This is the tech blog

Know many tips and tricks

This is the tech blog

Know many tech tips and tricks

This is the tech blog

Know many tips and tricks

This is the tech blog

Know many new tips and tricks

This is the tech blog

Know many tech tips and tricks

Wednesday 21 June 2017

How to Customize Folders With Different Colors In Windows





Are you bored of seeing the same colour of your folders ? Don't worry, here is a way to change the colour and to customize the folders in your way. 

 

Unlike Mac OS X, Windows doesn’t allow you to change the color of folders. There are many software available today over the internet which can Customize your Computer in an efficient manner that it looks so attractive as well as it becomes very easy to use.

We always want our computer to be clean and well organized so that whenever we need to access something or need to search a particular file/folder in our computer we could find it easily.

With the free Folderico utility installed, you can right-click on a folder and choose which color you want it to be. Then, instead of searching through a list of folder names, you’ll instantly see the one you want. And it will also make them look good and attractive.

 

How to Customize Folders With Different Colors?

1. First of all Download and install the software Folderico. It is tested and 100% virus free.

Click here to Download Folderico. Once the download completed, unzip the file. Run it and follow the instructions to install it. Finally, click Finish.








How to Customize Folders With Different Colors-compressed
Unzip the download file.
 

2. Now, go to Folderico folder and double click on folderico.exe file

3. Click on the Windows folders and a range of colors will be displayed on the right-hand side –

highlight the one you want and click the Select button.



How to Customize Folders With Different Colors -2 -compressed


4. Finally click Apply and then Close to close the Folderico window. Your folder should have changed color but if not, tap F5 to refresh the Explorer window and it should update:








How to Customize Folders With Different Colors 2-compressed
Select folder style and color

 
 

Your folder will get
 customize now and 
will look cool and 
attractive.
 





 
 
 

How to Lock and unlock your computer with a USB Pendrive?

 

You can Lock down your PC using Pendrive and then unlock it using the same Pendrive.


Want to use your pendrive for locking and unlocking of your computer? This is the way you can do so.

Follow the steps and that will surely help you.  

 

Predator (For windows)

Step 1: Download and install a software: Predator.

This software locks your PC when you are away, even if your Windows session is still active.
It uses a regular USB flash drive as an access control device.

 

Step 2: Once Predator launches plug in the Pendrive.

When you’re away from your PC, you simply remove the USB drive:
– once it is removed, the keyboard and mouse are disabled and the screen darkens
when you return back to your PC, you put the USB flash drive in place:
– keyboard and mouse are immediately released, and the display is restored.

 

Step 3:  When you insert the USB Pendrive, Predator will ask you whether you want to create a password. Click OK to continue.

 

Step 4: In the Preferences window, enter a secure password in the “New password” field. That is if you lose your USB pen drive, you can use this password to unlock your computer.

This software also allows you to use a password in addition to USB lock/unlock. If you want this facility, check the Always Required box and you’ll be asked to enter the password each time you use your thumb drive to unlock your PC.

Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you’re done, click “Create key” and then OK.

 

Step 5: Predator will exit. Click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running. Once done, Predator will check every 30 seconds to see that your USB Pendrive is plugged in. If it isn’t, your computer will dim and lock down.

 You can pause Predator at any time select “Pause monitoring” from the taskbar menu. You can also check if someone accessed your PC/laptop while the Predator was switched on using USB drive from the Predator activity log.

 

The only issue with using predator on your computer is that it locks down one

usb port exclusively for lock/unlock purpose

 

 

 USB lock (for Mac)

USB Lock is a Mac app that’s similar to Predator for Windows: it turns your USB drives into keys that grant access to the computer as long as the USB key is plugged in. Unplugging the drive instantly locks the computer. Creating a USB key with USB Lock will not affect your drive’s files in any way.

It’s a unique solution in the midst of other screen lockers that rely on text-input passwords and grid-swipe patterns. The only downside is that there isn’t a free version available, but for a price tag as low as $3 USD, it’s certainly worth the cost.

Features include:

  • Optional password requirement on top of the USB key requirement.

  • Does not sleep or close applications when entering locked mode.

  • Idle timer that locks the system during inactivity. (Coming soon)

 

When all is said and done, USB Lock is basically Predator Lite. It serves the same core purpose – requiring the USB key to be plugged in order for the computer to be usable – but it doesn’t have the extra bells and whistles that make Predator awesome (namely, the scheduler and per-user customization).

However, seeing as how Predator is only for Windows, USB Lock is the closest alternative for Mac users. Only use it if you can spare an entire USB port. If you can’t, you may be better off using Rohos instead.

To set up your first key with USB Lock:

  • Install USB lock.

  • Run USB Lock.

  • Insert your USB drive when prompted.

  • Optionally enter a password if desired.

  • Done!

Hope that it would help you in
securing your computer.

Sunday 18 June 2017

How To Download Incompatible Apps In Any Android





Today every Android user keeps on trying all new apps in their Android. And while downloading different apps we come across some apps that are not compatible with your Android device. Sometimes there is a game or an app that you really want to install. So here we have a way by which you can easily get the apps that are not compatible with your device



So let us see the ways to do so.

How To Download Incompatible Apps In Any Android

Mostly the apps are not compatible according to your Android version or due to country-specific limit that means the app you are trying to download is not available or made for your country. You can simply paste the Google Play URL here and it will give you the option to download the APK file to your computer. You can later transfer it to your Android device and can enjoy the incompatible apps too.


#1 Direct Downloading Apk Of Incompatible Apps

1. Apkleecher.com 

Direct Downloading Apk Of Incompatible Apps 

This is the cool site where you can directly download .apk file of any app of Google Play store. In this app, you just have to type the app name package in the text field  and this site will give you the direct .apk download link of that app.

 

2. Evozi Apk Downloader 

Direct Downloading Apk Of Incompatible Apps
Direct Downloading Apk Of Incompatible Apps
By using this site, you can download all your favorite app’s directly as .apk file in your device. Through this, you can even download massive game files too. Just paste the play store link of the app and download it directly to your computer.

3. APK-Dl.com

Direct Downloading Apk Of Incompatible Apps
Direct Downloading Apk Of Incompatible Apps

It was the newest apk downloader. The reason it is gaining popularity is because this site has some features that make downloading apk files a fun. You can download apps from Google play store by simply editing URL, you just need to change play.google.com to APK-DL.com, then a file will appear for download.

 

4. apkpure.com

How To Directly Download Apk from Google Play Store on PC & Android 
How To Directly Download Apk from Google Play Store on PC & Android

APKPure is the best online download which lets you download an app from reliable apps source Google play. The also offer the most comprehensive collections of Android Games, Apps, and all other needed apk files. You just need to paste the Google play app URL and you will be able to download the apk file directly on your computer.

 

5. ApkMirror

ApkMirror
ApkMirror

ApkMirror is one of the most popular web services which is frequently updated with Android apps. Actually, at the time it arrives on Google Play it has been uploaded in ApkMirror. This is a web service where you can get all the latest apk files of apps directly on your computer

#2 Download Country Specific Apps Using VPN

1. Unlimited Free VPN – betternet

Download Country Specific Apps Using VPN
Download Country Specific Apps Using VPN

Using this, you can download the country specific apps that are not available for you. There is amazing service that offered by Betternet. Betternet VPN is free you don’t need to register yourself for using this VPN. When you use this VPN, you can’t see any ads, logs, and limits. They protect your privacy and identity. With Unlimited Free VPN, you can unblock websites on ISP and Wifi connections. Visit here.

Features

  • Bypass the government censorship: You can unblock Facebook, Youtube and etc using betternet free VPN proxy

  • Secures you like a shield

  • Provides you with a private browser

  • Protects your anonymity

  • It’s a Simple, one-tap connects VPN | Virtual private network

  • No traffic or bandwidth limit

  • Connects you to the fastest Server

     

2. Hotspot Shield VPN & Proxy

Download Country Specific Apps Using VPN
Download Country Specific Apps Using VPN

Hotspot Shield is the most popular and most downloaded VPN android app in Google Play. Hotspot Shield supports 3G/4G connections. Hotspot Shield gives you amazing protection on browsing websites and famous social networking websites. With this VPN, you can secure your Internet from Hackers, set firewall rules and hide you IP Address. Basically, this is free VPN but for Elite, you pay some fees. Visit here.

Features

  • Unblock any websites and apps – access geo-restricted content from anywhere on your Android device.

  • Get complete protection from cyber criminals – Hotspot Shield’s banking-level encryption hides your IP address from snoopers

  • Enjoy complete anonymity – hide your IP address, identity, and location from websites and online trackers.

     

3. Hola Free VPN

Download Country Specific Apps Using VPN
Download Country Specific Apps Using VPN

You can easily unblock websites using this app. This is much popular Android VPN app, you can install today to keep your Activities safe, Secure and private. The interface is very simple and fast you can easily switch countries with ease. Visit here.

Features

  • The only VPN that gives you simple direct access to your favorite censored or blocked websites

  • Unblocks applications and websites from around the world

  • Hide your IP address to browse the web privately & anonymously

  • 100% Free

  • Switch countries with ease

  • Speeds up web browsing

  • Reduces data plan costs


4. Opera Free VPN

Download Country Specific Apps Using VPN
Download Country Specific Apps Using VPN

Opera VPN blocks ad trackers and lets you change your virtual location. Unblock more content and access your favorite websites and apps from anywhere – completely free. Opera VPN is one of the best and fastest ways to access more of your favorite online content for free. With super-fast VPN servers and other premium features included for free, Opera VPN is a smart choice for you. Visit here.

Features:

  • One of the fastest, most reliable VPN services

  • Unblocked access via your choice of five virtual locations (with more coming soon)

  • The ability to determine WiFi network security level, as well as connection encryption and protection from threats

  • A built-in ad tracker blocker to stop advertisers from following you around the web

     

#3 Downloading Incompatible Apps Using Google Play Alternatives

1. Amazon App Store

amazon app store1
Amazon App Store

The giant shopping network had their app store too, where you can find the huge collection of free apps that you may not get in the Google Play store that’s why it is also known as the best alternative to Google Play Store. Must try out this app on your device. Click here to visit amazon app store.


2. Aptoide

Aptoide
Aptoide

Aptoide launched as a project to develop a Marketplace in the Android Platform. Aptoide allows Developers, OEM, Telcos and Integrators to create and manage their own Android store. Apptoide lets user download as many apps as they want. Download from here.


3. GetJar

GetJar
GetJar

Well if you ever have a Symbian phone then GetJar will be familiar to you. This is one of the oldest apps you can ever find on the app. This app is lightweight and provides popular Android apps for free. You can download the app from here.

 

3. App Brain

App Brain 

This app is the best alternative to Google Play Store. You can get the apps that are incompatible in your device. You can even find premium apps for free from AppBrain. Just like Google Play Store you can access its website as well as a mobile app to access its catalog. You can download App Brain from here.

So these are the ways to download incompatible apps. Now download whichever app you want to download and enjoy.

 

Google Will Pay You $200,000 For Finding a Bug in Android OS




 Google to pay $200,000 for finding bug in android so if you are a hacker or a security researcher, that is probably going to be a good news for you. Google Will now Pay you Up to $200,000 if you Find any Bug in it’s Android OS. A few days ago, a malware called "Judy" hit over 36.5 million Android-based phones and caused a lot of damage. So, Google has decided to increase the bounty for finding a bug in Android OS to as much as $2,00,000.

According to cyber security firm Check Point, dozens of malicious apps were downloaded between 4.5 million to 18.5 million times from the Play Store. It was noted that the malicious code was present hidden in some apps since April 2016, undetected by Google. Google has now removed the infected apps from the PlayStore. “Judy” is one such case of how an open and free mobile operating system (OS) can be exploited by malicious app developers.

According to cyber security firm Check Point, dozens of malicious apps were downloaded between 4.5 million to 18.5 million times from the Play Store. Some of the malware-affected apps have been discovered residing on the online store for several years. “Judy” is one such case of how an open and free mobile operating system (OS) can be exploited by malicious app developers.

Most security flaws we hear about now affect old builds of the OS or require clever social engineering to get the user to weaken device security, technology website extremetech.com reported on Friday. The versions of Android being released now are more secure than what Google was putting out years ago and as a result no one has managed to claim Google’s largest bug bounties for Android.

Hoping to attract more researchers and engineers to the bug bounty programme, the company has increased the rewards to up to $2,00,000.Google started the bug bounty programme for Android about two years ago in which the security researchers, who demonstrate an exploit, get a cash prize — the amount of which varies based on the severity of the hack.

Tech companies such as Apple, Facebook, Microsoft, and Google have paid out millions of dollars in bug bounty programs over the past few years. Google started the bug bounty program for Android about two years ago in which the security researchers, who demonstrate an exploit, get a cash prize — the amount of which varies based on the severity of the hack. Since then the reward value has been increased from $50,000 to up to $200,000.

 The increased reward applies to two bounties: one for vulnerabilities in TrustZone or Verified Boots, and the other for a remote Linux kernel exploit. Among them, TrustZone or Verified Boot is a matter of serious concern than the Linux exploit, as reported by Extreme Tech. TruztZone is chipset related technology, which ensures biometric data, DRM and boot settings are kept in a trusted secure environment. On the other Verified Boot is software related, to ensure the OS has not tampered with each time a device starts up. Google has increased the bounty for both TrustZone and Verified Boot from $50,000 to $200,000.

It is speculated that Google will further increase the reward price if it again fails to get to a working exploit for Android’s core components.

 

 

Friday 9 June 2017

How to speed up your Android phone

 

 

 

We all use many apps in our phones and many times it starts working very slowly. Here are some tips to boost up the speed of your android smartphone. 


Switching off Animations for the phone

Phones generally have a lot of animations to improve the user experience. These look very good when the phone is brand new but, over time, these make the phone appear a lot slower. These animations load up slowly when there are a lot of other apps loaded up in the RAM, because of which they somewhat mellow out the whole experience. One of the fastest way to get the phone back to speed would be to either switch these animations off or to slow them down. To do this, the Developer Option on the phone needs to be enabled. This is done by going to Settings>About Phone and tapping the Build Number multiple times to get the mode. Once Developer mode is enabled go to Settings>Developer Options and then scroll down. Options like Window Animation Scale, Transition Animation scale and Animator duration scale will now be visible. All these are set to 1x by default, to improve the performance, so reduce all three to 0.5x or simple switch them off.

 

Update Your OS

Updating your android to the latest version not only means access to the newest features but also to the most up-to-date security patches. Depending on your device, carrier, and current operating system, the process will be a bit different, but most of the time it should be relatively easy. 

 

Use the Built-in File Manager

If you've upgraded to android Marshmallow, you can access a built in file manager . Previously, you had to download a third-party app in order to manage your device's files. Now you can dig into your files by going into the storage and USB section of your device's settings. There you can see how much space you have left, view all of the apps installed on your device, and copy files to the cloud.

 

Uninstall Apps /Disabling Apps and Bloatware

We love to download apps on our smartphones and why not, most of them are free on the Google Play Store! The most common reason for phones to slow down, however, is Apps. What most of us do is download lots of apps and we may only use a few of them. These apps are not only occupying precious space on the phone, some apps also wake the processor up or utilise RAM even when not being actively used. Even manufacturers install apps in the phone that are just idle. Samsung mobiles typically had a lot of such bloatware apps on their phone but has recently reduced it. Motorola, on the other hand, is among the few manufacturers who have near zero bloatware on their phones. If you have bloatware on the phone, consider uninstalling or disabling it by going to Settings>Applications.

 

Make Space

Your smartphone or tablet may become sluggish if it's packed with too much stuff. In addition, the more crowded your device, the harder it is to find important information or images when you need them. Luckily, it's relatively easy to clear space an Android device, even if it doesn't have a memory card slot. It can be done by removing unused apps, transfer data from your phone to PC, delete useless data and files etc. .

 

Clear App Cache

As we use the apps installed on our phones they generate cache, which is stored on the phone. The stored cache is used as reference, when it is run later. If an app is misbehaving, or slowing your phone down, the easiest way to fix it is to wipe the app cache. This makes the app generate cache again from scratch and would fix errors and slowdowns; as an added benefit it also frees up space on the phone. You can also do it for the entire operating system by wiping phone cache. This process isn’t easy and should be done only when the device is intolerable. Wiping cache on different phones has different procedures and you will have to look up the exact procedure for your phone.

 

Use an Android Launcher

 The Android interface is generally easy to use, but it can sometimes get mucked up by the manufacturer. If you have an HTC, LG, or Samsung device, it likely runs a slightly modified version of Android. There are two ways to deal with this. First, you can switch to a device that runs stock Android, such as Google Nexus smartphone or the Motorola X pure edition. Alternatively, you can download an android launcher which lets you customize your home screens and manage apps. Launchers give you more options; you can personalize color schemes, more easily organize apps, and even resize the elements on your screen. 

 

Set up Default Apps

This is an easy fix. Frustrated that the wrong app or web browser opens up when you click on a link or try to view a photo? Just go into settings and view which apps are selected as the default for certain actions. You can clear them all and start fresh or do it one-by-one.

 

Format Your Smartphone

When all else fails this is a sure shot method to get your phone back to its glory. Formatting a smartphone wipes everything, it's like starting all over on a blank canvas. For most phones you can go to Settings>Backup & Reset and find the option to Factory Data Reset the phone. Before you rush to do it, keep in mind that you'll lose everything on the phone unless you back it up. If you have saved all your contacts onto your Google Account then it'll be available after the reset. You will also need to backup your photos and messages. Once the phone is reset, give it some time to settle before setting it up. 

 

 

Tuesday 6 June 2017

Surface web, deep web and dark web




 

 Not everything can be accessed by you on the internet. A large part of net is hidden. Let's know about it.

 

SURFACE WEB- It is the part of the internet that everyone can access through their browser and can search it on the search engine. It comprises of only about 3-4% of internet. The major part of net can not be accessed by you. It is hidden. 

When using the Surface Web, you access data directly from the source.

This direct approach tracks the information downloaded, from where and when it was accessed, and your exact location.

Files are shared through any number of computers connected to the internet that hold the information you need. This is known as peer-to-peer networking.

 

 

The hidden part of the net comprises of Deep web(can be legal or illegal but mostly it is legal) and Dark net(illegal). Let's see what is it. 

 

DEEP WEB-  Deep web is that part of the net that is hidden. It basically contains legal information of any company that cannot be seen by public but only by them. It also contains information of army or and country or recipe of any company etc. It is also known as the ‘Invisible Web’, it is the content that cannot be indexed by search engines. And it is hard to keep track of.
Information on the Deep Web cannot be accessed directly. This is because data is not held on any single page, but rather in databases, which makes it difficult for search engines to index.

 In order to access the Deep Web, you need to use a dedicated browser. TOR (The Onion Router) is the most commonly used.

This method of sharing encrypted data makes it difficult for your location, and the kind of information you access, to be tracked or monitored.

 

 

IS IT LEGAL TO SURF DEEP WEB ? 

Yes. You use it as you would any other internet browser. Many people are now beginning to use TOR as a way to maintain their privacy whilst online.

  • Who else uses it:

    • Military
    • Police and crime units
    • Journalists
    • Whistleblowers
      • Edward Snowden
      • Julian Assange

      

     

DARK WEB-  The part of the internet which is also hidden but it contains illegal information only. Ilegal work is done here. Illegal work like torturing, drug smuggling, black marketing etc are held here. You can hire hitman here or can buy guns illegally. It is illegal to surf dark web and you could get arrest if you are caught surfing it. So it is advisable not to surf it. Because there are illegal things only then if you will surf it, you are also considered that you are involved  in doing illegal things. 

You can be in big trouble if you will surf it. There are some things or videos that no one should see as it maybe harmful for you. So do not ever surf it. Otherwise you can be in a big trouble.

 

 

 

Monday 5 June 2017

How to root your android device

 

 

Before rooting your android phone, make sure that you have backed up all your data because it might get lost in the process or you can also root in recovery mode. There are various other methods of rooting but this one is the simplest one.


KINGO ROOT(apk) for android- 

Before doing the root with pc try KingoRoot Apk first. It is more convenient and easy to use without connecting to a computer.
  • Allow installation of apps from unknown sources on your Android device.
  • Settings > Security > Unknown Sources
  • Free download KingoRoot.apk on your Android.
  • Install and launch KingoRoot.
  • Press "One Click Root" on the main interface.
  • Wait a few seconds until the result appear.
  • If still failed, refer to KingoRoot Android PC Version, which has a higher success rate.

 KINGO ROOT FOR PC-


Make sure you get everything right beforehand.
  • Device powered ON
  • At least 50% battery level
  • Internet connection necessary
  • USB Cable (the original one recommended)

  1. Free download and install KingoRoot Android (PC Version).
  2. Kingo offers the best one-click Android root software for free. Just download and install it now.


              Root any Android device with KingoRoot, the best one-click Android root tool.


     2. Double click the desktop icon of Kingo Android Root and launch it.
      After launching Kingo Android Root, you will see its interface as shown below.



      Root any Android device with KingoRoot, the best one-click Android root tool.

      Plug your Android device into your computer via USB cable. If your device driver is not installed on your Computer, Kingo will install it for you automatically. Make sure you get Internet conenction so that device driver can be downloaded. If you are using Windows 8, you may need to change some settings first. When running Kingo Android Root on Windows 8, the issue you may most likely encounter is driver installation looping.


      1. Enable USB Debugging mode on your Android device.
      2. USB Debugging mode enabled is a necessary step of Android rooting process.

First of all enable developer options in your phone. Go to settings>>about phone>>software information>>more>>build number. You have to go to build number in your android phone. The setting are different for different phones just go to about phone >>advanced options and search for build number.

Then click on build number about 8-10 times, it will show you that you are 6 or 7 steps away from developer mode then click few more time, then it will show that you are a developer now.

Go to settings>>developer options and select USB debugging.


        IMPORTANT: Pay attention to your device screen for a prompt window. Tick "Always allow from this computer". If you don't, you will probably get yourself an OFFLINE DEVICE.


        Root any Android device with KingoRoot, the best one-click Android root tool.


      1. Read notifications carefully before rooting your device.
      2. Android rooting is nothing big. However, it is not exactly a small issue either. Rooting your device may open a door for you, and yet with risks.

         

        Root any Android device with KingoRoot, the best one-click Android root tool.


      3. Click "ROOT" to root your device.
      4. Kingo Android Root will employ multiple exploits on your device, which will probably take a couple of minutes. In the rooting process, your device may be rebooted several times. Do not be panic, it is perfectly normal. And once it begins, please DO NOT touch, move, unplug or perform any operation on your device.


        Root any Android device with KingoRoot, the best one-click Android root tool.


      5. Root succeeded.
      6. Hopefully your device is well supported and successfully rooted by Kingo. Until your device reboots itself, do not operate.


        Root any Android device with KingoRoot, the best one-click Android root tool.


      7. Check the root status of your device.
      8. Normally, you will find an app named "SuperUser" installed on your device after
         successful rooting.




        Root any Android device with KingoRoot, the best one-click Android root tool.


        For any details or confusion, visit-  https://www.kingoapp.com/root-tutorials/how-to-root-android.htm
         

Rooting your android device



Do you know by rooting your android phone, you could gain full access to your android phone?

Lets see what is rooting.


Rooting- Rooting is basically getting full access to your android device. You could get most out of it.  Rooting is a process that allows you to attain root access to the Android operating system code (the equivalent term for Apple devices id jailbreaking). It gives you privileges to modify the software code on the device or install other software that the manufacturer wouldn’t normally allow you to. And for good mobile security reasons: they don’t want users to make modifications to the phones that could result in accidents beyond repair; it is easier for them to offer support if they allow users to only use the same unmodified version of the software. But tech savvy users have already developed rooting methods, which vary depending on device.

But if you haven't properly rooted your android phone, then it may harm your device. You should have proper antivirus protection for your android then only start this process.  

There are many benefits of rooting your android device, like-

1. Installing Custom ROMs

After rooting your device, you can flash a custom ROM or Kernel, which means you can have a new device.

2. Remove Preinstalled Crapware

Manufacturer won’t allow you to uninstall those preinstalled apps on your device. Rooting a device can make them removed easily, which ensures a high running quality.

3. Blocking Ads in Any Apps

Sick of the pop-up ads when playing games? A rooted device can remove this annoying ads immediately.

4. Install Incompatible Apps

Some wonderful apps need the root access if you install them on your device. Root your phone, enjoy more apps.

5. Keep Latest Android OS

A rooted Android can get the new OS months before the carrier releases the update, often along with a few bonus features.

6. Change Skin for your Android

As you can see, there are only 3 to 4 default skin on your device to change. But if you root your phone and install the new ROMs, you can enjoy the customized and tweaked skins on your device.

7. Boost your Android Device’s Speed and Battery Life

Some powerful apps like Greenify can close the useless applications automatically, which can effectively improve your device’s performance. Of course, Greenify needs root access.

8. Make Complete Backups of Your Android Phone or Tablet

A unrooted Android phone can only backup some settings and apps of your device. Titanium can be used on rooted device to give you a complete backup.

In one word, rooting can make you be the master of your Android phone. You can automate everything on your Android device.

But with this, there are certain disadvantages also,like-

1. Root can Brick Your Device

Compared with unrooted Android device, the rooted one faces a common threat from mis-operation and sometimes you may turn your Android device into a brick.

Avoid this risk: Just download apps from reliable place like Google play, and, do not delete the files if the files are suggested not to delete by rooting apps.

2. Say Good-Bye to the Warranty

The Android device manufacturers will not cover the damage after you rooting your device. For some brand, we can unroot the device after rooting, so, the manufactures don’t know if you have rooted your Android device or not. But to make matters worse, Android device manufactures also go to great lengths to know if your device has been rooted!

3. Problems with Updates

Sometimes you root Android phone to get latest OS but after rooting, you may find that the automatic updates to the firmware stopped. Updates fail to install due to software modifications that occurred while the distribution has been rooted.

Comparing with these pros and cons of rooting your Android device, then choose if you need to root your Android device or not. But i would suggest, if you really want to make most of your phone then do root your phone properly and then enjoy.

When you root your android phone, you may need to connect your android phone to PC with USB cable, and enable the USB debugging mode, install driver for the phone and so on. Or there are other methods to root it like one click root.

To know how to root your android phone, visit-  https://techiehackergeek.blogspot.in/2017/06/how-to-root-your-android-device.html

Thursday 1 June 2017

What is command promt and command promt codes



Command Prompt is a command line interpreter application available in most Windows operating system.
Command Prompt is used to execute entered commands.. Most of those commands are used to automate tasks via scripts and batch files, perform advanced administrative functions, and troubleshoot and solve certain kinds of Windows issues.
Command Prompt is officially called Windows Command Processor but is also sometimes called the command shell or cmd prompt, or even referred to by its filename cmd.exe.

 The Command promt in Windows provides access to over 280 commands. These commands are used to do certain operating system tasks from a command line interface instead of the graphical Windows interface we use most of the time.
These are the following commands that can be used. 

Command

Description
AppendThe append command can be used by programs to open files in another directory as if they were located in the current directory. The append command is available in MS-DOS as well as in all 32-bit versions of Windows. The append command is not available in 64-bit versions of Windows.
ArpThe arp command is used to display or change entries in the ARP cache. The arp command is available in all versions of Windows.
AssocThe assoc command is used to display or change the file type associated with a particular file extension. The assoc command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
AtThe at command is used to schedule commands and other programs to run at a specific date and time. The at command is available in Windows 7, Windows Vista, and Windows XP. Beginning in Windows 8, command line task scheduling should instead be completed with the schtasks command.
AtmadmThe atmadm command is used to display information related to asynchronous transfer mode (ATM) connections on the system. The atmadm command is available in Windows XP. Support for ATM was removed beginning in Windows Vista, making the atmadm command unnecessary.
AttribThe attrib command is used to change the attributes of a single file or a directory. The attrib command is available in all versions of Windows, as well as in MS-DOS.
AuditpolThe auditpol command is used to display or change audit policies. The auditpol command is available in Windows 8, Windows 7, and Windows Vista.
BcdbootThe bcdboot command is used to copy boot files to the system partition and to create a new system BCD store. The bcdboot command is available in Windows 8 and Windows 7.
BcdeditThe bcdedit command is used to view or make changes to Boot Configuration Data. The bcdedit command is available in Windows 8, Windows 7, and Windows Vista. The bcdedit command replaced the bootcfg command beginning in Windows Vista.
BdehdcfgThe bdehdcfg command is sued to prepare a hard drive for BitLocker Drive Encryption. The bdehdcfg command is available in Windows 8 and Windows 7.
BitsadminThe bitsadmin command is used to create, manage, and monitor download and upload jobs. The bitsadmin command is available in Windows 8, Windows 7, and Windows Vista. While the bitsadmin command is available in both Windows 8 and Windows 7, it is being phased out. The BITS PowerShell cmdlets should be used instead.
BootcfgThe bootcfg command is used to build, modify, or view the contents of the boot.ini file, a hidden file that is used to identify in what folder, on which partition, and on which hard drive Windows is located. The bootcfg command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The bootcfg command was replaced by the bcdedit command beginning in Windows Vista. Bootcfg is still available in Windows 8, 7, and Vista, but it serves no real value since boot.ini is not used in these operating systems.
BootsectThe bootsect command is used to configure the master boot code to one compatible with BOOTMGR (Vista and later) or NTLDR (XP and earlier). The bootsect command is available in Windows 8. The bootsect command is also available in Windows 7 and Windows Vista but only from the Command Prompt available in System recovery options.
BreakThe break command sets or clears extended CTRL+C checking on DOS systems. The break command is available in all versions of Windows, as well as in MS-DOS. The break command is available in Windows XP and later versions of Windows to provide compatibility with MS-DOS files but it has no effect in Windows itself.
CaclsThe cacls command is used to display or change access control lists of files. The cacls command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The cacls command is being phased out in favor of the icacls command, which should be used instead in all versions of Windows after Windows XP.
CallThe call command is used to  run a script or batch program from within another script or batch program. The call command is available in all versions of Windows, as well as in MS-DOS. The call command has no effect outside of a script or batch file. In other words, running the call command at the Command Prompt or MS-DOS prompt will do nothing.
CdThe cd command is the shorthand version of the chdir command. The cd command is available in all versions of Windows, as well as in MS-DOS.
CertreqThe certreq command is used to perform various certification authority (CA) certificate functions. The certreq command is available in Windows 8, Windows 7, and Windows Vista.
CertutilThe certutil command is used to dump and display certification authority (CA) configuration information in addition to other CA functions. The certutil command is available in Windows 8, Windows 7, and Windows Vista.
ChangeThe change command changes various terminal server settings like install modes, COM port mappings, and logons. The change command is available in Windows 8, Windows 7, and Windows Vista.
ChcpThe chcp command displays or configures the active code page number. The chcp command is available in all versions of Windows, as well as in MS-DOS.
ChdirThe chdir command is used to display the drive letter and folder that you are currently in. Chdir can also be used to change the drive and/or directory that you want to work in. The chdir command is available in all versions of Windows, as well as in MS-DOS.
ChecknetisolationThe checknetisolation command is used to  test apps that require network capabilities. The checknetisolation command is available in Windows 8.
ChglogonThe chglogon command enables, disables, or drains terminal server session logins. The chglogon command is available in Windows 8, Windows 7, and Windows Vista. Executing the chglogon command is the same as executing change logon.
ChgportThe chgport command can be used to display or change COM port mappings for DOS compatibility. The chgport command is available in Windows 8, Windows 7, and Windows Vista. Executing the chgport command is the same as executing change port.
ChgusrThe chgusr command is used to change the install mode for the terminal server. The chgusr command is available in Windows 8, Windows 7, and Windows Vista. Executing the chgusr command is the same as executing change user.
ChkdskThe chkdsk command, often referred to as check disk, is used to identify and correct certain hard drive errors. The chkdsk command is available in all versions of Windows, as well as in MS-DOS.
ChkntfsThe chkntfs command is used to configure or display the checking of the disk drive during the Windows boot process. The chkntfs command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ChoiceThe choice command is used within a script or batch program to provide a list of choices and return the value of that choice to the program. The choice command is available in MS-DOS and all versions of Windows except Windows XP. Use the set command with the /p switch in place of the choice command in batch files and scripts that you plan to use in Windows XP.
CipherThe cipher command shows or changes the encryption status of files and folders on NTFS partitions. The cipher command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ClipThe clip command is used to redirect the output from any command to the clipboard in Windows. The clip command is available in Windows 8, Windows 7, and Windows Vista.
ClsThe cls command clears the screen of all previously entered commands and other text. The cls command is available in all versions of Windows, as well as in MS-DOS.
CmdThe cmd command starts a new instance of the cmd.exe command interprener. The cmd command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
CmdkeyThe cmdkey command is used to show, create, and remove stored user names and passwords. The cmdkey command is available in Windows 8, Windows 7, and Windows Vista.
CmstpThe cmstp command installs or uninstalls a Connection Manager service profile. The cmstp command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ColorThe color command is used to change the colors of the text and background within the Command Prompt window. The color command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
CommandThe command command starts a new instance of the command.com command interpreter. The command command is available in MS-DOS as well as in all 32-bit versions of Windows. The command command is not available in 64-bit versions of Windows.
CompThe comp command is used to compare the contents of two files or sets of files. The comp command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
CompactThe compact command is used to show or change the compression state of files and directories on NTFS partitions. The compact command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ConvertThe convert command is used to convert FAT or FAT32 formatted volumes to the NTFS format. The convert command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
CopyThe copy command does simply that - it copies one or more files from one location to another. The copy command is available in all versions of Windows, as well as in MS-DOS. The xcopy command is considered to be a more "powerful" version of the copy command.
CscriptThe cscript command is used to execute scripts via Microsoft Script Host. The cscript command is available in all versions of Windows. The cscript command is most popularly used to manage printers from the command line using scripts like prncnfg.vbs, prndrvr.vbs, prnmngr.vbs, and others.
CttyThe ctty command is used to change the default input and output devices for the system. The ctty command is available in Windows 98 and 95 as well as in MS-DOS. The functions provided by the ctty command were no longer necessary beginning in Windows XP because the command.com interpreter (MS-DOS) is no longer the default command line interpreter.
DateThe date command is used to show or change the current date. The date command is available in all versions of Windows, as well as in MS-DOS.
DblspaceThe dblspace command is used to create or configure DoubleSpace compressed drives. The dblspace command is available in Windows 98 and 95, as well as in MS-DOS. DriveSpace, executed using the drvspace command, is an updated version of DoubleSpace. Windows natively handles compression beginning in Windows XP.
DebugThe debug command starts Debug, a command line application used to test and edit programs. The debug command is available in MS-DOS as well as in all 32-bit versions of Windows. The debug command is not available in 64-bit versions of Windows.
DefragThe defrag command is used to defragment a drive you specify. The defrag command is the command line version of Microsoft's Disk Defragmenter. The defrag command is available in all versions of Windows, as well as in MS-DOS.
DelThe del command is used to delete one or more files. The del command is available in all versions of Windows, as well as in MS-DOS. The del command is the same as the erase command.
DeltreeThe deltree command is used to delete a directory and all the files and subdirectories within it. The deltree command is available in Windows 98 and 95, as well as in MS-DOS. Beginning in Windows XP, a folder and its files and subfolders can be removed using the /s function of the rmdir command. Deltree was no longer needed with this new rmdir ability so the command was removed.
DiantzThe diantz command is used to losslessly compress one or more files. The diantz command is sometimes called Cabinet Maker. The diantz command is available in Windows 7, Windows Vista, and Windows XP. The diantz command is the same as the makecab command.
DirThe dir command is used to display a list of files and folders contained inside the folder that you are currently working in. The dir command also displays other important information like the hard drive's serial number, the total number of files listed, their combined size, the total amount of free space left on the drive, and more. The dir command is available in all versions of Windows, as well as in MS-DOS.
DiskcompThe diskcomp command is used to compare the contents of two floppy disks. The diskcomp command is available in all versions of Windows, as well as in MS-DOS.
DiskcopyThe diskcopy command is used to copy the entire contents of one floppy disk to another. The diskcopy command is available in all versions of Windows, as well as in MS-DOS.
DiskpartThe diskpart command is used to create, manage, and delete hard drive partitions. The diskpart command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The diskpart command replaced the fdisk command beginning in Windows XP.
DiskperfThe diskperf command is used to manage disk performance counters remotely. The diskperf command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
DiskraidThe diskraid command starts the DiskRAID tool which is used to manage and configure RAID arrays. The diskraid command is available in Windows 8, Windows 7, and Windows Vista.
DismThe dism command starts the Deployment Image Servicing and Management tool (DISM). The DISM tool is used to manage features in Windows images. The dism command is available in Windows 8 and Windows 7.
DispdiagThe dispdiag command is used to output a log of information about the display system. The dispdiag command is available in Windows 8, Windows 7, and Windows Vista.
DjoinThe djoin command is used to create a new computer account in a domain. The djoin command is available in Windows 8, Windows 7, and Windows Vista.
DoskeyThe doskey command is used to edit command lines, create macros, and recall previously entered commands. The doskey command is available in all versions of Windows, as well as in MS-DOS.
DosshellThe dosshell command starts DOS Shell, a graphical file management tool for MS-DOS. The dosshell command is available in Windows 95 (in MS-DOS mode) and also in MS-DOS version 6.0 and later MS-DOS versions that were upgraded from previous versions that contained the dosshell command. A graphical file manager, Windows Explorer, became an integrated part of the operating system beginning in Windows 95.
DosxThe dosx command is used to start  DOS Protected Mode Interface (DPMI), a special mode designed to give MS-DOS applications access to more than the normally allowed 640 KB. The dosx command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The dosx command is not available in 64-bit versions of Windows. The dosx command and DPMI is only available in Windows to support older MS-DOS programs.
DriverqueryThe driverquery command is used to show a list of all installed drivers. The driverquery command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
DrvspaceThe drvspace command is used to create or configure DriveSpace compressed drives. The drvspace command is available in Windows 98 and 95, as well as in MS-DOS. DriveSpace is an updated version of DoubleSpace, executed using the dblspace command. Windows natively handles compression beginning in Windows XP.
EchoThe echo command is used to show messages, most commonly from within script or batch files. The echo command can also be used to turn the echoing feature on or off. The echo command is available in all versions of Windows, as well as in MS-DOS.
EditThe edit command starts the MS-DOS Editor tool which is used to create and modify text files. The edit command is available in MS-DOS as well as in all 32-bit versions of Windows. The edit command is not available in 64-bit versions of Windows.
EdlinThe edlin command starts the Edlin tool which is used to create and modify text files from the command line. The edlin command is available in all 32-bit versions of Windows but is not available in 64-bit versions of Windows. In MS-DOS, the edlin command is only available up to MS-DOS 5.0 so unless your later version of MS-DOS was upgraded from 5.0 or prior, you won't see the edlin command.
Emm386The emm386 command is used to give MS-DOS access to more than 640 KB of memory. The emm386 command is available in Windows 98 and 95, as well as in MS-DOS. Windows itself has access to extended and expanded memory beginning in Windows 95.
EndlocalThe endlocal command is used to end the localization of environment changes inside a batch or script file. The endlocal command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
EraseThe erase command is used to delete one or more files. The erase command is available in all versions of Windows, as well as in MS-DOS. The erase command is the same as the del command.
EsentutlThe esentutl command is used to manage Extensible Storage Engine databases. The esentutl command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
EventcreateThe eventcreate command is used to create a custom event in an event log. The eventcreate command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
EventtriggersThe eventtriggers command is used to configure and display event triggers. The eventtriggers command is available in Windows XP. Beginning in Windows Vista, event triggers are created using the Attach Task To This Event feature in Event Viewer, making the eventtriggers command unnecessary.
Exe2binThe exe2bin command is used to convert a file of the EXE file type (executable file) to a binary file. The exe2bin command is available in 32-bit versions of Windows 8, Windows 7, Windows Vista, and Windows XP. The exe2bin command is not available in any 64-bit version of Windows.
ExitThe exit command is used to end the cmd.exe (Windows) or command.com (MS-DOS) session that you're currently working in. The exit command is available in all versions of Windows, as well as in MS-DOS.
ExpandThe expand command is used to extract the files and folders contained in Microsoft Cabinet (CAB) files. The expand command is available in MS-DOS as well as in all versions of Windows. The expand command is not available in the 64-bit version of Windows XP.
Extrac32The extrac32 command is used to extract the files and folders contained in Microsoft Cabinet (CAB) files. The extrac32 command is available in all versions of Windows. The extrac32 command is actually a CAB extraction program for use by Internet Explorer but can be used to extract any Microsoft Cabinet file. Use the expand command instead of the extrac32 command if possible.
ExtractThe extract command is used to extract the files and folders contained in Microsoft Cabinet (CAB) files. The extract command is available in Windows 98 and 95. The extract command was replaced by the expand command beginning in Windows XP.
FasthelpThe fasthelp command provides more detailed information on any of the other MS-DOS commands. The fasthelp command is only available in MS-DOS. The help command replaced the fasthelp command beginning in Windows 95.
FastopenThe fastopen command is used to add a program's hard drive location to a special list stored in memory, potentially improving the program's launch time by removing the need for MS-DOS to locate the application on the drive. The fastopen command is available in MS-DOS as well as in all 32-bit versions of Windows. The fastopen command is not available in 64-bit versions of Windows. Fastopen is only available in Windows 8, 7, Vista, and XP to support older MS-DOS files.
FcThe fc command is used to compare two individual or sets of files and then show the differences between them. The fc command is available in all versions of Windows, as well as in MS-DOS.
FdiskThe fdisk command is used to create, manage, and delete hard drive partitions. The fdisk command is available in Windows 98 and 95, as well as in MS-DOS. The fdisk command was replaced by the diskpart command beginning in Windows XP. Partition management is also available from Disk management in Windows 8, 7, Vista, and XP.
FindThe find command is used to search for a specified text string in one or more files. The find command is available in all versions of Windows, as well as in MS-DOS.
FindstrThe findstr command is used to find text string patterns in one or more files. The findstr command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
FingerThe finger command is used to return information about one or more users on a remote computer that's running the Finger service. The finger command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
FltmcThe fltmc command is used to load, unload, list, and otherwise manage Filter drivers. The fltmc command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
FondueThe fondue command, short for Features on Demand User Experience Tool, is used to install any of the several optional Windows features from the command line. The fondue  command is available in Windows 8. Optional Windows features can also be installed from the Programs and Features applet in Control Panel.
ForThe for command is used to run a specified command for each file in a set of files. The for command is most often used within a batch or script file. The for command is available in all versions of Windows, as well as in MS-DOS.
ForcedosThe forcedos command is used to start the specified program in the MS-DOS subsystem. The forcedos command is only available in 32-bit versions of Windows XP. The forcedos command is only used for MS-DOS programs that are not recognized as such by Windows XP.
ForfilesThe forfiles command selects one or more files to execute a specified command on. The forfiles command is most often used within a batch or script file. The forfiles command is available in Windows 8, Windows 7, and Windows Vista.
FormatThe format command is used to format a drive in the file system that you specify. The format command is available in all versions of Windows, as well as in MS-DOS. Drive formatting is also available from Disk Management in Windows 8, 7, Vista, and XP.
FsutilThe fsutil command is used to perform various FAT and NTFS file system tasks like managing reparse points and sparse files, dismounting a volume, and extending a volume. The fsutil command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
FtpThe ftp command can used to transfer files to and from another computer. The remote computer must be operating as an FTP server. The ftp command is available in all versions of Windows.
FtypeThe ftype command is used to define a default program to open a specified file type. The ftype command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
GetmacThe getmac command is used to display the media access control (MAC) address of all the network controllers on a system. The getmac command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
GotoThe goto command is used in a batch or script file to direct the command process to a labeled line in the script. The goto command is available in all versions of Windows, as well as in MS-DOS.
GpresultThe gpresult command is used to display Group Policy settings. The gpresult command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
GpupdateThe gpupdate command is used to update Group Policy settings. The gpupdate command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
GraftablThe graftabl command is used to enable the ability of Windows to display an extended character set in graphics mode. The graftabl command is available in all versions of Windows and in MS-DOS up to version 5.0. The graftabl command is not available in 64-bit versions of Windows.
GraphicsThe graphics command is used to load a program that can print graphics. The graphics command is available in MS-DOS as well as in all 32-bit versions of Windows. The graphics command is not available in 64-bit versions of Windows.
HelpThe help command provides more detailed information on any of the other Command Prompt or MS-DOS commands. The help command is available in all versions of Windows, as well as in MS-DOS.
HostnameThe hostname command displays the name of the current host. The hostname command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
HwrcompThe hwrcomp command is used to compile custom dictionaries for handwriting recognition. The hwrcomp command is available in Windows 8 and Windows 7.
HwrregThe hwrreg command is used to install a previously compiled custom dictionary for handwriting recognition. The hwrreg command is available in Windows 8 and Windows 7.
IcaclsThe icacls command is used to display or change access control lists of files. The icacls command is available in Windows 8, Windows 7, and Windows Vista. The icacls command is an updated version of the cacls command.
IfThe if command is used to perform conditional functions in a batch file. The if command is available in all versions of Windows, as well as in MS-DOS.
InterlnkThe interlnk command is used to connect two computers via a serial or parallel connection to share files and printers. The interlnk command is only available in MS-DOS. The ability to directly connect two computers is handled by the networking functions in all versions of Windows.
IntersvrThe intersvr command is used to start the Interlnk server and to copy Interlnk files from one computer to another. The intersvr command is only available in MS-DOS. The ability to directly connect two computers is handled by the networking functions in all versions of Windows.
IpconfigThe ipconfig command is used to display detailed IP information for each network adapter utilizing TCP/IP. The ipconfig command can also be used to release and renew IP addresses on systems configured to receive them via a DHCP server. The ipconfig command is available in all versions of Windows.
IpxrouteThe ipxroute command is used to display and change information about IPX routing tables. The ipxroute command is available in Windows XP. Microsoft removed their native NetWare client beginning in Windows Vista, removing the associated ipxroute command as well.
IrftpThe irftp command is used to transmit files over an infrared link. The irftp command is available in Windows 8, Windows 7, and Windows Vista.
IscsicliThe iscsicli command starts the Microsoft iSCSI Initiator, used to manage iSCSI. The iscsicli command is available in Windows 8, Windows 7, and Windows Vista.
Kb16The kb16 command is used to support MS-DOS files that need to configure a keyboard for a specific language. The kb16 command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The kb16 command is not available in 64-bit versions of Windows. The kb16 command replaced the keyb command beginning in Windows XP but only exists to support older MS-DOS files.
KeybThe keyb command is used to configure a keyboard for a specific language. The keyb command is available in Windows 98 and 95, as well as in MS-DOS. See the kb16 command for an equivalent command in later versions of Windows. Keyboard language settings are handled by the Region and Language or Regional and Language Options (depending on the version of Windows) Control panel applets in Windows beginning in Windows XP.
KlistThe klist command is used to list Kerberos service tickets. The klist command can also be used to purge Kerberos tickets. The klist command is available in Windows 8 and Windows 7.
KsetupThe ksetup command is used to configure connections to a Kerberos server. The ksetup command is available in Windows 8 and Windows 7.
KtmutilThe ktmutil command starts the Kernel Transaction Manager utility. The ktmutil command is available in Windows 8, Windows 7, and Windows Vista.
LabelThe label command is used to manage the volume label of a disk. The label command is available in all versions of Windows, as well as in MS-DOS.
LhThe lh command is the shorthand version of the loadhigh command. The lh command is available in Windows 98 and 95, as well as in MS-DOS.
LicensingdiagThe licensingdiag command is a tool used to generate a text-based log and other data files that contain product activation and other Windows licensing information. The licensingdiag command is available in Windows 8.
LoadfixThe loadfix command is used to load the specified program in the first 64K of memory and then runs the program. The loadfix command is available in MS-DOS as well as in all 32-bit versions of Windows. The loadfix command is not available in 64-bit versions of Windows.
LoadhighThe loadhigh command is used to load a program into high memory and is usually used from within the autoexec.bat file. The loadhigh command is available in Windows 98 and 95, as well as in MS-DOS. Memory usage is handled automatically beginning in Windows XP.
LockThe lock command is used to lock a drive, enabling direct disk access for a program. The lock command is only available in Windows 98 and 95. Drive locking is no longer available as of Windows XP.
LodctrThe lodctr command is used to update registry values related to performance counters. The lodctr command is available in all versions of Windows.
LogmanThe logman command is used to create and manage Event Trace Session and Performance logs. The logman command also supports many functions of Performance Monitor. The logman command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
LogoffThe logoff command is used to terminate a session. The logoff command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
LpqThe lpq command displays the status of a print queue on a computer running Line Printer Daemon (LPD). The lpq command is available in all versions of Windows. The lpq command is not available by default in Windows 8, 7, or Vista, but can be enabled by turning on the LPD Print Service and LPR Port Monitor features from Programs and Features in Control Panel.
LprThe lpr command is used to send a file to a computer running Line Printer Daemon (LPD). The lpr command is available in all versions of Windows. The lpr command is not available by default in Windows 8, 7, or Vista, but can be enabled by turning on the LPD Print Service and LPR Port Monitor features from Programs and Features in Control Panel.
MakecabThe makecab command is used to losslessly compress one or more files. The makecab command is sometimes called Cabinet Maker. The makecab command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The makecab command is the same as the diantz command, a command that was removed after Windows 7.
Manage-bdeThe manage-bde command is used to configure BitLocker Drive Encryption from the command line. The manage-bde command is available in Windows 8 and Windows 7. A script by the name of manage-bde.wsf exists in Windows Vista and can be used with the cscript command to perform BitLocker tasks from the command line in that operating system.
MdThe md command is the shorthand version of the mkdir command. The md command is available in all versions of Windows, as well as in MS-DOS.
MemThe mem command shows information about used and free memory areas and programs that are currently loaded into memory in the MS-DOS subsystem. The mem command is available in MS-DOS as well as in all 32-bit versions of Windows. The mem command is not available in 64-bit versions of Windows.
MemmakerThe memmaker command is used to start MemMaker, a memory optimization tool. The memaker command is available in Windows 98 and 95, as well as in MS-DOS. Memory usage is automatically optimized beginning in Windows XP.
MkdirThe mkdir command is used to create a new folder. The mkdir command is available in all versions of Windows, as well as in MS-DOS.
MklinkThe mklink command is used to create a symbolic link. The mklink command is available in Windows 8, Windows 7, and Windows Vista.
ModeThe mode command is used to configure system devices, most often COM and LPT ports. The mode command is available in all versions of Windows, as well as in MS-DOS.
MofcompThe mofcomp command properly displays the data within a Managed Object Format (MOF) file. The mofcomp command is available in all versions of Windows.
MoreThe more command is used to display the information contained in a text file. The more command can also be used to paginate the results of any other Command Prompt or MS-DOS command. The more command is available in all versions of Windows, as well as in MS-DOS.
MountThe mount command is used to mount Network File System (NFS) network shares. The mount command is available in Windows 7 and Windows Vista. The mount command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Services for NFS Windows feature from Programs and Features in Control Panel. The mount command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
MountvolThe mountvol command is used to display, create, or remove  volume mount points. The mountvol command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
MoveThe move command is used to move one or files from one folder to another. The move command is also used to rename directories. The move command is available in all versions of Windows, as well as in MS-DOS.
MrinfoThe mrinfo command is used to provide information about a router's interfaces and neighbors. The mrinfo command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
MsavThe msav command starts Microsoft Antivirus. The msav command is only available in MS-DOS. Microsoft Antivirus was designed for MS-DOS and Windows 3.x only. Microsoft provides an optional virus protection suite called Microsoft Security Essentials for Windows XP and later operating systems and third party antivirus tools are available for all versions of Windows.
MsbackupThe msbackup command starts Microsoft Backup, a tool used to back up and restore one or more files. The msbackup command is only available in MS-DOS. The msbackup command was replaced with Microsoft Backup beginning in Windows 95 and then Backup and Restore in later versions of Windows.
MscdexThe mscdex command is used to provide CD-ROM access to MS-DOS. The mscdex command is available in Windows 98 and 95, as well as in MS-DOS. Windows provides access to CD-ROM drives for the MS-DOS subsystem beginning in Windows XP so the mscdex command is unnecessary in this and later operating systems.
MsdThe msd command starts Microsoft Diagnostics, a tool used to display information about your computer. The msd command is only available in MS-DOS. The msd command was replaced with System Information beginning in Windows 95.
MsgThe msg command is used to send a message to a user. The msg command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
MsiexecThe msiexec command is used to start Windows Installer, a tool used to install and configure software. The msiexec command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
MuiunattendThe muiunattend command starts the Multilanguage User Interface unattended setup process. The muiunattend command is available in Windows 8, Windows 7, and Windows Vista.
NbtstatThe nbtstat command is used to show TCP/IP information and other statistical information about a remote computer. The nbtstat command is available in all versions of Windows.
NetThe net command is used to display, configure, and correct a wide variety of network settings. The net command is available in all versions of Windows.
Net1The net1 command is used to display, configure, and correct a wide variety of network settings. The net1 command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The net command should be used instead of the net1 command. The net1 command was made available in Windows NT and Windows 2000 as a temporary fix for a Y2K issue that the net command had, which was corrected before the release of Windows XP. The net1 command remains in later versions of Windows only for compatibility with older programs and scripts that utilized the command.
NetcfgThe netcfg command is used to install the Windows Preinstallation Environment (WinPE), a lightweight version of Windows used to deploy workstations. The netcfg command is available in Windows 8, Windows 7, and Windows Vista.
NetshThe netsh command is used to start Network Shell, a command-line utility used to manage the network configuration of the local, or a remote, computer. The netsh command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
NetstatThe netstat command is most commonly used to display all open network connections and listening ports. The netstat command is available in all versions of Windows.
NfsadminThe nfsadmin command is used to manage Server for NFS or Client for NFS from the command line. The nfsadmin command is available in Windows 7 and Windows Vista. The nfsadmin command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Services for NFS Windows feature from Programs and Features in Control Panel. The nfsadmin command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
NlsfuncThe nlsfunc command is used to load information specific to a particular country or region. The nlsfunc command is available in MS-DOS as well as in all 32-bit versions of Windows. The nlsfunc command is not available in 64-bit versions of Windows. Nlsfunc is only available in Windows 8, 7, Vista, and XP to support older MS-DOS files.
NltestThe nltest command is used to test secure channels between Windows computers in a domain and between domain controllers that are trusting other domains. The nltest command is available in Windows 8 and Windows 7.
NslookupThe nslookup is most commonly used to display the hostname of an entered IP address. The nslookup command queries your configured DNS server to discover the IP address. The nslookup command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
NtbackupThe ntbackup command is used to perform various backup functions from the Command Prompt or from within a batch or script file. The ntbackup command is available in Windows XP. The ntbackup command was replaced with the wbadmin beginning in Windows Vista.
NtsdThe ntsd command is used to perform certain command line debugging tasks. The ntsd command is available in Windows XP. The ntsd command was removed beginning in Windows Vista due to the addition of dump file support in Task manager.
OcsetupThe ocsetup command starts the Windows Optional Component Setup tool, used to install additional Windows features. The ocsetup command is available in Windows 8, Windows 7, and Windows Vista. Beginning in Windows 8, Microsoft is depreciating the ocsetup command in favor of the dism command.
OpenfilesThe openfiles command is used to display and disconnect open files and folders on a system. The openfiles command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
PathThe path command is used to display or set a specific path available to executable files. The path command is available in all versions of Windows, as well as in MS-DOS.
PathpingThe pathping command functions much like the tracert command but will also report information about network latency and loss at each hop. The pathping command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
PauseThe pause command is used within a batch or script file to pause the processing of the file. When the pause command is used, a "Press any key to continue…" message displays in the command window. The pause command is available in all versions of Windows, as well as in MS-DOS.
PentntThe pentnt command is used to detect floating point division errors in the Intel Pentium chip. The pentnt command is also used to enable floating point emulation and disable floating point hardware The pentnt command is available in Windows XP. The pentnt command was removed beginning in Windows Vista due to the lack of Intel Pentium CPU use at the time of this operating system release.
PingThe ping command sends an Internet Control Message Protocol (ICMP) Echo Request message to a specified remote computer to verify IP-level connectivity. The ping command is available in all versions of Windows.
PkgmgrThe pkgmgr command is used to start the Windows Package Manager from the Command Prompt. Package Manager installs, uninstalls, configures, and updates features and packages for Windows. The pkgmgr command is available in Windows 8, Windows 7, and Windows Vista.
PnpunattendThe pnpunattend command is used to automate the installation of hardware device drivers. The pnpunattend command is available in Windows 8, Windows 7, and Windows Vista.
PnputilThe pnputil command is used to start the Microsoft PnP Utility, a tool used to install a Plug and Play device from the command line. The pnputil command is available in Windows 8, Windows 7, and Windows Vista.
PopdThe popd command is used to change the current directory to the one most recently stored by the pushd command. The popd command is most often utilized from within a batch or script file. The popd command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
PowerThe power command is used to reduce the power consumed by a computer by monitoring software and hardware devices. The power command is available in Windows 98 and 95, as well as in MS-DOS. The power command was replaced by operating system integrated power management functions beginning in Windows XP.
PowercfgThe powercfg command is used to manage the Windows power management settings from the command line. The powercfg command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
PrintThe print command is used to print a specified text file to a specified printing device. The print command is available in all versions of Windows, as well as in MS-DOS.
PromptThe prompt command is used to customize the appearance of the prompt text in Command Prompt or MS-DOS. The prompt command is available in all versions of Windows, as well as in MS-DOS.
PushdThe pushd command is used to store a directory for use, most commonly from within a batch or script program. The pushd command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
PwlauncherThe pwlauncher command is used to enable, disable, or show the status of your Windows To Go startup options. The pwlauncher command is available in Windows 8.
QappsrvThe qappsrv command is used to display all Remote Desktop Session Host servers available on the network. The qappsrv command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
QbasicThe qbasic command starts QBasic, the MS-DOS based programming environment for the BASIC programming language. The qbasic command is available in Windows 98 and 95, as well as in MS-DOS. The qbasic command is not installed by default with Windows 98 or 95 but is available from the installation disc or disks.
QprocessThe qprocess command is used to display information about running processes. The qprocess command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
QueryThe query command is used to display the status of a specified service. The query command is available in Windows 8, Windows 7, and Windows Vista.
QuserThe quser command is used to display information about users currently logged on to the system. The quser command is available in Windows 8, Windows 7, and Windows Vista.
QwinstaThe qwinsta command is used to display information about open Remote Desktop Sessions. The qwinsta command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RasautouThe rasautou command is used to manage Remote Access Dialer AutoDial addresses. The rasautou command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RasdialThe rasdial command is used to start or end a network connection for a Microsoft client. The rasdial command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RcpThe rcp command is used to copy files between a Windows computer and a system running the rshd daemon. The rcp command is available in Windows 7, Windows Vista, and Windows XP. The rcp command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Subsystem for UNIX-based Applications Windows feature from Programs and Features in Control Panel and then installing the Utilities and SDK for UNIX-based Applications available here for Windows Vista and here for Windows 7. The rcp command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
RdThe rd command is the shorthand version of the rmdir command. The rd command is available in all versions of Windows, as well as in MS-DOS.
RdpsignThe rdpsign command is used to sign a Remote Desktop Protocol (RDP) file. The rdpsign command is available in Windows 7.
ReagentcThe reagentc command is used to configure the Windows Recovery Environment (RE). The reagentc command is available in Windows 8 and Windows 7.
RecimgThe recimg command is used to create a custom refresh image. The recimg command is available in Windows 8.
RecoverThe recover command is used to recover readable data from a bad or defective disk. The recover command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RegThe reg command is used to manage the Window registry from the command line. The reg command can perform common registry functions like adding registry keys exporting the registry, etc. The reg command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ReginiThe regini command is used to set or change registry permissions and  registry values from the command line. The regini command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
Register-cimproviderThe register-cimprovider command is used to register a Common Information Model (CIM) Provider in Windows. The register-cimprovider command is available in Windows 8.
Regsvr32The regsvr32 command is used to register a DLL file as a command component in the Windows Registry. The regsvr32 command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RelogThe relog command is used to create new performance logs from data in existing performance logs. The relog command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RemThe rem command is used to record comments or remarks in a batch or script file. The rem command is available in all versions of Windows, as well as in MS-DOS.
RenThe ren command is the shorthand version of the rename command. The ren command is available in all versions of Windows, as well as in MS-DOS.
RenameThe rename command is used to change the name of the individual file that you specify. The rename command is available in all versions of Windows, as well as in MS-DOS.
Repair-bdeThe repair-bde command is used to repair or decrypt a damaged drive that's been encrypted using BitLocker. The repair-bde command is available in Windows 8 and Windows 7.
ReplaceThe replace command is used to replace one or more files with one or more other files. The replace command is available in all versions of Windows, as well as in MS-DOS.
ResetThe reset  command, executed as reset session, is used to reset the session subsystem software and hardware to known initial values. The reset command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RestoreThe restore command is used to restore files that were backed up using the backup command. The restore command is only available in MS-DOS. The backup command was only available up to MS-DOS 5.00 but the restore command was included by default with later versions of MS-DOS to provide a way to restore files that were backed up in previous versions of MS-DOS.
RexecThe rexec command is used to run commands on remote computers running the rexec daemon. The rexec command is available in Windows Vista and Windows XP. The rsh command is not available by default in Windows Vista but can be enabled by turning on the Subsystem for UNIX-based Applications Windows feature from Programs and Features in Control Panel and then installing the Utilities and SDK for UNIX-based Applications available here. The rexec command is not available in Windows 7 but can be executed in Windows XP via Windows XP Mode if need be.
RmdirThe rmdir command is used to delete an existing or completely empty folder. The rmdir command is available in all versions of Windows, as well as in MS-DOS.
RobocopyThe robocopy command is used to copy files and directories from one location to another. This command is also called Robust File Copy. The robocopy command is available in Windows 8, Windows 7, and Windows Vista. The robocopy command is superior to the both the copy command and the xcopy command because robocopy supports many more options. 
RouteThe route command is used to manipulate network routing tables. The route command is available in all versions of Windows.
RpcinfoThe rpcinfo command makes a remote procedure call (RPC) to an RPC server and reports what it finds. The rpcinfo command is available in Windows 7 and Windows Vista. The rpcinfo command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Services for NFS Windows feature from Programs and Features in Control Panel. The rpcinfo command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
RpcpingThe rpcping command is used to ping a server using RPC. The rpcping command is available in Windows 8, Windows 7, and Windows Vista.
RshThe rsh command is used to run commands on remote computers running the rsh daemon. The rsh command is available in Windows 7, Windows Vista, and Windows XP. The rsh command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Subsystem for UNIX-based Applications Windows feature from Programs and Features in Control Panel and then installing the Utilities and SDK for UNIX-based Applications available here for Windows Vista and here for Windows 7. The rsh command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
RsmThe rsm command is used to manage media resources using Removable Storage. The rsm command is available in Windows Vista and Windows XP. The rsm command was optional in Windows Vista and then removed in Windows 7 due to Removable Storage Manager being removed from the operating system. Search for the rsm command in the C:\Windows\winsxs folder in Windows Vista if you're having trouble executing the command.
RunasThe runas command is used to execute a program using another user's credentials. The runas command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
RwinstaThe rwinsta command is the shorthand version of the reset session command. The rwinsta command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ScThe sc command is used to configure information about services. The sc command communicates with the Service Control Manager. The sc command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ScandiskThe scandisk command is used to start Microsoft ScanDisk, a disk repair program. The scandisk command is available in Windows 98 and 95, as well as in MS-DOS. The scandisk command was replaced by the chkdsk command beginning in Windows XP.
ScanregThe scanreg command starts Windows Registry Checker, a basic registry repair program and backup utility. The scanreg command is available in Windows 98 and Windows 95. The functions provided by the scanreg command were no longer necessary beginning in Windows XP due to changes in how the Windows Registry functions.
SchtasksThe schtasks command is used to schedule specified programs or commands to run a certain times. The schtasks command can be used to create, delete, query, change, run, and end scheduled tasks. The schtasks command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
SdbinstThe sdbinst command is used to deploy customized SDB database files. The sdbinst command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
SeceditThe secedit command is used to configure and analyze system security by comparing the current security configuration to a template. The secedit command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
SetThe set command is used to display, enable, or disable environment variables in MS-DOS or from the Command Prompt. The set command is available in all versions of Windows, as well as in MS-DOS.
SetlocalThe setlocal command is used to start the localization of environment changes inside a batch or script file. The setlocal command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
SetspnThe setspn command is used to manage the Service Principal Names (SPN) for an Active Directory (AD) service account. The setspn command is available in Windows 8 and Windows 7.
SetverThe setver command is used to set the MS-DOS version number that MS-DOS reports to a program. The setver command is available in MS-DOS as well as in all 32-bit versions of Windows. The setver command is not available in 64-bit versions of Windows.
SetxThe setx command is used to create or change environment variables in the user environment or the system environment. The setx command is available in Windows 8, Windows 7, and Windows Vista.
SfcThe sfc command is used to verify and replace important Windows system files. The sfc command is also referred to as System File Checker or Windows Resource Checker depending on the operating system. The sfc command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
ShadowThe shadow command is used to monitor another Remote Desktop Services session. The shadow command is available in Windows 7, Windows Vista, and Windows XP.
ShareThe share command is used to install file locking and file sharing functions in MS-DOS. The share command is available in MS-DOS as well as in all 32-bit versions of Windows. The share command is not available in 64-bit versions of Windows. Share is only available in Windows 8, 7, Vista, and XP to support older MS-DOS files.
ShiftThe shift command is used to change the position of replaceable parameters in a batch or script file. The shift command is available in all versions of Windows, as well as in MS-DOS.
ShowmountThe showmount command is used to display information about NFS mounted file systems. The showmount command is available in Windows 7 and Windows Vista. The showmount command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Services for NFS Windows feature from Programs and Features in Control Panel. The showmount command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
ShutdownThe shutdown command can be used to shut down, restart, or log off the current system or a remote computer. The shutdown command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
SmartdrvThe smartdrv command installs and configures SMARTDrive, a disk caching utility for MS-DOS. The smartdrv command is available in Windows 98 and 95, as well as in MS-DOS. Caching is automatic beginning in Windows XP, making the smartdrv command unnecessary.
SortThe sort command is used to read data from a specified input, sort that data, and return the results of that sort to the Command Prompt screen, a file, or another output device. The sort command is available in all versions of Windows, as well as in MS-DOS.
StartThe start command is used to open a new command line window to run a specified program or command. The start command can also be used to start an application without creating a new window. The start command is available in all versions of Windows.
SubstThe subst command is used to associate a local path with a drive letter. The subst command is a lot like the net use command except a local path is used instead of a shared network path. The subst command is available in all versions of Windows, as well as in MS-DOS. The subst command replaced the assign command beginning with MS-DOS 6.0.
SxstraceThe sxstrace command is used to start the WinSxs Tracing Utility, a  programming diagnostic tool. The sxstrace command is available in Windows 8, Windows 7, and Windows Vista.
SysThe sys command is used to copy the MS-DOS system files and command interpreter to a disk. The sys command is available in Windows 98 and 95, as well as in MS-DOS. The sys command is used most often to create a simple bootable disk or hard drive. The necessary system files  for Windows are too large to fit on a disk so the sys command was removed beginning in Windows XP.
SysteminfoThe systeminfo command is used to display basic Windows configuration information for the local or a remote computer. The systeminfo command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TakeownThe takedown command is used to regain access to a file that that an administrator was denied access to when reassigning ownership of the file. The takeown command is available in Windows 8, Windows 7, and Windows Vista.
TaskkillThe taskkill command is used to terminate a running task. The taskkill command is the command line equivalent of ending a process in task manager in Windows. The taskkill command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TasklistDisplays a list of applications, services, and the Process ID (PID) currently running on either a local or a remote computer. The tasklist command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TcmsetupThe tcmsetup command is used to setup or disable the Telephony Application Programming Interface (TAPI) client. The tcmsetup command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TelnetThe telnet command is used to communicate with remote computers that use the Telnet protocol. The telnet command is available in all versions of Windows. The telnet command is not available by default in Windows 8, 7, or Vista, but can be enabled by turning on the Telnet Client Windows feature from Programs and Features in Control Panel.
TftpThe tftp command is used to transfer files to and from a remote computer that's running the Trivial File Transfer Protocol (TFTP) service or daemon. The tftp command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The tftp command is not available by default in Windows 8, 7, or Vista, but can be enabled by turning on the TFTP Client Windows feature from Programs and Features in Control Panel.
TimeThe time command is used to show or change the current time. The time command is available in all versions of Windows, as well as in MS-DOS.
TimeoutThe timeout command is typically used in a batch or script file to provide a specified timeout value during a procedure. The timeout command can also be used to ignore keypresses. The timeout command is available in Windows 8, Windows 7, and Windows Vista.
TitleThe title command is used to set the Command Prompt window title. The title command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TlntadmnThe tlntadmn command is used to administer a local or remote computer running Telnet Server. The tlntadmn command is available in Windows 8, Windows 7, Windows Vista, and Windows XP. The tlntadmn command is not available by default in Windows 8, 7, or Vista, but can be enabled by turning on the Telnet Server Windows feature from Programs and Features in Control Panel.
TpmvscmgrThe tpmvscmgr command is used to create and destroy TPM virtual smart cards. The tpmvscmgr command is available in Windows 8.
TracerptThe tracerpt command is used to process event trace logs or real-time data from instrumented event trace providers. The tracerpt command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TracertThe tracert command sends Internet Control Message Protocol (ICMP) Echo Request messages to a specified remote computer with increasing Time to Live (TTL) field values and displays the IP address and hostname, if available, of the router interfaces between the source and destination. The tracert command is available in all versions of Windows.
TreeThe tree command is used to graphically display the folder structure of a specified drive or path. The tree command is available in all versions of Windows, as well as in MS-DOS.
TsconThe tscon command is used to attach a user session to a Remote Desktop session. The tscon command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TsdisconThe tsdiscon command is used to disconnect a Remote Desktop session. The tsdiscon command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TskillThe tskill command is used to end the specified process. The tskill command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TsshutdnThe tsshutdn command is used to remotely shut down or restart a terminal server. The tsshutdn command is available in Windows XP. The ability to shut down a computer remotely is also available in the more powerful shutdown command so tsshutdn was removed beginning in Windows Vista.
TypeThe type command is used to display the information contained in a text file. The type command is available in all versions of Windows, as well as in MS-DOS.
TypeperfThe typerperf command displays performance data in the Command Prompt window or writes the data to specified log file. The typeperf command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
TzutilThe tzutil command is used to display or configure the current system's time zone. The tzutil command can also be used to enable or disable Daylight Saving Time adjustments. The tzutil command is available in Windows 8 and Windows 7.
UmountThe umount command is used to remove Network File System (NFS) mounted network shares. The umount command is available in Windows 7 and Windows Vista. The umount command is not available by default in Windows Vista or Windows 7 but can be enabled by turning on the Services for NFS Windows feature from Programs and Features in Control Panel. The umount command is not available in Windows 8 because Service for UNIX (SFU) was discontinued.
UndeleteThe undelete command is used to undo a deletion performed with the MS-DOS delete command. The undelete command is only available in MS-DOS. The undelete command was removed beginning in Windows 95 due to the availability of the Recycle Bin in Windows. Additionally, free file recovery programs are available from third party software makers.
UnformatThe unformat command is used to undo the formatting on a drive performed by the MS-DOS format command. The unformat command is only available in MS-DOS. The unformat command was removed beginning in Windows 95 due to file system changes.
UnlockThe unlock command is used to unlock a drive, disabling direct disk access for a program. The unlock command is only available in Windows 98 and 95. Drive locking is no longer available as of Windows XP.
UnlodctrThe unlodctr command removes Explain text and Performance counter names for a service or device driver from the Windows Registry. The unlodctr command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
VaultcmdThe vaultcmd command is used to create, remove, and show stored credentials. The vaultcmd command is available in Windows 8 and Windows 7.
VerThe ver command is used to display the current Windows or MS-DOS version number The ver command is available in all versions of Windows, as well as in MS-DOS.
VerifyThe verify command is used to enable or disable the ability of Command Prompt, or MS-DOS, to verify that files are written correctly to a disk. The verify command is available in all versions of Windows, as well as in MS-DOS.
VolThe vol command shows the volume label and serial number of a specified disk, assuming this information exists. The vol command is available in all versions of Windows, as well as in MS-DOS.
VsafeThe vsafe command is used to start VSafe, a basic virus protection system for MS-DOS. The vsafe command is only available in MS-DOS. VSafe was designed for MS-DOS and Windows 3.x only. Microsoft provides an optional virus protection suite called Microsoft Security Essentials for Windows XP and later operating systems and third party antivirus tools are available for all versions of Windows.
VssadminThe vssadmin command starts the Volume Shadow Copy Service administrative command line tool which displays current volume shadow copy backups and all installed shadow copy writers and providers. The vssadmin command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
W32tmThe w32tm command is used to diagnose issues with Windows Time. The w32tm command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
WaitforThe waitfor command is used to send or wait for a signal on a system. The waitfor command is available in Windows 8, Windows 7, and Windows Vista.
WbadminThe wbadmin command is used start and stop backup jobs, display details about a previous backup, list the items within a backup, and report on the status of a currently running backup. The wbadmin command is available in Windows 8, Windows 7, and Windows Vista. The wbadmin command replaced the ntbackup command beginning in Windows Vista.
WecutilThe wecutil command is used to mange subscriptions to events that are forwarded from WS-Management supported computers. The wecutil command is available in Windows 8, Windows 7, and Windows Vista.
WevtutilThe wevtutil command starts the Windows Events Command Line Utility which is used to manage event logs and publishers. The wevtutil command is available in Windows 8, Windows 7, and Windows Vista.
WhereThe where command is used to search for files that match a specified pattern. The where command is available in Windows 8, Windows 7, and Windows Vista.
WhoamiThe whoami command is used to retrieve user name and group information on a network. The whoami command is available in Windows 8, Windows 7, and Windows Vista.
WinmgmtThe winmgmt command starts the command line version of WMI, a scripting tool in Windows. The winmgmt command is available in all versions of Windows.
WinrmThe winrm command is used to start the command line version of Windows Remote Management, used to manage secure communications with local and remote computers using web services. The winrm command is available in Windows 8, Windows 7, and Windows Vista.
WinrsThe winrs command is used to open a secure command window with a remote host. The winrs command is available in Windows 8, Windows 7, and Windows Vista.
WinsatThe winsat command starts the Windows System Assessment Tool, a program that assesses various features, attributes, and capabilities of a computer running Windows. The winsat command is available in Windows 8, Windows 7, and Windows Vista.
WmicThe wmic command starts the Windows Management Instrumentation Command line (WMIC), a scripting interface that simplifies the use of Windows Management Instrumentation (WMI) and systems managed via WMI. The wmic command is available in Windows 8, Windows 7, Windows Vista, and Windows XP.
WsmanhttpconfigThe wsmanhttpconfig command is used to manage aspects of the Windows Remote Management (WinRM) service. The wsmanhttpconfig command is available in Windows 8, Windows 7, and Windows Vista.
XcopyThe xcopy command can copy one or more files or directory trees from one location to another. The xcopy command is generally considered a more "powerful" version of the copy command though the robocopy command trumps even xcopy. The xcopy command is available in all versions of Windows, as well as in MS-DOS. A command by the name of xcopy32 existed in Windows 95 and Windows 98. To avoid a long and confusing explanation here, just know that no matter if you executed the xcopy command or the xcopy32 command, you were always executing the most updated version of the command.
XwizardThe xwizard command, short for Extensible Wizard, is used to register data in Windows, often from a preconfigured XML file. The xwizard command is available in Windows 8 and Windows 7.