000 (bit 15) - Power framework delay fuzzing\n          0x00010000 (bit 16) - Port\/miniport interface checking\n          0x00040000 (bit 18) - Systematic low resources simulation\n          0x00080000 (bit 19) - DDI compliance checking (additional)\n          0x00200000 (bit 21) - NDIS\/WIFI verification (**)\n          0x00800000 (bit 23) - Kernel synchronization delay fuzzing\n          0x01000000 (bit 24) - VM switch verification\n          0x02000000 (bit 25) - Code integrity checks\n\n    \/ruleclasses or \/rc [&lt;ruleclass_1&gt; &lt;ruleclass_2&gt; ... &lt;ruleclass_k&gt;]\n        This parameter is larger set of '\/flags' above. While '\/flags' is\n        limited to 32 bit bitmap expression, this can include more than 32\n        verification classes. Each positive decimal integer represents a\n        verification class. Multiple classes can be expressed by separating\n        each class id with space character. Following rule classes IDs are\n        available and leading 0's can be omitted.\n\n        Standard Rule Classes:\n\n                   1 - Special pool\n                   2 - Force IRQL checking\n                   4 - Pool tracking\n                   5 - I\/O verification\n                   6 - Deadlock detection\n                   8 - DMA checking\n                   9 - Security checks\n                  12 - Miscellaneous checks\n                  18 - DDI compliance checking\n                  34 - WDF Verification\n\n        Additional Rule Classes:\n          These rule classes are intended for specific scenario testing. Rule\n          classes are marked with (*) require I\/O Verification (5) that will\n          be automatically enabled. Flags marked with (**) support disabling\n          of individual rules.\n\n                   3 - Randomized low resources simulation\n                  10 - Force pending I\/O requests (*)\n                  11 - IRP logging (*)\n                  14 - Invariant MDL checking for stack (*)\n                  15 - Invariant MDL checking for driver (*)\n                  16 - Power framework delay fuzzing\n                  17 - Port\/miniport interface checking\n                  19 - Systematic low resources simulation\n                  20 - DDI compliance checking (additional)\n                  22 - NDIS\/WIFI verification (**)\n                  24 - Kernel synchronization delay fuzzing\n                  25 - VM switch verification\n                  26 - Code integrity checks\n\n    \/log.code_integrity\n        This option suppresses Code Integrity violation breaks and collects\n        only statistics for verified drivers. Statistics could be extracted\n        via \/log option or kernel debugger. This parameter is applicable only\n        if Code Integrity checks are enabled.\n\n    \/rules {query | reset | default &lt;id&gt; | disable &lt;id&gt;}\n        Specifies rules level control (advanced).\n\n          query           Shows current status of controllable rules.\n          reset           Resets all rules to their default state.\n          default &lt;id&gt;    Sets rule ID to its default state.\n          disable &lt;id&gt;    Disables specified rule ID.\n\n    \/query\n        Display runtime Driver Verifier statistics and settings.\n\n    \/querysettings\n        Displays a summary of the options and drivers that are currently\n        enabled, or options and drivers that will be verified after the\n        next boot. The display does not include drivers and options added\n        using \/volatile.\n\n    \/bootmode\n        Specifies the Driver Verifier boot mode. This option requires system\n        reboot to take effect.\n\n          persistent        Ensures that Driver Verifier settings are\n                            persistent across reboots. This is the default\n                            value.\n          resetonbootfail   Disables Driver Verifier for subsequent reboots\n                            if the system failed to start.\n          resetonunusualshutdown\n                            Driver Verifier persists until unusual shutdown\n                            happens. Its abbrevation, 'rous', can be used.\n          oneboot           Enables Driver Verifier only for the next boot.\n\n    \/persistthroughupgrade\n        Makes the Driver Verifier settings persist through upgrade. Driver\n        Verifier will be active during system upgrade.\n\n    \/reset\n        Clears Driver Verifier flags and driver settings. This option requires\n        system reboot to take effect.\n\n    \/faults [probability [pool_tags [applications [delay_minutes]]]]\n        Enable the Randomized low resources simulation feature and optionally\n        control parameters for the Randomized low resources simulation.\n\n          Probability     Specifies the probability that Driver Verifier will\n                          fail a given allocation. The value represents the\n                          number of chances in 10,000 that Driver Verifier will\n                          fail the allocation. The default value 600, means\n                          600\/10000 or 6.\n          Pool Tags:      Specifies a space separated list of the pool tags to\n                          be injected with faults. By default, any pool\n                          allocation can be injected with faults.\n          Applications    Specifies a space separated list of image file names\n                          (an executable) that will be injected with faults. By\n                          default, any pool allocation can be injected with\n                          faults.\n          DelayMinutes    Specifies the number of minutes after booting during\n                          which Driver Verifier does not intentionally fail any\n                          allocations. This delay allows the drivers to load\n                          and the system to stabilize before the test begins.\n                          The default value is 8 minutes.\n\n    \/faultssystematic [&lt;options&gt; ...]\n        Controls the Systematic low resources simulation parameters.\n\n          enableboottime          Enables fault injections across reboots.\n          disableboottime         Disables fault injections across reboots.\n                                  This is the default value.\n          recordboottime          Enables fault injections in 'what if' mode\n                                  across reboots.\n          resetboottime           Disables fault injections across reboots and\n                                  clears the stack exclusion list.\n          enableruntime           Dynamically enables fault injections.\n          disableruntime          Dynamically disables fault injections.\n          recordruntime           Dynamically enables fault injections in\n                                  'what if' mode.\n          resetruntime            Dynamically disables fault injections and\n                                  clears the previously faulted stack list.\n          querystatistics         Shows the current fault injection statistics.\n          incrementcounter        Increments the test pass counter used to\n                                  identify when a fault was injected.\n          getstackid &lt;counter&gt;    Retrieves the indicated injected stack id.\n          excludestack &lt;stack_id&gt; Excludes the stack from fault injection.\n\n    \/log &lt;file_name&gt; [\/interval &lt;seconds&gt;]\n        Creates a log file with the specified name and periodically writes the\n        runtime statistics to this file. The interval between log file updates\n        is controlled by the '\/interval' parameter. The default value is 30\n        seconds. Use CTRL+C to close the log and return.\n\n    \/volatile\n        Changes Driver Verifier settings without rebooting the computer.\n        Volatile settings take effect immediately and are in effect until the\n        next system reboot.\n\n    \/volatile \/adddriver &lt;name&gt; [&lt;name&gt; ...]\n        Starts the verification for the specified driver or drivers.\n\n    \/volatile \/removedriver &lt;name&gt; [&lt;name&gt; ...]\n        Stops the verification for the specified driver or drivers.\n\n    \/domain {wdm | ndis | ks | audio} [rules.all | rules.default] \/driver ...\n        [\/logging | \/livedump]\n        Controls the verifier extension settings. The following verifier\n        extension types are supported:\n\n          wdm               Enabled verifier extension for WDM drivers.\n          ndis              Enabled verifier extension for networking drivers.\n          ks                Enabled verifier extension for kernel mode\n                            streaming drivers.\n          audio             Enabled verifier extension for audio drivers.\n\n        The following extension options are supported:\n\n          rules.default     Enables default validation rules for the selected\n                            verifier extension.\n          rules.all         Enables all validation rules for the selected\n                            verifier extension.\n\n        \/logging\n          Enables logging for violated rules detected by the selected verifier\n          extensions.\n\n        \/livedump\n          Enables live memory dump collection for violated rules detected by\n          the selected verifier extensions.\n \n<\/details><details><summary><strong>VERIFY<\/strong><\/summary>\nTells cmd.exe whether to verify that your files are written correctly to a\ndisk.\n\nVERIFY [ON | OFF]\n\nType VERIFY without a parameter to display the current VERIFY setting.\n \n<\/details><details><summary><strong>VOL<\/strong><\/summary>\nDisplays the disk volume label and serial number, if they exist.\n\nVOL [drive:]\n \n<\/details><details><summary><strong>XCOPY<\/strong><\/summary>\nCopies files and directory trees.\n\nXCOPY source [destination] [\/A | \/M] [\/D[:date]] [\/P] [\/S [\/E]] [\/V] [\/W]\n                           [\/C] [\/I] [\/Q] [\/F] [\/L] [\/G] [\/H] [\/R] [\/T] [\/U]\n                           [\/K] [\/N] [\/O] [\/X] [\/Y] [\/-Y] [\/Z] [\/B] [\/J]\n                           [\/EXCLUDE:file1[+file2][+file3]...] [\/COMPRESS]\n\n  source       Specifies the file(s) to copy.\n  destination  Specifies the location and\/or name of new files.\n  \/A           Copies only files with the archive attribute set,\n               doesn't change the attribute.\n  \/M           Copies only files with the archive attribute set,\n               turns off the archive attribute.\n  \/D:m-d-y     Copies files changed on or after the specified date.\n               If no date is given, copies only those files whose\n               source time is newer than the destination time.\n  \/EXCLUDE:file1[+file2][+file3]...\n               Specifies a list of files containing strings.  Each string\n               should be in a separate line in the files.  When any of the\n               strings match any part of the absolute path of the file to be\n               copied, that file will be excluded from being copied.  For\n               example, specifying a string like \\obj\\ or .obj will exclude\n               all files underneath the directory obj or all files with the\n               .obj extension respectively.\n  \/P           Prompts you before creating each destination file.\n  \/S           Copies directories and subdirectories except empty ones.\n  \/E           Copies directories and subdirectories, including empty ones.\n               Same as \/S \/E. May be used to modify \/T.\n  \/V           Verifies the size of each new file.\n  \/W           Prompts you to press a key before copying.\n  \/C           Continues copying even if errors occur.\n  \/I           If destination does not exist and copying more than one file,\n               assumes that destination must be a directory.\n  \/Q           Does not display file names while copying.\n  \/F           Displays full source and destination file names while copying.\n  \/L           Displays files that would be copied.\n  \/G           Allows the copying of encrypted files to destination that does\n               not support encryption.\n  \/H           Copies hidden and system files also.\n  \/R           Overwrites read-only files.\n  \/T           Creates directory structure, but does not copy files. Does not\n               include empty directories or subdirectories. \/T \/E includes\n               empty directories and subdirectories.\n  \/U           Copies only files that already exist in destination.\n  \/K           Copies attributes. Normal Xcopy will reset read-only attributes.\n  \/N           Copies using the generated short names.\n  \/O           Copies file ownership and ACL information.\n  \/X           Copies file audit settings (implies \/O).\n  \/Y           Suppresses prompting to confirm you want to overwrite an\n               existing destination file.\n  \/-Y          Causes prompting to confirm you want to overwrite an\n               existing destination file.\n  \/Z           Copies networked files in restartable mode.\n  \/B           Copies the Symbolic Link itself versus the target of the link.\n  \/J           Copies using unbuffered I\/O. Recommended for very large files.\n  \/COMPRESS    Request network compression during file transfer where\n               applicable.\n\nThe switch \/Y may be preset in the COPYCMD environment variable.\nThis may be overridden with \/-Y on the command line.\n \n<\/details><details><summary><strong>W32TM<\/strong><\/summary>\nw32tm [\/? | \/register | \/unregister ]\n  ? - this help screen.\n  register - register to run as a service and add default\n    configuration to the registry.\n  unregister - unregister service and remove all configuration\n    information from the registry.\n\nw32tm \/monitor [\/domain:&lt;domain name&gt;]\n               [\/computers:&lt;name&gt;[,&lt;name&gt;[,&lt;name&gt;...]]]\n               [\/threads:&lt;num&gt;] [\/ipprotocol:&lt;4|6&gt;] [\/nowarn]\n  domain - specifies which domain to monitor. If no domain name\n    is given, or neither the domain nor computers option is\n    specified, the default domain is used. This option may be\n    used more than once.\n  computers - monitors the given list of computers. Computer\n   names are separated by commas, with no spaces. If a name is\n    prefixed with a '*', it is treated as an AD PDC. This option\n    may be used more than once.\n  threads - how many computers to analyze simultaneously. The\n    default value is 3. Allowed range is 1-50.\n  ipprotocol - specify the IP protocol to use. The default is\n    to use whatever is available.\n  nowarn - skip warning message.\n\nw32tm \/ntte &lt;NT time epoch&gt;\n  Convert a NT system time, in (10^-7)s intervals from 0h 1-Jan 1601,\n  into a readable format.\n\nw32tm \/ntpte &lt;NTP time epoch&gt;\n  Convert an NTP time, in (2^-32)s intervals from 0h 1-Jan 1900, into\n  a readable format.\n\nw32tm \/resync [\/computer:&lt;computer&gt;] [\/nowait] [\/rediscover] [\/soft]\n  Tell a computer that it should resynchronize its clock as soon\n  as possible, throwing out all accumulated error statistics.\n  computer:&lt;computer&gt; - computer that should resync. If not\n    specified, the local computer will resync.\n  nowait - do not wait for the resync to occur;\n    return immediately. Otherwise, wait for the resync to\n    complete before returning.\n  rediscover - redetect the network configuration and rediscover\n    network sources, then resynchronize.\n  soft - resync utilizing existing error statistics. Not useful,\n    provided for compatibility.\n\nw32tm \/stripchart \/computer:&lt;target&gt; [\/period:&lt;refresh&gt;]\n    [\/dataonly] [\/samples:&lt;count&gt;] [\/packetinfo] [\/ipprotocol:&lt;4|6&gt;] [\/rdtsc]\n  Display a strip chart of the offset between this computer and\n  another computer.\n  computer:&lt;target&gt; - the computer to measure the offset against.\n  period:&lt;refresh&gt; - the time between samples, in seconds. The\n    default is 2s\n  dataonly - display only the data, no graphics.\n  samples:&lt;count&gt; - collect &lt;count&gt; samples, then stop. If not\n    specified, samples will be collected until Ctrl-C is pressed.\n  packetinfo - print out NTP packet response message.\n  ipprotocol - specify the IP protocol to use. The default is\n    to use whatever is available.\n  rdtsc - display the TSC values and time offset data in CSV format.\n    The output displays TSC and FILETIME values captured before the\n    NTP request is sent, TSC value after an NTP response is received\n    along with NTP roundtrip and time offset values.\n\n\nw32tm \/config [\/computer:&lt;target&gt;] [\/update]\n    [\/manualpeerlist:&lt;peers&gt;] [\/syncfromflags:&lt;source&gt;]\n    [\/LocalClockDispersion:&lt;seconds&gt;]\n    [\/reliable:(YES|NO)]\n    [\/largephaseoffset:&lt;milliseconds&gt;]\n  computer:&lt;target&gt; - adjusts the configuration of &lt;target&gt;. If not\n    specified, the default is the local computer.\n  update - notifies the time service that the configuration has\n    changed, causing the changes to take effect.\n  manualpeerlist:&lt;peers&gt; - sets the manual peer list to &lt;peers&gt;,\n    which is a space-delimited list of DNS and\/or IP addresses.\n    When specifying multiple peers, this switch must be enclosed in\n    quotes.\n  syncfromflags:&lt;source&gt; - sets what sources the NTP client should\n    sync from. &lt;source&gt; should be a comma separated list of\n    these keywords (not case sensitive):\n      MANUAL - sync from peers in the manual peer list\n      DOMHIER - sync from an AD DC in the domain hierarchy\n      NO - sync from none\n      ALL - sync from both manual and domain peers\n  LocalClockDispersion:&lt;seconds&gt; - configures the accuracy of the\n    internal clock that w32time will assume when it can't acquire\n    time from its configured sources.\n  reliable:(YES|NO) - set whether this machine is a reliable time source.\n    This setting is only meaningful on domain controllers.\n      YES - this machine is a reliable time service\n      NO - this machine is not a reliable time service\n  largephaseoffset:&lt;milliseconds&gt; - sets the time difference between\n    local and network time which w32time will consider a spike.\n\nw32tm \/tz\n  Display the current time zone settings.\n\nw32tm \/dumpreg [\/subkey:&lt;key&gt;] [\/computer:&lt;target&gt;]\n  Display the values associated with a given registry key.\n  The default key is HKLM\\System\\CurrentControlSet\\Services\\W32Time\n    (the root key for the time service).\n  subkey:&lt;key&gt; - displays the values associated with subkey &lt;key&gt;\n    of the default key.\n  computer:&lt;target&gt; - queries registry settings for computer &lt;target&gt;.\n\nw32tm \/query [\/computer:&lt;target&gt;]\n    {\/source | \/configuration | \/peers | \/status}\n    [\/verbose]\n  Display a computer's windows time service information.\n  computer:&lt;target&gt; - query the information of &lt;target&gt;. If not\n    specified, the default is the local computer.\n  source: display the time source.\n  configuration: display the configuration of run-time and where\n    the setting comes from. In verbose mode, display the undefined\n    or unused setting too.\n  peers: display a list of peers and their status.\n  status: display windows time service status.\n  verbose: set the verbose mode to display more information.\n\nw32tm \/debug {\/disable | {\/enable \/file:&lt;name&gt; \/size:&lt;bytes&gt; \/entries:&lt;value&gt;\n    [\/truncate]}}\n  Enable or disable local computer windows time service private log.\n  disable: disable the private log.\n  enable: enable the private log.\n    file:&lt;name&gt; - specify the absolute filename.\n    size:&lt;bytes&gt; - specify the maximum size for circular logging.\n    entries:&lt;value&gt; - contains a list of flags, specified by number and\n      separated by commas, that specify the types of information that\n      should be logged. Valid numbers are 0 to 300. A range of numbers\n      is valid, in addition to single numbers, such as 0-100,103,106.\n      Value 0-300 is for logging all information.\n  truncate: truncate the file if it exists.\n\nw32tm \/leapseconds \/getstatus [\/verbose]\n  Display the status of leap seconds on the local machine.\n  verbose: Set the verbose mode to display more information.\n \n<\/details><details><summary><strong>WAITFOR<\/strong><\/summary>\nWaitFor has two ways of working:\n\nSyntax 1: to send a signal\n    WAITFOR [\/S system [\/U user [\/P [password]]]] \/SI signal\n\nSyntax 2: to wait for a signal\n    WAITFOR [\/T timeout] signal\n\nDescription:\n    This tool sends, or waits for, a signal on a system. When \/S is not\n    specified, the signal will be broadcasted to all the systems in a\n    domain. If \/S is specified, then the signal will be sent only\n    to the specified system.\n\nParameter List:\n    \/S     system         Specifies remote system to send signal to.\n\n    \/U     [domain\\]user  Specifies the user context under which\n                          the command should execute.\n\n    \/P     [password]     Specifies the password for the given user context.\n\n    \/SI                   Sends the signal across the net to waiting machines\n\n    \/T     timeout        Number of seconds to wait for signal. Valid range\n                          is 1 - 99999. Default is to wait forever for signal.\n\n    signal                The name of the signal to wait for or to send.\n\n    \/?                    Displays this help message.\n\n    NOTE: A system can wait for multiple unique signal names.\n    The signal name cannot exceed 225 characters and cannot\n    contain characters other than a-z, A-Z, 0-9 and ASCII\n    characters in the range 128-255.\n\nExamples:\n    WAITFOR \/?\n    WAITFOR SetupReady\n    WAITFOR CopyDone \/T 100\n    WAITFOR \/SI SetupReady\n    WAITFOR \/S system  \/U user \/P password \/SI CopyDone\n \n<\/details><details><summary><strong>WHERE<\/strong><\/summary>\nWHERE [\/R dir] [\/Q] [\/F] [\/T] pattern...\n\nDescription:\n    Displays the location of files that match the search pattern.\n    By default, the search is done along the current directory and\n    in the paths specified by the PATH environment variable.\n\nParameter List:\n    \/R       Recursively searches and displays the files that match the\n             given pattern starting from the specified directory.\n\n    \/Q       Returns only the exit code, without displaying the list\n             of matched files. (Quiet mode)\n\n    \/F       Displays the matched filename in double quotes.\n\n    \/T       Displays the file size, last modified date and time for all\n             matched files.\n\n    pattern  Specifies the search pattern for the files to match.\n             Wildcards * and ? can be used in the pattern. The\n             \"$env:pattern\" and \"path:pattern\" formats can also be\n             specified, where \"env\" is an environment variable and\n             the search is done in the specified paths of the \"env\"\n             environment variable. These formats should not be used\n             with \/R. The search is also done by appending the\n             extensions of the PATHEXT variable to the pattern.\n\n     \/?      Displays this help message.\n\n  NOTE: The tool returns an error level of 0 if the search is\n        successful, of 1 if the search is unsuccessful and\n        of 2 for failures or errors.\n\nExamples:\n    WHERE \/?\n    WHERE myfilename1 myfile????.*\n    WHERE $windir:*.*\n    WHERE \/R c:\\windows *.exe *.dll *.bat\n    WHERE \/Q ??.???\n    WHERE \"c:\\windows;c:\\windows\\system32:*.dll\"\n    WHERE \/F \/T *.dll\n \n<\/details><details><summary><strong>WHOAMI<\/strong><\/summary>\nWhoAmI has three ways of working:\n\nSyntax 1:\n    WHOAMI [\/UPN | \/FQDN | \/LOGONID]\n\nSyntax 2:\n    WHOAMI { [\/USER] [\/GROUPS] [\/CLAIMS] [\/PRIV] } [\/FO format] [\/NH]\n\nSyntax 3:\n    WHOAMI \/ALL [\/FO format] [\/NH]\n\nDescription:\n    This utility can be used to get user name and group information\n    along with the respective security identifiers (SID), claims,\n    privileges, logon identifier (logon ID) for the current user\n    on the local system. I.e. who is the current logged on user?\n    If no switch is specified, tool displays the user name in NTLM\n    format (domain\\username).\n\nParameter List:\n    \/UPN                    Displays the user name in User Principal\n                            Name (UPN) format.\n\n    \/FQDN                   Displays the user name in Fully Qualified\n                            Distinguished Name (FQDN) format.\n\n    \/USER                   Displays information on the current user\n                            along with the security identifier (SID).\n\n    \/GROUPS                 Displays group membership for current user,\n                            type of account, security identifiers (SID)\n                            and attributes.\n\n    \/CLAIMS                 Displays claims for current user,\n                            including claim name, flags, type and values.\n\n    \/PRIV                   Displays security privileges of the current\n                            user.\n\n    \/LOGONID                Displays the logon ID of the current user.\n\n    \/ALL                    Displays the current user name, groups\n                            belonged to along with the security\n                            identifiers (SID), claims and privileges for\n                            the current user access token.\n\n    \/FO       format        Specifies the output format to be displayed.\n                            Valid values are TABLE, LIST, CSV.\n                            Column headings are not displayed with CSV\n                            format. Default format is TABLE.\n\n    \/NH                     Specifies that the column header should not\n                            be displayed in the output. This is\n                            valid only for TABLE and CSV formats.\n\n    \/?                      Displays this help message.\n\nExamples:\n    WHOAMI\n    WHOAMI \/UPN\n    WHOAMI \/FQDN\n    WHOAMI \/LOGONID\n    WHOAMI \/USER\n    WHOAMI \/USER \/FO LIST\n    WHOAMI \/USER \/FO CSV\n    WHOAMI \/GROUPS\n    WHOAMI \/GROUPS \/FO CSV \/NH\n    WHOAMI \/CLAIMS\n    WHOAMI \/CLAIMS \/FO LIST\n    WHOAMI \/PRIV\n    WHOAMI \/PRIV \/FO TABLE\n    WHOAMI \/USER \/GROUPS\n    WHOAMI \/USER \/GROUPS \/CLAIMS \/PRIV\n    WHOAMI \/ALL\n    WHOAMI \/ALL \/FO LIST\n    WHOAMI \/ALL \/FO CSV \/NH\n    WHOAMI \/?\n \n<\/details><details><summary><strong>WINGET<\/strong><\/summary>\nThe winget command line utility enables installing applications and other packages from the command line.\n\nusage: winget [&lt;command&gt;] [&lt;options&gt;]\n\nThe following commands are available:\n  install    Installs the given package\n  show       Shows information about a package\n  source     Manage sources of packages\n  search     Find and show basic info of packages\n  list       Display installed packages\n  upgrade    Shows and performs available upgrades\n  uninstall  Uninstalls the given package\n  hash       Helper to hash installer files\n  validate   Validates a manifest file\n  settings   Open settings or set administrator settings\n  features   Shows the status of experimental features\n  export     Exports a list of the installed packages\n  import     Installs all the packages in a file\n\nFor more details on a specific command, pass it the help argument. [-?]\n\nThe following options are available:\n  -v,--version  Display the version of the tool\n  --info        Display general info of the tool\n\nMore help can be found at: https:\/\/aka.ms\/winget-command-help\n \n<\/details><details><summary><strong>WINVER<\/strong><\/summary>\nThis cmd command to open About Windows on Windows.\n \n<\/details><details><summary><strong>WRITE.EXE<\/strong><\/summary>\nThis cmd command to open Wordpad on Windows.\n \n<\/details><details><summary><strong>WSCRIPT<\/strong><\/summary>\nThis cmd command to open Windows Script Host on Windows. \nhttps:\/\/en.wikipedia.org\/wiki\/Windows_Script_Host\n\n\n<\/details><details><summary><strong>Redirections<\/strong><\/summary>\ncommand &gt; file\nRedirect command output to a file\n\ncommand &gt;&gt; file\nApend to a file\n\ncommand &lt; file\nRedirect file to command\n\ncommandA | commandB\nPipe the commands output from commandA into commandB\n\ncommandA &amp; commandB\nRun commandA and then run commandB\n\ncommandA &amp;&amp; commandB\nRun commandA and if it succeeds then run commandB\n\ncommandA || commandB\nRun commandA and if it fails then run commandB\n\ncommandA &amp;&amp; commandB || commandC\n\tIf commandA succeeds run commandB, if commandA fails run commandC\n\t(Note that if commandB fails, that will also trigger running commandC)\n\n<\/details><details><summary><strong>Redirect to NUL<\/strong><\/summary>\nAlso NUL command, use hide command errors.\n\ncommand 2&gt; nul            Redirect error messages to NUL\ncommand &gt;nul 2&gt;&amp;1         Redirect error and output to NUL\ncommand &gt;filename 2&gt; nul  Redirect output to file but suppress error\n(command)&gt;filename 2&gt; nul  Redirect output to file but suppress CMD.exe errors\n\nRedirect multiple lines\nRedirect multiple lines by bracketing a set of commands:\n\n(\n  echo hi\n  echo bye\n) &gt; C:\\log.txt\n<\/details>\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>What is CMD Command Prompt, also known as CMD, is a command-line interpreter for Windows operating system. Cmd, in short, is used to run commands<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[7,4,6,5],"class_list":["post-17","post","type-post","status-publish","format-standard","hentry","category-cmd","tag-bat","tag-cmd","tag-command-line","tag-windows"],"_links":{"self":[{"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/posts\/17","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/comments?post=17"}],"version-history":[{"count":6,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/posts\/17\/revisions"}],"predecessor-version":[{"id":60,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/posts\/17\/revisions\/60"}],"wp:attachment":[{"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/media?parent=17"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/categories?post=17"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mustafauzun.co\/blog\/wp-json\/wp\/v2\/tags?post=17"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}