Some Useful RUN Commands on Windows

Some Useful RUN Commands on Windows


On the Microsoft Windows operating system, the Run command is used to directly open an application or document whose path is known. It functions more or less like a single-line command line interface

To run command, you can press the Windows keyboard logo and press R (Win logo + R)

1. chkdsk

CHKDSK (short for "check disk") is a system tool in DOS, OS/2 and Windows. It verifies the file system integrity on hard disks or floppy disk and fixes logical file system errors. It is similar to the fsck command in Unix.<3 2. compmgmt.msc

Microsoft Management Console (MMC) is a component of Windows 2000 and its successors that provides system administrators and advanced users an interface for configuring and monitoring the system.

Useful to monitor the computer status. View the shared folder, connected user, scheduler, etc

3. devmgmt.msc

The Device Manager is a Control Panel applet in Microsoft Windows operating systems. It allows users to view and control the hardware attached to the computer. When a piece of hardware is not working, the offending hardware is highlighted for the user to deal with. The list of hardware can be sorted by various criteria.

4. dxdiag

DxDiag ("DirectX Diagnostics") is a diagnostics tool used to test DirectX functionality and troubleshoot video- or sound-related hardware problems. DirectX Diagnostic can save text files with the scan results. These files are often posted in tech forums or attached to support emails in order to give support personnel a better idea of the PC the requester is using in case the error is due to a hardware failure or incompatibility.

5. cleanmgr

It was good if you keep your computer clean. By running this tool, you can clean some trash or cache file to make some free space on your system.

6. dfrgui

Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk.[1] Beginning with Windows XP, Disk Defragmenter also reduces system startup times.

7. diskmgmt.msc or diskpart

The Logical Disk Manager (LDM) is an implementation of a logical volume manager for Microsoft Windows NT, developed by Microsoft and Veritas Software. It was introduced with the Windows 2000 operating system, and is supported in Windows XP, Windows Server 2003, Windows Vista, Windows 7 and Windows 8. The MMC-based Disk Management snap-in (diskmgmt.msc) hosts the Logical Disk Manager. On Windows 8 and Windows Server 2012, LDM was deprecated in favor of Storage Spaces.

8. secpol.msc

A security policy is a combination of security settings that affect the security on a computer. You can use your local security policy to edit account policies and local policies on your local computer.

With the local security policy, you can control:

– Who accesses your computer.

– What resources users are authorized to use on your computer.

– Whether or not a user or group's actions are recorded in the event log.

9. perfmon

Performance Monitor is a simple yet powerful visualization tool for viewing performance data, both in real time and from log files. With it, you can examine performance data in a graph, histogram, or report.

10. gpedit.msc

Group Policy is a feature of the Microsoft Windows NT family of operating systems that control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications, and users' settings in an Active Directory environment.

#hackuptechnology

要查看或添加评论,请登录

Dinesh Paranthagan的更多文章

  • Social Media Safety and Reporting

    Social Media Safety and Reporting

    This post will guide you in visualizing the mind map in order to demonstrate online media reporting forms and keep you…

  • A Step-by-Step Guide to eSIM and eSIM-Ready Devices

    A Step-by-Step Guide to eSIM and eSIM-Ready Devices

    Despite all the advantages, new technologies do not always succeed in quickly displacing old ones. This is especially…

  • Happy New Year 2019

    Happy New Year 2019

    ?? " Better is not something you wish, it's something you became ", 2018 wonderful year filled with loads of…

  • Top Five Emerging programming languages with a bright future

    Top Five Emerging programming languages with a bright future

    The top tier would include the mainstream languages such as Java, JavaScript, Python, Ruby, PHP, C#, C++, and…

  • What is the Future of Cybersecurity ?

    What is the Future of Cybersecurity ?

    Cyber Security is one of the key concepts in Information Technology. The people of Cyber Security has a bright feature…

  • List of Hacking Scripts for Metasploit's

    List of Hacking Scripts for Metasploit's

    Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be…

    1 条评论
  • Basics of Computer Hacking | Beginner Guide

    Basics of Computer Hacking | Beginner Guide

    The computer is a very popular platform to work with in nowadays. Sometimes we need to know more about computers so…

  • Best Hacking Tools ... !!

    Best Hacking Tools ... !!

    NMAP NMAP, by far is that the best security scanning and hacking tool ever created. This software is superior in each…

    1 条评论
  • Remote Administration Tool

    Remote Administration Tool

    Remote administration tool : A RAT or remote administration tool, is software that gives a person full control a…

  • What is Darknet & Deep Web and How to access it

    What is Darknet & Deep Web and How to access it

    Darknet A Darknet is an overlay network that can only be accessed with specific software, configurations, or…

    1 条评论

社区洞察

其他会员也浏览了