TRENDING ON ONEINDIA
- 2019 Lok Sabha — All You Need To Know
- Hero ISL To Resume From Jan 25th; Kerala Blasters To Face ATK
- Owning A Maruti Suzuki Is Now A Special Occasion — Here's How
- Asus ZenFone Max M2 — Detailed Review
- Why Cheat India — Movie Review
- 7 Best SBI Mutual Fund Schemes To Invest Through SIP
- Benefits Of Drinking Black Coffee
- Vikramshila — The Forgotten University In Bhagalpur, Bihar
The command shell in the Windows operating system makes use of the command interpreter, Cmd.exe. It loads applications, manages the flow of information between applications and translates user input into a form that can be understood by the PC. Text-based commands may seem a bit old-fashioned in this era when everything is a click or swipe away.
While this is quite true and Microsoft itself has slowly nudged the command line to a corner, there are still plenty of commands that are useful to know, there are also a variety of features that have been added in Windows 8 and 10. Fifteen useful commands that would benefit you if you happen to be a Windows user are given below:
By default, most files in Windows are associated with a specific program that can open it. Keeping track of what opens what is a task that can be very confusing. A full list of file name extensions and program associations can be accessed by entering the command "Assoc."
You can also change the file associations. You can use the information obtained from using the assoc command to inform you what files are associated with a certain program and which are not.
The files that have been deleted from a hard drive is not deleted completely. Only the access to them is locked. The data will still be present there until it is replaced by new data.
The cipher command can be used to delete such files from a particular directory, it does so by writing random data in it.
Drivers are very crucial to the functioning of a PC, driverquery provides a list of drivers, you can use "driverquery-v" if you wish to get more information, this will include the directory in which the driver has been installed.
4) File Compare
The command can be used to identify the differences in the text of two files, this is very useful for programmers and writers. All you need to do is type "fc" followed by the directory path and the file name of the two files you wish to compare.
You can also type "/b" to compare only binary output or "/I" to compare ASCII text.
This command can be used to obtain the IP address of the computer that you are using. If you are using a router, you will receive the local address network of the router.
Using the command Netstat will provide you with a list of ports that are currently open and related IP addresses. The command will also tell you the state that the port is in, listening, established or closed.
This can be used to locate malicious connections or troubleshoot connected devices.
Using Ping command followed by a web domain or an IP address will send a series of text packets to that address. You will know that your device is capable of communicating if they arrive and are returned. This will help you identify the root cause of the improper connection.
This command works like Ping but it deals with multiple routers. You will have to type in the command followed by the IP address, but PathPing also gives you information about the route the test packets take.
Using tracert command followed by an IP address will give you information about each step in the route available between your PC and the target along with the time taken (in milliseconds) for each hop between servers or devices.
Powercfg followed by a list of specific commands can help you determine how your computer uses energy. The commands are:
a) powercfg /hibernate on
b) powercfg /hibernate off
c) powercfg/devicequery s1_supported
This command can be used to shut down your PC. You can also use the shutdown/r/o command to restart the PC and launch the Advanced Start Options Menu.
12) System File Checker
The sfc command can be used to automatically find and replace corrupt or missing files with cached copies kept around by Windows just for this purpose. This command can take about a half-hour to run.
13) Recovery Image
All Windows 8/8.1 computers are released by the company with a recovery image. But this image might also include bloatware. Once you have installed the software you can use the "recimg" command to receive a detailed explanation as to how to use it.
Tasklist can be used to find a current list of all tasks that are currently being run by the PC, this can also find tasks hidden from the utility and cannot be found by the task manager.
All the tasks that appear in Tasklist will have an executable and process ID (a four-digit number) that is associated with them. A program can be force stopped using "taskkill-im" followed by an executable's name or "taskkill-pid" followed by the process ID.