text stringlengths 0 4.23k |
|---|
Parameters |
Parameter |
Description |
[<drive>:][<path>]<filename1> |
Specifies the location and name of the file or set of files you want to rename. Filename1 can include wildcard characters (* and ?). |
<filename2> |
Specifies the new name for the file. You can use wildcard characters to specify new names for multiple files. |
/? |
Displays help at the command prompt. |
[<drive>:][<path>]<filename1> |
<filename2> |
Remarks |
You can't specify a new drive or path when renaming files. You also can't use this command to rename files across drives or to move files to a different directory. |
Characters represented by wildcard characters in filename2 will be identical to the corresponding characters in filename1. |
Filename2 must be a unique file name. If filename2 matches an existing file name, the following message appears: Duplicate file name or file not found. |
Duplicate file name or file not found |
Examples |
To change all the .txt file name extensions in the current directory to .doc extensions, type: |
rename *.txt *.doc |
To change the name of a directory from Chap10 to Part10, type: |
rename chap10 part10 |
repair-bde |
Attempts to reconstruct critical parts of a severely damaged drive and salvage recoverable data if the drive was encrypted by using BitLocker and if it has a valid recovery password or recovery key for decryption. |
Important |
If the BitLocker metadata data on the drive is corrupt, you must be able to supply a backup key package in addition to the recovery password or recovery key. If you used the default key back up setting for Active Directory Domain Services, your key package is backed up there. You can use the BitLocker: Use BitLocker Recovery Password Viewer to obtain the key package from AD DS. |
Using the key package and either the recovery password or recovery key, you can decrypt portions of a BitLocker-protected drive, even if the disk is corrupted. Each key package works only for a drive with the corresponding drive identifier. |
Syntax |
repair-bde <inputvolume> <outputvolumeorimage> [-rk] [–rp] [-pw] [–kp] [–lf] [-f] [{-?|/?}] |
Warning |
The contents of the output volume will be completely deleted and overwritten by the decrypted contents from the damaged BitLocker drive. If you want to save any existing data on the selected target drive, move the existing data to other reliable backup media first, before running the repair-bde command. |
repair-bde |
Parameters |
Parameter |
Description |
<inputvolume> |
Identifies the drive letter of the BitLocker-encrypted drive that you want to repair. The drive letter must include a colon; for example: C:. If the path to a key package isn't specified, this command searches the drive for a key package. In the event that the hard drive is damaged, this command might not be able to find the package and will prompt you to provide the path. |
<outputvolumeorimage> |
Identifies the drive on which to store the content of the repaired drive. All information on the output drive will be overwritten. |
-rk |
Identifies the location of the recovery key that should be used to unlock the volume. This command can also be specified as -recoverykey. |
-rp |
Identifies the numerical recovery password that should be used to unlock the volume. This command can also be specified as -recoverypassword. |
-pw |
Identifies the password that should be used to unlock the volume. This command can also be specified as -password |
-kp |
Identifies the recovery key package that can be used to unlock the volume. This command can also be specified as -keypackage. |
-lf |
Specifies the path to the file that will store Repair-bde error, warning, and information messages. This command may also be specified as -logfile. |
-f |
Forces a volume to be dismounted even if it cannot be locked. This command can also be specified as -force. |
-? or /? |
Displays Help at the command prompt. |
<inputvolume> |
<outputvolumeorimage> |
Limitations |
The following limitations exist for the this command: |
This command can't repair a drive that failed during the encryption or decryption process. |
This command assumes that if the drive has any encryption, then the drive has been fully encrypted. |
Examples |
To attempt to repair drive C:, to write the content from drive C: to drive D: using the recovery key file (RecoveryKey.bek) stored on drive F:, and to write the results of this attempt to the log file (log.txt) on drive Z:, type: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.