HOW TO WORK "CMD" COMMAND & WITH WINDOWS OPERATING SYSTEM

Starts a new instance of the Windows XP command interpreter

CMD [/A | /U] [/Q] [/D] [/E:ON | /E:OFF] [/F:ON | /F:OFF] [/V:ON | /V:OFF]
[[/S] [/C | /K] string]

/C Carries out the command specified by string and then terminates
/K Carries out the command specified by string but remains
/S Modifies the treatment of string after /C or /K (see below)
/Q Turns echo off
/D Disable execution of AutoRun commands from registry (see below)
/A Causes the output of internal commands to a pipe or file to be ANSI
/U Causes the output of internal commands to a pipe or file to be
Unicode
/T:fg Sets the foreground/background colors (see COLOR /? for more info)
/E:ON Enable command extensions (see below)
/E:OFF Disable command extensions (see below)
/F:ON Enable file and directory name completion characters (see below)
/F:OFF Disable file and directory name completion characters (see below)
/V:ON Enable delayed environment variable expansion using ! as the
delimiter. For example, /V:ON would allow !var! to expand the
variable var at execution time. The var syntax expands variables
at input time, which is quite a different thing when inside of a FOR
loop.
/V:OFF Disable delayed environment expansion.

Note that multiple commands separated by the command separator '&&'
are accepted for string if surrounded by quotes. Also, for compatibility
reasons, /X is the same as /E:ON, /Y is the same as /E:OFF and /R is the
same as /C. Any other switches are ignored.

If /C or /K is specified, then the remainder of the command line after
the switch is processed as a command line, where the following logic is
used to process quote (") characters:

1. If all of the following conditions are met, then quote characters
on the command line are preserved:

- no /S switch
- exactly two quote characters
- no special characters between the two quote characters,
where special is one of: &<>()@^|
- there are one or more whitespace characters between the
the two quote characters
- the string between the two quote characters is the name
of an executable file.

2. Otherwise, old behavior is to see if the first character is
a quote character and if so, strip the leading character and
remove the last quote character on the command line, preserving
any text after the last quote character.

If /D was NOT specified on the command line, then when CMD.EXE starts, it
looks for the following REG_SZ/REG_EXPAND_SZ registry variables, and if
either or both are present, they are executed first.

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\AutoRun

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun

Command Extensions are enabled by default. You may also disable
extensions for a particular invocation by using the /E:OFF switch. You
can enable or disable extensions for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\EnableExtensions

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\EnableExtensions

to either 0x1 or 0x0. The user specific setting takes precedence over
the machine setting. The command line switches take precedence over the
registry settings.

The command extensions involve changes and/or additions to the following
commands:

DEL or ERASE
COLOR
CD or CHDIR
MD or MKDIR
PROMPT
PUSHD
POPD
SET
SETLOCAL
ENDLOCAL
IF
FOR
CALL
SHIFT
GOTO
START (also includes changes to external command invocation)
ASSOC
FTYPE

To get specific details, type commandname /? to view the specifics.

Delayed environment variable expansion is NOT enabled by default. You
can enable or disable delayed environment variable expansion for a
particular invocation of CMD.EXE with the /V:ON or /V:OFF switch. You
can enable or disable completion for all invocations of CMD.EXE on a
machine and/or user logon session by setting either or both of the
following REG_DWORD values in the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\DelayedExpansion

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\DelayedExpansion

to either 0x1 or 0x0. The user specific setting takes precedence over
the machine setting. The command line switches take precedence over the
registry settings.

If delayed environment variable expansion is enabled, then the exclamation
character can be used to substitute the value of an environment variable
at execution time.

File and Directory name completion is NOT enabled by default. You can
enable or disable file name completion for a particular invocation of
CMD.EXE with the /F:ON or /F:OFF switch. You can enable or disable
completion for all invocations of CMD.EXE on a machine and/or user logon
session by setting either or both of the following REG_DWORD values in
the registry using REGEDT32.EXE:

HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\CompletionChar
HKEY_LOCAL_MACHINE\Software\Microsoft\Command Processor\PathCompletionChar

and/or

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\CompletionChar
HKEY_CURRENT_USER\Software\Microsoft\Command Processor\PathCompletionChar

with the hex value of a control character to use for a particular
function (e.g. 0x4 is Ctrl-D and 0x6 is Ctrl-F). The user specific
settings take precedence over the machine settings. The command line
switches take precedence over the registry settings.

If completion is enabled with the /F:ON switch, the two control
characters used are Ctrl-D for directory name completion and Ctrl-F for
file name completion. To disable a particular completion character in
the registry, use the value for space (0x20) as it is not a valid
control character.

Completion is invoked when you type either of the two control
characters. The completion function takes the path string to the left
of the cursor appends a wild card character to it if none is already
present and builds up a list of paths that match. It then displays the
first matching path. If no paths match, it just beeps and leaves the
display alone. Thereafter, repeated pressing of the same control
character will cycle through the list of matching paths. Pressing the
Shift key with the control character will move through the list
backwards. If you edit the line in any way and press the control
character again, the saved list of matching paths is discarded and a new
one generated. The same occurs if you switch between file and directory
name completion. The only difference between the two control characters
is the file completion character matches both file and directory names,
while the directory completion character only matches directory names.
If file completion is used on any of the built in directory commands
(CD, MD or RD) then directory completion is assumed.

The completion code deals correctly with file names that contain spaces
or other special characters by placing quotes around the matching path.
Also, if you back up, then invoke completion from within a line, the
text to the right of the cursor at the point completion was invoked is
discarded.

The special characters that require quotes are:

&()[]{}^=;!'+,`~

Consept of Data Processing

The following events take place when a computer processes the data.

1. The programme and the necessary data are entered into the Computer System from an input device, and are stored in main memory where they can be accessed as needed.
2. Now, the C.P.U. (Central Processing Unit) retrieves the instructions from the main memory, one by one, and de-codes each instructions to determine what operation to be performed.
3. When required by instructions, the C.P.U. also retrieves the necessary data from main memory.
4. The C.P.U. then performs the operation required by the instruction, which might be arithmetic or logical operation. As each instructions are performed, the results are either temporary saved by the C.P.U. or are stored in memory.
5. The processing Cycle (retrieves instructions, decode and execute instructions, save results) is repeated until all the programme instructions have been carried out by the C.P.U. The final results are then either stored in main memory, or are sent to an output device such as a printer.

* For more information regarding 6th Pay Click Here
* For more information regarding Government Resolution Click here
* For more information regarding Income Tax ITR Click Here
* For more information regarding RTM Nagpur University Click Here

OPERATING SYSTEM WINDOWS XP

You can install Windows XP Home Edition or Professional in a virtual machine using the corresponding
Windows XP distribution CD. If your VMware product supports it, you can also install from a PXE server.
Fulfill these prerequisites before installing Windows XP:ESX, VMware Workstation, VMware ACE, and GSX Server: To use the virtual BusLogic SCSI adapter in

  • Create and configure a new virtual machine
    Consider these support and configuration issues for Windows XP:
  • a Windows XP virtual machine, you need a special SCSI driver available from the download section of the
    VMware Web site at www.vmware.com/download. Follow the instructions on the Web site to use the
    driver with a fresh installation of Windows XP.
  • ESX and GSX Server: If you are using the virtual LSI Logic SCSI adapter in a Windows XP virtual
    machine, download the driver from the download center at the LSI Logic Web site. Go to
    http://www.lsi.com/cm/DownloadSearch.do?locale=EN and download the LSI20320‐R SCSI adapter
    driver for your guest operating system.
  • ESX: You can use the vmscsi SCSI driver for the virtual BusLogic SCSI adapter provided on the Windows
    XP Professional floppy image that is included with the ESX software. Although supported by ESX 4.0
    Update 1, the e1000 NIC driver is not provided with the 32‐bit version of Windows XP Professional. For
    support, download the driver from the Intel Web site. See knowledgebase article 1016456
  • If you have a virtual machine with a SCSI virtual disk and an earlier Windows guest operating system,
    and want to upgrade the virtual machine to Windows XP, install the new SCSI driver before upgrading
    the operating system.

Do you know, What is CIS (Central Internet Servers) ?

By 1998, a new form of the darknet began to emerge from technological advances in several areas. The internet had become mainstream, and as such its protocols and infrastructure could now be relied upon by anyone seeking to connect users with a centralized service or with each other. The continuing fall in the price of storage together with advances in compression technology had also crossed the threshold at which storing large numbers of audio files was no longer an obstacle to mainstream users. Additionally, the power of computers had crossed the point at which they could be used as rendering devices for multimedia content. Finally, “CD ripping” became a trivial method for content injection.

The first embodiments of this new darknet were central internet servers with large collections of MP3 audio files. A fundamental change that came with these servers was the use of a new distribution network: The internet displaced the sneaker net – at least for audio content. This solved several problems of the old darknet. First, latency was reduced drastically.

Secondly, and more importantly, discovery of objects became much easier because of simple and powerful search mechanisms – most importantly the general-purpose world-wide-web search engine. The local view of the small world was replaced by a global view of the entire collection accessible by all users. The main characteristic of this form of the darknet was centralized storage and search – a simple architecture that mirrored mainstream internet servers.

Centralized or quasi-centralized distribution and service networks make sense for legal online commerce. Bandwidth and infrastructure costs tend to be low, and having customers visit a commerce site means the merchant can display adverts, collect profiles, and bill efficiently. Additionally, management, auditing, and accountability are much easier in a centralized model.
However, centralized schemes work poorly for illegal object distribution because large, central servers are large single points of failure: If the distributor is breaking the law, it is relatively easy to force him to stop. Early MP3 Web and FTP sites were commonly “hosted” by universities, corporations, and ISPs. Copyright-holders or their representatives sent “cease and desist” letters to these web-site operators and web-owners citing copyright infringement and in a few cases followed up with legal action [15]. The threats of legal action were successful attacks on those centralized networks, and MP3 web and FTP sites disappeared from the mainstream shortly after they appeared.

SPECIFICATION, FETURES & BENEFITS OF DOT MATRICS PRINTER

Features and benefits

RS-232 or 20mA input

Small enough (41/2" x 4" x 2") to fit anywhere—

Table top, wall, or panel mounting available.

24-, 32-, and 40-column printing capacity

Uses standard 21/2" adding machine paper

Programmable double high and/or double wide characters

Easily replaceable black or purple ink cartridge.

Dual function rocker switch: On/Standby, Paper feed

Available in AC or DC models.

Optional watertight enclosure available.

X-ON, X-OFF and Busy Signal-clear to send (CTS)

are both supported.

Selectable sequencial transaction number printing

Specifications

Print method: Impact dot matrix

Character matrix: 5 x 8 or 5 x 5 matrix

Character spacing:

24 column - 12.8 characters/inch

32 column - 17 characters/inch

40 column - 21 characters/inch

Line feed spacing:

7.6 lines per inch...single high character mode

Character buffering: 9.5K

Paper roll:

Table top - 21/4" W x 23/4" O.D.; 0.44" I.D.

Panel mount - 21/4" W x 11/4: O.D.

Power: 1.5 Watts (idle) 10 Watts (while printing)

AC voltage: 9 VAC (120 VAC stepdown converter included)

DC voltage:

Optional 9-12 VDC, 100 mA idle, 1.5 A typical, 2.9A peak

Optional 12-48 VDC

Available baud rates:

300, 600, 1200, 2400, 4800, 9600, 19200

Character format:

7, 8 data bits, 1 or 2 stop bits, even, odd or no parity

Environment: 5°C to 40°C (41°F to 104°F)

Shipping weight: 3 lbs

Options:

Time/date battery protected circuitry

Wall mounting versions and a watertight enclosure are

available, for both AC and DC models.

Warranty: 120 day

System Security Testing

Proactive methods, employing system testing, can be used to identify system vulnerabilities
efficiently, depending on the criticality of the IT system and available resources (e.g., allocated
funds, available technology, persons with the expertise to conduct the test). Test methods
include.

• Automated vulnerability scanning tool
• Security test and evaluation (ST&E)
• Penetration testing.6

The automated vulnerability scanning tool is used to scan a group of hosts or a network for
known vulnerable services (e.g., system allows anonymous File Transfer Protocol [FTP],
sendmail relaying). However, it should be noted that some of the potential vulnerabilities
identified by the automated scanning tool may not represent real vulnerabilities in the context of
the system environment. For example, some of these scanning tools rate potential vulnerabilities
without considering the site’s environment and requirements. Some of the “vulnerabilities”
flagged by the automated scanning software may actually not be vulnerable for a particular site
but may be configured that way because their environment requires it. Thus, this test method
may produce false positives.
ST&E is another technique that can be used in identifying IT system vulnerabilities during the
risk assessment process. It includes the development and execution of a test plan (e.g., test
script, test procedures, and expected test results). The purpose of system security testing is to
test the effectiveness of the security controls of an IT system as they have been applied in an
operational environment. The objective is to ensure that the applied controls meet the approved
security specification for the software and hardware and implement the organization’s security
policy or meet industry standards.
Penetration testing can be used to complement the review of security controls and ensure that
different facets of the IT system are secured. Penetration testing, when employed in the risk
assessment process, can be used to assess an IT system’s ability to withstand intentional attempts
to circumvent system security. Its objective is to test the IT system from the viewpoint of a
threat-source and to identify potential failures in the IT system protection schemes.