Upgrading to Windows XP

Preliminaries

As with earlier versions of the Windows operating system, an Upgrade installation requires that you have a previous version to serve as a “qualifying product.” However, this time around you will not be able to use the Upgrade from Windows 95. Windows XP requires Windows 98 or newer to qualify.

NOTE: By design, Win95 should not work as a qualifying product. However, there is a bug in the Setup program on Windows XP CDs (both Home Edition and Professional). Apparently, Microsoft will not be fixing this bug. As a result, though you will not be able to perform an upgrade installation from a Win95 install, the following operating system CDs will suffice as “Qualifying Media” for a clean install:

  • Windows NT Workstation, Versions 3.51 & 4.0
  • Windows 2000 Professional
  • Windows 95
  • Windows 98 (Original & Second Edition)
  • Windows Millennium Edition

Also, the old question remains of whether an OEM CD or “Restore Disk” supplied by your computer manufacturer will “qualify.” The answer is that not all will work for this purpose, mostly because the Windows CAB files are not in evidence. Check with your computer manufacturer to confirm that your copy qualifies, or buy your Upgrade copy directly from them. Presently, the only company that I have confirmed all their OEM CD’s will “qualify” is Dell. I talked to a Dell Representative during the XP Launch in New York City on the trade show floor who confirmed this and stated that they understood the importance of keeping it that way.

So what do you do if your OEM CD or Restore disk does not work as qualifying media? One neat new feature of XP allows one to get around this problem. First, start the XP clean install from within an existing qualified install rather then from the XP CD or from a DOS prompt. When you see the screen that ask what type of install to do, change “Upgrade (Recommended)” to “New install.” You can then select the existing partition, format it, and do a Clean Install, never having to insert your qualifying product CD.

As in the past, Original Equipment Manufacturer (OEM) copies, which can be purchased with a qualifying piece of hardware, cannot be used to Upgrade. They will allow only a clean install, and all support is the responsibility of the seller. Microsoft will provide no support for OEM copies of Windows. (However, you can still get free support even for OEM copies, usually of a very high quality, on the peer-support newsgroups that Microsoft sponsors. - Ed.) Also, there are some important changes regarding OEM copies, which will make them a more attractive alternative for many people: See OEM CD’s & Microsoft Licensing: What Has Changed? below.

A Decision to Make

You first have to decide of whether to purchase Windows XP Home or Professional. You will find several links to articles comparing the two Win XP Versions here.

To Clean Install or Upgrade — That is the question!

As with earlier versions of Windows, you will have the option either to clean install or to upgrade. So, what is the difference?

A Clean Install

With a clean install you start completely over from scratch, right?

Well, that used to be true; but with Windows XP, you have the option (from the CD’s welcome screen) to select “Transfer Files and Settings.” (See a screen shot here and read about it in my File & Settings Transfer Wizard article.) This utility allows you to export your personal settings, such as network settings; Dial-Up Networking; email information including accounts, folders, and filters; and registered file types. Then you can import them back into Windows after your clean install of XP. In other words, “Transfer Files and Settings” blurs the meaning of starting over with a clean install, when all that information can be gleaned and saved from your old install before you format. It does not bring the actual applications — those would need to be reinstalled, which that is why you should consider the upgrade route instead.

An Upgrade

An upgrade is by far the simplest approach, and requires the least from the user. You just install Windows XP over the old Windows install, and it keeps your settings, files, and all your applications as well. If you have “tweaked” your system heavily, installing then uninstalling many programs from the web and, in general, played with the system a lot, you are a candidate for a clean install; but if you are an average user, you should take Microsoft’s advice during the initial install and note the word “Recommended” next to the Upgrade option in the Install Type box.

And the best thing about an upgrade is that it’s easy, and doesn’t require you to reinstall all your existing applications. If it doesn’t meet your expectations, you can always fall back and do a clean install with your Upgrade CD by inserting your Windows 98 or Millennium CD in your drive when asked proof of ownership. You really can’t lose.

To get a good result from an upgrade you will need to do a little homework and, more importantly, a little house cleaning. This gives you the best chance of being happy with your upgrade installation of Windows XP.

Homework Before You Install (Maybe even before you buy!)

  1. You will want to make sure your system is a candidate for Windows XP. It is not considered a good idea to have only the minimums hardware as listed in the article, Windows XP Professional System Requirements. If you are close to the minimum hardware listed, you should pass on Windows XP. I have seen it suggested that only computers manufactured since January 1, 2000 should be considered for Windows XP. That may be a little strong; but, the older the system, the more likely its performance will not be up to par. As a practical matter, you will want to look at a base of a P-III 500 with 128 MB of memory, or possibly a slower processor in the P-II or P-III 300+ range if you have plenty of memory (say, 256 MB or more). Memory seems more important then processor speed to Windows XP. Next, check your hardware for compatibility. You can download the free Windows XP Upgrade Advisor utility from here. (Just keep in mind, if you don’t have a high-speed Internet connection, that one of the downloads is 50 MB.) This is the same utility that runs before Win XP is installed, but you can download it and run it on your computer before spending the money for XP.
  2. Check the web site of your computer manufacturer for Windows XP compatible drivers. This will be particularly important if you have new hardware that is not likely to have drivers on the XP CD-ROM. Download and set aside any new XP drivers that you may need. In the event that you find you have orphaned hardware or hardware that is not supported, you may want to consider directing Win XP to set up a Dual Boot installation, so that you can keep using the original (currently existing) operating system for this hardware. See How To Create a Multi-Boot System With Windows XP. As an alternative to this method, you can use BootIt Direct or Partition Magic to create alternate (hidden) primary partitions for Dual Boot.
  3. Make sure your software is compatible with XP. This is particularly important for CD-writer software, firewalls, and antivirus applications.

    NOTES ON SPECIFIC SOFTWARE

    • For ZoneAlarm or ZoneAlarm Pro to survive an upgrade with no problems, they must be version 2.5.357 or later.
    • Norton AntiVirus must be version 2002. (NAV 2001 will work with XP, but make sure it has the XP update patches from Symantec.) I am most with comfortable removing this utility completely via the Add/Remove Programs applet in Control Panel, then reinstalling it after the upgrade.
    • Norton GoBack also has had some issue with upgrades, and Symantec addresses the issues on their web site. Remove GoBack with the Add/Remove Programs applet, then reinstall it after the upgrade.
    • EasyCD version 4.03 will make the trip, but you should install the version 4.05 upgrade immediately after installing Windows XP.
    • MusicMatch Jukebox also seems to survive an upgrade, but you should reinstall just after the upgrade.
    • If you have installed the Target Context PowerToy to your system, remove it prior to the install via the Control Panel’s Add/Remove Programs applet; see also the PowerToys FAQ on this site for a discussion of the PowerToys that will still work under Windows XP.
    • If you own a Hewlett Packard All in One Printer, remove your print driver before the upgrade. This step may be crucial to your being able to use your printer. For any HP printer, see this page on their web site for more information.
    To be safe, if you are not sure about your version of these programs (or, for that matter, the XP-readiness of any other software you have), remove the program via Control Panel | Add/Remove Programs, then try reinstalling after the Win XP upgrade. As a general rule it is best to uninstall any firewall, antivirus, CD burning, NAT, or proxy server programs prior to the upgrade.
  4. If you are running Internet Explorer 5.5 (original) or IE5.5 SP1 you need to do one of the following things. (In Internet Explorer, see Help | About IE Explorer to confirm what version you are using.)
    • If you are running Windows 98 (either edition) and upgraded to IE 5.5, go to Control Panel | Add/Remove Programs and uninstall it so that you revert back to your previous version of IE; or
    • If you are running Windows Millennium Edition, which comes with with IE 5.5 preinstalled, or if you do not want to revert to a pre-5.5 version of IE, upgrade your browser to IE 5.5 Service Pack 2 (SP2). Microsoft has withdrawn all IE 5.5 versions from its Web site, but you can still get archived copies of IE 5.5 SP2 here if you don’t already have a copy available. Alternately, you could upgrade to IE 6.
    In any case, try to do the upgrade with something other than IE 5.5 or IE 5.5 SP1 installed. Though these versions do not always cause problems in an upgrade, they have been known to increase the chances of a problem. I wouldn’t play the odds.
  5. Take a look at the README.HTM file on your Windows XP CD-ROM. Put in the CD and select, from its opening menu, “Perform Additional Tasks,” then “Browse this CD.” More information on the XP CD is given below. You can also take a look at the following articles from the Microsoft Knowledge Base. (The first is for Home Edition; the second, for Professional.)

    Release Notes for Windows XP Setup Contained in the PRO.TXT File Release Notes for Windows XP Setup Contained in the HOME.TXT File

  6. If your user name in Win98 or ME ends in a period (!), various problems can result of which the most frustrating would be the appearance of having lost a lot of data after the upgrade. (It’s recoverable, but why put yourself through a panic and a hassle?) For more details, see MSKB article 312942, Missing Data or Program Settings After Upgrade to Win XP.

OK, Time to Start House Cleaning

NOTE: Variations pertaining to Windows Millennium will be noted as we go.

1. In the past, this is where I would have stated categorically that you should not upgrade on top of an installed operating system with existing problems. That is probably still good advice, but, since Win XP is based on an entirely different kernel, it replaces virtually all of any Win 9x install anyway. This means it is more likely to fix a flaky installation. No guarantee, just more likely.

2. Since I have been one of those involved with keeping the old MS Fax (originally from Win95) alive and working even on Windows Millennium, I should say that the days of MS Fax are done. Do not even think about trying to make it work with XP. That dog won’t hunt. By all means try the new Fax Service for XP explained here: How to Enable & Configure the Fax Service

3. This is also a good time to remove, using Control Panel | Add/Remove Programs, any programs that you do not use or that have become antiquated. Get rid of any unnecessary programs now.

4. Check the Web site for your computer manufacturer to see if there is an update for your BIOS. A BIOS update may be a good idea if your BIOS is more then two years old. If you have not flashed a BIOS before, follow the update instructions from your computer or motherboard manufacturer exactly. This update can do serious damage to your computer if not done correctly. Better, if it is your first time, to take it to a technician or have a competent friend come over and help. If in doubt, do not.

5. Shut down the screen saver: Right-click on an empty spot on the desktop, and select “Properties,” then the “Screen Saver” tab. Select “None” for your screen saver. While you are at the Screen Saver tab, check to be sure that Power Management settings are all set to “Never.”

6. Manually delete the Temp files. Reboot first, just to make sure you do not interrupt something in process. Include:

  • Files in C:\Windows\Temp
  • Temporary Internet Files from IE: Open IE and click Tools | Internet Options | General tab.
  • Recycle Bin: Right-click the Recycle Bin and choose the option to delete files. With Norton installed, delete Norton Protected Files from here as well.

Alternatively, you can use the Disk Cleanup Tool. Open My Computer, indicate the drive, right-click, and select Properties.

7. Next, I run Scandisk, EasyCleaner, RegClean 4.1a, and Windows Disk Defragmenter to make sure there are no problems. (You can substitute your own favorite utilities.) Do this before the upgrade then update EasyCleaner to version 2.0, since older versions of EasyCleaner will remove Registry keys required for Windows’ Help system to run, effectively breaking it. Also, Symantec states that you should upgrade to their newest versions of their products for XP. In other words, do not use this type of utility after the XP Upgrade unless they are updated to versions specifically created for Windows XP.

8. In Win98, if you are familiar with ScanReg, run SCANREG /OPT /FIX from a real-mode DOS prompt. (In other words, reboot to MS-DOS, rather than just using a DOS window.) Run this from one to three times in succession. This will repair and compact your Registry, always a good idea and particularly well-advised just before upgrading. Windows Millennium will not reboot to real-mode DOS, but SCANREG /OPT /FIX runs just fine, and faster, from the Start | Run box. (During the process, in ME, your system will reboot to finish the job.)

9. For Norton Antivirus 2001, you have to go to “Options” | “Auto-Protect,” uncheck “Load Auto-Protect at startup,” “OK” out, and answer Yes to “Do you want to unload now” to keep it from popping up during installation. You can restart AutoProtect after the upgrade, but go to Norton AntiVirus now and uncheck “Scan System files at Startup” under “Startup Scan.” It should no longer run.

Norton Antivirus 2002 is more complicated. I would uncheck all the following:

Norton Antivirus 2002
Under this heading Uncheck the following
Auto Protect Enable Auto Protect; Start Auto Protect When Windows Starts Up
Script Blocking Enable Script Blocking
Live Update Enable Automatic Live Update
Inoculation Inoculate Boot Record
Miscellaneous Alert me on start up if my virus protection is out of date

The above is probably overkill, but it won’t hurt to be ahead of the game. Personally, I uninstall my antivirus software, then reinstall it after the upgrade. This is the best method to make sure your antivirus software works correctly.

Also, check your BIOS to make sure you do not have BIOS antivirus protection enabled. Other antivirus programs may have similar features that need to be disabled. See your documentation for instructions.

10. Make sure you disable any firewall you have install so that it does not run at startup. (With ZoneAlarm, bring up the program on your screen and select the “Configure” tab. Uncheck “Load ZoneAlarm at startup” box.) As mentioned previously, the best method is to remove your firewall, then reinstall it after the upgrade.

11. Launch MSCONFIG. On its General tab, uncheck the “Process Startup Group” box. This will keep stray applications from running and interfering with the upgrade. (Remember to go back and recheck this box after you are finished with the upgrade.) Sometimes, Windows Setup will say mysteriously that it has still found a driver running that will get in its way. Don’t worry, let it reboot to inhibit whatever it has found, then run Setup again and it should upgrade fine.

12. OK, you are nearly done. But now you will want to set yourself up to make a clean install as easy as possible, if this is necessary later. To do this, run Transfer Files and Settings from the Windows XP CD-ROM. (See below, The Windows XP CD.) By running this wizard and safely storing your settings, accounts, folders and created files on another drive, CD-RW, or other storage medium, you make a clean install less of a headache. By importing this saved information, many hours of tweaking the newly installed operating system will be saved.

If you’ve followed all the advice above, your system will be squeaky-clean. It is ready for the Windows XP Upgrade.

(NOTES)

1. Remember to go to the Windows Update site soon after the install and make any updates that are available.

2. System Restore is found at Programs | Accessories | System Tools | System Restore. A new Restore Point is automatically created on the install partition, if you have room, upon completion of the Win XP upgrade. Remember this if things deteriorate soon after the upgrade (as you proceed to add programs, make configuration changes, etc.).

3. Remember to turn back on

  • Turn back on your screen saver and any power saving settings you normally run.
  • Enable the antivirus AutoProtect and other features you disabled.
  • Check for driver problems and upgrade any that need attention.

4. After the install you may find the following MSKB article of use: How to Troubleshoot Program Compatibility Issues in Windows XP.

New Options During the XP Install

1. Windows XP will ask you early in the install whether you want to connect to the web to update the install routine. This is a powerful tool and will help make the installation go well. Only the updates to the tool are downloaded during the install, so, by all means, let it update. For further information on this feature, see Description of the Dynamic Update Feature in Windows XP Setup.

2. A few steps later, the Setup program will suggest that you look at a report from the Upgrade Advisor. This is one of the tools that get updated during the update just mentioned, and is the same tool you can download from the MS Web site (discussed above; see also the link at the left of your screen). Leave the default and let Setup identify possible problems. This report will identify both hardware and software compatibility issues. Depending on the seriousness, you may want to cancel the install and do one of the following:

  • Download XP compatible drivers for the identified problem hardware.
  • Remove the problem piece of hardware until a driver is available.
  • Download an update for software identified as not compatible.
  • Remove software that will not work with XP.

There will be fewer issues as time goes on. So, by all means, allow the Upgrade Advisor to upgrade itself from the Web to benefit from late additions to this wizard.

The Windows XP CD

The Windows XP CD-ROM has some differences from past Windows versions. First, the CD is bootable. So, if your system supports and is set to look for a bootable CD, you will not need an Emergency Boot Disk for any type of install of XP. The CD-ROM also has several valuable utilities, and provides access to some great information.

Go ahead and put it in your Windows XP CD. The first screen will look like this:

WinXP Screen Shot No. 1

Select “Perform Additional Tasks” on this screen and you will see the following screen:

WinXP Screen Shot No. 2

Set Up Remote Desktop Connection and Setup a Home or Small Office Network

These are for after the XP install and are pretty self-explanatory. (They are also available from within XP at Start | Settings | Network Connections.)

Transfer Files and Settings

This utility allows you to transfer your personal settings such as Network settings, Dial Up Network, E-mail information including accounts, folders and filters. It catches your registered data file types and can bring those data files across to a new install of XP. For additional information on this remarkable tool, see my article File & Settings Transfer Wizard.

Browse this CD

This takes you to Windows Explorer to take a look at the actual files on the CD-ROM.

View the Release notes

This accesses the RELNOTES.HTM file on the CD. Lots of information here and it explains the above utilities. Spend some time here as it is worth you time.

OEM CD’s & Microsoft Licensing: What Has Changed?

An OEM copy (according to the signed agreement between the seller and Microsoft) is to be sold only with a new computer or a “qualifying” piece of hardware. That used to be pretty much restricted to a hard drive, CPU, or motherboard. The rules for what “qualifies” for an OEM sale recently were loosened considerably. Some have read them even to encompass something as minor as a power cord.

Basically, OEM copies are supposed to be sold with a fully-assembled computer system or a non-peripheral hardware component. A fully-assembled computer system normally consists of at least a central processing unit, motherboard, hard drive, power supply, and a case. A non-peripheral hardware component is any component that is essential to running a computer system, such as memory, internal drives, mouse, or power supply. According to an OEM System Builder with whom I spoke recently, it is pretty much up to the OEM supplier to determine what qualifies — but a power cord probably shouldn’t make the grade.

If you qualify an OEM copy, this brings down the cost of Win XP considerably in comparison to a retail “Full” version — particularly with the XP Professional version. The following chart tells the story.

Windows XP Versions: Comparative Pricing & Capabilities
Win XP Edition Street Price What It Does
Win XP Home Edition Retail “Full” $199 Clean Install & Upgrade
Retail “Upgrade” $99 Clean Install & Upgrade; Requires you to have Qualifying Previous Version
OEM “Full” $90-$95 Clean Install only; No Microsoft support
Win XP Professional Retail “Full” $299 Clean Install & Upgrade
Retail “Upgrade” $199 Clean Install & Upgrade; Requires you to have Qualifying Previous Version
OEM “Full” $140-$145 Clean Install only; No Microsoft Support

Microsoft recently changed their policies on additional licenses. Previously they had offered only 5% to 10% discounts on additional licenses. Now you can get an across-the-board 15% discount. The discounts are discussed on the Windows XP Home Edition retail page and the Windows XP Professional Edition retail page. Keep in mind that these “additional licenses” can be used only with an existing CD copy of the respective Windows versions, and will not work for systems where Windows XP was preloaded on the system and did not include a CD copy. Make sure that you read the “how to qualify for and order your new Product Key” link on the above web sites.

NOTE: This is a very recent change in Microsoft’s pricing policy. There is no 5-copy minimum purchase required as with past Volume Licensing. You can buy only one additional license, or as many as three additional licenses per original copy for which you have a license. Windows Product Activation (WPA) is enforced for these one-at-a-time supplemental licenses.

Microsoft’s recommended pricing, which may differ from actual retail pricing, is summarized in the following table:

Windows XP: MS Pricing of CDs vs. Extra Licenses
Win XP Edition Street Price What It Does
Win XP Home Edition Retail “Full” $199 Clean Install & Upgrade
Additional Full License $170
Upgrade CD $99 Clean Install & Upgrade; Requires you to have Qualifying Previous Version
Additional Upgrade License $85
Win XP Professional Retail “Full” $299 Clean Install & Upgrade
Additional Full License $255
Upgrade CD $199 Clean Install & Upgrade; Requires you to have Qualifying Previous Version
Additional Upgrade License $170

OEM copies still deserve consideration, however. In the past, OEM copies have been looked down on by many knowledgeable users. Yes, they now are considerably cheaper. But they only are supported by the seller. No telephone support is available from Microsoft. And they only clean install on a blank drive or partition. What surely will draw more attention to them is the advent of the “Transfer Files and Setting” utility discussed above, which gives a clean install more of the advantages of an upgrade. Now you can buy an OEM copy, use the “Transfer Files and Settings” wizard to capture your current system information, and seriously reduce the tweaking and setup normally required by a clean install. You will still have to reinstall all your applications, but that normally is less then half the work.

So it is your choice.

Also, if you are shopping around for the best price (these will vary somewhat from source to source, and over time), keep in mind that with OEM copies of Windows you depend on the seller, rather than Microsoft, for support. This means that your local computer shop is worth a lot more to you than any available deal on the web!

JSKYs - XP Tips & Tricks

XP Tips & Tricks

 

NOTE: Always turn off system restore, and reboot into safe mode when removing viruses and spyware. This is the safest way to completely remove unwanted viruses and spyware utilities installed on your pc.

Always be sure to go to the Microsoft update site and download the security updates. And any other downloads deemed necessary!

 

To turn off System Restore:

 Open your start menu, and then go to My Computer. R-click mouse button, click on properties. Go to the System Restore Tab, put a check mark in "Turn off System Restore on all Drives. (Restart your pc to clear out old files saved in system restore) Repeat processes to re-enable System Restore.

 

To boot into safe mode:

 

 Open your start menu, go to "Run� Type in "msconfig"(without quotation marks). This will open your System Configuration Folder. Select the BOOT.INI tap, put a checkmark in /SAFEBOOT. Click apply, you will be asked to reboot for these settings to take effect. You will now reboot into safe mode. When you are done doing your virus and spyware scans and removals, repeat the processes and uncheck /SAFEBOOT. And on the �General Tap� Click �Normal Startup�.

 

Booting into your BIOs
To change your start-up device

 

 

You will need to change the boot order in your BIOs setup. To boot from the Floppy or CD-ROM.

It would depend on your computer manufacture.Assuming that your PC is from about 1985 or later, it should have an integrated setup program.You've probably seen a notice on your PC's screen at start-up about the BIOS setup many times. When your computer is getting itself going, the BIOS usually places a brief message on the screen telling you how to activate the BIOS setup menu to show up. The message might say something like this: "Press F2 for setup." (F2 is just used as an example.)

Try the following key combinations, which I have listed approximately in order of popularity in today's system (there may be others as well): You would need to do this as your system is booting-up. If it doesn't work the first time, just keep trying it over and over until you get into the BIOs setup screen.

 

*{Delete} (modern Award and AMI BIOS)

*{F2} (modern Phoenix BIOS)

*{Ctrl}+{Alt}+{Esc}

*{Ctrl}+{Esc}

*{Alt}+{Esc}

*{Ctrl}+{Alt}+{S}

*{Insert}

*{F1}

*{F8}

*{F9}

*Or consult your system manufacturer for the key combination.

 

Once in the BIOs screen, look for boot devices, Boot order, boot-up devices. (You should see something similar). As each type of motherboard is slightly different.

It will say something along the lines of Boot Order.

Kinda like this

Boot Device 1 - HHD (or Hard Drive)

Boot Device 2 - CDROM

Boot Device 3 - Floppy

Etc.

You will need to set the first boot device as Floppy Disk.

But be sure to set which ever was your floppy drive to your Hard Drive.

 

Enable XP Firewall:

 

 When you're online, your computer passes information to and from the Internet through ports, or open connections. A port's number identifies the type of information passing through it. For example, port 80 is used for HTTP traffic, so page requests and WebPages being downloaded all come through port 80.

 Hackers usually try to sneak into your computer through an unguarded and open port. Luckily, Microsoft's Windows XP Internet Connection Firewall helps you close ports you aren't using.

Here's how to enable the XP firewall:

  1. Log into XP with an owner account.
  2. Click the Start button and select Control Panel. Double-click the Network Connections icon.
  3. In the Network Connections window, click to highlight the connection you want to protect. In the left panel, under Network Tasks, click "change settings of this connection."
  4. When the connection status dialog box opens, click the Properties button.
  5. In the Properties dialog box, click the advanced tab. Check the box beneath "Internet Connection Firewall." If you leave it unchecked, the firewall is off. If you aren't running any servers on your computer, just click OK. If you run an FTP or Web server, you need to change the advanced settings.
  6.  

Enable or Disable XP SP2 Firewall:

Here is how to enable or disable the new firewall in SP2

  1. Log into XP with an owner account.
  2. Click the Start button and select Control Panel.
  3. Select Network And Internet Connections.
  4. Click the �Windows Firewall� Icon.
  5. Now you can enable or disable the Windows Firewall.
  6. Click OK and your done.

 For those who prefer the �Classic� look.

1.     Log into XP with an owner account.

2.     Click the Start button and select Control Panel.

3.       Here you will see the �Windows Firewall� Icon.

4.     Click the �Windows Firewall� Icon.

5.       Now you can enable or disable the Windows Firewall.

6.     Click OK and your done.

 (it is not advised to disable the firewall unless you have another firewall application installed).

XP Repair:

(Also called a dirty install by some).

 There are two types of repair on XP.  When you boot with the XP disk. You will come to the first part that asks if you want to install or do a repair. This first repair is a command prompt type for a specific repair.

 AT THIS POINT! If you click on install XP instead, you will see XP load files as it get ready to install the OS. When it gets done loading files, you will again be asked to install XP or to repair your current OS. At this second repair option, click to repair and sit back. XP will go through your whole system searching and repairing parts that have been changed or need to be replaced. BUT REMEMBER!! With any repair, you will need your CD KEY. And you MUST go to windows update and re-download some of the updates because the repair will remove some of them.

 

System File Check:

 

If you have your XP CD, do a system file check. This way you will have all damaged or missing dlls and system files replaced.

Put your XP install cd in your cdrom drive and go to start > run and type sfc /scannow hit enter.

It will start windows file protection and compare all files to the original install or update patches (The $NTuninstall files in windows).

If it says failed, hit retry, it just means something is using it and you have to hit retry to pause the process. It may take two or three clicks of retry to get through.

Restart computer.

 

Using �chkdsk /r�

 

If you have a XP CD, boot to it, like you are going to install, then there is a choice to go to the repair console, when you get to the command prompt type "chkdsk /r" without quotes, make sure to have a space between the "k" and the "/r". It may take an hour or more for it to complete the repair. See if it helps your problem.

 

Fix MBR:

(Master Boot Record)

Fix the Master Boot Record on NTFS Partitions

Windows NT, 2000, XP, and Windows Server 2003 users having problems accessing or booting from an NTFS disk can use the FIXMBR program to rewrite a new Master Boot Record on the hard drive.

Boot from the windows XP CD, press the "R" key in the setup in order to start the restoration console. Select your windows XP installation from the list, and enter the administrator password. Enter the command: "FIXMBR" (without the quotes) at the input prompt and confirm the next question with a "Y" (without the quotes). Use exit to restore the computer.

Defragging the Prefetch File:

 Go to run, and then type in �cmd�, (without the quotes). And a black window will pop up with the c:\ prompt. On that line just type in �defrag c: -b� (without the quotes) and it will defrag the prefetch file for you. When it is done just type exit and the window will close and you are done.

 If the file was really fragmented you will notice a difference in the time it takes to boot up Windows, usually faster.

 

Turn Off Error Reporting:

 

When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to.

To disable error reporting, follow these directions:

  1. Right-click My Computer and choose Properties.
  2. Click the Advanced tab on your System Properties dialog box.
  3. Click the Error Reporting button on the advanced tab.
  4. Place a checkmark next to "Disable error reporting."
  5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."
  6. Click OK.

 

Disable Driver Signing:

Getting a warning about that driver your installing?

 Disable the driver signing error by going to your start menu, then to your "My Computer" icon. R-Click, and then down to properties. Click on properties, and then open the "Hardware Tab". In the Device Manger section, click on Driver Signing. Check the "ignore" section. Then click OK.

 

How to start and run the �Help and Support Center�

 

To start the Help and Support Center, press the F1 Key.

To run Help and Support, go to your �Start Menu� and click the �Help and Support� Icon.

(If you don�t see the H&P icon, open your start menu. On the top where it lists your user name, r-click and it will show �properties�. Click on properties. Go to customize then customize start menu, then to advanced. Scroll down the list of start menu items until you see �Help And Support�. Place a check in the box, click apply and exit. It will now show in your start menu.

 

Cleaning out the Prefetch File:

More on the prefetch 

XP Activation:

 

To see if your copy of XP is activated;

Type this into �Run� on your Start Menu to see if your copy of windows is activated.

oobe/msoobe /a

 

Key Finder - Windows activation key

 

The Magical Jelly Bean Keyfinder is a freeware utility that retrieves your Product Key (cd key) used to install windows from your registry. It has the options to copy the key to clipboard, save it to a text file, or print it for safekeeping

 

Password Restore Disk:

 

 XP's Forgotten Password Wizard, your conscience will be free and clear should your mind happen to accidentally misplace your user password.

 Here's how to launch the Forgotten Password Wizard to create your very own password recovery disk.

  1. Click Start menu, Control Panel, and User Accounts.
  2. Click your user account name.
  3. Under Related Tasks on the left, click "Prevent forgotten password" to launch the wizard.

 Now that you've launched the wizard, let it walk you through creating the recovery disk. Make sure the disk you use is formatted and in the drive. After it's finished creating the disk, label it and stash it away for an emergency.

 If you happen to forget your password, all you need to do is click your user icon at the logon screen. Even though you don't have your password, go ahead and click the green arrow just like you would to finish logging on to your computer. This will launch a little yellow dialog box directing you to use your password recovery disk.

 Don't lose the disk, however, or you're out of luck. XP Tips & Tricks
Blogged with the Flock Browser

Guide To Remove Virus, Trojans, Spywares, Etc - Guides & Tutorials

Virus scanners AVG Free Anti virus scanner Trend Micro Housecall Online anti virus scanner. Anti spy/malware Windows Defender Anti spyware scanner. Windows 2000 and XP only. Spybot Search & Destroy Anti spyware scanner Adaware SE Personal Anti spyware scanner Firewalls Use both a hardware and software firewall. Be advised as dual software firewalls may cause problems ZoneAlarm Free Free firewall - more user friendly Sygate Personal Free firewall - more configuration options Removal tools The following files are not substitutes for the ones described above. They are either diagnostic tools or removal tools for malware of a certain kind HijackThis Manual malware remover. Post the HijackThis log generated only if requested! McAfee Stinger Virus removal tool. No substitute for a fully functional virus scanner! CWshredder CoolWebSearch removal tool. Widely known and persistant Hijacker. cCleaner Removes unused and unwanted files from your PC Anti Trojan Ewido Effective utility for finding and removing Trojans. Windows 2000 and XP only. NOTE: New users might find going through the following steps to be useful: 1. Turn off System Restore if applicable. (Windows ME & XP users) 2. Run Ccleaner 3. Run Ad-Aware 4. Run Spybot 5. Run Microsoft Antispyware 6. Run AVG Free 7. Run Ewido 8. Re-start in Safe Mode 9. Re-run AVG Free 10. Re-start in Normal Mode 11. Turn on System Restore if applicable. (Windows ME & XP users) Originally from Computerhope.Com

Guide To Remove Virus, Trojans, Spywares, Etc - Guides & Tutorials

Problem: Spyware, Adware, Viruses and Trojans A wide variety of failures, system errors and general performance problems can be directly attributed to the presence of adware, spyware, viruses and trojans. Solution: Free downloadable removal utilities Fortunately, these gremlins can be safely and easily removed using free software available on the web. Here we have compiled the best of the best, in our opinion. Download and install the following utilities and you will be well on your way to eliminating many of the common problems experienced by new and experienced users alike. IMPORTANT: As effective as these programs are, they do require you to keep them updated. Like diseases, new strains of viruses, spyware and trojans make their way through the online community on a daily basis. Updates contain the latest definitions to keep your system safe on an ongoing basis. Usually you can download the updates by clicking on a choice or icon within the program interface itself. In some cases, you can even set the updates to occur automatically at set times. Stay current with your updates, and you should experience no problems.

Defend and enhance the performance of your PC

Key Technologies Norton AntiVirus™ Norton Antispyware Norton Antibot NEW! Norton™ Pulse Updates NEW! Norton Insight NEW! Norton Protection System Browser Protection Norton Disk Doctor™ Norton Speed Disk™ Norton Cleanup Norton Startup Manager Norton WinDoctor™ Norton WipeInfo™ CheckIt™ Diagnostics Process Viewer performance System Optimizer One-Button Checkup Key Benefits Norton AntiVirus™—Provides fast, light, and continuous protection against viruses, spyware, worms, bots, and other threats. NEW! Norton Pulse Updates—Deliver up-to-the-minute protection against new threats.* NEW! Norton Insight—Offers innovative, intelligence-driven technology for faster, fewer, shorter scans. NEW! Norton Protection System—Provides multilayered protection working in concert to stop threats before they impact you. Norton Disk Doctor™—Diagnoses and fixes hard drive problems. Norton Speed Disk™—Defragments, cleans, and repairs the hard drive for enhanced performance. Norton Cleanup—Quickly and permanently removes unwanted Internet cookies, cache files, and temporary files that slow your computer’s performance. Features and BenefitsNorton AntiVirus 2009—engineered for speed Offers proven fastest, lightest security suite available.** NEW! Saves time and improves performance with Norton Insight NEW! Installs in under one minute on average and requires less than 8 MB of memory. [More info] Up-to-the-minute protection NEW! Delivers up-to-the-minute protection with rapid pulse updates every 5 to 15 minutes. NEW! Prevents bots from taking control of your PC. NEW! Boots and repairs badly infected PCs with recovery tool. NEW! Delivers our most complete, deep cleaning scan possible. IMPROVED! Defends against Web-based attacks. IMPROVED! Provides multilayered security through the Norton Protection System. Control without disruptions NEW! Automatically schedules scans and updates to occur while your PC is idle. NEW! Allows you to review the security status of every process on your PC. NEW! Helps ensure movies and games are never interrupted. Maps your wireless home network. Norton SystemWorks Utilities—enhanced PC performance Diagnoses and fixes hard drive problems. Defragments, cleans, and rearranges the hard drive for optimized performance. Quickly and permanently removes unwanted Internet cookies, cache, and temporary files that slow your computer’s performance. Speeds up your system by preventing the automatic loading of undesired software applications. Identifies and fixes problems with the Windows registry, system files, and software applications. Searches disks for deleted files and recovers them to their original state (available on XP only). Safely and permanently removes sensitive files from your computer. Allows you to easily see which software processes are running on your system and which ones are affecting its overall performance. Enables you to customize Windows settings according to the way you use your computer Maintains your PC with a click of the button. NEW! Performance Test™ evaluates the performance of your system and hardware and compares it with other systems.*****

Learning On Demand - Step by step : adding free hit counter for your website / blog

Well I try to explain it in step by step mode to make it easy to understand:

1. Find provider first, for this tutorial I choose HitcounterExperts. Go the their website and click on link ‘create a counter‘ or click the picture  Step by step : adding free hit counter for your website / blog

2. Choose one of style provided there, just click on the image or ’see more’ link to see other variation.

free hit counter

3. Pick the style, just click on the picture.

 Step by step : adding free hit counter for your website / blog

4. Fill all required information, like this one. Click on ‘Generate Counter Code

free hit counter

5. Copy and paste created code to your website / blog.

free hit counter

6. For wordpress blog, you can find file ‘footer.php’ and paste the code. Followed by upload it to the host.

Finish

Windows XP Useful Links - Virus threats

Virus Advisory Scan and Remove the Sasser Worm

Sasser exploits a Local Security Authority Subsystem Service (LSASS) issue that was addressed by a security update released in April 2004. This page explains how to recover from infection, including printable steps for users whose computers keep shutting down.

Scan and Clean Mydoom Infections

The Mydoom worm installs a back door that virus writers can use to gain access to infected computers. Microsoft has released a tool to help customers remove the Mydoom and Doomjuice worms from their computers.

Scan and Remove the Blaster Worm

Blaster exploits a security issue related to the Remote Procedure Call (RPC) function that was addressed by security updates released in 2003. This page explains how to end the worm's process and remove it from infected computers.

Scan and Remove Download.Ject Trojan Horses

Download.Ject can install malicious software on the computers of users who visit compromised Web sites. Microsoft has released a tool to help customers detect and remove these hidden programs.

TClocklite

Looking to customize your Task Bar?

Want to change the look of your Clock?

Want to change the look of your Start Button?

Then you want.

TClock

Down Load TClock Here.

TClocklite lets you customize your Start Button, and your Clock. You can even set your Clock to be your Start Button.

Change the Transparency of your Task Bar. Change the wording and picture on your start button.

From Win95 to XP!

Works Great With XP!

To get Tclock to auto start with windows, Simply copy and past the Tclock shortcut into your Start Menus �Startup� Folder.

I Have fully tested this out on XPSP2.

Uses a very small amount of system resources.

RockXP

Recover your WinXP product code and passwords and save your product activation to a file.

Want to turn your brand-new copy of Windows XP into a $200 coaster? Lose the product key. Without it you won't be able to reinstall the OS. Of course there are places you can go online to find serials and cracks, but that involves rummaging around on the seedier side of the Net. Lucky for you, we dug up a simple solution for law-abiding, non-warez-searching computer, and it'll let you recover your product key, as well as system passwords stored in Windows.

There's not much to RockXP. Just launch the executable and agree to the licensing agreement. You can now access several different tabs. Click the "My Product Key" tab to reveal or change your current key. You can also save your Windows product activation to a file so you don't have to activate it again through Microsoft if you want to reinstall WinXP.

Another tab gives you access to various passwords Windows stores on your system -- for instance, the user name and password to sites you've asked IE to remember. You can also recover remote-access passwords.

The last tab is a password generator that'll help you create securer passwords. You can choose how many characters you want for each password and save your passwords to a list for easy access.

RockXP Download

Command Prompt CMD Definitions

Command Definitions
APPEND
Allows programs to open data files in specified directories as if they were in
The current directory.
APPEND [[drive:]path[;...]] [/X[:ON | :OFF]] [/PATH:ON | /PATH:OFF] [/E]
APPEND ;
  [drive:]path Specifies a drive and directory to append.
  /X:ON        Applies appended directories to file searches and
               application execution.
  /X:OFF       Applies appended directories only to requests to open files.
               /X:OFF is the default setting.
  /PATH:ON     Applies appended directories to file requests that already
               specify a path.  /PATH:ON is the default setting.
  /PATH:OFF    Turns off the effect of /PATH:ON.
  /E           Stores a copy of the appended directory list in an environment
               variable named APPEND.  /E may be used only the first time
               you use APPEND after starting your system.
Type APPEND ; to clear the appended directory list.
Type APPEND without parameters to display the appended directory list.
ARP
Displays and modifies the IP-to-Physical address translation tables used by
address resolution protocol (ARP).
ARP -s inet_addr eth_addr [if_addr]
ARP -d inet_addr [if_addr]
ARP -a [inet_addr] [-N if_addr]
  -a            Displays current ARP entries by interrogating the current
                protocol data.  If inet_addr is specified, the IP and Physical
                addresses for only the specified computer are displayed.  If
                more than one network interface uses ARP, entries for each ARP
                table are displayed.
  -g            Same as -a.
  inet_addr     Specifies an internet address.
  -N if_addr    Displays the ARP entries for the network interface specified
                by if_addr.
  -d            Deletes the host specified by inet_addr. inet_addr may be
                wildcarded with * to delete all hosts.
  -s            Adds the host and associates the Internet address inet_addr
                with the Physical address eth_addr.  The Physical address is
                given as 6 hexadecimal bytes separated by hyphens. The entry
                is permanent.
  eth_addr      Specifies a physical address.
  if_addr       If present, this specifies the Internet address of the
                interface whose address translation table should be modified.
                If not present, the first applicable interface will be used.
Example:
  > arp -s 157.55.85.212   00-aa-00-62-c6-09  .... Adds a static entry.
  > arp -a                                    .... Displays the arp table.
ASSOC
Displays or modifies file extension associations
ASSOC [.ext[=[fileType]]]
  .ext      Specifies the file extension to associate the file type with
  fileType  Specifies the file type to associate with the file extension
Type ASSOC without parameters to display the current file associations.
If ASSOC is invoked with just a file extension, it displays the current
file association for that file extension.  Specify nothing for the file
type and the command will delete the association for the file extension.
AT
The AT command schedules commands and programs to run on a computer at     
a specified time and date. The Schedule service must be running to use     
the AT command.
AT [\\computername] [ [id] [/DELETE] | /DELETE [/YES]]
AT [\\computername] time [/INTERACTIVE]
    [ /EVERY:date[,...] | /NEXT:date[,...]] "command"
\\computername     Specifies a remote computer. Commands are scheduled on the
                   local computer if this parameter is omitted.
id                 Is an identification number assigned to a scheduled
                   command.
/delete            Cancels a scheduled command. If id is omitted, all the
                   scheduled commands on the computer are canceled.
/yes               Used with cancel all jobs command when no further
                   confirmation is desired.
time               Specifies the time when command is to run.
/interactive       Allows the job to interact with the desktop of the user  
                   who is logged on at the time the job runs.
/every:date[,...]  Runs the command on each specified day(s) of the week or
                   month. If date is omitted, the current day of the month
                   is assumed.
/next:date[,...]   Runs the specified command on the next occurrence of the
                   day (for example, next Thursday).  If date is omitted, the
                   current day of the month is assumed.
"command"          Is the Windows NT command, or batch program to be run.
ATTRIB
Displays or changes file attributes.
ATTRIB [+R | -R] [+A | -A ] [+S | -S] [+H | -H] [drive:][path][filename]
       [/S [/D]]
  +   Sets an attribute.
  -   Clears an attribute.
  R   Read-only file attribute.
  A   Archive file attribute.
  S   System file attribute.
  H   Hidden file attribute.
  [drive:][path][filename]
      Specifies a file or files for attrib to process.
  /S  Processes matching files in the current folder
      and all subfolders.
  /D  Processes folders as well.
ATMADM
Windows ATM Call Manager
Usage: atmadm [options]
       where options are one or more of:
         -c         List all connections
         -a         List all registered addresses
         -s         Display Statistics
BOOTCFG
BOOTCFG /parameter [arguments]
Description:
    This command line tool can be used to configure, query, change or
    Delete the boot entry settings in the BOOT.INI file.
Parameter List:
    /Copy       Makes a copy of an existing boot entry [operating
                systems] section for which you can add OS options to.
    /Delete     Deletes an existing boot entry in the [operating
                systems] section of the BOOT.INI file. You must specify
                the entry# to delete.
    /Query      Displays the current boot entries and their settings.
    /Raw        Allows the user to specify any switch options to be
                added for a specified boot entry.
    /Timeout    Allows the user to change the Timeout value.
    /Default    Allows the user to change the Default boot entry.
    /EMS        Allows the user to configure the /redirect switch
                for headless support for a boot entry.
    /Debug      Allows the user to specify the port and baudrate for
                remote debugging for a specified boot entry.
    /Addsw      Allows the user to add predefined switches for
                a specific boot entry.
    /Rmsw       Allows the user to remove predefined switches for a
                specific boot entry.
    /Dbg1394    Allows the user to configure 1394 port debugging
                for a specified boot entry.
    /?          Displays this help/usage.
Examples:
    BOOTCFG /Copy /?
    BOOTCFG /Delete /?
    BOOTCFG /Query /?
    BOOTCFG /Raw /?
    BOOTCFG /Timeout /?
    BOOTCFG /EMS /?
    BOOTCFG /Debug /?
    BOOTCFG /Addsw /?
    BOOTCFG /Rmsw /?
    BOOTCFG /Dbg1394 /?
    BOOTCFG /Default /?
    BOOTCFG /?
BREAK
Sets or Clears Extended CTRL+C checking on DOS system
BREAK
This is present for Compatibility with DOS systems. It has no effect
under Windows XP.
If Command Extensions are enabled, and running on the Windows XP
platform, then the BREAK command will enter a hard coded breakpoint
if being debugged by a debugger.
CACLS
Displays or modifies access control lists (ACLs) of files
CACLS filename [/T] [/E] [/C] [/G user:perm] [/R user [...]]
               [/P user:perm [...]] [/D user [...]]
   filename      Displays ACLs.
   /T            Changes ACLs of specified files in
                 the current directory and all subdirectories.
   /E            Edit ACL instead of replacing it.
   /C            Continue on access denied errors.
   /G user:perm  Grant specified user access rights.
                 Perm can be: R  Read
                              W  Write
                              C  Change (write)
                              F  Full control
   /R user          Revoke specified user's access rights (only valid with /E).
   /P user:perm  Replace specified user's access rights.
                 Perm can be: N  None
                              R  Read
                              W  Write
                              C  Change (write)
                              F  Full control
   /D user       Deny specified user access.
Wildcards can be used to specify more that one file in a command.
You can specify more than one user in a command.
Abbreviations:
   CI - Container Inherit.
        The ACE will be inherited by directories.
   OI - Object Inherit.
        The ACE will be inherited by files.
   IO - Inherit Only.
        The ACE does not apply to the current file/directory.
CALL
Calls one batch program from another.
CALL [drive:][path]filename [batch-parameters]
  batch-parameters   Specifies any command-line information required by the
                     batch program.
If Command Extensions are enabled CALL changes as follows:
CALL command now accepts labels as the target of the CALL.  The syntax
is:
    CALL :label arguments
A new batch file context is created with the specified arguments and
control is passed to the statement after the label specified.  You must
"exit" twice by reaching the end of the batch script file twice.  The
first time you read the end, control will return to just after the CALL
statement.  The second time will exit the batch script.  Type GOTO /?
for a description of the GOTO :EOF extension that will allow you to
"return" from a batch script.
In addition, expansion of batch script argument references (%0, %1,
etc.) have been changed as follows:
    %* in a batch script refers to all the arguments (e.g. %1 %2 %3
        %4 %5 ...)
    Substitution of batch parameters (%n) has been enhanced.  You can
    now use the following optional syntax:
        %~1         - expands %1 removing any surrounding quotes (")
        %~f1        - expands %1 to a fully qualified path name
        %~d1        - expands %1 to a drive letter only
        %~p1        - expands %1 to a path only
        %~n1        - expands %1 to a file name only
        %~x1        - expands %1 to a file extension only
        %~s1        - expanded path contains short names only
        %~a1        - expands %1 to file attributes
        %~t1        - expands %1 to date/time of file
        %~z1        - expands %1 to size of file
        %~$PATH:1   - searches the directories listed in the PATH
                       environment variable and expands %1 to the fully
                       qualified name of the first one found.  If the
                       environment variable name is not defined or the
                       file is not found by the search, then this
                       modifier expands to the empty string
    The modifiers can be combined to get compound results:
        %~dp1       - expands %1 to a drive letter and path only
        %~nx1       - expands %1 to a file name and extension only
        %~dp$PATH:1 - searches the directories listed in the PATH
                       environment variable for %1 and expands to the
                       drive letter and path of the first one found.
        %~ftza1     - expands %1 to a DIR like output line
    In the above examples %1 and PATH can be replaced by other
    valid values.  The %~ syntax is terminated by a valid argument
    number.  The %~ modifiers may not be used with %*
CD & CHDIR
Displays the name of or changes the current directory.
CHDIR [/D] [drive:][path]
CHDIR [..]
CD [/D] [drive:][path]
CD [..]
  ..   Specifies that you want to change to the parent directory.
Type CD drive: to display the current directory in the specified drive.
Type CD without parameters to display the current drive and directory.
Use the /D switch to change current drive in addition to changing current
directory for a drive.
If Command Extensions are enabled CHDIR changes as follows:
The current directory string is converted to use the same case as
the on disk names.  So CD C:\TEMP would actually set the current
directory to C:\Temp if that is the case on disk.
CHDIR command does not treat spaces as delimiters, so it is possible to
CD into a subdirectory name that contains a space without surrounding
the name with quotes.  For example:
    cd \winnt\profiles\username\programs\start menu
is the same as:
    cd "\winnt\profiles\username\programs\start menu"
which is what you would have to type if extensions were disabled.
CHCP
Displays or sets the active code page number.
CHCP [nnn]
  nnn   Specifies a code page number.
Type CHCP without a parameter to display the active code page number.
CHKDSK
Checks a disk and displays a status report.
CHKDSK [volume[[path]filename]]] [/F] [/V] [/R] [/X] [/I] [/C] [/L[:size]]
  volume          Specifies the drive letter (followed by a colon),
                  mount point, or volume name.
  filename        FAT/FAT32 only: Specifies the files to check for fragmentation.
  /F              Fixes errors on the disk.
  /V              On FAT/FAT32: Displays the full path and name of every file
                  on the disk.
                  On NTFS: Displays cleanup messages if any.
  /R              Locates bad sectors and recovers readable information
                  (implies /F).
  /L:size         NTFS only:  Changes the log file size to the specified number
                  of kilobytes.  If size is not specified, displays current
                  size.
  /X              Forces the volume to dismount first if necessary.
                  All opened handles to the volume would then be invalid
                  (implies /F).
  /I              NTFS only: Performs a less vigorous check of index entries.
  /C              NTFS only: Skips checking of cycles within the folder
                  structure.
The /I or /C switch reduces the amount of time required to run Chkdsk by
skipping certain checks of the volume.
CHKNTFS
Displays or modifies the checking of disk at boot time.
CHKNTFS volume [...]
CHKNTFS /D
CHKNTFS /T[:time]
CHKNTFS /X volume [...]
CHKNTFS /C volume [...]
  volume         Specifies the drive letter (followed by a colon),
                 mount point, or volume name.
  /D             Restores the machine to the default behavior; all drives are
                 checked at boot time and chkdsk is run on those that are
                 dirty.
  /T:time        Changes the AUTOCHK initiation countdown time to the
                 specified amount of time in seconds.  If time is not
                 specified, displays the current setting.
  /X             Excludes a drive from the default boot-time check.  Excluded
                 drives are not accumulated between command invocations.
  /C             Schedules a drive to be checked at boot time; chkdsk will run
                 if the drive is dirty.
If no switches are specified, CHKNTFS will display if the specified drive is
dirty or scheduled to be checked on next reboot.
CIPHER
Displays or alters the encryption of directories [files] on NTFS partitions.
  CIPHER [/E | /D] [/S:directory] [/A] [/I] [/F] [/Q] [/H] [pathname [...]]
  CIPHER /K
  CIPHER /R:filename
  CIPHER /U [/N]
  CIPHER /W:directory
  CIPHER /X[:efsfile] [filename]
    /A        Operates on files as well as directories. The encrypted file
              could become decrypted when it is modified if the parent
              directory is not encrypted. It is recommended that you encrypt
              the file and the parent directory.
    /D        Decrypts the specified directories. Directories will be marked
              so that files added afterward will not be encrypted.
    /E        Encrypts the specified directories. Directories will be marked
              so that files added afterward will be encrypted.
    /F        Forces the encryption operation on all specified objects, even
              those which are already encrypted.  Already-encrypted objects
              are skipped by default.
    /H        Displays files with the hidden or system attributes.  These
              files are omitted by default.
    /I        Continues performing the specified operation even after errors
              have occurred.  By default, CIPHER stops when an error is
              encountered.
    /K        Creates new file encryption key for the user running CIPHER. If
              this option is chosen, all the other options will be ignored.
    /N        This option only works with /U. This will prevent keys being
              updated. This is used to find all the encrypted files on the
              local drives.
    /Q        Reports only the most essential information.
    /R        Generates an EFS recovery agent key and certificate, then writes
              them to a .PFX file (containing certificate and private key) and
              a .CER file (containing only the certificate). An administrator
              may add the contents of the .CER to the EFS recovery policy to
              create the recovery agent for users, and import the .PFX to
              recover individual files.
    /S        Performs the specified operation on directories in the given
              directory and all subdirectories.
    /U        Tries to touch all the encrypted files on local drives. This will
              update user's file encryption key or recovery agent's key to the
              current ones if they are changed. This option does not work with
              other options except /N.
    /W        Removes data from available unused disk space on the entire
              volume. If this option is chosen, all other options are ignored.
              The directory specified can be anywhere in a local volume. If it
              is a mount point or points to a directory in another volume, the
              data on that volume will be removed.
    /X        Backup EFS certificate and keys into file filename. If efsfile is
              provided, the current user's certificate(s) used to encrypt the
              file will be backed up. Otherwise, the user's current EFS
              certificate and keys will be backed up.
    directory A directory path.
    filename  A filename without extensions.
    pathname  Specifies a pattern, file or directory.
    efsfile   An encrypted file path.
    Used without parameters, CIPHER displays the encryption state of
    the current directory and any files it contains. You may use multiple
    directory names and wildcards.  You must put spaces between multiple
    parameters.
CLS
Clears the screen.
CLS
CMD
Starts a new instance of the Windows XP command interpreter
CMD [/A | /U] [/Q] [/D] [/E:ON | /E:OFF] [/F:ON | /F:OFF] [/V:ON | /V:OFF]
    [[/S] [/C | /K] string]
/C      Carries out the command specified by string and then terminates
/K      Carries out the command specified by string but remains
/S      Modifies the treatment of string after /C or /K (see below)
/Q      Turns echo off
/D      Disable execution of AutoRun commands from registry (see below)
/A      Causes the output of internal commands to a pipe or file to be ANSI
/U      Causes the output of internal commands to a pipe or file to be
        Unicode
/T:fg   Sets the foreground/background colors (see COLOR /? for more info)
/E:ON   Enable command extensions (see below)
/E:OFF  Disable command extensions (see below)
/F:ON   Enable file and directory name completion characters (see below)
/F:OFF  Disable file and directory name completion characters (see below)
/V:ON   Enable delayed environment variable expansion using ! as the
        delimiter. For example, /V:ON would allow !var! to expand the
        variable var at execution time.  The var syntax expands variables
        at input time, which is quite a different thing when inside of a FOR
        loop.
/V:OFF  Disable delayed environment expansion.
Note that multiple commands separated by the command separator '&&'
are accepted for string if surrounded by quotes.  Also, for compatibility
reasons, /X is the same as /E:ON, /Y is the same as /E:OFF and /R is the
same as /C.  Any other switches are ignored.
If /C or /K is specified, then the remainder of the command line after
the switch is processed as a command line, where the following logic is
used to process quote (") characters:
    1.  If all of the following conditions are met, then quote characters
        on the command line are preserved:
        - no /S switch
        - exactly two quote characters
        - no special characters between the two quote characters,
          where special is one of: &<>()@^|
        - there are one or more whitespace characters between the
          the two quote characters
        - the string between the two quote characters is the name
          of an executable file.
    2.  Otherwise, old behavior is to see if the first character is
        a quote character and if so, strip the leading character and
        remove the last quote character on the command line, preserving
        any text after the last quote character.
If /D was NOT specified on the command line, then when CMD.EXE starts, it
looks for the following REG_SZ/REG_EXPAND_SZ registry variables, and if
either or both are present, they are executed first.
    HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\AutoRun
        and/or
    HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun
Command Extensions are enabled by default.  You may also disable
extensions for a particular invocation by using the /E:OFF switch.  You
can enable or disable extensions for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\EnableExtensions
        and/or
    HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions
to either 0x1 or 0x0.  The user specific setting takes precedence over
the machine setting.  The command line switches take precedence over the
registry settings.
The command extensions involve changes and/or additions to the following
commands:
    DEL or ERASE
    COLOR
    CD or CHDIR
    MD or MKDIR
    PROMPT
    PUSHD
    POPD
    SET
    SETLOCAL
    ENDLOCAL
    IF
    FOR
    CALL
    SHIFT
    GOTO
    START (also includes changes to external command invocation)
    ASSOC
    FTYPE
To get specific details, type commandname /? to view the specifics.
Delayed environment variable expansion is NOT enabled by default.  You
can enable or disable delayed environment variable expansion for a
particular invocation of CMD.EXE with the /V:ON or /V:OFF switch.  You
can enable or disable completion for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\DelayedExpansion
        and/or
    HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion
to either 0x1 or 0x0.  The user specific setting takes precedence over
the machine setting.  The command line switches take precedence over the
registry settings.
If delayed environment variable expansion is enabled, then the exclamation
character can be used to substitute the value of an environment variable
at execution time.
File and Directory name completion is NOT enabled by default.  You can
enable or disable file name completion for a particular invocation of
CMD.EXE with the /F:ON or /F:OFF switch.  You can enable or disable
completion for all invocations of CMD.EXE on a machine and/or user logon
session by setting either or both of the following REG_DWORD values in
the registry using REGEDT32.EXE:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\CompletionChar
    HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\PathCompletionChar
        and/or
    HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
    HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar
with the hex value of a control character to use for a particular
function (e.g.  0x4 is Ctrl-D and 0x6 is Ctrl-F).  The user specific
settings take precedence over the machine settings.  The command line
switches take precedence over the registry settings.
If completion is enabled with the /F:ON switch, the two control
characters used are Ctrl-D for directory name completion and Ctrl-F for
file name completion.  To disable a particular completion character in
the registry, use the value for space (0x20) as it is not a valid
control character.
Completion is invoked when you type either of the two control
characters.  The completion function takes the path string to the left
of the cursor appends a wild card character to it if none is already
present and builds up a list of paths that match.  It then displays the
first matching path.  If no paths match, it just beeps and leaves the
display alone.  Thereafter, repeated pressing of the same control
character will cycle through the list of matching paths.  Pressing the
Shift key with the control character will move through the list
backwards.  If you edit the line in any way and press the control
character again, the saved list of matching paths is discarded and a new
one generated.  The same occurs if you switch between file and directory
name completion.  The only difference between the two control characters
is the file completion character matches both file and directory names,
while the directory completion character only matches directory names.
If file completion is used on any of the built in directory commands
(CD, MD or RD) then directory completion is assumed.
The completion code deals correctly with file names that contain spaces
or other special characters by placing quotes around the matching path.
Also, if you back up, then invoke completion from within a line, the
text to the right of the cursor at the point completion was invoked is
discarded.
The special characters that require quotes are:
     <space>
     &()[]{}^=;!'+,`~
CMSTP
Installs or removes a Connection Manager service profile.
    Used without optional parameters, cmstp installs a service profile with default
    settings appropriate to the operating system and to the user's permissions.
  ServiceProfileFileName.exe /q:a
   /c:"cmstp.exe ServiceProfileFileName.inf [/nf] [/ni] [/ns] [/s] [/su] [/u]"
  cmstp.exe [/nf] [/ni] [/ns] [/s] [/su] [/u]
   "[Drive:][Path]ServiceProfileFileName.inf"
  ServiceProfileFileName.exe : Required for Syntax 1 but not valid for Syntax 2.
   Specifies, by name, the installation package that contains the
   profile that you want to install.
  /q:a  Required for Syntax 1 but not valid for Syntax 2.
        Specifies that the profile should be installed without prompting the user.
        The verification message that the installation has succeeded will still appear.
  [Drive:][Path]ServiceProfileFileName.inf : Required. Specifies, by name,
        the configuration file that determines how the profile should be installed.
        The [Drive:][Path] parameter is not valid for Syntax 1.
  /nf   Specifies that the support files should not be installed.
  /ni   Specifies that a desktop icon should not be created.
        This parameter is only valid for Windows 95, 98, NT 4.0, or Windows ME.
  /ns   Specifies that a desktop shortcut should not be created.
        This parameter is only valid for Windows 2000 or XP.
  /s    Specifies that the service profile should be installed or uninstalled silently
        (without prompting for user response or displaying verification message).
        this is the only parameter that you can use in combination with /u.
  /su   Specifies that the service profile should be installed for a single user
        rather than for all users.
        This parameter is only valid for Windows 2000 or XP.
  /u    Specifies that the service profile should be uninstalled.
  /?    Displays help at the command prompt.

� Syntax 1 is the typical syntax used in a custom installation application.
   To use this syntax, you must run cmstp from the directory that
   contains the ServiceProfileFileName.exe file.

COLOR
Sets the default console foreground and background colors.
COLOR [attr]
  attr        Specifies color attribute of console output
Color attributes are specified by TWO hex digits -- the first
corresponds to the background; the second the foreground.  Each digit
can be any of the following values:
    0 = Black       8 = Gray          Also See: 7.4 Color Codes
    1 = Blue        9 = Light Blue
    2 = Green       A = Light Green
    3 = Aqua        B = Light Aqua
    4 = Red         C = Light Red
    5 = Purple      D = Light Purple
    6 = Yellow      E = Light Yellow
    7 = White       F = Bright White
If no argument is given, this command restores the color to what it was
when CMD.EXE started.  This value either comes from the current console
window, the /T command line switch or from the DefaultColor registry
value.
The COLOR command sets ERRORLEVEL to 1 if an attempt is made to execute
the COLOR command with a foreground and background color that are the
same.
Example: "COLOR fc" produces light red on bright white
COMMAND
Starts a new instance of the MS-DOS command interpreter.
COMMAND [[drive:]path] [device] [/E:nnnnn] [/P] [/C string] [/MSG]
  [drive:]path    Specifies the directory containing COMMAND.COM file.
  device          Specifies the device to use for command input and output.
  /E:nnnnn        Sets the initial environment size to nnnnn bytes.
  /P              Makes the new command interpreter permanent (can't exit).
  /C string       Carries out the command specified by string, and then stops.
  /MSG            Specifies that all error messages be stored in memory. You
                  need to specify /P with this switch.
COMP
Compares the contents of two files or sets of files.
COMP [data1] [data2] [/D] [/A] [/L] [/N=number] [/C] [/OFF[LINE]]
  data1      Specifies location and name(s) of first file(s) to compare.
  data2      Specifies location and name(s) of second files to compare.
  /D         Displays differences in decimal format.
  /A         Displays differences in ASCII characters.
  /L         Displays line numbers for differences.
  /N=number  Compares only the first specified number of lines in each file.
  /C         Disregards case of ASCII letters when comparing files.
  /OFF[LINE] Do not skip files with offline attribute set.
To compare sets of files, use wildcards in data1 and data2 parameters.
COMPACT
Displays or alters the compression of files on NTFS partitions.
COMPACT [/C | /U] [/S[:dir]] [/A] [/I] [/F] [/Q] [filename [...]]
  /C        Compresses the specified files.  Directories will be marked
            so that files added afterward will be compressed.
  /U        Uncompresses the specified files.  Directories will be marked
            so that files added afterward will not be compressed.
  /S        Performs the specified operation on files in the given
            directory and all subdirectories.  Default "dir" is the
            current directory.
  /A        Displays files with the hidden or system attributes.  These
            files are omitted by default.
  /I        Continues performing the specified operation even after errors
            have occurred.  By default, COMPACT stops when an error is
            encountered.
  /F        Forces the compress operation on all specified files, even
            those which are already compressed.  Already-compressed files
            are skipped by default.
  /Q        Reports only the most essential information.
  filename  Specifies a pattern, file, or directory.
  Used without parameters, COMPACT displays the compression state of
  the current directory and any files it contains. You may use multiple
  filenames and wildcards.  You must put spaces between multiple
  parameters.
CONVERT
Converts FAT volumes to NTFS.
CONVERT volume /FS:NTFS [/V] [/CvtArea:filename] [/NoSecurity] [/X]
  volume      Specifies the drive letter (followed by a colon),
              mount point, or volume name.
  /FS:NTFS    Specifies that the volume is to be converted to NTFS.
  /V          Specifies that Convert should be run in verbose mode.
  /CvtArea:filename
              Specifies a contiguous file in the root directory to be
              the place holder for NTFS system files.
  /NoSecurity Specifies the converted files and directories security
              settings to be accessible by everyone.
  /X          Forces the volume to dismount first if necessary.
              All opened handles to the volume would then be invalid.
COPY
Copies one or more files to another location.
COPY [/D] [/V] [/N] [/Y | /-Y] [/Z] [/A | /B ] source [/A | /B]
     [+ source [/A | /B] [+ ...]] [destination [/A | /B]]
  source       Specifies the file or files to be copied.
  /A           Indicates an ASCII text file.
  /B           Indicates a binary file.
  /D           Allow the destination file to be created decrypted
  destination  Specifies the directory and/or filename for the new file(s).
  /V           Verifies that new files are written correctly.
  /N           Uses short filename, if available, when copying a file with a
               non-8dot3 name.
  /Y           Suppresses prompting to confirm you want to overwrite an
               existing destination file.
  /-Y          Causes prompting to confirm you want to overwrite an
               existing destination file.
  /Z           Copies networked files in restartable mode.
The switch /Y may be preset in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.  Default is
to prompt on overwrites unless COPY command is being executed from
within a batch script.
To append files, specify a single file for destination, but multiple files
for source (using wildcards or file1+file2+file3 format).
CSCRIPT
Microsoft (R) Windows Script Host
Usage: CScript scriptname.extension [option...] [arguments...]
Options:
 //B         Batch mode: Suppresses script errors and prompts from displaying
 //D         Enable Active Debugging
 //E:engine  Use engine for executing script
 //H:CScript Changes the default script host to CScript.exe
 //H:WScript Changes the default script host to WScript.exe (default)
 //I         Interactive mode (default, opposite of //B)
 //Job:xxxx  Execute a WSF job
 //Logo      Display logo (default)
 //Nologo    Prevent logo display: No banner will be shown at execution time
 //S         Save current command line options for this user
 //T:nn      Time out in seconds:  Maximum time a script is permitted to run
 //X         Execute script in debugger
 //U         Use Unicode for redirected I/O from the console
DATE
Displays or sets the date.
DATE [/T | date]
Type DATE without parameters to display the current date setting and
a prompt for a new one.  Press ENTER to keep the same date.
If Command Extensions are enabled the DATE command supports
the /T switch which tells the command to just output the
current date, without prompting for a new date.
DEBUG
Runs Debug, a program testing and editing tool.
DEBUG [[drive:][path]filename [testfile-parameters]]
  [drive:][path]filename  Specifies the file you want to test.
  testfile-parameters     Specifies command-line information required by
                          the file you want to test.
After Debug starts, type ? to display a list of debugging commands.
DEL & ERASE
Deletes one or more files.
DEL [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names
ERASE [/P] [/F] [/S] [/Q] [/A[[:]attributes]] names
  names         Specifies a list of one or more files or directories.
                Wildcards may be used to delete multiple files. If a
                directory is specified, all files within the directory
                will be deleted.
  /P            Prompts for confirmation before deleting each file.
  /F            Force deleting of read-only files.
  /S            Delete specified files from all subdirectories.
  /Q            Quiet mode, do not ask if ok to delete on global wildcard
  /A            Selects files to delete based on attributes
  attributes    R  Read-only files            S  System files
                H  Hidden files               A  Files ready for archiving
                -  Prefix meaning not
If Command Extensions are enabled DEL and ERASE change as follows:
The display semantics of the /S switch are reversed in that it shows
you only the files that are deleted, not the ones it could not find.
EVENTCREATE
This command line tool enables an administrator to create
    a custom event ID and message in a specified event log.
    EVENTCREATE [/S system [/U username [/P [password]]]] /ID eventid
            [/L logname] [/SO srcname] /T type /D description
    /S    system           Specifies the remote system to connect to.
    /U    [domain\]user    Specifies the user context under which
                           the command should execute.
    /P    [password]       Specifies the password for the given
                           user context. Prompts for input if omitted.
    /L    logname          Specifies the event log to create
                           an event in.
    /T    type             Specifies the type of event to create.
                           Valid types: ERROR, WARNING, INFORMATION.
    /SO   source           Specifies the source to use for the
                           event. A valid source can be any string
                           and should represent the application or
                           component that is generating the event.
    /ID   id               Specifies the event ID for the event. A
                           valid custom message ID is in the range
                           of 1 - 1000.
    /D    description      Specifies the description to be set for
                           the newly creating event.
    /?                     Displays this help/usage.
    EVENTCREATE /T ERROR /ID 100
        /L APPLICATION /D "Create an event in application log"
    EVENTCREATE /T ERROR /ID 999 /L APPLICATION
        /SO WinWord /D "new source Winword in application log"
    EVENTCREATE /S system /T ERROR /ID 100
        /L APPLICATION /D "Remote system without user credentials"
    EVENTCREATE /S system /U user /P password /ID 100 /T ERROR
        /L APPLICATION /D "Remote machine with user credentials"
    EVENTCREATE /S system /U domain\user /ID 100 /T WARNING
        /SO MyBatchFile.cmd /D "Maintenance script user logon failed"
DIR
Displays a list of files and subdirectories in a directory.
DIR [drive:][path][filename] [/A[[:]attributes]] [/B] [/C] [/D] [/L] [/N]
  [/O[[:]sortorder]] [/P] [/Q] [/S] [/T[[:]timefield]] [/W] [/X] [/4]
  [drive:][path][filename]
              Specifies drive, directory, and/or files to list.
  /A          Displays files with specified attributes.
  attributes   D  Directories                R  Read-only files
               H  Hidden files               A  Files ready for archiving
               S  System files               -  Prefix meaning not
  /B          Uses bare format (no heading information or summary).
  /C          Display the thousand separator in file sizes.  This is the
              default.  Use /-C to disable display of separator.
  /D          Same as wide but files are list sorted by column.
  /L          Uses lowercase.
  /N          New long list format where filenames are on the far right.
  /O          List by files in sorted order.
  sortorder    N  By name (alphabetic)       S  By size (smallest first)
               E  By extension (alphabetic)  D  By date/time (oldest first)
               G  Group directories first    -  Prefix to reverse order
  /P          Pauses after each screenful of information.
  /Q          Display the owner of the file.
  /S          Displays files in specified directory and all subdirectories.
  /T          Controls which time field displayed or used for sorting
  timefield   C  Creation
              A  Last Access
              W  Last Written
  /W          Uses wide list format.
  /X          This displays the short names generated for non-8dot3 file
              names.  The format is that of /N with the short name inserted
              before the long name. If no short name is present, blanks are
              displayed in its place.
  /4          Displays four-digit years
Switches may be preset in the DIRCMD environment variable.  Override
preset switches by prefixing any switch with - (hyphen)--for example, /-W.
DEFRAG
Windows Disk Defragmenter
Usage:
defrag  [-a] [-f] [-v] [-?]
  volume  drive letter or mount point (d: or d:\vol\mountpoint)
  -a      Analyze only
  -f      Force defragmentation even if free space is low
  -v      Verbose output
  -?      Display this help text
DISKCOMP
Compares the contents of two floppy disks.
DISKCOMP [drive1: [drive2:]]
DISKCOPY
Copies the contents of one floppy disk to another.
DISKCOPY [drive1: [drive2:]] [/V]
  /V   Verifies that the information is copied correctly.
The two floppy disks must be the same type.
You may specify the same drive for drive1 and drive2.
DISKPART
Microsoft DiskPart
        diskpart [/s <script>] [/?]
        /s <script> - Use a DiskPart script.
        /?          - Show help screen.
DOSKEY
Edits command lines, recalls Windows XP commands, and creates macros.
DOSKEY [/REINSTALL] [/LISTSIZE=size] [/MACROS[:ALL | :exename]]
  [/HISTORY] [/INSERT | /OVERSTRIKE] [/EXENAME=exename] [/MACROFILE=filename]
  [macroname=[text]]
  /REINSTALL          Installs a new copy of Doskey.
  /LISTSIZE=size      Sets size of command history buffer.
  /MACROS             Displays all Doskey macros.
  /MACROS:ALL         Displays all Doskey macros for all executables which have
                      Doskey macros.
  /MACROS:exename     Displays all Doskey macros for the given executable.
  /HISTORY            Displays all commands stored in memory.
  /INSERT             Specifies that new text you type is inserted in old text.
  /OVERSTRIKE         Specifies that new text overwrites old text.
  /EXENAME=exename    Specifies the executable.
  /MACROFILE=filename Specifies a file of macros to install.
  macroname           Specifies a name for a macro you create.
  text                Specifies commands you want to record.
UP and DOWN ARROWS recall commands; ESC clears command line; F7 displays
command history; ALT+F7 clears command history; F8 searches command
history; F9 selects a command by number; ALT+F10 clears macro definitions.
The following are some special codes in Doskey macro definitions:
$T     Command separator.  Allows multiple commands in a macro.
$1-$9  Batch parameters.  Equivalent to %1-%9 in batch programs.
$*     Symbol replaced by everything following macro name on command line.
DRIVERQUERY
Enables an administrator to enumerate and display the list of
    installed device drivers as well as their properties.
DRIVERQUERY [/S system [/U username [/P [password]]]]
              [/FO format] [/NH] [/SI] [/V]
Parameter List:
      /S     system           Specifies the remote system to connect to.
      /U     [domain\]user    Specifies the user context
                              under which the command should execute.
      /P     [password]       Specify the Password for the given
                              user context. Prompts for input if omitted.
      /FO    format           Specifies the type of output to display.
                              Valid values to be passed with the
                              switch are "TABLE", "LIST", "CSV".
      /NH                     Specifies that the "Column Header"
                              should not be displayed in the
                              screen output. Valid for "TABLE"
                              and "CSV" format only.
      /V                      Displays detailed information. Not valid
                              for signed drivers.
      /SI                     Provides information about signed drivers.
      /?                      Displays this Help/Usage.
Examples:
    DRIVERQUERY
    DRIVERQUERY /FO CSV /SI
    DRIVERQUERY /NH
    DRIVERQUERY /S ipaddress /U user  /V
    DRIVERQUERY /S system /U domain\user /P password /FO LIST
ECHO
Displays messages, or turns command-echoing on or off.
  ECHO [ON | OFF]
  ECHO [message]
Type ECHO without parameters to display the current echo setting.
EDIT
MS-DOS Editor

EDIT [/B] [/H] [/R] [/S] [/<nnn>] [/?] [file(s)]

  /B       - Forces monochrome mode.
  /H       - Displays the maximum number of lines possible for your hardware.
  /R       - Load file(s) in read-only mode.
  /S       - Forces the use of short filenames.
  /<nnn>   - Load binary file(s), wrapping lines to <nnn> characters wide.
  /?       - Displays this help screen.
  [file]   - Specifies initial files(s) to load.  Wildcards and multiple
             filespecs can be given.
EDLIN
Starts Edlin, a line-oriented text editor.
EDLIN [drive:][path]filename [/B]
  /B   Ignores end-of-file (CTRL+Z) characters.
ENDLOCAL
Ends localization of environment changes in a batch file.
Environment changes made after ENDLOCAL has been issued are
not local to the batch file; the previous settings are not
restored on termination of the batch file.
ENDLOCAL
If Command Extensions are enabled ENDLOCAL changes as follows:
If the corresponding SETLOCAL enable or disabled command extensions
using the new ENABLEEXTENSIONS or DISABLEEXTENSIONS options, then
after the ENDLOCAL, the enabled/disabled state of command extensions
will be restored to what it was prior to the matching SETLOCAL
command execution.
EXIT
Quits the CMD.EXE program (command interpreter) or the current batch
script.
EXIT [/B] [exitCode]
  /B          specifies to exit the current batch script instead of
              CMD.EXE.  If executed from outside a batch script, it
              will quit CMD.EXE
  exitCode    specifies a numeric number.  if /B is specified, sets
              ERRORLEVEL that number.  If quitting CMD.EXE, sets the process
              exit code with that number.
FC
Compares two files or sets of files and displays the differences between
them
FC [/A] [/C] [/L] [/LBn] [/N] [/OFF[LINE]] [/T] [/U] [/W] [/nnnn]
   [drive1:][path1]filename1 [drive2:][path2]filename2
FC /B [drive1:][path1]filename1 [drive2:][path2]filename2
  /A         Displays only first and last lines for each set of differences.
  /B         Performs a binary comparison.
  /C         Disregards the case of letters.
  /L         Compares files as ASCII text.
  /LBn       Sets the maximum consecutive mismatches to the specified
             number of lines.
  /N         Displays the line numbers on an ASCII comparison.
  /OFF[LINE] Do not skip files with offline attribute set.
  /T         Does not expand tabs to spaces.
  /U         Compare files as UNICODE text files.
  /W         Compresses white space (tabs and spaces) for comparison.
  /nnnn      Specifies the number of consecutive lines that must match
             after a mismatch.
  [drive1:][path1]filename1
             Specifies the first file or set of files to compare.
  [drive2:][path2]filename2
             Specifies the second file or set of files to compare.
FIND
Searches for a text string in a file or files.
FIND [/V] [/C] [/N] [/I] [/OFF[LINE]] "string" [[drive:][path]filename[ ...]]
  /V         Displays all lines NOT containing the specified string.
  /C         Displays only the count of lines containing the string.
  /N         Displays line numbers with the displayed lines.
  /I         Ignores the case of characters when searching for the string.
  /OFF[LINE] Do not skip files with offline attribute set.
  "string"   Specifies the text string to find.
  [drive:][path]filename
             Specifies a file or files to search.
If a path is not specified, FIND searches the text typed at the prompt
or piped from another command.
FINDSTR
Searches for strings in files.
FINDSTR [/B] [/E] [/L] [/R] [/S] [/I] [/X] [/V] [/N] [/M] [/O] [/P] [/F:file]
        [/C:string] [/G:file] [/D:dir list] [/A:color attributes] [/OFF[LINE]]
        strings [[drive:][path]filename[ ...]]
  /B         Matches pattern if at the beginning of a line.
  /E         Matches pattern if at the end of a line.
  /L         Uses search strings literally.
  /R         Uses search strings as regular expressions.
  /S         Searches for matching files in the current directory and all
             subdirectories.
  /I         Specifies that the search is not to be case-sensitive.
  /X         Prints lines that match exactly.
  /V         Prints only lines that do not contain a match.
  /N         Prints the line number before each line that matches.
  /M         Prints only the filename if a file contains a match.
  /O         Prints character offset before each matching line.
  /P         Skip files with non-printable characters.
  /OFF[LINE] Do not skip files with offline attribute set.
  /A:attr    Specifies color attribute with two hex digits. See "color /?"
  /F:file    Reads file list from the specified file(/ stands for console).
  /C:string  Uses specified string as a literal search string.
  /G:file    Gets search strings from the specified file(/ stands for console).
  /D:dir     Search a semicolon delimited list of directories
  strings    Text to be searched for.
  [drive:][path]filename
             Specifies a file or files to search.
Use spaces to separate multiple search strings unless the argument is prefixed
with /C.  For example, 'FINDSTR "hello there" x.y' searches for "hello" or
"there" in file x.y.  'FINDSTR /C:"hello there" x.y' searches for
"hello there" in file x.y.
Regular expression quick reference:
  .        Wildcard: any character
  *        Repeat: zero or more occurances of previous character or class
  ^        Line position: beginning of line
  $        Line position: end of line
  [class]  Character class: any one character in set
  [^class] Inverse class: any one character not in set
  [x-y]    Range: any characters within the specified range
  \x       Escape: literal use of metacharacter x
  \<xyz    Word position: beginning of word
  xyz\>   Word position: end of word
For full information on FINDSTR regular expressions refer to the online Command
Reference.
FOR
Runs a specified command for each file in a set of files.
FOR %variable IN (set) DO command [command-parameters]
  %variable  Specifies a single letter replaceable parameter.
  (set)      Specifies a set of one or more files.  Wildcards may be used.
  command    Specifies the command to carry out for each file.
  command-parameters
             Specifies parameters or switches for the specified command.
To use the FOR command in a batch program, specify %%variable instead
of %variable.  Variable names are case sensitive, so %i is different
from %I.
If Command Extensions are enabled, the following additional
forms of the FOR command are supported:
FOR /D %variable IN (set) DO command [command-parameters]
    If set contains wildcards, then specifies to match against directory
    names instead of file names.
FOR /R [[drive:]path] %variable IN (set) DO command [command-parameters]
    Walks the directory tree rooted at [drive:]path, executing the FOR
    statement in each directory of the tree.  If no directory
    specification is specified after /R then the current directory is
    assumed.  If set is just a single period (.) character then it
    will just enumerate the directory tree.
FOR /L %variable IN (start,step,end) DO command [command-parameters]
    The set is a sequence of numbers from start to end, by step amount.
    So (1,1,5) would generate the sequence 1 2 3 4 5 and (5,-1,1) would
    generate the sequence (5 4 3 2 1)
FOR /F ["options"] %variable IN (file-set) DO command [command-parameters]
FOR /F ["options"] %variable IN ("string") DO command [command-parameters]
FOR /F ["options"] %variable IN ('command') DO command [command-parameters]
    or, if usebackq option present:
FOR /F ["options"] %variable IN (file-set) DO command [command-parameters]
FOR /F ["options"] %variable IN ('string') DO command [command-parameters]
FOR /F ["options"] %variable IN (`command`) DO command [command-parameters]
    filenameset is one or more file names.  Each file is opened, read
    and processed before going on to the next file in filenameset.
    Processing consists of reading in the file, breaking it up into
    individual lines of text and then parsing each line into zero or
    more tokens.  The body of the for loop is then called with the
    variable value(s) set to the found token string(s).  By default, /F
    passes the first blank separated token from each line of each file.
    Blank lines are skipped.  You can override the default parsing
    behavior by specifying the optional "options" parameter.  This
    is a quoted string which contains one or more keywords to specify
    different parsing options.  The keywords are:
        eol=c           - specifies an end of line comment character
                          (just one)
        skip=n          - specifies the number of lines to skip at the
                          beginning of the file.
        delims=xxx      - specifies a delimiter set.  This replaces the
                          default delimiter set of space and tab.
        tokens=x,y,m-n  - specifies which tokens from each line are to
                          be passed to the for body for each iteration.
                          This will cause additional variable names to
                          be allocated.  The m-n form is a range,
                          specifying the mth through the nth tokens.  If
                          the last character in the tokens= string is an
                          asterisk, then an additional variable is
                          allocated and receives the remaining text on
                          the line after the last token parsed.
        usebackq        - specifies that the new semantics are in force,
                          where a back quoted string is executed as a
                          command and a single quoted string is a
                          literal string command and allows the use of
                          double quotes to quote file names in
                          filenameset.
    Some examples might help:
FOR /F "eol=; tokens=2,3* delims=, " %i in (myfile.txt) do @echo %i %j %k
    would parse each line in myfile.txt, ignoring lines that begin with
    a semicolon, passing the 2nd and 3rd token from each line to the for
    body, with tokens delimited by commas and/or spaces.  Notice the for
    body statements reference %i to get the 2nd token, %j to get the
    3rd token, and %k to get all remaining tokens after the 3rd.  For
    file names that contain spaces, you need to quote the filenames with
    double quotes.  In order to use double quotes in this manner, you also
    need to use the usebackq option, otherwise the double quotes will be
    interpreted as defining a literal string to parse.
    %i is explicitly declared in the for statement and the %j and %k
    are implicitly declared via the tokens= option.  You can specify up
    to 26 tokens via the tokens= line, provided it does not cause an
    attempt to declare a variable higher than the letter 'z' or 'Z'.
    Remember, FOR variables are single-letter, case sensitive, global,
    and you can't have more than 52 total active at any one time.
    You can also use the FOR /F parsing logic on an immediate string, by
    making the filenameset between the parenthesis a quoted string,
    using single quote characters.  It will be treated as a single line
    of input from a file and parsed.
    Finally, you can use the FOR /F command to parse the output of a
    command.  You do this by making the filenameset between the
    parenthesis a back quoted string.  It will be treated as a command
    line, which is passed to a child CMD.EXE and the output is captured
    into memory and parsed as if it was a file.  So the following
    example:
      FOR /F "usebackq delims==" %i IN (`set`) DO @echo %i
    would enumerate the environment variable names in the current
    environment.
In addition, substitution of FOR variable references has been enhanced.
You can now use the following optional syntax:
    %~I         - expands %I removing any surrounding quotes (")
    %~fI        - expands %I to a fully qualified path name
    %~dI        - expands %I to a drive letter only
    %~pI        - expands %I to a path only
    %~nI        - expands %I to a file name only
    %~xI        - expands %I to a file extension only
    %~sI        - expanded path contains short names only
    %~aI        - expands %I to file attributes of file
    %~tI        - expands %I to date/time of file
    %~zI        - expands %I to size of file
    %~$PATH:I   - searches the directories listed in the PATH
                   environment variable and expands %I to the
                   fully qualified name of the first one found.
                   If the environment variable name is not
                   defined or the file is not found by the
                   search, then this modifier expands to the
                   empty string
The modifiers can be combined to get compound results:
    %~dpI       - expands %I to a drive letter and path only
    %~nxI       - expands %I to a file name and extension only
    %~fsI       - expands %I to a full path name with short names only
    %~dp$PATH:I - searches the directories listed in the PATH
                   environment variable for %I and expands to the
                   drive letter and path of the first one found.
    %~ftzaI     - expands %I to a DIR like output line
In the above examples %I and PATH can be replaced by other valid
values.  The %~ syntax is terminated by a valid FOR variable name.
Picking upper case variable names like %I makes it more readable and
avoids confusion with the modifiers, which are not case sensitive.
FORMAT
Formats a disk for use with Windows XP.
FORMAT volume [/FS:file-system] [/V:label] [/Q] [/A:size] [/C] [/X]
FORMAT volume [/V:label] [/Q] [/F:size]
FORMAT volume [/V:label] [/Q] [/T:tracks /N:sectors]
FORMAT volume [/V:label] [/Q]
FORMAT volume [/Q]
  volume          Specifies the drive letter (followed by a colon),
                  mount point, or volume name.
  /FS:filesystem  Specifies the type of the file system (FAT, FAT32, or NTFS).
  /V:label        Specifies the volume label.
  /Q              Performs a quick format.
  /C              NTFS only: Files created on the new volume will be compressed
                  by default.
  /X              Forces the volume to dismount first if necessary.  All opened
                  handles to the volume would no longer be valid.
  /A:size         Overrides the default allocation unit size. Default settings
                  are strongly recommended for general use.
                  NTFS supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K.
                  FAT supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,
                  (128K, 256K for sector size > 512 bytes).
                  FAT32 supports 512, 1024, 2048, 4096, 8192, 16K, 32K, 64K,
                  (128K, 256K for sector size > 512 bytes).
                  Note that the FAT and FAT32 files systems impose the
                  following restrictions on the number of clusters on a volume:
                  FAT: Number of clusters <= 65526
                  FAT32: 65526 < Number of clusters < 4177918
                  Format will immediately stop processing if it decides that
                  the above requirements cannot be met using the specified
                  cluster size.
                  NTFS compression is not supported for allocation unit sizes
                  above 4096.
  /F:size         Specifies the size of the floppy disk to format (1.44)
  /T:tracks       Specifies the number of tracks per disk side.
  /N:sectors      Specifies the number of sectors per track.
FTP
Transfers files to and from a computer running an FTP server service
(sometimes called a daemon). Ftp can be used interactively.
FTP [-v] [-d] [-i] [-n] [-g] [-s:filename] [-a] [-w:windowsize] [-A] [host]
  -v             Suppresses display of remote server responses.
  -n             Suppresses auto-login upon initial connection.
  -i             Turns off interactive prompting during multiple file
                 transfers.
  -d             Enables debugging.
  -g             Disables filename globbing (see GLOB command).
  -s:filename    Specifies a text file containing FTP commands; the
                 commands will automatically run after FTP starts.
  -a             Use any local interface when binding data connection.
  -A             login as anonymous.
  -w:buffersize  Overrides the default transfer buffer size of 4096.
  host           Specifies the host name or IP address of the remote
                 host to connect to.
Notes:
  - mget and mput commands take y/n/q for yes/no/quit.
  - Use Control-C to abort commands.
Also See: FTP Commands
FTYPE
Displays or modifies file types used in file extension associations
FTYPE [fileType[=[openCommandString]]]
  fileType  Specifies the file type to examine or change
  openCommandString Specifies the open command to use when launching files
                    of this type.
Type FTYPE without parameters to display the current file types that
have open command strings defined.  FTYPE is invoked with just a file
type, it displays the current open command string for that file type.
Specify nothing for the open command string and the FTYPE command will
delete the open command string for the file type.  Within an open
command string %0 or %1 are substituted with the file name being
launched through the assocation.  %* gets all the parameters and %2
gets the 1st parameter, %3 the second, etc.  %~n gets all the remaining
parameters starting with the nth parameter, where n may be between 2 and 9,
inclusive.  For example:
    ASSOC .pl=PerlScript
    FTYPE PerlScript=perl.exe %1 %*
would allow you to invoke a Perl script as follows:
    script.pl 1 2 3
If you want to eliminate the need to type the extensions, then do the
following:
    set PATHEXT=.pl;%PATHEXT%
and the script could be invoked as follows:
    script 1 2 3
GOTO
Directs cmd.exe to a labeled line in a batch program.
GOTO label
  label   Specifies a text string used in the batch program as a label.
You type a label on a line by itself, beginning with a colon.
If Command Extensions are enabled GOTO changes as follows:
GOTO command now accepts a target label of :EOF which transfers control
to the end of the current batch script file.  This is an easy way to
exit a batch script file without defining a label.  Type CALL /?  for a
description of extensions to the CALL command that make this feature
useful.
GRAFTABL
Enable Windows to display an extended character set in graphics mode.
GRAFTABL [xxx]
GRAFTABL /STATUS
   xxx      Specifies a code page number.
   /STATUS  Displays the current code page selected for use with GRAFTABL.
HELP
Provides help information for Windows XP commands.
HELP [command]
    command - displays help information on that command.
IF
Performs conditional processing in batch programs.
IF [NOT] ERRORLEVEL number command
IF [NOT] string1==string2 command
IF [NOT] EXIST filename command
  NOT               Specifies that Windows XP should carry out
                    the command only if the condition is false.
  ERRORLEVEL number Specifies a true condition if the last program run
                    returned an exit code equal to or greater than the number
                    specified.
  string1==string2  Specifies a true condition if the specified text strings
                    match.
  EXIST filename    Specifies a true condition if the specified filename
                    exists.
  command           Specifies the command to carry out if the condition is
                    met.  Command can be followed by ELSE command which
                    will execute the command after the ELSE keyword if the
                    specified condition is FALSE
The ELSE clause must occur on the same line as the command after the IF.  For
example:
    IF EXIST filename. (
        del filename.
    ) ELSE (
        echo filename. missing.
    )
The following would NOT work because the del command needs to be terminated
by a newline:
    IF EXIST filename. del filename. ELSE echo filename. missing
Nor would the following work, since the ELSE command must be on the same line
as the end of the IF command:
    IF EXIST filename. del filename.
    ELSE echo filename. missing
The following would work if you want it all on one line:
    IF EXIST filename. (del filename.) ELSE echo filename. missing
If Command Extensions are enabled IF changes as follows:
    IF [/I] string1 compare-op string2 command
    IF CMDEXTVERSION number command
    IF DEFINED variable command
where compare-op may be one of:
    EQU - equal
    NEQ - not equal
    LSS - less than
    LEQ - less than or equal
    GTR - greater than
    GEQ - greater than or equal
and the /I switch, if specified, says to do case insensitive string
compares.  The /I switch can also be used on the string1==string2 form
of IF.  These comparisons are generic, in that if both string1 and
string2 are both comprised of all numeric digits, then the strings are
converted to numbers and a numeric comparison is performed.
The CMDEXTVERSION conditional works just like ERRORLEVEL, except it is
comparing against an internal version number associated with the Command
Extensions.  The first version is 1.  It will be incremented by one when
significant enhancements are added to the Command Extensions.
CMDEXTVERSION conditional is never true when Command Extensions are
disabled.
The DEFINED conditional works just like EXISTS except it takes an
environment variable name and returns true if the environment variable
is defined.
%ERRORLEVEL% will expand into a string representation of
the current value of ERRORLEVEL, provided that there is not already
an environment variable with the name ERRORLEVEL, in which case you
will get its value instead.  After running a program, the following
illustrates ERRORLEVEL use:
    goto answer%ERRORLEVEL%
    :answer0
    echo Program had return code 0
    :answer1
    echo Program had return code 1
You can also using the numerical comparisons above:
    IF %ERRORLEVEL% LEQ 1 goto okay
%CMDCMDLINE% will expand into the original command line passed to
CMD.EXE prior to any processing by CMD.EXE, provided that there is not
already an environment variable with the name CMDCMDLINE, in which case
you will get its value instead.
%CMDEXTVERSION% will expand into a string representation of the
current value of CMDEXTVERSION, provided that there is not already
an environment variable with the name CMDEXTVERSION, in which case you
will get its value instead.
IPCONFIG
IP Configuration
IPCONFIG [/? | /all | /renew [adapter] | /release [adapter] |
              /flushdns | /displaydns | /registerdns |
              /showclassid adapter |
              /setclassid adapter [classid] ]
    adapter         Connection name
                   (wildcard characters * and ? allowed, see examples)
    Options:
       /?           Display this help message
       /all         Display full configuration information.
       /release     Release the IP address for the specified adapter.
       /renew       Renew the IP address for the specified adapter.
       /flushdns    Purges the DNS Resolver cache.
       /registerdns Refreshes all DHCP leases and re-registers DNS names
       /displaydns  Display the contents of the DNS Resolver Cache.
       /showclassid Displays all the dhcp class IDs allowed for adapter.
       /setclassid  Modifies the dhcp class id. 
The default is to display only the IP address, subnet mask and
default gateway for each adapter bound to TCP/IP.
For Release and Renew, if no adapter name is specified, then the IP address
leases for all adapters bound to TCP/IP will be released or renewed.
For Setclassid, if no ClassId is specified, then the ClassId is removed.
Examples:
    > ipconfig                   ... Show information.
    > ipconfig /all              ... Show detailed information
    > ipconfig /renew            ... renew all adapters
    > ipconfig /renew EL*        ... renew any connection that has its
                                     name starting with EL
    > ipconfig /release *Con*    ... release all matching connections,
                                     eg. "Local Area Connection 1" or
                                         "Local Area Connection 2"
KB16
Configures a keyboard for a specific language.
KB16 [xx[,[yyy][,[drive:][path]filename]]] [/E] [/ID:nnn]
  xx                      Specifies a two-letter keyboard code.
  yyy                     Specifies the code page for the character set.
  [drive:][path]filename  Specifies the keyboard definition file.
  /E                      Specifies that an enhanced keyboard is installed.
  /ID:nnn                 Specifies the keyboard in use.
LABEL
Creates, changes, or deletes the volume label of a disk.
LABEL [drive:][label]
LABEL [/MP] [volume] [label]
  drive:          Specifies the drive letter of a drive.
  label           Specifies the label of the volume.
  /MP             Specifies that the volume should be treated as a
                  mount point or volume name.
  volume          Specifies the drive letter (followed by a colon),
                  mount point, or volume name.  If volume name is specified,
                  the /MP flag is unnecessary.
LOADFIX
Loads a program above the first 64K of memory, and runs the program.
LOADFIX [drive:][path]filename
Use LOADFIX to load a program if you have received the message
"Packed file corrupt" when trying to load it in low memory.
MD & MKDIR
Creates a directory.
MKDIR [drive:]path
MD [drive:]path
If Command Extensions are enabled MKDIR changes as follows:
MKDIR creates any intermediate directories in the path, if needed.
For example, assume \a does not exist then:
    mkdir \a\b\c\d
is the same as:
    mkdir \a
    chdir \a
    mkdir b
    chdir b
    mkdir c
    chdir c
    mkdir d
which is what you would have to type if extensions were disabled.
MODE
Configures system devices.
Serial port:       MODE COMm[:] [BAUD=b] [PARITY=p] [DATA=d] [STOP=s]
                                [to=on|off] [xon=on|off] [odsr=on|off]
                                [octs=on|off] [dtr=on|off|hs]
                                [rts=on|off|hs|tg] [idsr=on|off]
Device Status:     MODE [device] [/STATUS]
Redirect printing: MODE LPTn[:]=COMm[:]
Select code page:  MODE CON[:] CP SELECT=yyy
Code page status:  MODE CON[:] CP [/STATUS]
Display mode:      MODE CON[:] [COLS=c] [LINES=n]
Typematic rate:    MODE CON[:] [RATE=r DELAY=d]
MEM
Displays the amount of used and free memory in your system.
MEM [/PROGRAM | /DEBUG | /CLASSIFY]
  /PROGRAM or /P   Displays status of programs currently loaded in memory.
  /DEBUG or /D     Displays status of programs, internal drivers, and other
                   information.
  /CLASSIFY or /C  Classifies programs by memory usage. Lists the size of
                   programs, provides a summary of memory in use, and lists
                   largest memory block available.
MORE
Displays output one screen at a time.
MORE [/E [/C] [/P] [/S] [/Tn] [+n]] < [drive:][path]filename
command-name | MORE [/E [/C] [/P] [/S] [/Tn] [+n]]
MORE /E [/C] [/P] [/S] [/Tn] [+n] [files]
    [drive:][path]filename  Specifies a file to display one
                            screen at a time.
    command-name            Specifies a command whose output
                            will be displayed.
    /E      Enable extended features
    /C      Clear screen before displaying page
    /P      Expand FormFeed characters
    /S      Squeeze multiple blank lines into a single line
    /Tn     Expand tabs to n spaces (default 8)
            Switches can be present in the MORE environment
            variable.
    +n      Start displaying the first file at line n
    files   List of files to be displayed. Files in the list
            are separated by blanks.
    If extended features are enabled, the following commands
    are accepted at the -- More -- prompt:
    P n     Display next n lines
    S n     Skip next n lines
    F       Display next file
    Q       Quit
    =       Show line number
    ?       Show help line
    <space> Display next page
    <ret>   Display next line
MOVE
Moves files and renames files and directories.
To move one or more files:
MOVE [/Y | /-Y] [drive:][path]filename1[,...] destination
To rename a directory:
MOVE [/Y | /-Y] [drive:][path]dirname1 dirname2
  [drive:][path]filename1 Specifies the location and name of the file
                          or files you want to move.
  destination             Specifies the new location of the file. Destination
                          can consist of a drive letter and colon, a
                          directory name, or a combination. If you are moving
                          only one file, you can also include a filename if
                          you want to rename the file when you move it.
  [drive:][path]dirname1  Specifies the directory you want to rename.
  dirname2                Specifies the new name of the directory.
  /Y                      Suppresses prompting to confirm you want to
                          overwrite an existing destination file.
  /-Y                     Causes prompting to confirm you want to overwrite
                          an existing destination file.
The switch /Y may be present in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.  Default is
to prompt on overwrites unless MOVE command is being executed from
within a batch script.
PATH
Displays or sets a search path for executable files.
PATH [[drive:]path[;...][;%PATH%]
PATH ;
Type PATH ; to clear all search-path settings and direct cmd.exe to search
only in the current directory.
Type PATH without parameters to display the current path.
Including %PATH% in the new path setting causes the old path to be
appended to the new setting.
PAUSE
Suspends processing of a batch program and displays the message
    Press any key to continue . . .           
    PAUSE
PING
PING  [-t] [-a] [-n count] [-l size] [-f] [-i TTL] [-v TOS]
      [-r count] [-s count] [[-j host-list] | [-k host-list]]
      [-w timeout] destination-list
Options:
    -t             Ping the specified host until stopped.
                   To see statistics and continue - type Control-Break;
                   To stop - type Control-C.
    -a             Resolve addresses to hostnames.
    -n count       Number of echo requests to send.
    -l size        Send buffer size.
    -f             Set Don't Fragment flag in packet.
    -i TTL         Time To Live.
    -v TOS         Type Of Service.
    -r count       Record route for count hops.
    -s count       Timestamp for count hops.
    -j host-list   Loose source route along host-list.
    -k host-list   Strict source route along host-list.
    -w timeout     Timeout in milliseconds to wait for each reply.
POPD
Changes to the directory stored by the PUSHD command.
POPD
If Command Extensions are enabled the POPD command will delete
any temporary drive letter created by PUSHD when you POPD that
drive off the pushed directory stack.
PRINT
Prints a text file.
PRINT [/D:device] [[drive:][path]filename[...]]
   /D:device   Specifies a print device.
PROMPT
Changes the cmd.exe command prompt.
PROMPT [text]
  text    Specifies a new command prompt.
Prompt can be made up of normal characters and the following special codes:
  $A   & (Ampersand)
  $B   | (pipe)
  $C   ( (Left parenthesis)
  $D   Current date
  $E   Escape code (ASCII code 27)
  $F   ) (Right parenthesis)
  $G   > (greater-than sign)
  $H   Backspace (erases previous character)
  $L   < (less-than sign)
  $N   Current drive
  $P   Current drive and path
  $Q   = (equal sign)
  $S     (space)
  $T   Current time
  $V   Windows XP version number
  $_   Carriage return and linefeed
  $$   $ (dollar sign)
If Command Extensions are enabled the PROMPT command supports
the following additional formatting characters:
  $+   zero or more plus sign (+) characters depending upon the
       depth of the PUSHD directory stack, one character for each
       level pushed.
  $M   Displays the remote name associated with the current drive
       letter or the empty string if current drive is not a network
       drive.
PUSHD
Stores the current directory for use by the POPD command, then
changes to the specified directory.
PUSHD [path | ..]
  path        Specifies the directory to make the current directory.
If Command Extensions are enabled the PUSHD command accepts
network paths in addition to the normal drive letter and path.
If a network path is specified, PUSHD will create a temporary
drive letter that points to that specified network resource and
then change the current drive and directory, using the newly
defined drive letter.  Temporary drive letters are allocated from
Z: on down, using the first unused drive letter found.
RD & RMDIR
Removes (deletes) a directory.
RMDIR [/S] [/Q] [drive:]path
RD [/S] [/Q] [drive:]path
    /S      Removes all directories and files in the specified directory
            in addition to the directory itself.  Used to remove a directory
            tree.
    /Q      Quiet mode, do not ask if ok to remove a directory tree with /S
RECOVER
Recovers readable information from a bad or defective disk.
RECOVER [drive:][path]filename
Consult the online Command Reference in Windows XP Help
before using the RECOVER command.
REM
Records comments (remarks) in a batch file or CONFIG.SYS.
REM [comment]
REN & RENAME
Renames a file or files.
RENAME [drive:][path]filename1 filename2.
REN [drive:][path]filename1 filename2.
Note that you cannot specify a new drive or path for your destination file.
REPLACE
Replaces files.
REPLACE [drive1:][path1]filename [drive2:][path2] [/A] [/P] [/R] [/W]
REPLACE [drive1:][path1]filename [drive2:][path2] [/P] [/R] [/S] [/W] [/U]
  [drive1:][path1]filename Specifies the source file or files.
  [drive2:][path2]         Specifies the directory where files are to be
                           replaced.
  /A                       Adds new files to destination directory. Cannot
                           use with /S or /U switches.
  /P                       Prompts for confirmation before replacing a file or
                           adding a source file.
  /R                       Replaces read-only files as well as unprotected
                           files.
  /S                       Replaces files in all subdirectories of the
                           destination directory. Cannot use with the /A
                           switch.
  /W                       Waits for you to insert a disk before beginning.
  /U                       Replaces (updates) only files that are older than
                           source files. Cannot use with the /A switch.
SET
Displays, sets, or removes cmd.exe environment variables.
SET [variable=[string]]
  variable  Specifies the environment-variable name.
  string    Specifies a series of characters to assign to the variable.
Type SET without parameters to display the current environment variables.
If Command Extensions are enabled SET changes as follows:
SET command invoked with just a variable name, no equal sign or value
will display the value of all variables whose prefix matches the name
given to the SET command.  For example:
    SET P
would display all variables that begin with the letter 'P'
SET command will set the ERRORLEVEL to 1 if the variable name is not
found in the current environment.
SET command will not allow an equal sign to be part of the name of
a variable.
Two new switches have been added to the SET command:
    SET /A expression
    SET /P variable=[promptString]
The /A switch specifies that the string to the right of the equal sign
is a numerical expression that is evaluated.  The expression evaluator
is pretty simple and supports the following operations, in decreasing
order of precedence:
    ()                  - grouping
    ! ~ -               - unary operators
    * / %               - arithmetic operators
    + -                 - arithmetic operators
    << >>               - logical shift
    &                   - bitwise and
    ^                   - bitwise exclusive or
    |                   - bitwise or
    = *= /= %= += -=    - assignment
      &= ^= |= <<= >>=
    ,                   - expression separator
If you use any of the logical or modulus operators, you will need to
enclose the expression string in quotes.  Any non-numeric strings in the
expression are treated as environment variable names whose values are
converted to numbers before using them.  If an environment variable name
is specified but is not defined in the current environment, then a value
of zero is used.  This allows you to do arithmetic with environment
variable values without having to type all those % signs to get their
values.  If SET /A is executed from the command line outside of a
command script, then it displays the final value of the expression.  The
assignment operator requires an environment variable name to the left of
the assignment operator.  Numeric values are decimal numbers, unless
prefixed by 0x for hexadecimal numbers, and 0 for octal numbers.
So 0x12 is the same as 18 is the same as 022. Please note that the octal
notation can be confusing: 08 and 09 are not valid numbers because 8 and
9 are not valid octal digits.
The /P switch allows you to set the value of a variable to a line of input
entered by the user.  Displays the specified promptString before reading
the line of input.  The promptString can be empty.
Environment variable substitution has been enhanced as follows:
    %PATH:str1=str2%
would expand the PATH environment variable, substituting each occurrence
of "str1" in the expanded result with "str2".  "str2" can be the empty
string to effectively delete all occurrences of "str1" from the expanded
output.  "str1" can begin with an asterisk, in which case it will match
everything from the beginning of the expanded output to the first
occurrence of the remaining portion of str1.
May also specify substrings for an expansion.
    %PATH:~10,5%
would expand the PATH environment variable, and then use only the 5
characters that begin at the 11th (offset 10) character of the expanded
result.  If the length is not specified, then it defaults to the
remainder of the variable value.  If either number (offset or length) is
negative, then the number used is the length of the environment variable
value added to the offset or length specified.
    %PATH:~-10%
would extract the last 10 characters of the PATH variable.
    %PATH:~0,-2%
would extract all but the last 2 characters of the PATH variable.
Finally, support for delayed environment variable expansion has been
added.  This support is always disabled by default, but may be
enabled/disabled via the /V command line switch to CMD.EXE.  See CMD /?
Delayed environment variable expansion is useful for getting around
the limitations of the current expansion which happens when a line
of text is read, not when it is executed.  The following example
demonstrates the problem with immediate variable expansion:
    set VAR=before
    if "%VAR%" == "before" (
        set VAR=after
        if "%VAR%" == "after" @echo If you see this, it worked
    )
would never display the message, since the %VAR% in BOTH IF statements
is substituted when the first IF statement is read, since it logically
includes the body of the IF, which is a compound statement.  So the
IF inside the compound statement is really comparing "before" with
"after" which will never be equal.  Similarly, the following example
will not work as expected:
    set LIST=
    for %i in (*) do set LIST=%LIST% %i
    echo %LIST%
in that it will NOT build up a list of files in the current directory,
but instead will just set the LIST variable to the last file found.
Again, this is because the %LIST% is expanded just once when the
FOR statement is read, and at that time the LIST variable is empty.
So the actual FOR loop we are executing is:
    for %i in (*) do set LIST= %i
which just keeps setting LIST to the last file found.
Delayed environment variable expansion allows you to use a different
character (the exclamation mark) to expand environment variables at
execution time.  If delayed variable expansion is enabled, the above
examples could be written as follows to work as intended:
    set VAR=before
    if "%VAR%" == "before" (
        set VAR=after
        if "!VAR!" == "after" @echo If you see this, it worked
    )
    set LIST=
    for %i in (*) do set LIST=!LIST! %i
    echo %LIST%
If Command Extensions are enabled, then there are several dynamic
environment variables that can be expanded but which don't show up in
the list of variables displayed by SET.  These variable values are
computed dynamically each time the value of the variable is expanded.
If the user explicitly defines a variable with one of these names, then
that definition will override the dynamic one described below:
%CD% - expands to the current directory string.
%DATE% - expands to current date using same format as DATE command.
%TIME% - expands to current time using same format as TIME command.
%RANDOM% - expands to a random decimal number between 0 and 32767.
%ERRORLEVEL% - expands to the current ERRORLEVEL value
%CMDEXTVERSION% - expands to the current Command Processor Extensions
    version number.
%CMDCMDLINE% - expands to the original command line that invoked the
    Command Processor.
SETLOCAL
Begins localization of environment changes in a batch file.  Environment
changes made after SETLOCAL has been issued are local to the batch file.
ENDLOCAL must be issued to restore the previous settings.  When the end
of a batch script is reached, an implied ENDLOCAL is executed for any
outstanding SETLOCAL commands issued by that batch script.
SETLOCAL
If Command Extensions are enabled SETLOCAL changes as follows:
SETLOCAL batch command now accepts optional arguments:
        ENABLEEXTENSIONS / DISABLEEXTENSIONS
            enable or disable command processor extensions.  See
            CMD /? for details.
        ENABLEDELAYEDEXPANSION / DISABLEDELAYEDEXPANSION
            enable or disable delayed environment variable
            expansion.  See SET /? for details.
These modifications last until the matching ENDLOCAL command,
regardless of their setting prior to the SETLOCAL command.
The SETLOCAL command will set the ERRORLEVEL value if given
an argument.  It will be zero if one of the two valid arguments
is given and one otherwise.  You can use this in batch scripts
to determine if the extensions are available, using the following
technique:
    VERIFY OTHER 2>nul
    SETLOCAL ENABLEEXTENSIONS
    IF ERRORLEVEL 1 echo Unable to enable extensions
This works because on old versions of CMD.EXE, SETLOCAL does NOT
set the ERRORLEVEL value. The VERIFY command with a bad argument
initializes the ERRORLEVEL value to a non-zero value.
SHIFT
Changes the position of replaceable parameters in a batch file.
SHIFT [/n]
If Command Extensions are enabled the SHIFT command supports
the /n switch which tells the command to start shifting at the
nth argument, where n may be between zero and eight.  For example:
    SHIFT /2
would shift %3 to %2, %4 to %3, etc. and leave %0 and %1 unaffected.
SORT
SORT [/R] [/+n] [/M kilobytes] [/L locale] [/REC recordbytes]
  [[drive1:][path1]filename1] [/T [drive2:][path2]]
  [/O [drive3:][path3]filename3]
  /+n                         Specifies the character number, n, to
                              begin each comparison.  /+3 indicates that
                              each comparison should begin at the 3rd
                              character in each line.  Lines with fewer
                              than n characters collate before other lines.
                              By default comparisons start at the first
                              character in each line.
  /L[OCALE] locale            Overrides the system default locale with
                              the specified one.  The ""C"" locale yields
                              the fastest collating sequence and is
                              currently the only alternative.  The sort
                              is always case insensitive.
  /M[EMORY] kilobytes         Specifies amount of main memory to use for
                              the sort, in kilobytes.  The memory size is
                              always constrained to be a minimum of 160
                              kilobytes.  If the memory size is specified
                              the exact amount will be used for the sort,
                              regardless of how much main memory is
                              available.
                              The best performance is usually achieved by
                              not specifying a memory size.  By default the
                              sort will be done with one pass (no temporary
                              file) if it fits in the default maximum
                              memory size, otherwise the sort will be done
                              in two passes (with the partially sorted data
                              being stored in a temporary file) such that
                              the amounts of memory used for both the sort
                              and merge passes are equal.  The default
                              maximum memory size is 90% of available main
                              memory if both the input and output are
                              files, and 45% of main memory otherwise.
  /REC[ORD_MAXIMUM] characters Specifies the maximum number of characters
                              in a record (default 4096, maximum 65535).
  /R[EVERSE]                  Reverses the sort order; that is,
                              sorts Z to A, then 9 to 0.
  [drive1:][path1]filename1   Specifies the file to be sorted.  If not
                              specified, the standard input is sorted.
                              Specifying the input file is faster than
                              redirecting the same file as standard input.
  /T[EMPORARY]
    [drive2:][path2]          Specifies the path of the directory to hold
                              the sort's working storage, in case the data
                              does not fit in main memory.  The default is
                              to use the system temporary directory.
  /O[UTPUT]
    [drive3:][path3]filename3 Specifies the file where the sorted input is
                              to be stored.  If not specified, the data is
                              written to the standard output.   Specifying
                              the output file is faster than redirecting
                              standard output to the same file.
START
Starts a separate window to run a specified program or command.
START ["title"] [/Dpath] [/I] [/MIN] [/MAX] [/SEPARATE | /SHARED]
      [/LOW | /NORMAL | /HIGH | /REALTIME | /ABOVENORMAL | /BELOWNORMAL]
      [/WAIT] [/B] [command/program]
      [parameters]
    "title"     Title to display in  window title bar.
    path        Starting directory
    B           Start application without creating a new window. The
                application has ^C handling ignored. Unless the application
                enables ^C processing, ^Break is the only way to interrupt
                the application
    I           The new environment will be the original environment passed
                to the cmd.exe and not the current environment.
    MIN         Start window minimized
    MAX         Start window maximized
    SEPARATE    Start 16-bit Windows program in separate memory space
    SHARED      Start 16-bit Windows program in shared memory space
    LOW         Start application in the IDLE priority class
    NORMAL      Start application in the NORMAL priority class
    HIGH        Start application in the HIGH priority class
    REALTIME    Start application in the REALTIME priority class
    ABOVENORMAL Start application in the ABOVENORMAL priority class
    BELOWNORMAL Start application in the BELOWNORMAL priority class
    WAIT        Start application and wait for it to terminate
    command/program
                If it is an internal cmd command or a batch file then
                the command processor is run with the /K switch to cmd.exe.
                This means that the window will remain after the command
                has been run.
                If it is not an internal cmd command or batch file then
                it is a program and will run as either a windowed application
                or a console application.
    parameters  These are the parameters passed to the command/program
If Command Extensions are enabled, external command invocation
through the command line or the START command changes as follows:
non-executable files may be invoked through their file association just
    by typing the name of the file as a command.  (e.g.  WORD.DOC would
    launch the application associated with the .DOC file extension).
    See the ASSOC and FTYPE commands for how to create these
    associations from within a command script.
When executing an application that is a 32-bit GUI application, CMD.EXE
    does not wait for the application to terminate before returning to
    the command prompt.  This new behavior does NOT occur if executing
    within a command script.
When executing a command line whose first token is the string "CMD "
    without an extension or path qualifier, then "CMD" is replaced with
    the value of the COMSPEC variable.  This prevents picking up CMD.EXE
    from the current directory.
When executing a command line whose first token does NOT contain an
    extension, then CMD.EXE uses the value of the PATHEXT
    environment variable to determine which extensions to look for
    and in what order.  The default value for the PATHEXT variable
    is:
        .COM;.EXE;.BAT;.CMD
    Notice the syntax is the same as the PATH variable, with
    semicolons separating the different elements.
When searching for an executable, if there is no match on any extension,
then looks to see if the name matches a directory name.  If it does, the
START command launches the Explorer on that path.  If done from the
command line, it is the equivalent to doing a CD /D to that path.
SUBST
Associates a path with a drive letter.
SUBST [drive1: [drive2:]path]
SUBST drive1: /D
  drive1:        Specifies a virtual drive to which you want to assign a path.
  [drive2:]path  Specifies a physical drive and path you want to assign to
                 a virtual drive.
  /D             Deletes a substituted (virtual) drive.
Type SUBST with no parameters to display a list of current virtual drives.
TFTP
Transfers files to and from a remote computer running the TFTP service.
TFTP [-i] host [GET | PUT] source [destination]
  -i              Specifies binary image transfer mode (also called
                  octet). In binary image mode the file is moved
                  literally, byte by byte. Use this mode when
                  transferring binary files.
  host            Specifies the local or remote host.
  GET             Transfers the file destination on the remote host to
                  the file source on the local host.
  PUT             Transfers the file source on the local host to
                  the file destination on the remote host.
  source          Specifies the file to transfer.
  destination     Specifies where to transfer the file.
Also See: TFTP Commands
TIME
Displays or sets the system time.
TIME [/T | time]
Type TIME with no parameters to display the current time setting and a prompt
for a new one.  Press ENTER to keep the same time.
If Command Extensions are enabled the TIME command supports
the /T switch which tells the command to just output the
current time, without prompting for a new time.
TITLE
Sets the window title for the command prompt window.
TITLE [string]
  string       Specifies the title for the command prompt window.
TREE
Graphically displays the folder structure of a drive or path.
TREE [drive:][path] [/F] [/A]
   /F   Display the names of the files in each folder.
   /A   Use ASCII instead of extended characters.
TYPE
Displays the contents of a text file or files.
TYPE [drive:][path]filename
TYPEPERF
Typeperf writes performance data to the command window or to a log file. To
stop Typeperf, press CTRL+C.
Usage:
typeperf { <counter [counter ...]> | -cf <filename> | -q [object]
                                | -qx [object] } [options]
Parameters:
  <counter [counter ...]>       Performance counters to monitor.
Options:
  -?                            Displays context sensitive help.
  -f <CSV|TSV|BIN|SQL>          Output file format. Default is CSV.
  -cf <filename>                File containing performance counters to
                                monitor, one per line.
  -si <[[hh:]mm:]ss>            Time between samples. Default is 1 second.
  -o <filename>                 Path of output file or SQL database. Default
                                is STDOUT.
  -q [object]                   List installed counters (no instances). To
                                list counters for one object, include the
                                object name, such as Processor.
  -qx [object]                  List installed counters with instances. To
                                list counters for one object, include the
                                object name, such as Processor.
  -sc <samples>                 Number of samples to collect. Default is to
                                sample until CTRL+C.
  -config <filename>            Settings file containing command options.
  -s <computer_name>            Server to monitor if no server is specified
                                in the counter path.
  -y                            Answer yes to all questions without
                                prompting.
Note:
  Counter is the full name of a performance counter in
  "\\<Computer>\<Object>(<Instance>)\<Counter>" format,
  such as "\\Server1\Processor(0)\% User Time".
Examples:
  typeperf "\Processor(_Total)\% Processor Time"
  typeperf -cf counters.txt -si 5 -sc 50 -f TSV -o domain2.tsv
  typeperf -qx PhysicalDisk -o counters.txt
TRACERPT
Tracerpt processes binary Event Trace Session log files or real-time streams
from instrumented Event Trace providers and creates a report or a text (CSV)
file describing the events generated.
Usage:
tracerpt { <filename [filename ...]> | -rt <session_name [session_name ...]>
                                } [options]
Parameters:
  <filename [filename ...]>     Event Trace log file to process.
Options:
  -?                            Displays context sensitive help.
  -o [filename]                 Text (CSV) output file. Default is
                                dumpfile.csv.
  -summary [filename]           Summary report text file (CSV) file. Default
                                is summary.txt.
  -report [filename]            Text output report file. Default is
                                workload.txt.
  -rt <session_name [session_name ...]>   Real-time Event Trace Session data
                                source.
  -config <filename>            Settings file containing command options.
  -y                            Answer yes to all questions without
                                prompting.
Examples:
  tracerpt logfile1.etl logfile2.etl -o -report
  tracerpt logfile.etl -o logdmp.csv -summary logdmp.txt -report logrpt.txt
  tracerpt -rt EVENT_SESSION_1 EVENT_SESSION_2 -o logfile.csv
VER
Displays the Windows XP version.
VER
VERIFY
Tells cmd.exe whether to verify that your files are written correctly to a
disk.
VERIFY [ON | OFF]
Type VERIFY without a parameter to display the current VERIFY setting.
VOL
Displays the disk volume label and serial number, if they exist.
VOL [drive:]
XCOPY
Copies files and directory trees.
XCOPY source [destination] [/A | /M] [/D[:date]] [/P] [/S [/E]] [/V] [/W]
                           [/C] [/I] [/Q] [/F] [/L] [/G] [/H] [/R] [/T] [/U]
                           [/K] [/N] [/O] [/X] [/Y] [/-Y] [/Z]
                           [/EXCLUDE:file1[+file2][+file3]...]
  source       Specifies the file(s) to copy.
  destination  Specifies the location and/or name of new files.
  /A           Copies only files with the archive attribute set,
               doesn't change the attribute.
  /M           Copies only files with the archive attribute set,
               turns off the archive attribute.
  /D:m-d-y     Copies files changed on or after the specified date.
               If no date is given, copies only those files whose
               source time is newer than the destination time.
  /EXCLUDE:file1[+file2][+file3]...
               Specifies a list of files containing strings.  Each string
               should be in a separate line in the files.  When any of the
               strings match any part of the absolute path of the file to be
               copied, that file will be excluded from being copied.  For
               example, specifying a string like \obj\ or .obj will exclude
               all files underneath the directory obj or all files with the
               .obj extension respectively.
  /P           Prompts you before creating each destination file.
  /S           Copies directories and subdirectories except empty ones.
  /E           Copies directories and subdirectories, including empty ones.
               Same as /S /E. May be used to modify /T.
  /V           Verifies each new file.
  /W           Prompts you to press a key before copying.
  /C           Continues copying even if errors occur.
  /I           If destination does not exist and copying more than one file,
               assumes that destination must be a directory.
  /Q           Does not display file names while copying.
  /F           Displays full source and destination file names while copying.
  /L           Displays files that would be copied.
  /G           Allows the copying of encrypted files to destination that does
               not support encryption.
  /H           Copies hidden and system files also.
  /R           Overwrites read-only files.
  /T           Creates directory structure, but does not copy files. Does not
               include empty directories or subdirectories. /T /E includes
               empty directories and subdirectories.
  /U           Copies only files that already exist in destination.
  /K           Copies attributes. Normal Xcopy will reset read-only attributes.
  /N           Copies using the generated short names.
  /O           Copies file ownership and ACL information.
  /X           Copies file audit settings (implies /O).
  /Y           Suppresses prompting to confirm you want to overwrite an
               existing destination file.
  /-Y          Causes prompting to confirm you want to overwrite an
               existing destination file.
  /Z           Copies networked files in restartable mode.
The switch /Y may be preset in the COPYCMD environment variable.
This may be overridden with /-Y on the command line.
Command Index
APPEND   Allows programs to open data files as if they were in the current directory
ARP      Displays and modifies the IP-to-Physical address ARP translation tables.
ASSOC    Displays or modifies file extension associations.
AT       Schedules commands and programs to run on a computer.
ATTRIB   Displays or changes file attributes.
ATMADM   Windows ATM Call Manager Statistics.
BOOTCFG  Configures the boot.ini file.
BREAK    Sets or clears extended CTRL+C checking.
CACLS    Displays or modifies access control lists (ACLs) of files.
CALL     Calls one batch program from another.
CD       Displays the name of or changes the current directory.
CHCP     Displays or sets the active code page number.
CHDIR    Displays the name of or changes the current directory.
CHKDSK   Checks a disk and displays a status report.
CHKNTFS  Displays or modifies the checking of disk at boot time.
CIPHER   Displays or alters the encryption of directories [files] on NTFS partitions.
CLS      Clears the screen.
CMD      Starts a new instance of the Windows command interpreter.
CMSTP    Installs or removes a Connection Manager service profiles.
COLOR    Sets the default console foreground and background colors.
COMMAND  Command Interpreter
COMP     Compares the contents of two files or sets of files.
COMPACT  Displays or alters the compression of files on NTFS partitions.
CONVERT  Converts FAT volumes to NTFS.
COPY     Copies one or more files to another location.
CSCRIPT  Microsoft Windows Script Host
DATE     Displays or sets the date.
DEBUG    A program testing and editing tool.
DEFRAG   Disk Defragmenter.
DEL      Deletes one or more files.
DIR      Displays a list of files and subdirectories in a directory.
DISKCOMP Compares the contents of two floppy disks.
DISKCOPY Copies the contents of one floppy disk to another.
DISKPART Disk Partition Utility.
DOSKEY   Edits command lines, recalls Windows commands, and creates macros.
DRIVERQUERY Enables an administrator to enumerate and display the list of
          installed device drivers as well as their properties.
ECHO     Displays messages, or turns command echoing on or off.
EDIT     MS-DOS Editor
EDLIN    A line-oriented text editor.
ENDLOCAL Ends localization of environment changes in a batch file.
ERASE    Deletes one or more files.
EVENTCREATE Create a custom event ID and message in a specified event log.
EXIT     Quits the CMD.EXE program (command interpreter).
FC       Compares two files or sets of files, and displays the differences
          between them.
FIND     Searches for a text string in a file or files.
FINDSTR  Searches for strings in files.
FOR      Runs a specified command for each file in a set of files.
FORMAT   Formats a disk for use with Windows.
FTP      Transfers files to and from a computer running an FTP server service
FTYPE    Displays or modifies file types used in file extension associations.
GOTO     Directs the Windows command interpreter to a labeled line in a
          batch program.
GRAFTABL Enables Windows to display an extended character set in graphics
          mode.
HELP     Provides Help information for Windows commands.
IF       Performs conditional processing in batch programs.
IPCONFIG IP Configuration.
KB16     Configures a keyboard for a specific language.
LABEL    Creates, changes, or deletes the volume label of a disk.
LOADFIX  Loads a program above the first 64K of memory, and runs the program.
MD       Creates a directory.
MEM      Displays the amount of used and free memory in your system.
MKDIR    Creates a directory.
MODE     Configures a system device.
MORE     Displays output one screen at a time.
MOVE     Moves one or more files from one directory to another directory.
PATH     Displays or sets a search path for executable files.
PAUSE    Suspends processing of a batch file and displays a message.
PING     Ping a network connection
POPD     Restores the previous value of the current directory saved by PUSHD.
PRINT    Prints a text file.
PROMPT   Changes the Windows command prompt.
PUSHD    Saves the current directory then changes it.
RD       Removes a directory.
RECOVER   Recovers readable information from a bad or defective disk.
REM      Records comments (remarks) in batch files or CONFIG.SYS.
REN      Renames a file or files.
RENAME   Renames a file or files.
REPLACE   Replaces files.
RMDIR    Removes a directory.
SET      Displays, sets, or removes Windows environment variables.
SETLOCAL Begins localization of environment changes in a batch file.
SHIFT    Shifts the position of replaceable parameters in batch files.
SORT     Sorts input.
START    Starts a separate window to run a specified program or command.
SUBST    Associates a path with a drive letter.
TFTP     Transfers files to and from a remote computer running the TFTP service.
TIME     Displays or sets the system time.
TITLE    Sets the window title for a CMD.EXE session.
TREE     Graphically displays the directory structure of a drive or path.
TYPE     Displays the contents of a text file.
TYPEPERF Writes performance data to the command window or to a log file.
TRACERPT Processes binary Event Trace Session log files or real-time streams
VER      Displays the Windows version.
VERIFY   Tells Windows whether to verify that your files are written
          Correctly to a disk.
VOL      Displays a disk volume label and serial number.
XCOPY    Copies files and directory trees.

Blogged with the Flock Browser