The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
The Guiding Principles and New Rules document is now in effect.
Guys, I am having trouble finding the right code to display the list of network drivers connected to a specific machine hostname, using Windows Command-Line. I need to write a script for this function.
Anybody have any idea? I have a couple of different command line books and I can't find it.
Thanks for any help you can give.
This is my sig. There are many like it but this one is mine. Without my sig I am nothing. Without me, my sig is nothing.
I don't need the network information. I need to have it list the network mapped drives, the paths to those drives, and the letters they are mapped with. Thanks though
kayen7 on
This is my sig. There are many like it but this one is mine. Without my sig I am nothing. Without me, my sig is nothing.
What are you writing the script in? VBS would be the most appropriate IMO and you are able to grab basically any information that a command will give you, via system API calls.
Download and "install" PsExec. PsExec allows you to run command line commands on remote machines. Store whatever script you are using to dump the drivers associated with each machine on your network and create a .vbs file that runs through a list of hostnames and uses PsExec to execute the driver script and store the results.
Download and "install" PsExec. PsExec allows you to run command line commands on remote machines. Store whatever script you are using to dump the drivers associated with each machine on your network and create a .vbs file that runs through a list of hostnames and uses PsExec to execute the driver script and store the results.
This is sounding more and more like somebody looking for info on how to fuck over the network he's on and not someone looking for useful information ...
Are you a domain admin? Add a couple lines to your startup script. Use net use command to get the info, and arrange for it to output to a text file. Here's an example of how I log users logging in and out of computers on my domain:
Thanks for all of the information guys. I am not trying to mess up anything. It is simply for statistical purposes. I may be getting close to the answer. Another guy I work with is checking it out with me. If we get it to work the way we want, I will show you how.
kayen7 on
This is my sig. There are many like it but this one is mine. Without my sig I am nothing. Without me, my sig is nothing.
Download and "install" PsExec. PsExec allows you to run command line commands on remote machines. Store whatever script you are using to dump the drivers associated with each machine on your network and create a .vbs file that runs through a list of hostnames and uses PsExec to execute the driver script and store the results.
This is sounding more and more like somebody looking for info on how to fuck over the network he's on and not someone looking for useful information ...
I used to work for a managed hosting company and while many tools can be used maliciously, the value of something like this cannot be measured. I currently use Dameware NT Utils for all my remote control and remote information needs.
Posts
ipconfig /all
will display most of your network information
c:\net use
NET USE
[devicename | *] [\\computername\sharename[\volume] [password | *]]
[/USER:[domainname\]username]
[/USER:[dotted domain name\]username]
[/USER:[username@dotted domain name]
[/SMARTCARD]
[/SAVECRED]
[/PERSISTENT:{YES | NO}
NET USE {devicename | *} [password | *] /HOME
NET USE [/PERSISTENT:{YES | NO}]
Maybe you can tie that in with the host name you are trying to get info from.
XBL: ElQuesoUno
NNID: ElQuesoUno
edit: beaten like a rented mule.
http://www.microsoft.com/technet/sysinternals/utilities/psexec.mspx
Podcast 0207: Sinking to new depths
Preview: Is Uncharted: Golden Abyss the Vita’s killer launch title?
Dynasty Warriors: Gundam 3: Macro-wreckonomics
This is sounding more and more like somebody looking for info on how to fuck over the network he's on and not someone looking for useful information ...
NintendoID: Nailbunny 3DS: 3909-8796-4685
I used to work for a managed hosting company and while many tools can be used maliciously, the value of something like this cannot be measured. I currently use Dameware NT Utils for all my remote control and remote information needs.
Podcast 0207: Sinking to new depths
Preview: Is Uncharted: Golden Abyss the Vita’s killer launch title?
Dynasty Warriors: Gundam 3: Macro-wreckonomics