100SILEX, de 0 à 100 s: MANAGEMENT
1526 Les perles du langage professionnel
MANAGEMENT
http://www.lesechos.fr/14/12/2010/lesechos.fr/0201000688949_les-perles-du-langage-professionnel.htm

1247 Les commandes dos de Windows
Panneau de configuration * ACCESS.CPL : ouvre les options d'accessibilitĂ© (Pour XP uniquement) * APPWIZ.CPL : ouvre l'outil Ajouter/Supprimer un programme * AZMAN.MSC : ouvre le gestionnaire d'autorisations (Pour Vista uniquement) * CERTMGR.MSC : ouvre les certificats pour l’utilisateur actuel * CLICONFG : ouvre la configuration des clients SQL * COLLAB.CPL : ouvre le voisinage immĂ©diat (Pour Vista uniquement) * COMEXP.MSC ou bien DCOMCNFG : ouvre l'outil services et composants (Pour Vista uniquement) * COMPMGMT.MSC : ouvre l'outil de gestion de l'ordinateur * COMPUTERDEFAULTS : ouvrir l’outil des programmes par dĂ©faut (Pour Vista uniquement) * CONTROL /NAME MICROSOFT.BACKUPANDRESTORECENTER : ouvre le centre de sauvegarde et de restauration (Pour Vista uniquement). Tutoriel ICI * CONTROL ADMINTOOLS : ouvre les outils d'administrations * CONTROL COLOR : ouvre les paramĂštres de l'apparence * CONTROL FOLDERS : ouvre les options de dossiers * CONTROL FONTS : ouvre le gestionnaire de polices * CONTROL INTERNATIONAL ou bien INTL.CPL : ouvre les options rĂ©gionales et linguistiques * CONTROL KEYBOARD : ouvre les propriĂ©tĂ©s du clavier * CONTROL MOUSE ou bien MAIN.CPL : ouvre les propriĂ©tĂ©s de la souris * CONTROL PRINTERS : ouvre les imprimantes et les fax disponibles * CONTROL USERPASSWORDS : ouvre l’éditeur des comptes utilisateurs * CONTROL USERPASSWORDS2 ou bien NETPLWIZ : contrĂŽle les utilisateurs et leurs accĂšs< * CONTROL : ouvre le panneau de configuration * CREDWIZ : ouvre l’outil de sauvegarde et restauration des mots de passe des utilisateurs (Pour Vista uniquement) * DESK.CPL : ouvre les paramĂštres d'affichage * DEVMGMT.MSC : ouvre les gestionnaire de pĂ©riphĂ©riques. Tutoriel ICI * DRWTSN32 : ouvre Dr. Watson (Pour XP uniquement) * DXDIAG : ouvre l'outil de diagnostic DirectX * EVENTVWR ou bien EVENTVWR.MSC : ouvre l'observateur d'Ă©vĂšnements * FSMGMT.MSC : ouvre les dossiers partagĂ©s * GPEDIT.MSC : ouvre l’éditeur des stratĂ©gies de groupe (Pour les Ă©ditions professionnelles et plus de Windows) * HDWWIZ.CPL : ouvre l'assistant ajout de matĂ©riels * INFOCARDCPL.CPL : ouvre l'assistant compatibilitĂ© des programmes * IRPROPS.CPL : ouvre le gestionnaire d'infrarouge * ISCSICPL : ouvre l'outil de configuration de l'initiateur ISCI Microsoft (Pour Vista uniquement) * JOY.CPL : ouvre l'outil de contrĂŽleur de jeu * LPKSETUP : ouvre l’assistant d’installation et dĂ©sinstallation des langues d’affichage (Pour Vista uniquement) * LUSRMGR.MSC : ouvre l’éditeur des utilisateurs et groupes locaux * MDSCHED : ouvre l'outil de diagnostics de la mĂ©moire Windows (Pour Vista uniquement) * MMC : ouvre une nouvelle console vide * MMSYS.CPL : ouvre les paramĂštres de sons * MOBSYNC : ouvre le centre de synchronisation * MSCONFIG : ouvre l'outil de configuration du systĂšme * NAPCLCFG.MSC : ouvre l'outil de configuration du client NAP (Pour Vista uniquement) * NTMSMGR.MSC : ouvre le gestionnaire des supports de stockage amovibles * NTMSOPRQ.MSC : ouvre les demandes de l'opĂ©rateur de stockage amovible * ODBCAD32 : ouvre l'administrateur de sources de donnĂ©es ODBC * OPTIONALFEATURES : ouvre l’outil Ajouter/Supprimer des composants Windows (Pour Vista uniquement) * PERFMON ou bien PERFMON.MSC : ouvre le moniteur de fiabilitĂ© et de performances Windows. * POWERCFG.CPL : ouvre le gestionnaire des modes d’alimentation (Pour Vista uniquement) * REGEDIT ou bien REGEDT32 (Pour Vista uniquement) : ouvre l'Ă©diteur de registre * REKEYWIZ : ouvre le gestionnaire des certificats de chiffrement de fichiers (Pour Vista uniquement) * RSOP.MSC : ouvre le jeu de stratĂ©gie rĂ©sultant * SECPOL.MSC : ouvre les paramĂštres de sĂ©curitĂ©s locales * SERVICES.MSC : ouvre le gestionnaire de services * SLUI : ouvre l’assistant d’activation de Windows (Pour Vista uniquement) * SYSDM.CPL : ouvre les propriĂ©tĂ©s systĂšme * SYSEDIT : ouvre l’éditeur de configuration systĂšme (Attention, Ă  manipuler avec prudence) * SYSKEY : ouvre l’utilitaire de protection de la base de donnĂ©es des comptes Windows (Attention, Ă  manipuler avec extrĂȘme prudence !) * SYSPREP: ouvre le dossier contenant l'outil de prĂ©paration du systĂšme (Pour Vista uniquement) * TABLETPC.CPL : ouvre les paramĂštres pour Tablet pc (Pour Vista uniquement) * TASKSCHD.MSC ou bien CONTROL SCHEDTASKS : ouvre le planificateur de tĂąches (Pour Vista uniquement) * TELEPHON.CPL : ouvre l'outil de connexion tĂ©lĂ©phonique * TIMEDATE.CPL : ouvre les paramĂštres de l'heure et de la date * TPM.MSC : ouvre l'outil gestion de module de plateforme sĂ©curisĂ©e sur l'ordinateur local (Pour Vista uniquement) * UTILMAN : ouvre les options d’ergonomie (Pour Vista uniquement) * VERIFIER : ouvre le gestionnaire de vĂ©rification des pilotes * WMIMGMT.MSC : ouvre Windows Management Infrastructure * WSCUI.CPL : ouvre le centre de sĂ©curitĂ© Windows * WUAUCPL.CPL : ouvre le service de mise Ă  jour Windows (Pour XP uniquement) Programmes et outils Windows * %WINDIR%\SYSTEM32\RESTORE\RSTRUI.EXE : ouvre l’outil de restauration de systĂšme (Pour XP uniquement). Tutoriel ICI * CALC : ouvre la calculatrice * CHARMAP : ouvre la table des caractĂšres * CLIPBRD : ouvre le presse papier (Pour XP uniquement, pour l'ajouter Ă  Vista voir ICI) * CMD : ouvre l'invite de commandes * DIALER : ouvre le numĂ©rateur tĂ©lĂ©phonique de Windows * DVDPLAY : ouvre votre lecteur DVD * EUDCEDIT : ouvre l’éditeur de caractĂšres privĂ©s * EXPLORER : ouvre l'explorateur Windows * FSQUIRT : Assistant transfert Bluetooth * IEXPLORE : ouvre Internet explorer * IEXPRESS : ouvre l’assistant de crĂ©ation des archives auto-extractibles. Tutoriel ICI * JOURNAL : ouvre un nouveau journal (Pour Vista uniquement) * MAGNIFY : ouvre la loupe * MBLCTR : ouvre le centre de mobilitĂ© de Windows (Pour Vista uniquement) * MIGWIZ : ouvre l'outil de transfert de fichiers et de paramĂštres Windows (Pour Vista uniquement) * MIGWIZ.EXE : ouvre l'outil de transfert de fichiers et de paramĂštres Windows (pour XP uniquement) * MOVIEMK : ouvre Windows Movie Maker * MRT : lance l’utilitaire de suppression de logiciel malveillant. Tutoriel ICI * MSDT : ouvre l’outil de diagnostics et support Microsoft * MSINFO32 : ouvre les informations systĂšme * MSPAINT : ouvre Paint * MSRA : ouvre l'assistance Ă  distance Windows * MSTSC : ouvre l'outil de connexion du bureau a distance * NOTEPAD : ouvre le bloc-notes * OSK : ouvre le clavier visuel. Tutoriel ICI * PRINTBRMUI : ouvre l'assistant de migration d'imprimante (Vista uniquement) * RSTRUI : ouvre l'outil de restauration du systĂšme (Pour Vista uniquement) * SIDEBAR : ouvre le volet Windows (Pour Vista uniquement) * SIGVERIF : ouvre l'outil de vĂ©rification des signatures de fichiers * SNDVOL : ouvre le mĂ©langeur de volume * SNIPPINGTOOL : ouvre l'outil capture d'Ă©cran (Pour Vista uniquement). Tutoriel ICI * SOUNDRECORDER : ouvre le magnĂ©tophone * STIKYNOT : ouvre le pense-bĂȘte (Pour Vista uniquement) * TABTIP : ouvre le panneau de saisie Tablet PC (Pour Vista uniquement) * TASKMGR : ouvre le gestionnaire des tĂąches Windows * WAB : ouvre les contacts (Pour Vista uniquement) * WERCON : ouvre l'outil de rapports et de solutions aux problĂšmes (Pour Vista uniquement) * WINCAL : ouvre le calendrier Windows (Pour Vista uniquement) * WINCHAT : ouvre le logiciel Microsoft de chat en rĂ©seau (Pour Windows XP uniquement) * WINDOWSANYTIMEUPGRADE : permet la mise Ă  niveau de Windows Vista * WINVER : ouvre la fenĂȘtre pour connaĂźtre votre version Windows * WINWORD: ouvre Word (s'il est installĂ©) * WMPLAYER : ouvre le lecteur Windows Media * WRITE ou bien Wordpad : ouvre Wordpad Gestion des disques * CHKDSK : effectue une analyse de la partition prĂ©cisĂ©e dans les paramĂštres de la commande (Pour plus d’informations, tapez CHKDSK /? dans l’invite de commande CMD) * CLEANMGR : ouvre l'outil de nettoyage de disque * DEFRAG: DĂ©fragmente le disque dur (pour savoir comment utiliser, c'est ici ) * DFRG.MSC : ouvre l’outil de dĂ©fragmentation de disque * DISKMGMT.MSC : ouvre le gestionnaire de disques * DISKPART : ouvre l’outil de partitionnement (un peu lourd Ă  manipuler) Gestion des rĂ©seaux et Internet * CONTROL NETCONNECTIONS ou bien NCPA.CPL : ouvre les connexions rĂ©seau * FIREWALL.CPL : ouvre le pare-feu Windows * INETCPL.CPL : ouvre les propriĂ©tĂ©s internet * IPCONFIG : affiche les configurations des adresses IP sur l’ordinateur (Pour plus d’informations, tapez IPCONFIG /? dans l’invite de commande CMD) * NETSETUP.CPL : ouvre l’assistant configuration rĂ©seau (Pour XP uniquement) * WF.MSC : ouvre les fonctions avancĂ©es du pare-feu Windows (Pour Vista uniquement). Tutoriel ICI * À VOIR ÉGALEMENT : Commandes IP relatives aux rĂ©seaux sous Windows Commandes IP relatives aux rĂ©seaux sous Windows Il est parfois trĂšs utile de connaĂźtre les commandes IP, pour analyser voire configurer ses rĂ©seaux TCP/IP. Voici la liste de ces commandes Ă  utiliser dans une fenĂȘtre DOS : * Ping * Tracert * IpConfig * NetStat * Route * Arp * NbtStat * Telnet * Hostname * Ftp * NsLookUp * NetSh ------------------------------------------------------------------------------------------------------------------------------------------------ PING : Teste la connexion rĂ©seau avec une adresse IP distante ping -t [IP ou host] ping -l 1024 [IP ou host] * L’option -t permet de faire des pings en continu jusqu’à Ctrl-C. o Si vous avez prĂ©cisĂ© l'option -t vous pouvez Ă  tout moment avoir des statistiques sans interrompre les requĂȘtes ping en appuyant sur Ctrl+Attn (aussi nommĂ© Ctrl+Pause) Cette commande est aussi utile pour gĂ©nĂ©rer une charge rĂ©seau en spĂ©cifiant la taille du paquet avec l’option -l et la taille du paquet en octets. --------------------------------------------------------------------------------------------------------------------------------------------------- TRACERT : Affiche toutes les adresses IP intermĂ©diaires par lesquelles passe un paquet entre la machine locale et l’adresse IP spĂ©cifiĂ©e. tracert [@IP ou nom du host] tracert -d [@IP ou nom du host] Cette commande est utile si la commande ping ne donne pas de rĂ©ponse, afin d'Ă©tablir Ă  quel niveau la connexion est dĂ©faillante. -------------------------------------------------------------------------------------------------------------------------------------------------------------- IPCONFIG : Affiche ou rafraĂźchit la configuration rĂ©seau TCP/IP ipconfig /all [/release [carte]] [/renew [carte]] /flushdns /displaydns /registerdns [-a] [-a] [-a] Cette commande, exĂ©cutĂ©e sans option, affiche l’adresse IP en cours, le masque rĂ©seau ainsi que la passerelle par dĂ©faut au niveau des interfaces rĂ©seau connues sur la machine locale. * /all: Affiche toute la configuration rĂ©seau, y compris les serveurs DNS, WINS, bail DHCP, etc ... * /renew [carte]: Renouvelle la configuration DHCP de toutes les cartes (si aucune carte n'est spĂ©cifiĂ©e) ou d'une carte spĂ©cifique avec le paramĂštre carte. Le nom de carte est celui qui apparaĂźt avec ipconfig sans paramĂštre. * /release [carte]: Envoie un message DHCPRELEASE au serveur DHCP pour libĂ©rer la configuration DHCP actuelle et annuler la configuration d'adresse IP de toutes les cartes (si aucune carte n'est spĂ©cifiĂ©e) ou d'une carte spĂ©cifique avec paramĂštre carte. Ce paramĂštre dĂ©sactive TCP/IP pour les cartes configurĂ©es de maniĂšre Ă  obtenir automatiquement une adresse IP. * /flushdns: Vide et rĂ©initialise le cache de rĂ©solution du client DNS. Cette option est utile pour exclure les entrĂ©es de caches nĂ©gatives ainsi que toutes les autres entrĂ©es ajoutĂ©es de façon dynamique. * /displaydns: Affiche le cache de rĂ©solution du client DNS, qui inclut les entrĂ©es prĂ©chargĂ©es Ă  partir du fichier des hĂŽtes locaux ainsi que tous les enregistrements de ressources rĂ©cemment obtenus pour les requĂȘtes de noms rĂ©solues par l'ordinateur. Le service Client DNS utilise ces informations pour rĂ©soudre rapidement les noms frĂ©quemment sollicitĂ©s, avant d'interroger ses serveurs DNS configurĂ©s. * /registerdns: Actualise tous les baux DHCP et rĂ©inscrit les noms DNS. ------------------------------------------------------------------------------------------------------------------------------------------------------------------ NETSTAT : Affiche l’état de la pile TCP/IP sur la machine locale NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [intervalle] * -a Affiche toutes les connexions et ports d'Ă©coute (Les connexions cĂŽtĂ© serveur sont normalement inhibĂ©es). * -e Affiche les statistiques Ethernet. Peut ĂȘtre combinĂ©e avec l'option -s. * -n Affiche les adresses et les numĂ©ros de port sous forme numĂ©rique. * -p proto Affiche les connexions pour le protocole spĂ©cifiĂ© par proto; proto peut ĂȘtre TCP ou UDP. UtilisĂ© avec l'option -s pour afficher des statistiques par protocole, proto peut ĂȘtre TCP, UDP, ou IP. * -r Affiche le contenu de la table de routage. * -s Affiche les statistiques par protocole. Par dĂ©faut, des statistiques sur TCP, UDP et IP sont visualisĂ©es; l'option -p peut ĂȘtre utilisĂ©e pour spĂ©cifier un sous-ensemble du dĂ©faut. * intervalle: RĂ©affiche les statistiques sĂ©lectionnĂ©es, avec une pause de "intervalle" secondes entre chaque affichage. Appuyez sur Ctrl+C pour arrĂȘter l'affichage des statistiques. * -abnov Affiche les processus qui utilisent la connexion internet (Adresse IP local, port, adress IP distante et le PID du processus qui utilise la connexion ainsi que son nom). ------------------------------------------------------------------------------------------------------------------------------------------------------------------- ROUTE : Affiche ou modifie la table de routage ROUTE [-f] [commande [destination] [MASK masque rĂ©seau] [passerelle] * -f Efface les tables de routage de toutes les entrĂ©es de passerelles. UtilisĂ© conjointement Ă  une des commandes, les tables sont effacĂ©es avant l'exĂ©cution de la commande. * -p Rend rĂ©manente l’entrĂ©e dans la table aprĂšs le reboot de la machine * commande SpĂ©cifie une des quatre commandes : o DELETE: Efface un itinĂ©raire. o PRINT: Affiche un itinĂ©raire. o ADD: Ajoute un itinĂ©raire. o CHANGE: Modifie un itinĂ©raire existant. * destination: SpĂ©cifie l'hĂŽte. * MASK: Si le mot clĂ© MASK est prĂ©sent, le paramĂštre suivant est interprĂ©tĂ© comme le paramĂštre masque rĂ©seau. * masque rĂ©seau: Fourni, il spĂ©cifie la valeur de masque de sous-rĂ©seau Ă  associer Ă  cette entrĂ©e d'itinĂ©raire. Non spĂ©cifiĂ©, il prend la valeur par dĂ©faut 255.255.255.255. * passerelle: SpĂ©cifie la passerelle. * METRIC: SpĂ©cifie le coĂ»t mĂ©trique pour la destination ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- ARP : RĂ©solution des adresses IP en adresses MAC. Affiche et modifie les tables de traduction des adresses IP en adresses physiques utilisĂ©es par le protocole de rĂ©solution d'adresses ARP. ARP -s adr_inet adr_eth [adr_if] ARP -d adr_inet [adr_if] ARP -a [adr_inet] [-N adr_if] * -a Affiche les entrĂ©es ARP actives en interrogeant le protocole de donnĂ©es actif. Si adr_inet est spĂ©cifiĂ©, seules les adresses IP et physiques de l'ordinateur spĂ©cifiĂ© sont affichĂ©es. Si plus d'une interface rĂ©seau utilise ARP, les entrĂ©es de chaque table ARP sont affichĂ©es. * -g Identique Ă  -a. * adr_inet SpĂ©cifie une adresse internet. * -N adr_if Affiche les entrĂ©es ARP pour l'interface rĂ©seau spĂ©cifiĂ©e par adr_if. * -d Efface l'hĂŽte spĂ©cifiĂ© par adr_inet. * -s Ajoute l'hĂŽte et associe l'adresse Internet adr_inet avec l'adresse physique adr_eth. L'adresse physique est donnĂ©e sous forme de 6 octets hexadĂ©cimaux sĂ©parĂ©s par des tirets. L'entrĂ©e est permanente. * adr_eth SpĂ©cifie une adresse physique. * adr_if PrĂ©cisĂ©e, elle spĂ©cifie l'adresse Internet de l'interface dont la table de traduction des adresses devrait ĂȘtre modifiĂ©e. Non prĂ©cisĂ©e, la premiĂšre interface applicable sera utilisĂ©e. --------------------------------------------------------------------------------------------------------------------------------------------------------------------- NBTSTAT : Mise Ă  jour du cache du fichier Lmhosts. Affiche les statistiques du protocole et les connexions TCP/IP actuelles utilisant NBT (NetBIOS sur TCP/IP). NBTSTAT [-a Nom Distant] [-A adresse IP] [-c] [-n] [-r] [-R] [-s] [S] [intervalle] * -a (Ă©tat carte) Liste la table de noms de la machine distante (nom connu). * -A (Ă©tat carte) Liste la table de noms de la machine distante (adresse IP). * -c (cache) Liste le cache de noms distants y compris les adresses IP. * -n (noms) Liste les noms NetBIOS locaux. * -r (rĂ©solus) Liste les noms rĂ©solus par diffusion et via WINS. * -R (Recharge) Purge et recharge la table du cache de noms distantes. * -S (Sessions) Liste la table de sessions avec les adresses destination IP. * -s (sessions) Liste la table de sessions convertissant les adresses de destination IP en noms d'hĂŽtes via le fichier hĂŽtes. Un Exemple : nbtstat -A @IP Cette commande renvoie le nom NetBIOS, nom du systĂšme, les utilisateurs connectĂ©s ...de la machine distante. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- TELNET telnet telnet La commande telnet permet d'accĂ©der en mode Terminal (Ecran passif) Ă  un host distant. Elle permet Ă©galement de vĂ©rifier si un service quelconque TCP tourne sur un serveur distant en spĂ©cifiant aprĂšs l’adresse IP le numĂ©ro de port TCP. C’est ainsi que l’on peut tester si le service SMTP, par exemple, tourne sur un serveur Microsoft Exchange en utilisant l’adresse IP du connecteur SMTP et puis 25 comme numĂ©ro de port. Les ports les plus courants sont : * ftp (21), * telnet (23), * smtp (25), * www (80), * kerberos (88), * pop3 (110), * nntp (119) * et nbt (137-139). --------------------------------------------------------------------------------------------------------------------------------------------------------------------- HOSTNAME : Affiche le nom de la machine Ftp FTP: Client de tĂ©lĂ©chargement de fichiers ftp –s: * -s cette option permet de lancer des FTP en mode batch : spĂ©cifie un fichier textuel contenant les commandes FTP. --------------------------------------------------------------------------------------------------------------------------------------------------------------------- NsLookUp: envoie des requĂȘtes DNS sur un serveur DNS au choix nslookup [domaine] [serveur dns] La commande NsLookUp permet d'envoyer des requĂȘtes DNS Ă  un serveur. Par dĂ©faut, si vous ne mettez pas le serveur DNS, la commande utilisera celui qui est configurĂ© pour votre interface rĂ©seau (celui que vous utilisez pour naviguer sur internet, par exemple) mais vous pouvez forcer l'utilisation d'un autre serveur. Par exemple, pour demander au serveur DNS 10.0.0.3 l'adresse IP correspondante Ă  l'adresse www.commentcamarche.net: nslookup www.commentcamarche.net 10.0.0.3 * Si vous ne prĂ©cisez aucun paramĂštre pour nslookup, un shell s'ouvrira en attente de requĂȘtes de votre part. -------------------------------------------------------------------------------------------------------------------------------------------------------------------- Netsh (network shell : shell rĂ©seau) est un utilitaire en ligne de commande inclus dans la gamme des systĂšmes d'exploitation Windows NT (NT, 2000, XP, 2003 Serveur, Vista) Ă  partir de Windows 2000. Il permet la configuration du rĂ©seau, localement ou Ă  distance. Une utilisation classique de netsh est la rĂ©initialisation de la pile TCP/IP Ă  ses paramĂštres d'origines (Sous Windows 98, cette opĂ©ration nĂ©cessitait la rĂ©installation de l'adaptateur TCP/IP). Dans ce mode, vous devez fournir Ă  la commande un fichier journal (log). Celui-ci sera rempli avec les valeurs affectĂ©es par netsh. Netsh permet aussi (entre autres) de changer l'adresse IP de la machine. Exemples d'utilisations : - RĂ©initialisation de la pile TCP/IP : netsh interface ip reset C:\resetlog.txt - Adresse IP statique : netsh interface ip set address local static 123.123.123.123 255.255.255.0 - Adresse IP dynamique : netsh interface ip set address name="Connexion au rĂ©seau local" source=dhcp - Netsh et IPv6 : Netsh peut Ă©galement ĂȘtre utilisĂ© pour lire des informations provenant de la pile IPv6, cette commande est plus facile Ă  utiliser que la commande IPv6.exe et fournit quasiment le mĂȘme niveau d'information. Pour afficher votre adresse IPv6 en utilisant netsh : netsh interface ipv6 show address Autres commandes * %HOMEDRIVE% : ouvre l'explorateur sur la partition ou le systĂšme d'exploitation est installĂ© * %HOMEPATH% : ouvre le dossier d'utilisateur connectĂ© actuellement C:\Documents and settings\[nom d'utilisateur] * %PROGRAMFILES% : ouvre le dossier d’installation d’autres programmes (Program Files) * %TEMP% ou bien %TMP% : ouvre le dossier temporaire * %USERPROFILE% : ouvre le dossier du profil de l'utilisateur connectĂ© actuellement * %WINDIR% ou bien %SYSTEMROOT% : ouvre le dossier d’installation de Windows * %WINDIR%\system32\rundll32.exe shell32.dll,Control_RunDLL hotplug.dll : affiche la fenĂȘtre "Supprimer le pĂ©riphĂ©rique en toute sĂ©curitĂ©" * AC3FILTER.CPL : ouvre les propriĂ©tĂ©s du filtre AC3 (Si installĂ©) * FIREFOX : lance Mozilla FireFox (Si installĂ©) * JAVAWS : Visualise le cache du logiciel JAVA (Si installĂ©) * LOGOFF : ferme la session actuelle * NETPROJ : autorise ou pas la connexion Ă  un projecteur rĂ©seau (Pour Vista uniquement) * VĂ©rificateur des fichiers systĂšme (NĂ©cessite un CD de Windows si le cache n’est pas disponible): (Tutoriel ICI) o SFC /SCANNOW : scanne immĂ©diatement tous les fichiers systĂšme et rĂ©pare les fichiers endommagĂ©s o SFC /VERIFYONLY : scanne seulement les fichiers systĂšme o SFC /SCANFILE="nom et chemin de fichier" : scanne le fichier prĂ©cisĂ©, et le rĂ©pare s’il est endommagĂ© o SFC /VERIFYFILE="nom et chemin de fichier" : scanne seulement le fichier prĂ©cisĂ© o SFC /SCANONCE : scanne les fichiers systĂšme au prochain redĂ©marrage o SFC /REVERT : remet la configuration initiale (Pour plus d’informations, tapez SFC /? dans l’invite de commande CMD. * SHUTDOWN : Ă©teint Windows * SHUTDOWN –A : interrompe l’arrĂȘt de Windows * VSP1CLN : supprime le cache d'installation du service pack 1 de Vista (Tutoriel ICI) CrĂ©er votre propre commande Pour ceux qui aiment tout faire avec le clavier, il est possible de crĂ©er vos propres commandes exĂ©cutables dans Menu dĂ©marrer > ExĂ©cuter. Nous allons prendre l'exemple de la commande netnavig qui exĂ©cutera Mozilla FireFox. * Ouvrez la base de registre. * Allez vers la clĂ© HKEY_LOCAL_MACHINE puis les sous-clĂ©s successives \SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths * Allez dans le menu Édition > Nouveau > ClĂ© et donnez-lui le nom netnavig.exe * Faites un double-clic sur la valeur que vous venez de crĂ©er, puis allez de nouveau dans le menu Édition > Nouveau > Valeur ChaĂźne et donnez-lui le nom Path * Faites encore un double-clic sur la valeur crĂ©Ă©e et entrez le chemin complet de l'application que vous voudrez lancer, dans notre exemple c'est C:\Program Files\Mozilla Firefox, puis validez. Il est possible de copier ce chemin Ă  partir de la barre d'adresse de l'explorateur directement. * Un autre double-clic sur la valeur (par dĂ©faut) et entrez l'exĂ©cutable de l'application avec son chemin complet : C:\Program Files\Mozilla Firefox\firefox, dans notre exemple. Ensuite, validez et fermez l'Ă©diteur de registre. Ainsi vous pouvez exĂ©cuter Mozilla Firefox juste en faisant: Menu dĂ©marrer > ExĂ©cuter > taper netnavig et valider. Vous pouvez faire la mĂȘme chose pour toutes les applications auxquelles vous voulez un accĂšs rapide avec le clavier.
http://www.artup-concept.com/commandes-dos-de-windows.html

1018 EZ sniper : Free ebay auction sniper software. Snipe auctions online. Automatic esnipe bid sniping agent.
Online auction sniping software. The most effective unattended esnipe auction sniping. Snipe ebay and others. auction, bid, esnipe, esniper, powersnipe, auctionsniper, ebay, snipe, sniper, sniping, ebay, software, online, EZ sniper , ezsniper, auctionstealer, automatic, free, bidding, tool, management, automated, auctions, free, agent, stealer
https://www.ezsniper.com/

992 Troy Hunt: Who’s who of bad password practices – banks, airlines and more
Troy Hunt on observations, musings and conjecture about the world of software and technology Troy Hunt, blog, .NET, Azure, Backup, Bing, Blogger, Career Development, Code Quality, Conference, Database, Design Utopia, DotNetNuke, Enterprise Software Platform, Internet Explorer, iPhone, K2, LinkedIn, Media, NDepend, Online Identity, OWASP, People Management, Personal Development, Product Review, ReSharper, Security, SharePoint, Silverlight, Software Quality, SQL Injection, SQL Server, Subversion, Travel, Twitter, Visual Studio, Windows Mobile, XSS, Ah, passwords. Love ‘em or hate ‘em, they’re a necessary evil of the digital age. The reality is we all end up with an alphabet soup of passwords spread over dozens of various sites and services across the internet. Whilst we might not always practice it, we all know the theory of creating a good password; uniqueness, randomness and length. The more of each, the better. Of course we frequently don’t do this because of all sorts of human factors such as convenience, memory or simple unawareness of the risks. Still, when it’s a case of individuals electing not to create secure passwords, they really only have themselves to blame. But what happens when the website won’t allow you to create a secure password? Or at least when they severely constrain your ability to create long, random, unique passwords? And what about when they don’t allow you to send it between your computer and their server securely? Even worse, what happens when our most “secure” institutions implement lazy password policies? Unfortunately, all of this is pretty rampant practice.
http://www.troyhunt.com/2011/01/whos-who-of-bad-password-practices.html

870 How I Use Visualization To Drive Creativity
This is a guest post by Mark Suster, a 2x entrepreneur turned VC.  He sold his second company to Salesforce.com, becoming VP of Product Management. He joined GRP Partners in 2007 as a General Partner focusing on early-stage technology companies. Read more about Suster on his blog at Bothsidesofthetable and on Twitter at @msuster. This is a guest post by Mark Suster, a 2x entrepreneur turned VC. He sold his second company to Salesforce.com, becoming VP of Product Management. He joined GRP Partners in 2007 as a General Partner focusing on early-stage technology companies. Read more about Suster on his blog at Bothsidesofthetable and on Twitter at @msuster. Creativity. I’ve always believed it’s been one of the most important attributes of business success yet something very few business leaders talk about. So I thought I’d write a post about how I drive my personal creativity. As a practitioner of creativity rather than as an instructor of it I’m certain that there are many ways to get the creative juices flowing and how to release more creativity. The one that works best for me is visualization coupled with self talk. Visualization is so important to help yourself & others conceptualize ideas. It’s why I always work hard to find images for my blog posts & why all of my keynote presentations are visual rather than bullet points with words.
http://techcrunch.com/2011/01/17/how-i-use-visualization-to-drive-creativity/

767 The 5 types of programmers « Steven Benner's Blog
In my code journeys and programming adventures I’ve encountered many strange foes, and even stranger allies. I’ve identified at least five different kinds of code warriors, some make for wonderful comrades in arms, while others seem to foil my every plan. However they all have their place in the pantheon of software development. Without a healthy mix of these different programming styles you’ll probably find your projects either take too long to complete, are not stable enough or are too perfect for humans to look upon. The duct tape programmer The code may not be pretty, but damnit, it works! This guy is the foundation of your company. When something goes wrong he will fix it fast and in a way that won’t break again. Of course he doesn’t care about how it looks, ease of use, or any of those other trivial concerns, but he will make it happen, without a bunch of talk or time-wasting nonsense. The best way to use this person is to point at a problem and walk away. The OCD perfectionist programmer You want to do what to my code? This guy doesn’t care about your deadlines or budgets, those are insignificant when compared to the art form that is programming. When you do finally receive the finished product you will have no option but submit to the stunning glory and radiant beauty of perfectly formatted, no, perfectly beautiful code, that is so efficient that anything you would want to do to it would do nothing but defame a masterpiece. He is the only one qualified to work on his code. The anti-programming programmer I’m a programmer, damnit. I don’t write code. His world has one simple truth; writing code is bad. If you have to write something then you’re doing it wrong. Someone else has already done the work so just use their code. He will tell you how much faster this development practice is, even though he takes as long or longer than the other programmers. But when you get the project it will only be 20 lines of actual code and will be very easy to read. It may not be very fast, efficient, or forward-compatible, but it will be done with the least effort required. The half-assed programmer What do you want? It works doesn’t it? The guy who couldn’t care less about quality, that’s someone elses job. He accomplishes the tasks that he’s asked to do, quickly. You may not like his work, the other programmers hate it, but management and the clients love it. As much pain as he will cause you in the future, he is single-handedly keeping your deadlines so you can’t scoff at it (no matter how much you want to). The theoretical programmer Well, that’s a possibility, but in practice this might be a better alternative. This guy is more interested the options than what should be done. He will spend 80% of his time staring blankly at his computer thinking up ways to accomplish a task, 15% of his time complaining about unreasonable deadlines, 4% of his time refining the options, and 1% of his time writing code. When you receive the final work it will always be accompanied by the phrase “if I had more time I could have done this the right way”. Where do you fit? Personally, I’d have to classify myself as the perfectionist. So, which type of programmer are you? Or perhaps you know another programming archetype that is missing from my list? Post a comment below and I’ll add it to a new updated list.
http://stevenbenner.com/2010/07/the-5-types-of-programmers/

745 Things You Should Do Immediately After Launching a Website
A few things you should do right after launching a website (and if you can, do them prior to launching your website publicly). website management
http://sixrevisions.com/website-management/things-you-should-do-immediately-after-launching-a-website/

533 The Theory and Technique of Electronic Music
Contents Sinusoids, amplitude and frequency Measures of Amplitude Units of Amplitude Controlling Amplitude Frequency Synthesizing a sinusoid Superposing Signals Periodic Signals About the Software Examples Examples Wavetables and samplers The Wavetable Oscillator Sampling Enveloping samplers Timbre stretching Interpolation Examples Audio and control computations The sampling theorem Control Control streams Converting from audio signals to numeric control streams Control streams in block diagrams Event detection Audio signals as control Operations on control streams Control operations in Pd Examples Automation and voice management Envelope Generators Linear and Curved Amplitude Shapes Continuous and discontinuous control changes Muting Switch-and-ramp Polyphony Voice allocation Voice tags Encapsulation in Pd Examples Modulation Taxonomy of spectra Multiplying audio signals Waveshaping Frequency and phase modulation Examples Designer spectra Carrier/modulator model Pulse trains Pulse trains via waveshaping Pulse trains via wavetable stretching Resulting spectra Movable ring modulation Phase-aligned formant (PAF) generator Examples Time shifts and delays Complex numbers Complex sinusoids Time shifts and phase changes Delay networks Recirculating delay networks Power conservation and complex delay networks Artificial reverberation Controlling reverberators Variable and fractional shifts Fidelity of interpolating delay lines Pitch shifting Examples Filters Taxonomy of filters Low-pass and high-pass filters Band-pass and stop-band filters Equalizing filters Elementary filters Elementary non-recirculating filter Non-recirculating filter, second form Elementary recirculating filter Compound filters Real outputs from complex filters Two recirculating filters for the price of one Designing filters One-pole low-pass filter One-pole, one-zero high-pass filter Shelving filter Band-pass filter Peaking and stop-band filter Butterworth filters Stretching the unit circle with rational functions Butterworth band-pass filter Time-varying coefficients Impulse responses of recirculating filters All-pass filters Applications Subtractive synthesis Envelope following Single Sideband Modulation Examples Fourier analysis and resynthesis Fourier analysis of periodic signals Periodicity of the Fourier transform Fourier transform as additive synthesis Properties of Fourier transforms Fourier transform of DC Shifts and phase changes Fourier transform of a sinusoid Fourier analysis of non-periodic signals Fourier analysis and reconstruction of audio signals Narrow-band companding Timbre stamping (classical vocoder) Phase Phase relationships between channels Phase bashing Examples Classical waveforms Symmetries and Fourier series Sawtooth waves and symmetry Dissecting classical waveforms Fourier series of the elementary waveforms Sawtooth wave Parabolic wave Square and symmetric triangle waves General (non-symmetric) triangle wave Predicting and controlling foldover Over-sampling Sneaky triangle waves Transition splicing Examples Index Bibliography
http://crca.ucsd.edu/~msp/techniques/latest/book-html/book.html

515 Flickr: Analogue Haven's Photostream
Flickr is almost certainly the best online photo management and sharing application in the world. Show off your favorite photos and videos to the world, securely and privately show content to your friends and family, or blog the photos and videos you take with a cameraphone. photography, digital photography, cameraphones, camera, hobby photography, photo, digital camera, compactflash, smartmedia, cameras, canon, nikon, olympus, fujifilm, video
http://www.flickr.com/photos/analoguehaven/

514 Flickr: Analogue Haven's Photostream
Flickr is almost certainly the best online photo management and sharing application in the world. Show off your favorite photos and videos to the world, securely and privately show content to your friends and family, or blog the photos and videos you take with a cameraphone. photography, digital photography, cameraphones, camera, hobby photography, photo, digital camera, compactflash, smartmedia, cameras, canon, nikon, olympus, fujifilm, video
http://www.flickr.com/photos/analoguehaven/page5/

492 Flickr: Chris_Carter_'s Photostream
Flickr is almost certainly the best online photo management and sharing application in the world. Show off your favorite photos and videos to the world, securely and privately show content to your friends and family, or blog the photos and videos you take with a cameraphone. photography, digital photography, cameraphones, camera, hobby photography, photo, digital camera, compactflash, smartmedia, cameras, canon, nikon, olympus, fujifilm, video
http://www.flickr.com/photos/chris_carter_/

484 Why did so many successful entrepreneurs and startups come out of PayPal? Answered by Insiders
Why did so many successful entrepreneurs and startups come out of PayPal? I long have been fascinated by the extraordinary achievement from the ex-Paypal team and wonder about the reasons behind their success. In the past, mass media tried to answer this question several times but still couldn’t give us a clear answer. I once asked David Sacks the same question during an event in Los Angeles. He told me the secret is that Paypal has built a “scrappy” culture. No matter what problems they faced, they would find a way to solve them. I kind of got the idea, but was still confused about the execution details. So when I saw some of the past Paypal employees answering this question on Quora, I was super excited! After all, they should be the only ones who can tell people the inside stories. Below are some highlights of their answers. *If you want to check out the sources or leave your comments, please go to here and here. On Talent Management “Peter and Max assembled an unusual critical mass of entrepreneurial talent, primarily due to their ability to recognize young people with extraordinary ability (the median age of *execs* on the S1 filing was 30). But the poor economy allowed us to close an abnormal number of offers, as virtually nobody other than eBay and (in part) google was hiring in 2000-02.” (by Keith Rabois, former Executive Vice President of Paypal) “Extreme Focus (driven by Peter): Peter required that everyone be tasked with exactly one priority. He would refuse to discuss virtually anything else with you except what was currently assigned as your #1 initiative. Even our annual review forms in 2001 required each employee to identify their single most valuable contribution to the company.” (by Keith Rabois, former Executive Vice President of Paypal) “Dedication to individual accomplishment: Teams were almost considered socialist institutions. Most great innovations at PayPal were driven by one person who then conscripted others to support, adopt, implement the new idea. If you identified the 8-12 most critical innovations at PayPal (or perhaps even the most important 25), almost every one had a single person inspire it (and often it drive it to implementation). As a result, David enforced an anti-meeting culture where any meeting that included more than 3-4 people was deemed suspect and subject to immediate adjournment if he gauged it inefficient. Our annual review forms in 2002 included a direction to rate the employee on “avoids imposing on others’ time, e.g. scheduling unnecessary meetings.” (by Keith Rabois, former Executive Vice President of Paypal) “Refusal to accept constraints, external or internal:We were expected to pursue our #1 priority with extreme dispatch (NOW) and vigor. To borrow an apt phrase, employees were expected to “come to work every day willing to be fired, to circumvent any order aimed at stopping your dream.” Jeremy Stoppelman has relayed elsewhere the story about an email he sent around criticizing management that he expected to get him fired and instead got him promoted. Peter did not accept no for answer: If you couldn’t solve the problem, someone else would be soon assigned to do it.” (by Keith Rabois, former Executive Vice President of Paypal) “Driven problem solvers: PayPal had a strong bias toward hiring (and promoting / encouraging, as Keith mentions) smart, driven problem solvers, rather than subject matter experts. Very few of the top performers at the company had any prior experience with payments, and many of the best employees had little or no prior background building Internet products. I worked on the fraud analytics team at PayPal, and most of our best people had never before done anything related to fraud detection. If he’d approached things “traditionally”, Max would have gone out and hired people who had been building logistic regression models for banks for 20 years but never innovated, and fraud losses would likely have swallowed the company.” (by Mike Greenfield, former Sr. Fraud R&D Scientist of Paypal) “Self-sufficiency – individuals and small teams were given fairly complex objectives and expected to figure out how to achieve them on their own. If you needed to integrate with an outside vendor, you picked up the phone yourself and called; you didn’t wait for a BD person to become available. You did (the first version of) mockups and wireframes yourself; you didn’t wait for a designer to become available. You wrote (the first draft of) site copy yourself; you didn’t wait for a content writer.” (by Yee Lee, former Product & BU GM of Paypal) On Culture & Ideology “Extreme bias towards action – early PayPal was simply a really *productive* workplace. This was partly driven by the culture of self-sufficiency. PayPal is and was, after all, a web service; and the company managed to ship prodigious amounts of relatively high-quality web software for a lot of years in a row early on. Yes, we had the usual politics between functional groups, but either individual heroes or small, high-trust teams more often than not found ways to deliver projects on-time.” (by Yee Lee, former Product & BU GM of Paypal) “Willingness to try – even in a data-driven culture, you’ll always run in to folks who either don’t believe you have collected the right supporting data for a given decision or who just aren’t comfortable when data contradicts their gut feeling. In many companies, those individuals would be the death of decision-making. At PayPal, I felt like you could almost always get someone to give it a *try* and then let performance data tell us whether to maintain the decision or rollback.” (by Yee Lee, former Product & BU GM of Paypal) “Data-driven decision making – PayPal was filled with smart, opinionated people who were often at logger-heads. The way to win arguments was to bring data to bear. So you never started a sentence like this “I feel like it’s a problem that our users can’t do X”, instead you’d do your homework first and then come to the table with “35% of our [insert some key metric here] are caused by the lack of X functionality
” (by Yee Lee, former Product & BU GM of Paypal) “Radical transparency on metrics: All employees were expected to be facile with the metrics driving the business. Otherwise, how could one expect each employee to make rational calculations and decisions on their own every day? To enforce this norm, almost every all-hands meeting consisted of distributing a printed Excel spreadsheet to the assembled masses and Peter conducting a line by line review of our performance (this is only a modest exaggeration).” (by Keith Rabois, former Executive Vice President of Paypal) “Vigorous debate, often via email: Almost every important issue had champions and critics. These were normally resolved not by official edict but by a vigorous debate that could be very intense. Being able to articulate and defend a strategy or product in a succinct, compelling manner with empirical analysis and withstand a withering critique was a key attribute of almost every key contributor. I still recall the trepidation I confronted when I was informed that I needed to defend the feasibility of my favorite “baby” to Max for the first time.” (by Keith Rabois, former Executive Vice President of Paypal) “Extreme Pressure – PayPal was a very difficult business with many major issues to solve. We were able to see our colleagues work under extreme pressure and hence we learned who we could rely on and trust.” (by Keith Rabois, former Executive Vice President of Paypal)
http://primitus.com/blog/why-did-so-many-successful-entrepreneurs-and-startups-come-out-of-paypal-answered-by-insiders/

483 Support Details | Tech Support Management
browser features detection
http://supportdetails.com/

472 Plupload - A tool for uploading files using Flash, Silverlight, Google Gears, HTML5 or Browserplus
Multiple file upload utility using Flash, Silverlight, Google Gears, HTML5 or BrowserPlus! upload,multiple,file upload,upload files,file management,google gears,silverlight,flash,html5,browserplus
http://www.plupload.com/

216 Open Source Design Pattern Library
Browse Patterns Content Management Information Organization Input Forms Navigation Not categorized All Patterns
http://www.uidesignpatterns.org/

114 JobFact - La nouvelle façon de voir l'emploi
Plateforme globale d'emploi proposant des jobs cliblés, des mises en relations ciblées avec des recruteurs, des rapports sur la qualité de l'environnement professionel et des informations détaillées sur les salaires, entreprise par entreprise, poste par poste. Ce service est totalement anonyme et gratuit. Evaluations des sociétés, climat social des sociétés, détail des salaires entreprises par entreprises et métiers par métiers, conditions de travail, management, progression hiérarchique, partage de l'information, qualité de la communication, degré d'autonomie, performance, reconnaissance, compétences, congés, promotions, atmosphÚre de travail, primes, commissions, avantages comité d'entreprise, chÚques vacances, tickets repas, mutuelle santé, plan d'épargne entreprise, recherche d'emplois, recherche de jobs, offres d'emplois ciblées, moyenne du salaire brut global, part du salaire fixe et part du salaire variable, rémunérations dans les entreprises, plateforme d'opportunités de carriÚre, négocier, échanger, évoluer professionnellement
http://www.jobfact.com/fr

113 meeting job - Ă©valuations d’entreprises, offres d'emplois et infos pratiques sur le monde du travail
meeting job , Ă©valuations d’entreprises, offres d'emplois et infos pratiques sur le monde du travail meeting job, travail, emploi, salariĂ©, employĂ©, employeur, Ă©valuation, avis, recrutement, entreprise, ressources humaines, rh, management, boss, patron, sociĂ©tĂ©, job, chomage,
http://www.meetingjob.fr/

111 Opentojob - RICOH INDUSTRIE FRANCE - Evaluation entreprise OpenToJob : valeur, Ă©thique, culture ...
Evaluation RICOH INDUSTRIE FRANCE - Ethique, engagement écologique, developpement durable, valeurs, culture : une vision sociale et professionnelle de votre entreprise. Sur OpenToJob, découvrez les points forts de votre entreprise et trouvez votre entreprise idéale. RICOH INDUSTRIE FRANCE,RICOH,INDUSTRIE,FRANCE,Industries,Bureautique,KAZUO NISHINOMIYA,144 ROUTE DE ROUFFACH,68920,WETTOLSHEIM,03 89 20 40 00,03 89 20 40 10,www.ricoh-thermal.fr,évaluation,avis,interne,Ambiance,Citoyenneté,Conditions de travail,Formation,Management,Rapports Humains,Rémunération
http://www.opentojob.com/o2j/Ricoh_industrie_france.htm?id=503

100 Therapeutic Injections for Pain Management: eMedicine Clinical Procedures
Overview: This article focuses on the use of therapeutic injections to treat acute and chronic pain syndromes. Discussion of this topic begins with an overview of regional anesthesia, which includes the pharmacology of frequently administered medications and basic ... nerve blocks, technique; nerve blocks, rationale; nerve blocks, complications; local anesthetics; injection, pain treatment; chronic pain disorders; therapeutic injections for pain management; acute pain syndromes; chronic pain syndromes; regional anesthesia; pain disorders; therapeutic blocks; sympathetic blocks; diagnostic blocks; prognostic blocks; prophylactic blocks; pain management techniques
http://emedicine.medscape.com/article/1143675-overview

91 Le mindmapping pour tous
Ce site propose des ressources sur le mind mapping, les cartes heuristiques et plus généralement sur le management de (...)
http://mindmanagement.free.fr/

84 Freeplane - mind map
Get Freeplane at SourceForge.net. Fast, secure and free downloads from the largest Open Source applications and software directory Office Suites, Project Management, Knowledge Management, Open Source, Open Source Software, Development, Community, Source Code, Secure, Downloads, Free Software
http://sourceforge.net/projects/freeplane/

101 - 201