Search This Blog

Showing posts with label Windows. Show all posts
Showing posts with label Windows. Show all posts

Thursday, May 31, 2012

Windows Optimized Desktop



The Windows Optimized Desktop offers client computing choices to enhance user productivity while meeting specific business and IT needs. Built on the Windows 7 Enterprise operating system, managed by Microsoft System Center, and secured by Microsoft Forefront Endpoint Protection, the Windows Optimized Desktop includes virtualization technologies with integrated management across physical and virtual machines (VMs), including virtual desktop infrastructures. Add Microsoft Office 2010, Windows Internet Explorer 9, and the Microsoft Desktop Optimization Pack (MDOP) to enable a workforce that is more productive, manageable, and secure.

This section focuses on specific technologies in the Windows Optimized Desktop that can help IT embrace consumerization on rich devices running Windows 7. These technologies can address challenges such as managing applications and user data, safeguarding data, defending the network, and protecting intellectual property in consumerization scenarios.

Application Management

In consumerization scenarios, application management is about provisioning applications and controlling which applications users can run on their computers. System Center Configuration Manager 2007 and Microsoft Application Virtualization (App-V) are key deployment technologies. Additionally, AppLocker is a Windows 7 Enterprise feature that you can use to control access to applications.

Configuration Manager provides a rich set of tools and resources that you can use to manage the complex task of creating, modifying, and distributing application packages to computers in your enterprise. Deploying applications by using an existing Configuration Manager infrastructure is remarkably straightforward. Administrator Workflows for Software Distribution on TechNet describes this process in detail:
  1. Create a software distribution package containing the application installation files.
  2. Create a program to include in the package. Among other options, the program defines the command necessary to install the application package.
  3. Distribute the package to distribution points.
  4. Advertise the package to computers in your organization.
Organizations using System Center Essentials can also use it to distribute applications. For more information about Essentials, see System Center Essentials. Technical guidance for deploying applications is available in the System Center Essentials 2010 Operations Guide.

To control access to physical or virtual applications, Windows 7 Enterprise offers AppLocker. AppLocker is a new feature that replaces the Software Restriction Policies feature in earlier Windows versions. It adds capabilities that reduce administrative overhead and help you control users’ access to program files, scripts, and Windows Installer files. By using AppLocker to control access to physical applications, you can prevent unlicensed, malicious, and unauthorized applications from running.

To use AppLocker, you create a Group Policy Object (GPO) and then define AppLocker rules inside it. Within a rule, you can allow or deny access to a program file, script, or Windows Installer file for a specific user or group. You identify the file based on file attributes—including the publisher, product name, file name, and file version—from the digital signature. For example, you can create rules based on product-name and file-version attributes that persist through updates, or you can create rules that target a specific version of a file. In addition to allowing or denying access to a file, you can define exceptions. For example, you can create a rule that allows all programs which ship as part of Windows 7 to run except for the Registry Editor (regedit.exe).

AppLocker is surprisingly easy to configure and deploy. It provides wizards that make defining rules for program files, scripts, and Windows Installer files straightforward. However, because AppLocker prevents users from opening or running files that are not defined explicitly in a rule, you should plan your AppLocker deployment after examining an inventory of applications used in your environment. More information about AppLocker is available in AppLocker on TechNet.

User State Virtualization

A specific challenge to embracing consumerization is people working on more than one computer. This scenario can be painful for both end users and IT pros. Users’ files and settings do not follow them when they roam from computer to computer. If a user creates a document on his or her work computer, for example, that document isn’t immediately available when he or she logs on to a slate or through a VM accessed by a non-Windows PC. For IT, decentralized storage of files and settings leads to even more challenges. Files are difficult to back up. They’re difficult to secure. And because they’re scattered across many PCs, availability of important files is difficult to manage.

User state virtualization addresses these challenges. It centralizes storage of users’ files and settings to make backing up and securing them easier. Managing the availability of important files is possible. Also, user-state virtualization enables users’ files and settings to follow them from PC to PC and even to VMs. In Windows 7, three technologies support user state virtualization:
  • Roaming user profiles give you the ability to store user profiles (i.e., files stored in C:\Users\Username, including the registry hive file) in a network share. Windows 7 synchronizes the local and remote user profiles when users log on to and off of the computer. For more information, see What's New in Folder Redirection and User Profiles.
  • Folder Redirection redirects folders such as Documents, Pictures, and Videos from a user profile to a network share. Redirecting folders reduces the size of roaming user profiles and can improve logon and logoff performance. You configure Folder Redirection by using Group Policy. The important distinction between roaming user profiles and Folder Redirection is that you use roaming user profiles primarily for settings and Folder Redirection for documents. For more information, see What's New in Folder Redirection and User Profiles.
  • Offline Files, a feature enabled by default in Windows 7, provide the ability to work with redirected folders and other shared network content when disconnected from the network by caching copies locally. Offline Files synchronizes changes the next time a connection is available. For more information, see What's New in Offline Files.
The Infrastructure Planning and Design: Windows User State Virtualization guide can help you implement user state virtualization.

Local Data Security

BitLocker Drive Encryption is an integral security feature in Windows 7 Enterprise that helps protect data stored on fixed drives and the operating system drive. BitLocker helps protect against offline attacks, which are attacks made by disabling or circumventing the installed operating system or by physically removing the hard drive to attack the data separately. BitLocker helps ensure that users can read the data on the drive and write data to the drive only when they have either the required password, smart card credentials, or are using the data drive on a BitLocker-protected computer that has the proper keys.

BitLocker protection on operating system drives supports two-factor authentication by using a Trusted Platform Module (TPM) along with a personal identification number (PIN) or startup key as well as single-factor authentication by storing a key on a USB flash drive or just using the TPM. Using BitLocker with a TPM provides enhanced data protection and helps assure early boot component integrity. This option requires that the computer have a compatible TPM microchip and BIOS:
  • A compatible TPM is defined as a version 1.2 TPM.
  • A compatible BIOS must support the TPM and the Static Root of Trust Measurement as defined by the Trusted Computing Group. For more information about TPM specifications, visit the TPM Specifications section of theTrusted Computing Group Web site.
The TPM interacts with BitLocker operating system drive protection to help provide protection at system startup. This is not visible to the user, and the user logon experience is unchanged. However, if the startup information has changed, BitLocker will enter recovery mode, and the user will need a recovery password or recovery key to regain access to the data.

The BitLocker Drive Encryption Deployment Guide for Windows 7 provides detailed guidance for deploying BitLocker. Additionally, numerous Group Policy settings are available for managing BitLocker. You can learn about these in theBitLocker Group Policy Reference. You can provision BitLocker during deployment by using the Microsoft Deployment Toolkit (MDT) 2010 or Configuration Manager. For more information, see the MDT 2010 documentation.

Windows 7 Home Premium and Windows 7 Professional do not include BitLocker. If you allow employees to use devices that are running these operating systems, you can use the Encrypting File System (EFS) to help protect corporate data on these computers. However, EFS does not provide full-volume encryption, as BitLocker does. Instead, users choose the folders and files they want to encrypt. For more information about EFS in Windows 7, see The Encrypting File System.

Note: Users who are running Windows 7 Home Premium or Windows 7 Professional can use Windows Anytime Upgrade to upgrade to Windows 7 Ultimate for a charge. Doing so would provide BitLocker. For more information about Windows Anytime Upgrade, see Windows Anytime Upgrade.

Removable Storage

In Windows 7 Enterprise, BitLocker To Go extends BitLocker to portable drives, such as USB flash drives. Users can encrypt portable drives by using a password or smart card. Authorized users can view the information on any PC that runs Windows 7, Windows Vista, or Windows XP by using the BitLocker To Go Reader. Also, by using Group Policy, you can require data protection for writing to any removable storage device but can enable unprotected storage devices to be used in read-only mode.

The BitLocker Drive Encryption Deployment Guide for Windows 7 provides detailed guidance for using BitLocker To Go. Additionally, numerous Group Policy settings are available for managing BitLocker To Go, which the BitLocker Group Policy Reference describes.

Backups

The Windows 7 Backup and Restore feature creates safety copies of users’ most important personal files. They can let Windows choose what to back up or pick individual folders, libraries, and drives to back up—on whatever schedule works best for them. Windows supports backing up to another drive or a DVD. Windows 7 Professional, Windows 7 Ultimate, and Windows 7 Enterprise also support backing up files to a network location.

Whereas Windows 7 provides a built-in backup feature that users can use on their own devices, System Center Data Protection Manager (DPM) 2010 enables an organization to create a two-tiered backup solution that combines the convenience and reliability of disk for short-term backup—where most recovery requests are concentrated—with the security of tape or other removable medium for long-term archiving. This two-tiered system helps to alleviate the problems associated with tape backup solutions while still allowing for the maintenance of long-term off-site archives.

Important to consumerization scenarios, DPM 2010 adds support for protecting client computers, such as laptop computers and slates, which are not always connected to the network. Additionally, users can recover their own data without waiting for the backup administrator. You can learn more about DPM 2010 at System Center Data Protection Manager 2010.

Network Access

Forefront Unified Access Gateway (UAG) provides remote client endpoints with access to corporate applications, networks, and internal resources via a Web site. Client endpoints include not only computers running Windows but also other non-Windows devices. It supports the following scenarios:
  • Forefront UAG as a publishing server. You can configure Forefront UAG to publish corporate applications and resources, and enable remote users to access those applications in a controlled manner from a diverse range of endpoints and locations.
  • Forefront UAG as a DirectAccess server. You can configure Forefront UAG as a DirectAccess server, extending the benefits of DirectAccess across your infrastructure to enhance scalability and simplify deployment and ongoing management. Forefront UAG DirectAccess provides a seamless connection experience to your internal network for users who have Internet access. Requests for internal resources are securely directed to the internal network without requiring a VPN connection.
  • Single and multiple server deployment. You can configure a single server as a publishing server and as a Forefront UAG DirectAccess server, or deploy an array of multiple servers for scalability and high availability.
Infrastructure Planning and Design: Forefront Unified Access Gateway on TechNet provides guidance for designing a Forefront UAG deployment. Additional detailed technical guidance is available in Forefront Unified Access Gateway (UAG)on TechNet.

Network Security

Network Access Protection (NAP) includes client and server components that allow you to create and enforce health requirement policies that define the required software and system configurations for computers that connect to your network. NAP enforces health requirements by inspecting and assessing the health of client computers, limiting network access when client computers are noncompliant, and remediating noncompliant client computers for unlimited network access. NAP enforces health requirements on client computers that are attempting to connect to a network. NAP can also provide ongoing health compliance enforcement while a compliant client computer is connected to a network.

NAP enforcement occurs at the moment client computers attempt to access the network through network access servers, such as a virtual private network (VPN) server running Routing and Remote Access (RRAS), or when clients attempt to communicate with other network resources. The way in which NAP is enforced depends on the enforcement method you choose. NAP enforces health requirements for the following:
  • Internet Protocol security (IPsec)-protected communications
  • Institute of Electrical and Electronics Engineers (IEEE) 802.1X-authenticated connections
  • VPN connections
  • Dynamic Host Configuration Protocol (DHCP) configuration
  • Terminal Services Gateway (TS Gateway) connections
The Network Access Protection Design Guide can help you design a NAP deployment. The Network Access Protection Deployment Guide provides detailed technical guidance for the above scenarios.

In Configuration Manager, NAP lets you include software updates in your system health requirements. Configuration Manager NAP policies define which software updates to include, and a Configuration Manager System Health Validator point passes the client's compliant or non-compliant health state to the Network Policy Server (NPS). The NPS then determines whether the client has full or restricted network access, and whether non-compliant clients will be brought into compliance through remediation. For more information about NAP in Configuration Manager, see Network Access Protection in Configuration Manager.

Information Protection

In addition to securing local data and network access, protecting access to business information—such as intellectual property—is an important consideration if you're embracing consumerization. Two technologies are available for protecting this information:
  • Rights Management Services. By using Active Directory Rights Management Services (AD RMS) and the AD RMS client, you can augment your organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. You can use AD RMS to help prevent sensitive information—such as financial reports, product specifications, customer data, and confidential e-mail messages—from intentionally or accidentally getting into the wrong hands. Microsoft Exchange Server 2010 and Microsoft Office SharePoint Server 2010 are examples of applications that integrate with AD RMS. You can learn more about AD RMS at Active Directory Rights Management Services.
  • File Classification Infrastructure. To reduce the cost and risk associated with this type of data management, the File Classification Infrastructure in Windows Server 2008 R2 offers a platform that allows you to classify files and apply policies based on that classification. The storage layout is unaffected by data-management requirements, and you can adapt more easily to a changing business and regulatory environment. Files can be classified in a variety of ways. Additionally, you can specify file-management policies, based on a file’s classification, and automatically apply corporate requirements for managing data, based on business value. You can easily modify the policies and use tools that support classification to manage their files. For example, you can automatically manage the rights to files that contain the word confidential. To learn more about the File Classification Infrastructure, see Working with File Classification.


Microsoft Technologies for Consumerization


The workplace is changing. The boundaries between peoples’ professional and personal lives are blurring. Work is no longer confined to the office. Employees check work email at home during the night and update their social media at the office during the day. In addition to their desktop computers, they're using portable computers, slates, and smartphones.

Contributing to this trend is the increasing computing power that’s available on a wide range of devices. Consumer devices, including smartphones and media tablets, are becoming powerful enough to run applications that were previously restricted to desktop and portable computers. For many workers, these devices represent the future of computing and help them do their job more efficiently.

In a world in which highly managed information technology (IT) infrastructures can seem inflexible, workers prefer to use the many consumer devices available to them. For IT, the challenge is to embrace consumerization as appropriate while minimizing risks to the enterprise and its data. Many consumer devices were not initially designed for business use, so IT must plan carefully to enable the level of management and control they require.

As a leader in business and consumer technologies, Microsoft is in a unique position to understand and provide guidance on how to responsibly embrace consumerization within enterprises. In a previous white paper, Strategies for Embracing Consumerization, you'll find specific strategies for embracing the latest consumerization trends. This article explores specific technologies that the aforementioned white paper recommends in its various scenarios.

In this article:

Sunday, December 25, 2011

Using Batch Files to Automate Networking Tasks - PART3


How to Restart Services On All Domain Controllers Within a Domain

To restart service on all domain controllers within a domain, perform the following steps: 

  1. Create the Restart.bat and Restart2.bat files listed below.
  2. Run the Restart.bat Service Name from a computer running Windows NT using administrator privileges. The Restart.bat file issues the Windows NT Resource Kit utility NETDOM to create a file called Netdom.txt. The Netdom.txt file gets parsed using the FOR command (part of Windows NT command extensions). Each \\DomainControllerName gets passed to the Restart2.bat file where the Windows NT Resource Kit utility NETSVC command gets issued to stop and start the Service Name entered at the command prompt.
Filename: RESTART.BAT 

echo off
cls
if (%1)==() goto NoParams
netdom bdc > netdom.txt
for /F "skip=6 tokens=4" %%a in (netdom.txt) do call restart2.bat
%%a %1
echo ---------
echo - Done! -
echo ---------
goto bottom
:NoParams
echo usage: RESTART "Service Name"
echo.
echo. i.e.- RESTART "License Logging Service"
echo.
:bottom
    

Filename: RESTART2.BAT 

echo Restarting %2 on %1
netsvc %2 %1 /stop
netsvc %2 %1 /start
echo.
  

Using Batch Files to Automate Networking Tasks - PART2


How to Add Files to Many Users' Home Directories

To add files to many users' home directories, perform the following steps: 

  1. Create the Addfile.bat and Addfile2.bat files listed below.
  2. Run Addfile.bat <Parent Directory> <File to Add> with administrative privileges from a computer running Windows NT. The Addfile.bat file simply issues a DIR command and redirects the output to a file, which in turn gets parsed using the FOR command (part of Windows NT command extensions). The Addfile2.bat file gets called once for each directory name listed in the Dir.txt file. The Addfile2.bat file issues a copy command to copy the file to each user directories.
Filename: ADDFILE.BAT
v
echo off
cls
IF (%1)==() GOTO NoParams
IF (%2)==() GOTO NoParams
Echo Creating directory listing...
dir %1 > dir.txt
for /F "skip=7 tokens=4" %%a in (dir.txt) do call addfile2.bat %%a
%1 %2
echo ---------
echo - Done! -
echo ---------
GOTO Bottom
:NoParams
ECHO usage: ADDFILE [Parent Directory] [File to Add]
ECHO.
ECHO  i.e.- ADDFILE C:\PROFILES MyFile.lnk
ECHO.
:Bottom
    

Filename: ADDFILE2.BAT 
if (%1)==() goto bottom
if (%1)==(bytes) goto bottom
copy %3 %2\%1
:bottom
    

Using Batch Files to Automate Networking Tasks - PART1

This article demonstrates a few ways to use Windows NT command extensions in conjunction with Windows NT Resource Kit utilities within batch files to automate common networking tasks. 

The following tasks will be illustrated: 

  • How to automate the addition of Domain\Domain Users global group to each of the member servers Change the system time user right.
  • How to add files to many users' home directories.
  • How to restart services on all domain controllers within a domain.

How to Automate the Addition of Domain\Domain Users

How to automate the addition of "Domain\Domain Users" global group to each of the member servers "Change the system time" user right. 

  1. Create the Addtime.bat and Addtime2.BAT files listed below.
  2. Run Addtime.bat with administrator privileges from a computer running Windows NT. This batch file creates a list of member servers using the Windows NT Resource Kit utility Netdom.exe. The output of NETDOM gets redirected to a file, which in turn, gets parsed using the FOR command (part of Windows NT command extensions). The Addtime2.bat file gets called for each instance of \\ServerName within the Netdom.txt file. The Addtime2.bat file then issues the Windows NT Resource Kit utility Ntrights.exe to add Domain\Domain Users global group to each of the member servers Change the system time user right. The output of NTRIGHTS gets written to a file called Log.txt.
Filename: Addtime.bat 

echo off
cls
echo Creating a list of member servers.
echo.
netdom member > netdom.txt
echo Adding "Change System Time" right to Member Servers...
echo.
if exist log.txt del log.txt
for /F "skip=6 tokens=4" %%a in (netdom.txt) do 
   call ADDTIME2.bat %%a
echo.
echo ----------------------------------------------
echo - Done! Check LOG.TXT for status information.-
echo ----------------------------------------------
    


Filename: ADDTIME2.BAT 

echo Adding right to %1...
ntrights -u "domain users" -m %1 +r SeSystemTimePrivilege >> log.txt
    

Monday, December 5, 2011

20 of the Best Tips and Tricks for Getting the Most out of the Windows Command Line

00_command_line

Do you use the command line in Windows to get things done? If you are more comfortable typing commands to accomplish tasks than using the mouse, we have compiled 20 of the best Windows command line tips and tricks to help you become a command line guru.


Copy to the Clipboard from the Windows Command Prompt

There may be times you need to copy text from the Windows command prompt and email it to someone for help with a problem or save it to a file for later reference. The following article shows you two methods of copying text from the command prompt to the clipboard for pasting into other programs.

Copy To the Clipboard From the Windows Command Prompt


Copy Output Text from the Command Line to the Windows Clipboard the Easy Way

The previous tip showed you two methods for copying text from the command line to the clipboard. The following article shows you an easier method using the clip.exe utility which is built into Windows 7 and Vista. If you are using Windows XP, the article provides a link so you can download the utility and tells you where to put it.

How to Copy Output Text from the Command Line to the Windows Clipboard


How to Enable Ctrl+V for Pasting in the Windows Command Prompt

If you copy a command from another program in Windows and want to paste it in the command prompt window, it generally requires using the mouse. If you prefer using Ctrl + V to paste text into the command prompt window, the following article shows you how to set up an AutoHotkey script to enable using the Ctrl + V keyboard combination on the command line.

How to Enable Ctrl+V for Pasting in the Windows Command Prompt


How to Print or Save a Directory Listing to a File

If you need to print a listing of a directory containing a lot of files, such as music or video files, it is very easy to do using the command line. The following article shows you how use the command line to save time when printing a directory listing.

How to Print or Save a Directory Listing to a File


Hide Flashing Command Line and Batch File Windows on Startup

If you run a lot of batch files or scripts that use the command line, you have probably encountered the flashing command prompt window. The following article shows you how to use a utility, called Hidden Start, or hstart, that hides the command line window when you run a batch file or script outside of the command prompt window.

Hide Flashing Command Line and Batch File Windows On Startup


Open a Command Prompt From the Desktop Right-Click Menu

Instead of manually opening the command prompt and typing a path to open a directory at the command prompt, there is an easier and quicker way to do this. The following article shows you how to open a command prompt window to a specific directory from within Windows Explorer.

Stupid Geek Tricks: Open a Command Prompt From the Desktop Right-Click Menu


Open a File Browser From Your Current Command Prompt/Terminal Directory

The previous tip showed you how to easily open a command prompt window to a specific directory. However, you may discover that you are doing something that would be easier to do using the mouse. Well, there’s an easy way to go the other way. The following article shows you how to open a Windows Explorer window to a specific directory from within a command prompt window.

Open a File Browser From Your Current Command Prompt/Terminal Directory


How to Personalize the Windows Command Prompt

The Command Prompt window is boring white text on a black background, by default, unlike the rest of Windows which is splashed with color and a variety of wallpaper options. The following article shows you how to customize the command prompt window with your choice of color.

How To Personalize the Windows Command Prompt


Enable More Fonts for the Windows Command Prompt

While we’re on the topic of customizing the command prompt window, there is an easy way to enable more fonts for use in the window. The following article shows you how to enable alternative fonts you can use to customize the command prompt window, such as some fonts used in Office 2007 and some fixed width fonts.

Stupid Geek Tricks: Enable More Fonts for the Windows Command Prompt


How to Make the Windows Command Prompt Wider

There are some commands used at the command prompt that produce very wide results. It’s frustrating when you have to scroll to the right to see the rest of the text in the window. You may think you can’t make the window wider to view all the text at once, but there is a way to do it, that’s the same in Windows 7, Vista, and even XP. The following article shows you how.

How to Make the Windows Command Prompt Wider


How to Create, Modify and Delete Scheduled Tasks from the Command Line

Do you use the Scheduled Tasks tool in Windows? There’s a SchTasks command you can use on the command line that allows you to control all aspects of your scheduled tasks. You can use this command to automatically manipulate tasks in batch scripts and in custom programs to communicate with the Task Scheduler. The following article shows you some example of using the SchTasks command.

How to Create, Modify and Delete Scheduled Tasks from the Command Line


Kill Processes from the Windows Command Line

Generally, in Windows, you use the Task Manager to kill tasks. However, if you’ve used Linux before, you are probably familiar with the ability to kill and start tasks from the command line. Wish you could do the same thing in Windows? The following article shows you how to use the Command line Process Viewer/Killer/Suspender utility to view a list of processes, kill processes, and even to change the priority of a process.

Kill Processes from the Windows Command Line


How Do I Kill All the iexplore.exe Processes at Once?

While we’re on the topic of killing tasks, how do you quickly kill the dozen or so iexplore.exe tasks running? Selecting each one in Task Manager and clicking End Process for each can be time consuming. The following article shows you how to use a command, called taskkill, to kill all the iexplore.exe processes by name. We even show you how to create a shortcut that will kill all the processes just by clicking on it. This utility will also work for other programs that open many processes.

How Do I Kill All the iexplore.exe Processes at Once?


How to Automate FTP Uploads from the Windows Command Line

If you create and maintain websites locally on your computer and then upload the files to the remote FTP server, wouldn’t it be handy to be able to automate the task? The following article shows you how to create a batch file to automate the task of uploading files to a remote FTP server.

How to automate FTP uploads from the Windows Command Line


Access Google Services from the Command Line

This tip may not be that useful, but it’s fun if you’re a geek. If you use Google Docs or create posts for Blogger, there’s a Python command line application, called GoogleCL, that allows you to access various Google services from the command line in Windows, Linux, or Mac OS X. The following article shows you how to use the command in Windows 7, and you can use it the same way on Linux and Mac OS X systems.

Access Google Services From the Command Line


Replace Text in Plain Text Files from the Command Line

There are a variety of practical uses for a command line utility that allows you to easily and quickly replace text in plain text files. However, this utility is not available on the Windows command line. The following article shows you a VBScript that uses the Visual Basic Replace function and lists some practical uses for the script. You can also download the script.

Replace Text in Plain Text Files from the Command Line


How to Figure Out Your PC’s Host Name From the Command Prompt

If you’re setting up a home network or you if you manage or maintain a work network, there will be times when you need to find out the name of a computer. The following article shows you an easier way to find this out using the command line, rather than the Control Panel.

How To Figure Out Your PC’s Host Name From the Command Prompt


Generate a List of Installed Drivers from the Command Line

There’s a variety of third-party tools available for generating a list of installed drivers on your computer. However, what do you do if you need to generate a list of drivers on a computer without any of these tools and on which you cannot install software? The following article shows you how to use a command line utility that comes with Windows 7, Vista, and XP to view a list of installed drivers and how to save that list to a text file.

Generate a List of Installed Drivers from the Command Line


Display a list of Started Services from the Windows Command Line

Generally, to view a list of services running on your computer, you must access the Services tool through the Administrative Tools in the Control Panel. However, Windows also contains the Net utility that allows you to view the Services panel from the command line. The following article shows you how to use this utility to display a list of services started on your computer from the command line.

Display a list of Started Services from the Command Line (Windows)


How to Delete a System File in Windows 7 or Vista

This last tip is something we strongly suggest you DO NOT do. Deleting system files is dangerous and can severely mess up your system. Windows does not allow you to delete system files, even as administrator. However, if you absolutely have to delete a system file, there is a way around this limitation. The following article shows you how to take ownership of the file to be deleted and assign rights to delete or modify the file.

How to Delete a System File in Windows 7 or Vista


The command line is a very useful tool for quickly performing many tasks or even automating tasks using batch scripts. We hope these tips help you become more a more savvy Windows command line user.

Link from:

http://www.howtogeek.com