IT guys run some command prompt commands and then to share the output, they copy paste the output by right clicking cmd and marking the stuff and pressing enter, then paste. This is lots of unecessary work 😉 and waste of time.
Here’s the command prompt trick, type in your command for example, ipconfig and postfix ‘ | clip ‘ to directly copy your cmd output to clipboard.
now, Select Paste to paste the stuff directly to notepad, TADAA…! Awesome, ain’t it? 😀 🙂
CMD usually opens up in either User or System folder depending upon whether you ran it as administrator or not.
If you want to run a particular file in a specific folder (suppose d:\docs\bills.txt), then your approach will be CMD > (Change directory) cd d:\docs\ so that command prompt can navigate to the location, then you will run the Bill.txt file.
Now here is the Command prompt trick 🙂 , just navigate to the folder and press and hold SHIFT KEY and then Right click and you will see a popup menu with some extra items, like the one in below picture.
Select open command window here to directly open the CMD prompt with the path to that folder directly.
You can simply press Ctrl+Shift+Enter to open command prompt with admin privileges or an Elevated command promt. This Command prompt trick will work for all the programs installed on your system.
Check last used command prompt commands in a session using the navigation (Up, Down, Left, Right ) buttons, but you can see list of all the commands by pressing the F7 button.
If you are already in command prompt, and you want to copy the exact path to a folder or file to run the file or change the present working directory, you can simply drag and drop file or the folder on the command prompt.
You can put && between two commands and execute them one after another. The command on the left will execute first followed by the command on the right of the double ampersand.
Here’s how we look at the seven layers of security:
Security Layer #1 – Anti-Virus Scan of Host PC
Malware has become increasingly vicious and an attack can instantly cripple an organization and cost millions of dollars to clean up. In order support this need, Moka5 partnered with security leader AVG. Moka5’s built-in AVG anti-virus constantly monitors for key loggers and screen scrapers, and ensues that these are not present on the host computer at startup.
Security Layer #2 – Full Virtual Machine Encapsulation
With full virtual machine encapsulation, a policy-enforced container keeps corporate data separate from personal files. Although the virtual machine “borrows” what it physically needs from the host (CPU, RAM, keyboard, mouse, monitor, etc.), the operating system, applications and data are kept separate. Not only does this prevent viruses and malware on the host from infecting the container, but it also helps eliminate data leaks and IP loss.
Security Layer #3 – AES-256 Encryption
If encryption is enabled, Moka5 will encrypt all LivePC containers using AES (128-bit or 256-bit) encryption. AES-256 encryption of the container ensures compliance with data security standards and privacy regulations.
Security Layer #4 – Tamper Resistance and Copy Protection
Taper-resistance and copy protection keep the container itself or its metadata from being moved or edited.
Security Layer #5 – Active Directory credentials or Two-Factor Authentication
LDAP/AD integration and two-factor authentication support ensures that you can use your existing access control processes.
Security Layer #6 – Seamless Updates and Granular Policies
130+ granular security policies give IT full control over the container, allowing them to configure data security in the way that best meets their unique requirements. These security protections can be tailored for specify users or applied across an entire organization.
Security Layer #7 – Remote Kill
The ability to remote revoke or remote kill allows IT to wipe the encrypted container from lost or stolen devices over the Internet or though a timeout mechanism.
Section 0. Background Information |
Section 1. Prerequisite |
Section 2. Configuring VMware to play Hiren’s |
Section 3. Starting up the Offline NT/2000/XP/Vista/7 Password Changer |
Section 4. Proof of Lab |
Section 5. Configuring your original VMware back to play Windows XP |
Section 6. Logging into Windows after password was cleared |
Section 7. Set Administrator’s Password |
Section 0. Background Information |
Section 1. Create a New Virtual Machine |
Section 2. Install BackTrack to Harddrive |
Section 3. Login to BackTrack |
Section 4. Installing VMware Tools |
Section 5. Proof of Lab |