Solved

hidden files

Posted on 1998-08-17
5
186 Views
Last Modified: 2010-04-27
how does one list (as with the "dir" command) hidden files in doss and windows, also how do you copy them.
0
Comment
Question by:jrhinely
5 Comments
 
LVL 3

Accepted Solution

by:
varun071898 earned 50 total points
ID: 1009789
Go to My Computer -> View -> Folder Options. Choose the View tab.
Then click Show all files. Now you will be able to see the hidden files and copy them too.
0
 
LVL 9

Expert Comment

by:rmarotta
ID: 1009790
For a list of options, from a Dos prompt, type DIR /?  and press enter.
0
 

Expert Comment

by:gertv
ID: 1009791
dir /ah
This means that you like all files with Atribute Hidden
=> all hidden files
with dir /ah /s typed in the root you get all the hidden files (and dir's) on your disk.
A copy is not possible I believe, but you can do it with windows explorer.
0
 
LVL 12

Expert Comment

by:public
ID: 1009792
You can copy hidden and system files using xcopy32 in a dos window. Note this does not work in dos alone.
0
 

Author Comment

by:jrhinely
ID: 1009793
Sorry about taking so long, Jhinely
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Is it worth it to buy an Echo? In a word, yes! For me it was definitely worth it. I use mine on a daily basis. Prologue & Privacy At first, I was very skeptical about the Amazon Echo. In general, I don't like voice assistants. I don't li…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

805 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question