Finding process that locks a DLL

You want to replace a dll on a system, but you get access denied, although you’re admin, have the necessary rights.. so which process is locking the particular file/library. I know, there is handles.exe from Sysinternal Suite, and plenty other tools that do the trick.But, you don’t need third-party tools to get the answer, just use tasklist.exe or PowerShell.  

Continue reading

Scan IP range using ping

IP scanner for the poor ones Zwinkerndes Smiley

Just open up a cmd.exe and change the ip range..

C:\>FOR /L %x in (1,1,255) do ping -n 1 192.168.2.%x | find /I "reply" >> c:\temp\pingresult.txt

The above command uses a FOR loop to ping each device and looks for "Reply" in the output. If there is a "Reply" then the host is up.. Results will be written to C:\temp\pingresults.txt

Or the PowerShell version:

C:\> 1..255 | foreach-object { (new-object System.Net.Networkinformation.Ping).Send("192.168.2.$_") } | where-object {$_.Status -eq "success"} | select Address

Continue reading

Did you know about DiskShadow? Creating Shadow Copy from the command line

This can be an alternative for taking a Snapshot in Hyper-V..
According to TechNet @Microsoft they state: DiskShadow.exe is a tool that exposes the functionality offered by the Volume Shadow Copy Service (VSS). By default, DiskShadow uses an interactive command interpreter similar to that of DiskRAID or DiskPart. DiskShadow also includes a scriptable mode.

Continue reading

FAQ – Windows Command Processor cmd.exe

Ok, everybody talks and writes about Microsoft PowerShell .. BUT, what about those legacy systems that do NOT support the installation of PowerShell? Some, probably the majority know exactly what i’m talking about. Well, for sake of christ, there is still another type of shell called cmd.exe and batchfiles (*.bat and *.cmd) to run some administrative tasks.. This article will show some possibilities about the command processer which is included in almost any Microsoft Windows Operating Systems – including Windows 7! 🙂 Logo_cmd

Continue reading