Free Proxy Servers - Anonymous Web Surfing - Unblock Websites

Learn About Free Proxy Servers, How to Unblock Websites, Surf Anonymously

Perhaps you are blocked from visiting MySpace or Facebook at work. Maybe you just want to make sure that you won't be a victim of identity theft. Or you might want to check out your bank balance at an Internet cafe - and don't want anyone to know your account or your password.

Whatever your reason - unblocking websites, protecting your identity, or surfing anonymously, free proxy servers can accomplish all of these tasks for you.

Learn where to find free proxy sites, how to use them, and their benefits here at our page dedicated to free proxy servers.
A lot of people are scared and concerned about their anonymity online. With many cyber criminals just waiting to steal your identity - including your personal details such as credit card numbers, one has to be a little more careful when surfing on the Internet.

It is even more crucial when you are using a public computer to view personal information. For example, if you were to go to an Internet cafe checking your bank account information, the next person to use the computer could potentially access your banking information.

But, if you use a proxy server, none of your sensitve information is stored on the computer that you are sitting at, ensuring that all your sensitive and personal information remains safe and secure.

Why Use A Free Proxy Server? 

Free proxy servers protect your identity online

“Protect yourself from identity theft with a free proxy website when using public computers”

The Truth About Public Computers 

Ask yourself this: is there any privacy in public?

Alright, let me shatter some myths for you.

Most Internet caf├ęs claim that they are safe places for you to surf the Internet. The one thing that they don't do is tell you how to protect your sensitive information.

The biggest problem is that computers store cookies which have information about the sites you visit and these sites may save a cookie when you enter the password.

This can translate into a problem if you forget to delete the cookies and history when you logoff the public computer that you are using. If you do forget, there is the possibility that the next user could access that information and use it to gain access to the sites you visited while at the public computer.

So are public computers private and safe?


Unless you know the precautions you need to take to erase your tracks (or use a free proxy server), don't visit any sites that you have to login to access them (think e-mail and membership sites) and don't visit any of your banking sites while on a public computer.

Try These Free Proxy Websites 

Safe, Secure, Anonymous Proxy Servers

Do you worry about your anonymity online? Or are you blocked from your favorite website at work or school? Try some of these proxy websites.
Free Proxy Server
This free proxy server has one cool design. This is a web proxy that allows you to unblock MySpace, unblock Facebook, and more.
Bypass School Filter
Designed primarily to be used at school you can use Bypass School Filter to visit MySpace, Facebook, Bebo, Orkut and more.
MySpace Proxy
Perhaps one of the most commmonly blocked websites online is MySpace. Unblock MySpace with this fast and beautifully desined site.
Orkut Proxy
Orkut is another social networking site that is typically blocked at work. Enjoy the speed and privacy provided by our Orkut inspired web proxy.
Free Proxy Website
Brand new free proxy website that will allow you to visit My Space, Facebook, Orkut, and all of the other favorite websites that you love.

Have you used free proxy servers? 

Share your experiences with anonymous web surfing.

I know that a lot of you have never heard of free proxy servers before - but a lot of you have. Share your experiences (good and bad) with free proxy servers, anonymous surfing, and identity theft.


WiMAX is the latest technology in the field of wireless internet. In fact it is the only available technology which enables broadband in wireless internet. WiMAX is the acronym for worldwide interoperability for microwave access. To phrase in simple words, WiMAX enables the users to access high speed internet with extreme mobility. This technology has several benefits when compared with existing WiFi technology. WiMAX uses microwave as a medium for data transfer which means a tower similar to the cell phone tower is used. Due to the use of microwaves, for a range of thirty miles, the data transfer rate can be nearly 75 MBPS. This would enable high speed internet access to more than 1000 computers from a single tower. The major advantages of WiMAX are, rural areas will be able to access broadband internet very easily at a much cheaper rate, Setting up internet access for the whole city can be completed within a couple of days. This would mean that in the near future we would be able to access the internet as if we are using the cell phones. It is possible to get hooked to the net from almost anyplace in the world.

Capture Screenshots with ease

Save time and Enhance your Screenshots with this freeware Software.
Usually when you hit the Print Screen button it loads the current screen into your clipboard.
To save the image you have to open up an image-editing application, paste it, then save the file .
Gadwin's free PrintScreen streamlines this whole process.

It sits in your System Tray, and you can set a number of options. When you hit print screen (or whichever button you specify), you can choose to save the screen directly to a specific folder. You can also choose to save just a window, or a specific area of the screen.

Other Options:

>You can send the screen capture directly to your printer or as an email.
>Automatically resize the picture to specified dimensions.
>You can select the type of image you want to save.

Portable Applications for your USB Thumb Drive

The cost of USB Thumb Drive has dropped significantly during the past few years. To make use of the amount of storage in those drives, I recommend the use of this PortableApps.

PortableApps is a collection of portable software that allow customers to add to USB Thumb Drive. There are a total of 12 different applications for your everyday use. It also included a user menu as illustrated in one of the picture I attached.

Download complete websites to your desktop and surf them offline.

Website eXtractor saves you time and effort by downloading entire Internet sites (or the sections you stipulate) to your hard drive.

Whether you browse the web for research, work, or fun, there's nothing worse than having to wait for page after page to load in Internet Explorer or Netscape Navigator (or in other popular browsers). The problem is they will only load one page at a time. So if you are viewing a large website with a thousand pages, you'd have to click the mouse a thousand times ... and ... choose a directory/folder a thousands times when you want to save each file. You end up spending a lot of time waiting around and not enough time reading or viewing pages on the Internet.
Note: Using a regular browser to surf large websites or photo galleries takes the fun out of web browsing and makes research a real chore.

Download Multiple Free Files From Rapidshare
Rapidshare allows to download only a single file at a time with free account. If you want to download multiple files at the same time, you need to buy a premium account but now you can download multiple files from Rapidshare free account without paying anything with RapidShare Download Accelerator.

With RapidShare Download Accelerator, you can add all the files you'd like to download, and it will do all the annoying work for you. Now you can just sit back and watch your files download without paying a dime.

Links : Download Rapidshare Download Accelerator

Remove Autorun Virus Infection - Solution for USB, PC & Laptops

Nowadays, there is a new problem that is cropping up in almost all schools,colleges, hostels etc. where the malicious Autorun Virus is Creating Havoc by spreading to Laptops and PC through USB Drives etc.

How to Stop the Autorun PC Virus Infection ?

The free Panda USB Vaccine allows users to vaccinate their PCs in order to disable Autorun completely so that no program from any USB/CD/DVD drive (regardless of whether they have been previously vaccinated or not) can auto-execute. This is a really helpful feature as there is no user friendly and easy way of completely disabling Autorun on a Windows PC.

Panda USB Vaccine is a 100% free utility. Its tested under Windows 2000 SP4, Windows XP SP1-SP3, and Windows Vista SP0 and SP1.
Download : Click Here to get Panda USB Vaccine

Configuring BitTorrent or MuTorrent To Get Fast Downloading Speed

Normally when downloading torrents through torrent clients (Mu torrent etc) one does not get good downloading speeds and it becomes very annoying especially on slow internet connections. Actually it is not the software or torrents at fault but the default settings of MuTorrent (Or BitTorrent) are the culprits. When you download a torrent it is not only downloaded but also uploaded at the same time (Actually it is “Sharing”). Thus uploading also take your bandwidth reducing downloading speeds. By tweaking some settings you can reduce uploading speeds and increase downloading speed. Just follow the below given instructions:

Installing and configuring a Wireless Router
A wireless router affords laptop or portable computer users greater mobility in their homes and businesses. In most home networks, wireless routers are connected to a cable or DSL modem, and the router sends the signals and information that make up an Internet protocol (IP) thread to the user's computer via radio signals rather than wires.
To communicate with the wireless router, individual computers house transceivers such as an internal expansion card, a peripheral docked by USB or, in the case of laptops, a PC card or hard-wired internal device. For those accessing the Internet through a high-speed connection, a wireless router can also serve as a hardware firewall (as opposed to a software program), enabling protection from undesirable outside computers without exhausting as many system resources as traditional firewall programs.

DHCP-(Dynamic Host Control Protocol)

IP addresses, by contrast, not only must be unique on a given internetwork, but also must reflect the structure of the internetwork. As noted above, they contain a network part and a host part, and the network part must be the same for all hosts on the same network. Thus, it is not possible for the IP address to be configured once into a host when it is manufactured, since that would imply that the manufacturer knew which hosts were going to end up on which networks, and it would mean that a host, once connected to one network, could never move to another. For this reason, IP addresses need to be reconfigurable.
In addition to an IP address, there are some other pieces of information a host needs to have before it can start sending packets. The most notable of these is the address of a default router—the place to which it can send packets whose destination address is not on the same network as the sending host. Most host operating systems provide a way for a system administrator, or even a user, to manually configure the IP information needed by a host. However, there are some obvious drawbacks to such manual configuration. One is that it is simplya lot of work to configure all the hosts in a large network directly, especially when you consider that such hosts are not reachable over a network until they are configured.

Satellite internet- a new sense of technology

Today the world is mostly operating with help of i posted here some of the useful information about the satellite internet access.

The satellite internet access is a wireless service that is extremely used in all over the world. But due to the non-availability of terrestrial internet access it cannot be connected.. It is also very popular among users of ‘movable’ locations.
Let us see how does these satellite internet works?
The wireless connectivity and instant access to anywhere in the world 24x7 has lead technologists to now tap on internet access via satellite! This is a world wide availability that is being sourced and includes connectivity at sea and within land vehicles. The system basically comes in three types and the variants all use the connectivity enhanced via the local satellite service.
Connectivity via special hardware components:

The internet connectivity via satellite can be tapped through interface presence, like the telephone network that is ‘public-switched’ as in the case of the squawk box applications. In this case, a physical and separate internet ‘connection’ is not required. The system operates with the support of a server-to-queue-data connectivity and includes an FTP or File Transfer Protcol. In the case of connectivity via system hardware components, the transmitting station or the teleport is supported by two important components.

The internet connection is made possible when the ISP routers are connected to the designed proxy servers. This connectivity enforces the band-width limits of the QOS or ‘quality of service’, thus enabling user traffic. This connectivity is furthered to the DVB encapsulator and then, the S modem. The DVB-S modem then transmits an RF or radio frequency to the outdoor unit, through the up converter connected via a feed line. The system components also include a block up converter, an optional low noise block converter, an optional orthomode transducer, a feed horn and a waveguide. This connectivity is routed to an Earth station, which is a setup that consists of an outdoor and indoor unit.



SCIENTIFIC EXPERTS from around the world are predicting that five years from now, all life on Earth could well come to an end. Some are saying it’ll be humans that would set it off. Others believe that a natural phenomenon will be the cause. And the religious folks are saying it’ll be God himself who would press the stop button. The following are some likely arguments as to why the world would end by the year 2012.

Reason One: Mayan calendar
The first to predict 2012 as the end of the world were the Mayans, a bloodthirsty race that were good at two things -- building highly accurate astrological equipment out of stone and sacrificing virgins.

Thousands of years ago they managed to calculate the length of the lunar moon as 329.53020 days, only 34 seconds out. The Mayan calendar predicts that the earth will end on December 21, 2012. Given that they were pretty close to the mark with the lunar cycle, it’s likely they’ve got the end of the world right as well.

Nano Technology

Introduction to Nanotechnology
Nanotechnology is defined as the study and use of structures between 1 nanometer and 100 nanometers in size. To give you an idea about this is, it would take eight 100 nanometer particles side by side to match the width of a human hair.

Introduction to the Nanoparticles
Scientists have been studying and working with nano particles for centuries, but the effectiveness of their work has been hampered by their inability to see the structure of nano particles. In recent decades the development of microscopes capable of displaying particles as small as atoms has allowed scientists to see what they are working with.


Multiple Access Techniques In Cellular Systems

Hi this is an article about the Multiple Access Techniques used in the cellular systems.

                                                                                                                                                                The goal in the design of a cellular system is to be able to handle as many calls as possible in a given bandwidth with the specifi ed blocking probability (reliability).

Multiplexing deals with the division of the resources to create multiple channels. Multiplexing can create channels in frequency, time, etc., and the corresponding terms are then frequency division multiplexing (FDM), time division multiplexing (TDM), etc. Since the amount of spectrum available is limited, we need to fi nd ways to allow multiple users to share the available spectrum simultaneously. Shared access is used to implement a multiple access scheme when access by many users to a channel is required.

For example, one cancreate multiple channels using TDM, but each of these channels can be accessedby a group of users using the ALOHA multiple access scheme. The multiple access schemes can be either reservation-based or random.

Multiple access schemes allow many users to share the radio spectrum. Sharing the bandwidth effi ciently among users is one of the main objectives of multiple access schemes.


Hi this is about the GPRS technology that is widely used in GSM Phones.

The general packet radio service (GPRS) enhances GSM data services
signifi cantly by providing end-to-end packet switched data connections. This is
particularly effi cient in Internet/intranet traffi c, where short bursts of intense data
communications are actively interspersed with relatively long periods of inactivity.
Because there is no real end-to-end connection to be established, setting up a
GPRS call is almost instantaneous and users can be continuously on-line. Users have the additional benefi ts of paying for the actual data transmitted, rather than for connection time. Because GPRS does not require any dedicated end-to-end connection, it only uses network resources and bandwidth when data is actually being transmitted. This means that a given amount of radio bandwidth can be shared effi ciently among many users simultaneously.

The next phase in the high-speed road map is the evolution of current short message service (SMS), such as smart messaging and unstructured supplementary service data (USSD), toward the new GPRS, a packet data service using TCP/IP and X.25 to offer speeds up to 115 kbps. GPRS has been standardized to optimally
support a wide range of applications ranging from very frequent transmissions of medium to large data volume. Services of GPRS have been developed to reduce connection set-up time and allow an optimum usage of radio resources. GPRS provides a packet data service for GSM where time slots on the air interface
can be assigned to GPRS over which packet data from several mobile stations is multiplexed.

HSCSD (High Speed Circuit Switching Data)

Hi this is one data transfering technology used in the GSM mobiles for internet usage.

High-speed circuit switched data (HSCSD) is a feature that enables the co-allocation of multiple full rate traffi c channels (TCH/F) of GSM into an HSCSD confi guration. The aim of HSCSD is to provide a mixture of services with different air interface user rates by a single physical layer structure. The available capacity of an HSCSD confi guration is several times the capacity of a TCH/F, leading to a significant enhancement in air interface data transfer capability.

Ushering faster data rates into the mainstream is the new speed of 14.4 kbps per time slot and HSCSD protocols that approach wireline access rates of up to 57.6 kbps by using multiple 14.4 kbps time slots. The increase from the current baseline of 9.6 kbps to 14.4 kbps is due to a nominal reduction in the error- correction overhead of the GSM radio link protocol (RLP), allowing the use of a higher data rate.

For operators, migration to HSCSD brings data into the mainstream, enabled in many cases by relatively standard software upgrades to base station (BS) and mobile switching center (MSC) equipment. Flexible air interface resource allocation allows the network to dynamically assign resources related to the air interface
usage according to the network operator’s strategy, and the end-user’s request for a change in the air interface resource allocation based on data transfer needs. The provision of the asymmetric air interface connection allows simple mobile equipment to receive data at higher rates than otherwise would be possible with a symmetric connection.

For end-users, HSCSD enables the roll-out of mainstream high-end segment services that enable faster web browsing, fi le downloads, mobile video-conference and navigation, vertical applications, telematics, and bandwidth-secure mobile local area network (LAN) access. Value-added service providers will also be able
to offer guaranteed quality of service and cost-effi cient mass-market applications, such as direct IP where users make circuit-switched data calls straight into a GSM network router connected to the Internet. To the end-user, the value-added service provider or the operator is equivalent to an Internet service provider that offers a fast, secure dial-up Internet protocol service at cheaper mobile-to-mobile rates. HSCSD is provided within the existing mobility management.  Roaming is also possible. The throughput for an HSCSD connection remains constant for the duration of the call, except for interruption of transmission during handoff. The handoff is simultaneous for all time slots making up an HSCSD connection. Endusers wanting to use HSCSD have to subscribe to general bearer services. Supplementary services applicable to general bearer services can be used simultaneously with HSCSD.

Data Evolution in GSM Technology

Hi this is about the evolution in GSM Technology for data transfers.

From a radio access perspective, adding 3G capabilities to 2G systems mainly means supporting higher data rates. Possible scenarios depend on spectrum availability for the network service provider. Depending on the spectrum situation, two different migration paths can be supported:

Reframing of existing spectrum bands
New or modified spectrum bands

Two 3G radio access schemes are identifi ed to support the different spectrum scenarios:

1. Enhanced data rates for GSM evolution (EDGE) with high-level modulation in  a 200 kHz TDMA channel is based on plug-in transceiver equipment, thereby allowing the migration of existing bands in small spectrum  segments.

2. Universal mobile telecommunications services (UMTS) is a new radio  access network based on 5 MHz WCDMA and optimized for effi cient support of 3G services. UMTS can be used in both new and existing spectra.

From a network point of view, 3G capabilities implies the addition of packet switched (PS) services, Internet access, and IP connectivity. With this approach, the existing mobile networks reuse the elements of mobility support, user authentication service handling, and circuit switched (CS) services. With packet switched services, IP connectivity can then be added to provide a mobile multimedia core network by evolving the existing mobile network.

GSM is moving to develop enhanced cutting-edge, customer-focused solutions to meet the challenges of the new millennium and 3G mobile services [29]. When GSM was fi rst introduced, no one could have predicted the dramatic growth of the Internet and the rising demand for multimedia services. These developments have brought about new challenges to the world of GSM. For GSM operators, the emphasis is now rapidly changing from that of instigating and driving the development of technology to fundamentally enabling mobile data transmission to that of improving speed, quality, simplicity, coverage, and reliability in terms of tools and services that will boost mass market take-up.

List of commands in Windows Command Prompt

Hi this is a list of commands from a-z that we use in windows command prompt. Other than this any commands you knows please write in comments.
A-Z windows XP commands

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
ATTRIB Change file attributes

BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info

CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location•
CSCcmd Client-side caching (Offline Files)
CSVDE Import or Export Active Directory data

DATE Display or set the date
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DISKPART Disk Administration
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
DSRM Remove items from Active Directory

ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the current script/routine and set an errorlevel
EXPAND Uncompress files
EXTRACT Uncompress CAB files

FC Compare two files
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations

GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line

HELP Online Help

iCACLS Change file and folder permissions
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup

KILL Remove a program from memory

LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file

MAPISEND Send email from the command line
MBSAcli Baseline Security Analyzer.
MEM Display memory usage
MD Create new folders
MKLINK Create a symbolic link (linkd)
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files

NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights

PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
POWERCFG Configure power settings
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory

QGREP Search file(s) for lines that match a given pattern.

RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Registry: Read, Set, Export, Delete keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files
REPLACE Replace or update one file with another
RD Delete folder(s)
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)

SC Service Control
SCHTASKS Schedule a command to run at a specific time
SCLIST Display NT Services
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SLMGR Software Licensing Management (Vista/2008)
SOON Schedule a command to run in the near future
SORT Sort input
START Start a program or command in a separate window
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration

TASKLIST List running applications and services
TASKKILL Remove a running process from memory
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TLIST Task list with full path
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file

USRSTAT List domain usernames and last login

VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label

WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands

XCACLS Change file and folder permissions
XCOPY Copy files and folders
:: Comment / Remark


Related Posts Plugin for WordPress, Blogger...