Escolar Documentos
Profissional Documentos
Cultura Documentos
By
The Technocrats
Windows XP Recovery Console Equivalents in Windows Vista
The Recovery Console has been deprecated in Windows Vista, so what happened to all those wonderful commands that were
available in recovery console? Well, we were kind of hoping that you wouldn’t need them anymore. But if you do, you’ll be glad to
know that most of them are available via the command line in the Windows Recovery Environment (WinRE). The recovery console
commands listed in the following table are different or unavailable in WinRE.
Recovery Console Command: BootCfg
WinRE Equivalent: BootRec /ScanOS; BootRec /RebuildBcd; bcdedit
Recovery Console Command: FixBoot
WinRE Equivalent: BootRec /FixBoot
Recovery Console Command: FixMBR
WinRE Equivalent: BootRec /FixMbr
Recovery Console Command: Map
WinRE Equivalent: DiskPart
Recovery Console Command: Logon
WinRE Equivalent: Not needed
Recovery Console Command: LISTSVC; ENABLE; DISABLE; SYSTEMROOT
WinRE Equivalent: Not available
All the remaining commands have the same name in WinRE. You can work around the unavailable services-related commands
(listsvc, enable, and disable) by using regedit to manually load the registry hive.
These IFilters are designed to provide enhanced search functionality for the following products: SPS2003, MOSS2007, Search
Server 2008, Search Server 2008 Express, WSSv3, Exchange 2007, SQL 2005, SQL 2008, and Windows Desktop Search 3.01.
When you install the Filter Pack (which you can download for free), the IFilters in the preceding list are installed and registered with
the Windows Search service. The Filter Pack is available for x86 and x64 versions of Windows Vista, Windows Server 2008,
Windows XP, and Windows Server 2003.
PendMove v1.1
Copyright (C) 2004 Mark Russinovich
Sysinternals - wwww.sysinternals.com
Source: C:\Users\User1\Documents\file.txt
Target: C:\Users\User1\Documents\dest\file.txt
Source: C:\Users\User1\Documents\file2.txt
Target: DELETE
Time of last update to pending moves key: 2/27/2008 10:08 AM
Free-form Snip. Draw an irregular line, such as a circle or a triangle, around an object.
Rectangular Snip. Draw a precise line by dragging the cursor around an object to form a rectangle.
Window Snip. Select a window, such as a browser window or dialog box, that you want to capture.
Full-screen Snip. Capture the entire screen when you select this type of snip.
After you capture a snip, it's automatically copied to the mark-up window, where you can annotate, save, or share the snip.
When Snipping Tool is open, a white overlay appears on your screen until you capture a snip. To turn off the overlay, open Snipping
Tool, and then click Options. In the Snipping Tool Options dialog box, clear the Show screen overlay when Snipping Tool is active
check box, and then click OK.
/r:value (remote) If specified, runs the command on a remote computer named value. Note that im (install-manifest)
and um (uninstall-manifest) do not support remote operation.
/u:value (username) Specifies a different user to log on to remote computer. Here value is a user name in the form
domain\user or user. This option is only applicable when option /r (remote) is specified.
/p:value (password) Specifies a password for the specified user. If not specified or value is "*", the user will be
prompted to enter a password. This option is only applicable when /u (username) option is specified.
/a:value (authentication) Specifies an authentication type for connecting to a remote computer. Value can be Default,
Negotiate, Kerberos, or NTLM. The default is Negotiate.
/uni:value (unicode) Displays output in Unicode. Value can be true or false (if true, output is in Unicode).
To learn more about a specific command, type wevtutil command /? at an elevated command prompt.
Hostname (Hostname.exe)
Displays the host name of the current computer.
Netstat (Netstat.exe)
Displays active TCP connections, ports on which the computer is listening, Ethernet statistics, the IP routing table, and IPv4/IPv6
statistics.
PathPing (Pathping.exe)
Combines functions of Traceroute and Ping to identify problems at a router or network link.
You probably knew that already. But did you know you can disable these options?
If you don’t want users to be able to delete their browsing history, form data, or passwords, you can enable the following group
policy settings located in both Computer Configuration\Administrative Templates\Windows Components\Internet Explorer\ and User
Configuration\Administrative Templates\Windows Components\Internet Explorer\:
Running Internet Explorer from the standard Start menu shortcut will return the functionality to its prior state.
To prevent unwanted changes in the future, ensure that you have all Microsoft Security Updates installed and are using anti-
malware software, such as Microsoft Forefront or Windows Defender.
Turn off Network Discovery in a domain environment, as it can generate excessive network traffic that can interfere with
normal network activities.
Publish shared folders in Active Directory so that users can search for them in the directory and access them instead of
having to browse the network to find them.
Use Group Policy to prevent users on Windows Vista computers from sharing files on their computers from their user
profiles unless they are local administrators on their computers. For more information, see the section titled ―Managing
File Sharing Using Group Policy‖ earlier in this chapter.
Allow only advanced users the ability to share folders on their computers by giving them administrative rights on their
computers.
Note: Do not make users local administrators on their computers unless you understand the consequences of doing so. One
consequence is that they will be able to share folders and open firewall exceptions on their computers. Sharing folders from desktop
computers in a domain environment may mean that important documents are being stored on computers instead of on network file
servers, and since desktop computers are not normally backed up, this can mean lost work. Educate users to store files instead
within shared folders on network file servers where their work can be centrally backed up regularly.
High Availability Printing with the Print Management
Console
With Windows Vista client computers and the Windows Vista Print Management console, printer administrators can easily provide
users with high printer availability. This can be achieved by moving users from the print queues on one server to identical print
queues (for the same physical printers) on another server when the first server is unavailable.
First, use the Print Management console to deploy printers to a number of users using a Group Policy object (let’s say
\\ServerA\ColorPrinter, with GPO1) and link GPO1 to an OU with a number of users or computers.
Then, using the Print Server import/export tool, do a backup of a print server. In the Print Management console, right-click a print
server and select Export Printers To A File. All the print queues and printer drivers will be exported to a .printerExport file.
Alternatively, you can use the command-line tool Printbrm.exe (in %WinDir%\System32\spool\tools), either from the command line
or from Task Scheduler, to do periodic backups of the print server.
When a print server goes down because of a hardware failure, the administrator can easily move users to a new server. On the new
server (Server2), use the Print Management console to import the .printerExport file. New print queues will now be created (s uch as
\\Server2\ColorPrinter, if the old server had \\Server1\ColorPrinter).
Using the deployed printers functionality in the Print Management console, deploy the printers using GPO2. With the Group Pol icy
Management tool, disable the link to GPO1. The print queues from Server1 will be undeployed and the print queues from GPO2
(Server2) will be installed.
When the old print server is online again, the link to GPO2 can be disabled, and the link to GPO1 can be enabled.
For more information about these new command-line switches for sc.exe, type sc /? at a command prompt.
After Windows Vista sets up the ad hoc network, you have the option of sharing your Internet connection.
To disconnect from an ad hoc network, display the Connect To A Network window, click the ad hoc network, and then click
Disconnect.
sdelete -z C:
SDelete - Secure Delete v1.51
Copyright (C) 1999-2005 Mark Russinovich
Sysinternals - www.sysinternals.com
SDelete is set for 1 pass.
Free space cleaned on C: