Solved

system setups - nt

Posted on 2000-03-08
4
172 Views
Last Modified: 2010-03-05
Just a little example, not too little, to get me started please.

How do you get to NT system setups via perl scripts.  For example,
I need to set up the peer services and tcp and would like to run
a script to do it.   AND, aside,  is it possible to run a perl distribution off
a floppy?  If not, I can make a CDROM.

I'll head over to activeware and poke around but would still like an
example.  Thanks.
0
Comment
Question by:hank1
  • 3
4 Comments
 
LVL 5

Expert Comment

by:PC_User321
ID: 2597659
If you can do it from the command line, you can do it with perl.


 Directory of A:\

CW3230MT DLL       319,488  08-10-97 11:11a cw3230mt.dll
PERL     DLL       561,152  08-10-97 11:11a perl.dll
PERL     EXE         8,192  08-10-97 11:11a perl.exe
         3 file(s)        888,832 bytes
         0 dir(s)         568,832 bytes free
0
 
LVL 5

Accepted Solution

by:
PC_User321 earned 50 total points
ID: 2599098
Here is a simple example of using ARP:-



`arp -s 200.20.180.144 23-45-67-9a-bc-de`;
@Arps = `arp -a`;
$HostNumber = 1;
foreach $Line (@Arps) {
   if( $Line =~ /^\s*[0-9]+\.[0-9]+/) {
      $HostHash{$HostNumber} = $Line;
      print "$HostNumber. $Line";
      $HostNumber++;
   } else {
      print "  $Line";
   }
}
print "Which host would you like to delete?   ";
chomp($ToDelete = <>);
if (defined($HostHash{$ToDelete})) {
   @Words = split ' ', $HostHash{$ToDelete};
   print "Going to do arp -d $Words[0]\n";
   `arp -d $Words[0]`;
   print "\nResult:-\n";
   print `arp -a`;
}

0
 

Expert Comment

by:KuznesofAA
ID: 2604366
Although not as powerfull, you can do quite a number of things with vbscript and the footprint is a bit lighter.

Follow this link:

http://cwashington.netreach.net/main_site/default.asp?topic=news

for a good site on vbscript.

If you want to use Perl install the ActiveState distribution www.activestate.com and

look at the Win32 options, in particular:

Win32::NetAdmin
Win32::NetResource

Hope that helps.
0
 
LVL 5

Expert Comment

by:PC_User321
ID: 6869183
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

I have been pestered over the years to produce and distribute regular data extracts, and often the request have explicitly requested the data be emailed as an Excel attachement; specifically Excel, as it appears: CSV files confuse (no Red or Green h…
In the distant past (last year) I hacked together a little toy that would allow a couple of Manager types to query, preview, and extract data from a number of MongoDB instances, to their tool of choice: Excel (http://dilbert.com/strips/comic/2007-08…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now