The following is a list of DiskShadow commands. For more information about a command, type the command name. All inputs in the form ofmust be replaced with parameters or environment variable aliases. LIST WRITERS - List all writers on the computer. LIST SHADOWS - List all volume shadow copies on the computer. LIST PROVIDERS - List all VSS providers on the computer. SET - List all current option settings and all DiskShadow aliases that are in the environment variable settings. SET CONTEXT - Set the shadow copy context. SET OPTION - Set options regarding the shadow copy and autorecovery. SET VERBOSE - Change verbose output mode for DiskShadow. SET METADATA - Specify the name of a .cab file to store metadata for transportable shadow copies. SIMULATE RESTORE - Simulate a restore operation. LOAD METADATA - Load a Backup Components Document before importing a transportable shadow copy or performing a restore operation. IMPORT - Import shadow copies based on the metadata specified in a previous LOAD command. WRITER VERIFY - Specify that the backup or restore operation must fail if the writer or component is not included. WRITER EXCLUDE - Excludes a writer or component from backup or restore. ADD - List currently added aliases and volumes. ADD ALIAS - Add an alias. ADD VOLUME - Add a volume. CREATE - Create a volume shadow copy set. EXEC - Execute the specified shell command script. BEGIN BACKUP - Begin a full backup. BEGIN RESTORE - Begin a restore. END BACKUP - Ends a full backup. END RESTORE - Ends a restore. EXPOSE - Expose a shadow copy. UNEXPOSE - Unexpose a shadow copy. REVERT - Revert a shadow copy. BREAK - Break a shadow copy. MASK - Hide an imported hardware shadow copy from the system. DELETE SHADOWS - Delete shadow copies. RESET - Reset DiskShadow to its original state. EXIT - Exits DiskShadow.
The following information is used to determine the inbound LAN Manager authentication level and whether LAN Manager hashes ...
The following information is used to determine the LAN Manager authentication level used when making outbound connections. ...
The following input is not recognized as an IP address or subnet: %1 Enter IP addresses using an X.X.X.X format and subnets ...
The following input methods are available only on 32 bit processes. %sDo you want to include them in Default User Account? ...
The following is a list of DiskShadow commands. For more information about a command, type the command name. All inputs in ...
The following is valid for Legacy Loader applications: BPBSTRING (string) The BIOS parameter block label indicating a special ...
The following Language Interface Packs you are about to install contains a readme file which you can optionally review before ...
The following list contains the policies that can apply to this item. The policy at the top of the list has precedence and ...
The following list displays the permissions that would be granted to the selected group or user, based solely on the permissions ...