The following is a list of DiskShadow commands. For more information about a command, type the command name. All inputs in the form ofmust be replaced with parameters or environment variable aliases. LIST WRITERS - List all writers on the computer. LIST SHADOWS - List all volume shadow copies on the computer. LIST PROVIDERS - List all VSS providers on the computer. SET - List all current option settings and all DiskShadow aliases that are in the environment variable settings. SET CONTEXT - Set the shadow copy context. SET OPTION - Set options regarding the shadow copy and autorecovery. SET VERBOSE - Change verbose output mode for DiskShadow. SET METADATA - Specify the name of a .cab file to store metadata for transportable shadow copies. SIMULATE RESTORE - Simulate a restore operation. LOAD METADATA - Load a Backup Components Document before importing a transportable shadow copy or performing a restore operation. IMPORT - Import shadow copies based on the metadata specified in a previous LOAD command. WRITER VERIFY - Specify that the backup or restore operation must fail if the writer or component is not included. WRITER EXCLUDE - Excludes a writer or component from backup or restore. ADD - List currently added aliases and volumes. ADD ALIAS - Add an alias. ADD VOLUME - Add a volume to the shadow copy creation set. ADD SHADOW - Add a shadow copy to the recovery set. CREATE - Create a volume shadow copy set. EXEC - Execute the specified shell command script. BEGIN BACKUP - Begin a full backup. BEGIN RESTORE - Begin a restore. END BACKUP - Ends a full backup. END RESTORE - Ends a restore. EXPOSE - Expose a shadow copy. UNEXPOSE - Unexpose a shadow copy. REVERT - Revert a shadow copy. RESYNC - Hardware shadow copy revert. BREAK - Break a shadow copy. MASK - Hide an imported hardware shadow copy from the system. DELETE SHADOWS - Delete shadow copies. RESET - Reset DiskShadow to its original state. EXIT - Exits DiskShadow.
The following information is used to determine the inbound LAN Manager authentication level and whether LAN Manager hashes ...
The following information is used to determine the LAN Manager authentication level used when making outbound connections. ...
The following input is not recognized as an IP address or subnet: %1 Enter IP addresses using an X.X.X.X format and subnets ...
The following input methods are available only on 32 bit processes. %sDo you want to include them in Default User Account? ...
The following is a list of DiskShadow commands. For more information about a command, type the command name. All inputs in ...
The following is a list of the driver packages that were not added to the server. Common causes for failed packages include ...
The following is a list of unattend parameters that can be specified to install a new AD LDS instance (default values are ...
The following issues are preventing Windows from upgrading. Cancel the upgrade, complete each task, and then restart the ...
The following key is in a registry hive that is not valid: "{0}". The key must be in one of the following hives: HKEY_LOCAL_MACHINE, ...