ComputerCavalry: Command & Conquer ( Command Line Basics ) | Computer Cavalry | Skillshare

ComputerCavalry: Command & Conquer ( Command Line Basics )

Computer Cavalry, Join The Cavalry!

ComputerCavalry: Command & Conquer ( Command Line Basics )

Computer Cavalry, Join The Cavalry!

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
10 Lessons (59m)
    • 1. Introduction to Command Prompt

    • 2. Command Prompt: Gather System Information

    • 3. Command Prompt: PING and PATHPING

    • 4. ComputerCavalry: IPCONFIG

    • 5. ComputerCavalry: NSLOOKUP

    • 6. ComputerCavalry: NETSTAT

    • 7. ComputerCavalry: POWERCFG

    • 8. ComputerCavalry: QUERY

    • 9. ComputerCavalry: WMIC DSQUERY NETUSER

    • 10. ComputerCavalry: HIDE YOUR PASSWORDS!

  • --
  • Beginner level
  • Intermediate level
  • Advanced level
  • All levels
  • Beg/Int level
  • Int/Adv level

Community Generated

The level is determined by a majority opinion of students who have reviewed this class. The teacher's recommendation is shown until at least 5 student responses are collected.





About This Class

A step-by-step guide from beginner to expert on learning Windows Command Line basics

In this course you will learn the basic, mid, and advance level commands for the command prompt application in windows! Commands such as IPCONFIG, PATHPING, WMIC, and QUERY will all be discussed in detail. Each video averages about 5 min and can viewed as many times as you like!

Please leave a review of your experience

Meet Your Teacher

Teacher Profile Image

Computer Cavalry

Join The Cavalry!


ComputerCavalry is a leader in online computer related education to over 17,000+ students and consumer electronics.


Click to Browse our Latest Courses!

See full profile

Class Ratings

Expectations Met?
  • Exceeded!
  • Yes
  • Somewhat
  • Not really
Reviews Archive

In October 2018, we updated our review system to improve the way we collect feedback. Below are the reviews written before that update.

Your creative journey starts here.

  • Unlimited access to every class
  • Supportive online creative community
  • Learn offline with Skillshare’s app

Why Join Skillshare?

Take award-winning Skillshare Original Classes

Each class has short lessons, hands-on projects

Your membership supports Skillshare teachers

Learn From Anywhere

Take classes on the go with the Skillshare app. Stream or download to watch on the plane, the subway, or wherever you learn best.


1. Introduction to Command Prompt: in this section will be covering command part following subcategory going to cover the basics W M I, C Queary Net and more. 2. Command Prompt: Gather System Information: in this section of the course will be discussing three commands system info DX diag in Emmis in full 32. On order for us to accurately assess on different PCs on our network, we need to know exactly what are the specs of the systems that were on. So that's what we're going to begin gathering information about the local PC that we're on . So I'm gonna go in Click Star and in the search programs and files box. I'm going to type cmd when rightly going command it run, his administrator going to change. The color is usual. Now, the first command system info is where we're going to begin. Let's go ahead and type that come in to see what we give that And in a now, what's going on here? The system is basically gathering Information about our network card were kind of process that we have what kind of patches have been applied to the system different things like that. Sometimes it can take a little while depending on the system. How new? It is our old it is a Zinkhan. See, we have our results back. We have our host name, which is lab PC a window seven Professional, Um, the owner lab account the original Install it date a system boat time way. We get a lot of different good information with this very simple command. We see that this is a 64 based PC on also physical memory that Sven apply Also the domain name. So we see how this is a very, very, very useful information about the local PC. Pretty much everything we need to know. So the second command that we're going to run is dxy. Diack. While it's not exactly command, we type in Windows Command prompt. We're gonna type forward in our system. So we're gonna click start again. And in the search programs and files box, we're gonna type d x D I A G and hit in a. And this is basically command asking. You want to check for drivers things like that. Click? Yes. And now we see we also get different information. We have our computer name, which is left. You see the current date in time, the system model, the amount of memory that's installed, and we can also go to different tabs. Here, go to the display tab to see the different drivers or devices that's installed are sound settings and our input devices. Now, lastly, we're going to cover another command. We're going to click, start and in the search programs and files box. We're going to type you Miss Info 32 and hit in a now. This is also a great place that we can gather information about our local system. We see at the very top. We have the OS name our system name 64 bit PC. Um, the user that's currently installed, the amount of memory installed, the page file size. Different things like that are different. Hall. Where resource is we can click. Memory is going, unless no difference things about our current memory status. We have all K's components. See rahm Display modem network adapter. Sometimes systems on these times to refresh is, well, different things here. Information about our dis that's also important. Sometimes we need to know of the physical size that we have on our desk. Also tracks sectors. A lot of information here USB devices, software, environment. Um, so we see these all the various ways that we can use within our windows environment to gather different information we went over the system Info Command, the DX dy egg and also M s info. 32. I hope you guys found this course engaging. I will see you again in the next one. 3. Command Prompt: PING and PATHPING: in this section, we're going to cover two topics. Ping and path pain. So what exactly is Ping? We'll? Ping is a very basic networking command that you can use within Windows that will test and see the connective ity between your system and another system on the same network. Now, how can this be useful? Well, let's just say you have a user calling to complain that there intermittently having issues connecting to the Internet or they're not receiving emails or, uh, the outlook isn't logging in just various areas that needs consistent network connectivity . Well, let's simulate a very basic troubleshooting steps when it comes to Ping in path pain. So the system on the left is going to be our computer, and a system on the right is going to simulate the user's computer. Both systems are connected to the network. Let's go ahead and verify that I'm going to type II P config and hey, dinner. See, I have an I P. Address 19 to 16801 54. And now we're gonna type the same command on the user computer and hit it and I verified. The user also has an I p address or 9 to 1680101 So, what we want to do, we want to see if we can successfully basically test a very basic networking connection from AARP system to the remote system. So I'm gonna typing, and then I'm going to type the I p address of the remote system. 192 1680101 and hit it. And as we notice we're not. We got four replies back from the remote system, so we know that we can successfully a Talese through the network, connect to the system or verify its connective iti to the network. But now let's simulate a system that's having intermittent connection issues. So on the remote system, I'm going to hit start, and I'm gonna type firewall gonna go select Windows firewall. I'm going to click inbound rules. Screw all the way down to file and print sharing eco requests. I've PV icmp before, so I'm going to right click on that section. You hear properties now under the action section of the General tab, I'm going to clink blocked the connection and hit Apply now, these eco requests are basically was being made on the left system by our system when we ping a remote PC. So basically, what we told the system is to block these connections when they come in. So we're going to go into our system on the left and typing. We're gonna type the same i p address as we did before 192 on 680.101 and hidden. Now, this time around, we're getting different results. Request time up. So now we know that for some strange reason, we can't connect to the remote system so we can verify that the user is having connectivity issues. So I'm gonna go back to our system and we're going to cover another switch using Ping called. Ah, well, the switch, Dashti. Actually, let's go back and listen. We Ford slash question more to see what are all of this? Which is that we can use with pain. You see, we have a dash T which is paying the specified Holst until stopped dash a resolve, the address, the host names we can scroll down. We have using running headers, and we can force you used the I P before or I p b six i p address. So let's go ahead and do the dash t for a continuous pain to the system to basically verify its connectivity. I'm going to go back to our system and here, okay, and on our system, I'm going to hit inner, let the thing run for a second. So now we know that for some reason we can't successfully connected the system on All right , we're getting request time outs. We know the issues that we know that the user is having connectivity issues. So let's just say we tell the user to go ahead and unplugged the Internet cable and plug the either night cable back into the system and wait a second. So the user unplug the Ethernet cable, unplug the Ethernet cable back in. And now we see that we're getting replies back from the remote system. So in this case, in a very simple way, we know that it was probably the Ethernet cable wasn't properly seated. And that's how a very effective way that we can use something as simple as paying to troubleshoot networking issues. I'm going to stop the ping on the left. I'm going to hit OK on the system on the right. Make sure we're going to allow the connection. Exit out of that. Now we want to cover a topic called Path Pain. What exactly is Path Ping? Well, Path Ping combines the technology of a command call. Trace route with the technology of pink trace Route basically attracts the amount of hops it takes to get from one destination to another via networking. So let's take a look a tracer out really fast. I want to clear the system on the left and clear the system on the right. We're going to do trace route to Let's just say, yahoo dot com. It's all right. Believe I spelled it wrong. Yahoo dot com believe I'm still spelling it wrong. Oh, sorry. Actually, it's called Tracer. There we go to yahoo dot com. So basically what the system is doing now it's tracing the amount of hops or routes that or routers that it hits in order to get to that specific yahoo dot com account. So right now we know we hit nine routers, 10 routers, 11 routers of things like that going to let restaurant run the reason why I'm saying trace round because that was the old way that we refer to treat run of this command instead. Itri certain you see the maximum amount of hops is 30 and now the trace has been complete. So this is basically the route that this PC takes to get from my computer all the way to yahoo dot com. Pretty, it's a pretty handy tool. How trace route can come in handy is because, let's just say you're having issues reaching young dot com and you don't know exactly where you're having the issue. Whether it's your company, the remote company, somewhere in the line, you want to see where the issue is. So we see that we have successfully connected to yahoo dot com with no issues. So we have any problems here now. Path Ping s stated before combines this technology of Trace wrote with the technology of paint. I'm gonna tie path being and type yahoo dot com and hidden. Now we see we have the same statistics as before is tracing the route We went from my lab PC in my domain. We crossed a few of the networks and it finished up, but the difference that it takes between, um Ping and Trade Shroud. Pain will now tell us the amount of packets that failed for one destination writer to another. So we can actually go into the system and see, Let's just say if there's a bad route or somewhere in the network. And once these packets hit that router, we see maybe 1% 2% of 3% loss. So help us to identify issues that we're having in a network. I'm going to pause the video for a second and wait for this to finish and we'll be right back. OK, we are back and we now have our results from our path Ping command. It's kind of important to notice here the different sections. We have the source of two particular website. We have the law sent percentage and the address of the website that we were trying toe access or the excess point. So as we see from just like treasure out, we started with our local network and we gradually went out Ah, and pained every single router that we ran across. But the more information that we get about path pain can help us with troubleshooting, so as we look as our loss percent, um, category Here we have a few ah, little bit. After a few of the route, as we have a 2% loss, 3% on our particular gateway. We may need to look at that on. As we go down, we look at different gateways. We have 1% 1% 1%. So we see the entire middle connection of our attempt to get to yahoo dot com is fine, while the beginning and the end tend to Ah, I have lost about 3% loss. So we see that our network router, our default gateway, may need to be looked at as well as we know that the routers on the endpoint also average about a 3% loss. So it kind of helps us to see where we are exactly having issues when connecting from one system to a website or one system to another system so we can pinpoint more exactly where those issues are. I hope you guys enjoyed this course. I will see you again in the next one 4. ComputerCavalry: IPCONFIG: in this section will cover I p config and Windows Administrator Command prompt. So let's do that. Let's go ahead and click. Start in type CMD I'm going to right click on the application hit Run as administrator here . We're back in command. Prompt. Let's go ahead and change the color as we did in the first video. Now we could set ah, command prompt to just come up as bright yellow. But I like to not say sort of default setting, so it kind accuses on our toes. Where else? With our commands. So what is I p config? Well, I p config is a command and windows as stated before that we can use in the command prompt to gather very basic networking information. Our i p address. Um, what network were on with some that mass? Our default gateway, things like that. So let's go ahead and take a look at the command I p config. I'm gonna hit in her. As you can see, we got some very basic information here. We now know our default gateway basically our router, the seven at Mass and also the I P V four address or our i P address of the system that we're on right now, and this is a very helpful information. So what I've started to do over here if you look on the desktop, there's a file called G Info for general info that we gather using our commands. I'm gonna open that file. As you can see here we have our help switch that we went over the host name and also the Who am I. So let's go ahead and add I p config going to hit in her one last time here, and I'm going to put our I P address, which is 192 on 68 that 0.154 So now we have our i p address of our system. I want to switch back over. It's a command prompt. And let's take a look at some of the very switches that we can use using. I p config got a Type II P config. Ford slash and question mark and hit in a. As we scroll down, we see that avarice amount of switches that we can use with this command. There's a P config all release renew flush DNs show class. I did their things of different sorts. But let's go ahead and type. I've config all and see what results we get. One type I if you config ford slash all and hit in a Now we have a lot more information than we got in Just the basic I Pekan Fick, um, command that we use. We have our host name, which, actually where we found the information. Here we have our domain. No type different things like that. We have our Mac address, which also comes in handy for identifying RPC DHC pay settings, other media that Let's just say we had two wireless Carter. Three more on this card would have this information for all networking on the system. So this is this has been a switch. I p config hope you guys enjoy this course. I will see you again in the next one 5. ComputerCavalry: NSLOOKUP: Theo in this section of the course, we're going to be covering the command called ns. Look of now, what in its look up does I mean, basically takes an I p address and tell you the name of the computer or the website or server that it's hitting. Or if you type the actual name of the system or the website you're trying to reach, it will probably spit back the i P address. So it's a good way to figure out general information about your local PC remote PC or ah, remote website. Let's go and take a look at the command in a Sligo. I'm going to click, start and in the search box. I'm going to type CMD right click on command and hit runners at ministry. See, we can enlarge this ah view going to change the color. Sorry. Let's student this way, you know? Sorry. Here we go. Okay. So we're gonna type the command in its look up and see what we get now. Here we have a default server, which is unknown with the address 19 to 1680101 And as is in fact true because we do have another server running here with that I p address. Now, whenever you type in its look up and just hit, enter its the command brings you into what's called interactive mode. And here is where you don't exactly need to type the command in this look up every single time you can just type of various information. So let's go ahead and start with a certain website. Some of you may be familiar Bo called yahoo dot com, so because we're in interactive mode, I can just type yahoo dot com and hit in a now we still have our server that we're connecting to, but we also get a few other information back to us about the domain yahoo dot com. We see we have a few I P addresses here that our system has registered for yahoo dot com. So I'm going to exit in its look up by hitting control. See, and let's type it one more time in type yahoo dot com with the command. As you can see, we get the same results. So in its lookout works whether you're in interactive mode or normal mode as well. Let's go in type one of the I P addresses that we got from yahoo dot com with in US look up type in its look up and let's select 98 that 138 not to 53 That 109 and hit it. No here, as you can see it, also in the second section, we did, in fact, reach yahoo dot com Now. Lastly, let's see how in its look up will interact with PCs on our network. Let's take our own PC. For example. Let's go ahead and find our computer name on a click Start right click on computer and hit properties. Give it a second to load and here we see our computer name is Lab dash PC going. Close that out. Now let's type in us Look up with lab dash PC and see what we get back now Here as we notice we have the full the fully qualified name for our system lab Dash PC that fake d c dot com cab dot com and we have the i p address of the system. So we see how in a slick up can get general information about what particular system were connected to Or maybe your network is starting tohave a rogue I p addresses. And you want to see what exactly these I P addresses are coming from? Maybe it's a certain website people are going to Or is it malicious things like that? So So in its look up is a very easy way that you can figure out information regarding a certain PC name, server name or I P address. I hope you guys enjoyed this course. I will see you again in the next one. 6. ComputerCavalry: NETSTAT: in this section will be discussing a very basic networking command called Net Stand. So what exactly is nuts stand nets that displays listening ports on your PC? Now that brings up another question in itself. What exactly are listening ports? Well, let's go ahead and take a look at our dry board and see if we get a better understanding before we dive into command. Net stat. So let's just say you have two individuals in an office that want to communicate via email . One person wants to send an email. The other one wants to receive the email. The other individual wants to reply to the email, and then the other individual wants to receive the replied email seems pretty simple when you're in the act, but basically your PC communicates this emailing language over something called ports. This is basically how your community, how your computer communicates with another PC over the Internet, on a network, different things like that. Now, in order for these ports to function properly, they have to be open or they have to be listening. So basically, in a situation like this of both PCs have to have certain ports open over the Internet to receive this email. These are just a few. Let's go ahead and take a look at the commandments that in my PC I'm going to click, start and in the search programs and files box. Wanna type CMD on the right? Click and hit run as administrator. As we can see, we have elevated command prompt. I'm going to change the color. Let's go ahead and type the command net stand N E T S t 18 Ford's last question mark Let's see what we get. So we see the command nets that displays protocol statistics and current T C I P network connections basically connections that are made in connections that are listening. So we have different switches here. Dash A, e f Things like that. No, in the corporate world or any basic networking with nets that you need to go ahead to start off is to display all connections and listening ports. Let's go ahead and run that command. I'm gonna type any t s t a t dash a and in. So we see here on our PC. We have ports like 135445 tweets, 69 different things like that does. Listening basically for connection and ready to accept that connection. Now, why exactly are ports themselves important? Well, let's go and take a look at some common ports over the Internet. I kind of have a Web page book here so we can go ahead and look at this. A copy. Open Internet Explorer. I'm going to pace now. This is a list of common networking port numbers. We're gonna see it. Figure out why port numbers are exactly important to us. As you can see, here we have Port 22. Ssh. 23 town net 53. Domain name server, Port 80 Hypertext transfer protocol. Http. As you can see here is that web page we have, http, of port open. So the reason why airports or important on your particular PC is because for the ports are needed for network connectivity. So if I was to go in and basically disconnect port or shut down for 80 I would probably no longer be able to make Internet connections because my PC is now no longer accepting listening requests from outside networks. Now, another command that we want to run with nets, That is the dash are we're gonna type nets that dash are Let's go up actually and see where , what exactly in the dash, or is so you see dash or displays the routing table. Now what exactly is a routing table? Well, let's go ahead and hit in her. See what we get back now with the Nets that dash our command, the I p four routing table of years. We have the network destination, the sudden it masked a default gateway. And the interface, now basically a routing table is basically what your PC and Roger, um stores for common connectivity. Celeste, you see from my PC. Normally, I connect to another PC on the same network. Your PC basically is going to save whatever the fastest route from your PC into your destination that had discovered, and it's going to save that in its writing table. Another way to look at this is just imagine when you leave for work in the morning. On average, the average person has about probably three different ways they can get to work. So that's your routing table. So if one lane doesn't work, you have a backup. Or if the roads are flooded you know another highway that you can take. That's your different routing table. Your PC does. The same thing is going to store the fastest routes that you took to some destinations. So I hope you guys enjoy this course. This is the very basic introduction to Nets that we did the dash, a command that lets all connections and listening ports. We went over what exactly ports do between your PC and another, and also we went over the running team. I hope you guys enjoyed this course. I will see you again in the next one. 7. ComputerCavalry: POWERCFG: in this section, we're going to be covering the power config. Man in Windows Administrator Command prompt Let's just say you have a user that states that particular times during the day their system intends to start running very, very, very fast. They hit the fan blowing really loudly in the background or this. They noticed that their system kind of randomly freezes. So you suspected that and it's of our issue. There's a way in command prompt that you can set your system to monitor the the amount of power that your system is using. And it will tell you whether you're having certain warnings or certain errors. Let's go and take a look at this command. I'm going to click start and in the search programs and file box. I'm gonna type CMD I wanna right click hit Run his administrator you. Now that we have an administrator, command prompt going to change the colors and things easier to read and I'm gonna type p o w e r c f G what a Ford slash and question mark. We're gonna look at some of the switches that we can use here, going to scroll down the SMIC this little larger go back up to the top. We see that there's a lot of different commands that we can use to kind of troubleshoot power issues, which is system we have delete the least the power scheme for specified I d. We can go down to even set the type of different type of combinations, or we can import export different power schemes. So from one system to another, we have last week different requests. Different switches like that, with one particular that we're interested in is the energy command we see here. It says Analyze the system for common energy efficient and battery life problems. The energy commands should be used when the computer is idle, with no open programs of documents. So let's go ahead and close our documents out. Could save, and I'm going to type p o w e r c of G dash energy. Sorry, I believe I may have spelled that wrong. Here we go. And now we see that Windows is now tracing the system or observing the system behavior for least 60 seconds. So now it's starting to see what are the different maybe power schemes. A different regulation of energy. The power that's being received to the system like that gonna let this run. And I guess we can take a break and come back when this is done and we are back. So we had the results back from our system. It says energy efficiency problems were found. We have five errors, one warnings and three informational messages. So it also has the file for men. It see that it exported as an HTML within this path. So let's go and take a look at the file. I want to open the system here. Computer going to see Dr Windows System 32 an energy report. I'm going to just slowly type energy. If you guys didn't know that Windows will automatically kind of search for files that are spelled as you're typing. E. R. G energy report What's going and copy that to the desktop. We're in double click the file, and we have a power efficiency diagnostic report. We have the computer name, whether it's plugged in or not, let's scroll down. So these are some of the errors that we're having when it comes to power? Were having so for some reason, some type of heirs with our USB devices warnings that we have for our active power plant when it being balanced power policy for video. We have a lot of different information that we can use here to distinguish whether or not a uses having issue with power from their system from the wall. I hope you guys find this tip useful. I will see you again in the next one. 8. ComputerCavalry: QUERY: in this section will be covering the query. Command and Windows Command prompt the system on our left will be a sort of the technician system. And the system on the right would be on demand controlled with active directory installed. So we're going to do We're going to choose a user, Jim Mc Fly. I'm gonna get his user name right. Click on his name of hit properties Angled to account. Now here we know that his user name is make fly. So is about four different areas we're gonna look at when it comes to the query command using the command prompt. First, we want to query the user himself. Let's do that. We're gonna take Query Q u E r Y user and the user name, which is Mike Fly and hitting her. Now we know on this local system, make fly is indeed log in. He has a council session. Ah, his session ideas number three and an active state and actually his log in time as well. Next, we're going to look at how to query different sections of different users that's logged in . So what we're going to do, we're going to switch users now this is going to simulate one PC with multiple users. Log onto. It's sort of like a terminal server in type of set of environment. So let's go ahead and switch users in, log in, under the local administrator what we're doing. Basically, we need to create multiple sessions on this PC, so I'm gonna go to start. I wanna right click on our command. Prompt hit runners. Administrator has changed the color. Now let's go ahead and query the system for the different sessions that's on the host. I'm gonna type query session and he dinner. Now we know with on this local host we have two different sessions. We have the administrator, which is the act of council session, and we see that we also have make Fly logged in to the same PC. Like I said, this is good to see how many users are logged into a certain system. Maybe you need to know why the computer is starting to lag or freeze different things like that where you can see. Okay, let's just exactly see who else has logged into the system. Some going to log out. We're gonna go back to Jim's account on golf, but the control delete. You know, we go Now let's query the different session I ds. So I'm gonna type Query Q u E r y, and I'm going to type session and hidden. I say before now this will tell us exactly how many users are logged on to the system. And now we know since the administrative logged off, we see that the system picked up that it's on Lee make fly logged into this session. Let's go ahead and see. We can query the session i d. Itself. I'm gonna type query qu er why, session and three We see that he has the session i d number three. I'm gonna hit in a and this tells us a little bit more about Jim's account. We know that his state is active. He's currently logged in Ah, and his user name. Now last, we're going to look at how to queer user on a remote server. So let's go ahead and take a look. I'm going to tweet type query user gonna type the server name Colon and D. C and hidden. We are now we've successfully queried the system on our right, which has active director installed on it to see who exactly is logged in on a remote PC. And we see indeed that it is theatre administrator with the main session I. D number and he's actively logged in. And also the time that the user logged in. You guys found this course very engaging. We went over a lot of different things in this section for querying House, a Queer Users session session I DS as well as remote systems for different users. I will see you again in the next one. 9. ComputerCavalry: WMIC DSQUERY NETUSER: in this section will be covering gathering user information. The Windows Command. We're going to cover a few topics from big around who's looking into a system. Use the name. And so System one right will be out to make control system when I left will be our PC that we're gonna be executing commands on. So let's jump into it. The first is the first command that we're going to run as we want to see who particularly is logged in on the system on our right, our domain controller. So I'm going to come over to our system on the left in type W M I. C. Space four slash note. Simen Kohler The remote computer name. As we can see on the right, it's just D C type D C space computer system space get space user name and hit in a Now, Based on the results that we received back for this particular system, we know that it is. The local administrator does long going to this PC. Let's go on to our second example. I want to clear the screen out type C. L s and dinner. Now let's see if this particular user, Jim MC Fly. If his account has been locked, I'm going to come over to our system on the left in type Net user. They use the name of the individual, which is make fly. Let's go in and right click on Jim's count and hit properties go to account. And here we have his log on a MC fly going to go back over to our system. Its face. Ford slash domain hit space pipe space. Find space four slash i space quotation. We're going to type, account active and hit. Enter. Now we see that Jim's account is indeed active, so we know that his account has not been disabled. I'm going to cancel and cancel our second wind. Now let's move on to our third example. Let's just say we're in a situation and we need to find out the user name of the individual that works at the company. We have their last name, but we don't exactly know their user name in Active directory is acting up for some reason . So once again, I'm gonna come out to our system when I left and type CLS to just declare the screen and I'm going to type D s query Q u e r y space user space, dash name space store And the last name of the individual in this case will be MC Fly Star again Piper Space Do you get space user space? Dash S A M I D Space dash display and hidden Sorry, I believe I missed one letter de escape There you go and hidden here the results that we got back We see that make fly Is the user name for Jim Mc fly Very, very handy Just in case you're having problems with the interface of active directory a lot of companies run across that on. That's the purpose of us getting down to just getting to the bear medals of command prompt because a lot of people may use it for very simple things. I p config i p address. But there's a lot of helpful information that you can use using the administrative Windows Command prompt. I'm going to hit CLS to clear the screen, and we're going to go over our very last topic. Now let's see if we have a user that's constantly getting locked out. That's a very common situation in most companies and It's kind of hard to pinpoint when their users being locked out on time that they're being locked out. Or let's just say you're on the phone a user. And he says he never reset his password. Well, there's a very simple way that we can prove that to be true or false. So a very last example is going to be finding out. When was the last time a user password was set? I'm going to come over to our administrative command, Prompt in type net space user space. The user name of the individual Ford slash. I don't mean space pipe space. Find space four slash I space and in quotations. I'm going to type password last set and inner. We see. The last time that Jim's account was Password was set waas at October 11 2017 10 37 PM Now let's go over to Jim's account. Actually, let's do this. Let's log out of Jim's account on the left, see that he's properly logged out, and now lets reset his password and see if the time changes. No, we don't want him to change on Log in. Sorry about that. Did not meet the minimum complexity. Try this one more time. Okay, Now, let's have Jim log back in. Keyboard. Here we go. Okay, so now we know that Jim is logged in. Now let's go and run. Our administrator command prompt again. And we're going to run the same command just to make sure that the time for Jim when he reset his password actually changes. So I'm going to type net user the user name of the individual space four slash domain space pipe space. Find space, ford slash I space and in quotation. As I say before, we're going to type password last set and hit it. Now we see that the new time that the last time Jim Reset his password was at 11:08 p.m. So we get some very useful information. Amusing these commands and Windows Command prompt is a very good toe that I think every admin should know whether no matter what your position, maybe there's a command pretty much everything. Actually, you can go online and search. Maybe the top 60 commands that every admin should know and allow these commands or in the list. And sometimes you need to ah, sort of browse these commands to see what exactly options are available to you. Like, for instance, in the Net command we had weaken do net accounts in that computer and that config knit continuing that file. There's a lot of different tools that every admin can use. I hope you guys enjoyed this course. I will see you again in the next one. 10. ComputerCavalry: HIDE YOUR PASSWORDS!: thean this section of the course. We're going to cover a very, very cool way that you can hide information using the command prompt. We're going to simulate basically hiding passwords in plain sight. So what I have here on the desktop is a pitcher named Harvey. Quite a double click on it. As you can see, it opens. I believe in Harvey. Didn't should some for me to a few of you. I'm gonna close out of it now. Let's open command print. When I click start and in the search programs and files box, I'm gonna type CMD when right click and run his administrator. Now let's change the color, as usual to make things more readable. And here we're going to type. We need to navigate to our desktop. So let's go ahead and change directory. We can go up one. The two dots will bring you up a level. His inner change directory again two dots and inner now we see were at the root of the C drive. So we want to reach the desktop of the user that we're currently logged into. Let's find out who we're longed into. I we are logged in as the local administrator. Okay, so now we know where we need to navigate. So I'm going to hit users and tab slash I'm going to do administrator. You can also just type one letter in Hit tab. Also, if that's the only file within that certain directly with that letter, or it will go down various files that start with that letter and hit tab. Let's go ahead and change the director while I'm at it Administrator and desktop and hidden . Okay, now we're at the root of the desktop on the day of ministry. So let's see all the files that we have in a certain directory. I'm gonna type de ir to see the files that's listed under the desktop and had dinner. Now we see we have a energy report html G Info and Harvey. So now let's cover the command that actually will combine our text file into our picture and hide our passwords in plain sight. I'm going to type copy ford slash b and I want to type the name of the picture, which is harvey dot jp g. So I'm going to type H A and dash the plus sign, and we're going to type of the name of our text file and hit tab. Here we go. Now we're going to hit a space. Now here is where we want to name the new picture that's going to contain our passwords. Sometimes I like to start naming pictures based on the word password. So something like pressure wash or, um, pre wash something like that. Let's type pre wash p r e wash That way. We know that this is where our passwords will be saved. I'm going to hit that J P. G and inner. Now we see a new file on our desktop that looks exactly like our Harvey file appeared. Let's double click and see if it opens like the Harvey File, and it does opens like a regular picture. But now our information from Margie Info folder is inside this picture. Let's see how we can access it. Exit out of this. I'm gonna go to our file Explorer and go navigate to the desktop and let's go ahead and change the file extensions being access, because we basically we need to convert this file into a text file so that we can actually view the information in text format because that's the file that it was created in. So let's go ahead and click organized and go all the way down toe folder in search options . We're going to click on view and go down to hide extensions for known file types. We wanna uncheck this because we need the file types to show so we can edit wouldn't apply . And OK, now we see dot jp g. So let's go ahead and change that extension. Right? Click and rename in type T X T because we know that's extension for text files gonna hit in her and they're just making sure Hey, are you sure you want to change this? Something may go wrong, but we do want to change it. So we want to click Yes, and double click the file. And as you can see, our information here has been at it to this text file. So imagine if this was passwords you wanted somewhere you can hide your passwords in plain sight. This would be a very helpful way to basically do that. Now let's close out of this and change this pre wash file back to a picture when right click and hit rename. What changed extension back to J. P. G. And hitting her. Yes. Now let's see if our picture opens successfully and it does. I believe in Harvey did. So. This is a very, very helpful way that I've learned and also incorporated in different companies that we can kind of hide very simple information. Let's just say you're troubleshooting issue between two PCs, and you actually do need to provide the user with administrative password, but you don't want toe. Send it in the email in plain text. Your phone batteries did. You can't text it to him. So this is a very handy way that you can actually incorporate that password into the picture and an email the picture to the individual and let them do the conversion to a text file. I hope you guys found this course very interesting. I hope you get a chance to implement this. I've seen it help myself in a lot of different situations. I will see you again in the next course