MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  H@.rsrc@@0H   8Ph   0@P`plD4H@tx<MUI"ÕɀT:Q,v_;FEQ MUI zh-CNHELPADD COMPUTERNAMEJOINMOVEQUERYREMOVE MOVENT4BDCRESETRESETPWDTRUSTVERIFYSYNTAXUserDUDPA PasswordDPDUserOUO PasswordOPOServerSOUVERBOSEDomainDRebootRebRealmReaVerifyVResetReseDirectDiAddARemoveRemTwoWayTKerberosKPDCSERVER WORKSTATIONDCOUFSMOTRUSTForceDC PasswordTPT TransitiveTransOneSideOSUserFUF PasswordFPF QuarantineNewName ToggleSuffixTS NameSuffixesNSH? MakePrimaryMPPA EnumerateEnumAlternateNames PrimaryNameAllNames ResetOneSideROS EXPERTHELPQEnableSIDHistoryESIDHForestTRANsitiveFTRAN SelectiveAUTHSAUTHAddTLNATLNAddTLNEXATLNEX RemoveTLNRTLN RemoveTLNEXRTLNEXSecurePasswordPromptSPP PasswordMPMSROEnableTgtDelegationETDTIME`Onx[ Rd[P[W %s vONT(Y b N)?NetDomtrustedtrusting/f&TRENAMECOMPUTER `O~~T(Y b N)?ynPA*** fJT: ҉r@b g*g[IN0*** fJT: ҉r@b g/f] Rdv DC: %1*gc[v_sQ/Spe %1A(  .6/,NETDOM [ ADD | COMPUTERNAME | HELP | JOIN | MOVE | QUERY | REMOVE | MOVENT4BDC | RENAMECOMPUTER | RESET | TRUST | VERIFY | RESETPWD ] }TNbR[b0 *gbR[b}TN0 NETDOM HELP }TN -b- NETDOM }TN/.^R S(uv}TN g: NETDOM ADD NETDOM RESETPWD NETDOM RESET NETDOM COMPUTERNAME NETDOM QUERY NETDOM TRUST NETDOM HELP NETDOM REMOVE NETDOM VERIFY NETDOM JOIN NETDOM MOVENT4BDC NETDOM MOVE NETDOM RENAMECOMPUTER NETDOM HELP SYNTAX ʑYUO NET HELP lL0 NETDOM HELP }TN | MORE O\>f:y.^R0 la: SNǏS+T&^ gNa N netdom }TNv /VERBOSE c[~Q0 l O(uN N`Oh:y}TNl: - 'YQW[kNh_{ cgq>f:y.eQvUS͋0- \QW[kNhSSSvyv Ty OYeN T0 - [ T ] W[&{b_SNcO~}TNvS y0 - { T } W[&{b_yvRh0`O_{\vQ-NN*NyvcO~}TN0 - | W[&{RRh-Nvyv0S\vQ-NN*NyvcO~}TN0 OY (W NRl-N `O_{.eQ NETDOM T SWITCH1 b SWITCH20cO Ty/fS v0 NETDOM [name] {SWITCH1 | SWITCH2} - [...] W[&{h:y`OSN͑ YMRNyv0 O(uzzN gHe /Direct N^(uNONg NRQvcONcv^_euǏS Oc cONvW0RN /Verify NwO(u0 /SecurePasswordPrompt O(u[hQQnc9_Q܃USc[Qnc0 ^(Wc[zfaSQnceO(udk y0 dk yN(WN * b__cO[xf:yS_MR O'`r`0 /Kerberos c[^(WWb]\OzTvhWKNۏL Kerberos NOS _{:N[aTvhWcO(u7b^7bT[x0 /Force [N /REMove y gHe0:_6R(WN*NW N RdON(TNS_(u) [a sSOl gSsvQNWbl gS+T9SMvON[a_N/fYdk0 _{O(u[tev DNS Tyc[W0 fJT: dk y\[hQ RdN*NP[W0 lNETDOM VERIFY machine [/Domain:domain] [/UserO:user] [/PasswordO:[password | *]] [/SecurePasswordPrompt] NETDOM VERIFY ]\OzTWc6RhVKNv[hQޏc machine /fvQ[hQޏcv{:gv Ty /Domain c[[vQ[hQޏcvW /UserO (uNNv{:g^zޏcv(u7b^7b /PasswordO /UserO c[v(u7b^7bv[x0* h:yc:yeQ[x /SecurePasswordPrompt O(u[hQQnc9_Q܃USc[Qnc0 ^(Wc[zfaSQnceO(udk y0 dk yN(WN * b__cO[xf:y .^R 0 (dkyd\OO(u Spe/W ,.eQNW(u7bvsQTv[x: %0 ,.eQN[a(u7bvsQTv[x: %0 0}TN]bR[b FO{:g*g͑e/TR0 0%1 _wWbXTNf9e[sQ0%0 P]N %1 0RW %2 v[hQS0 N{:g %3 ^zޏc0 0N %1 0R %2 v[hQSeHe0 @yr[(u7bSN(WvQ-NR^{:g^7bv~~USMO Rh: $^7b(WW-NvWc6RhVRh: $^7b(WW-Nv]\OzRh: $^7b(WW-Nv gRhVRh: Wv;NWc6RhV: ,%1 (]\Ozb gRhV) 8gg;N:g %1%0 ,W}T T;N:g %1%0 LPDC %1%0 <RID `l{thV %1%0 (~g;N:g %1%0 WbXTv[hQSn: {:g r`/W Wc6RhV ======= ============= ================= ͑nWbXTv[hQSn: {:g W Wc6RhV ======= ====== ================= @\\%1!-20s! %2!-18s!%3 @\\%1!-20s! ! ( %2 ) P]͑nN %1 0RW %2 v[hQS0N {:g %3 ^zޏc0 0*g͑nN %1 0R %2 v[hQS0 4<-> %1!-55s!%0 4<- %1!-55s!%0 4 -> %1!-55s!%0 vc %0 ^ Windows%0 (vQN) %0 [TSO\ONW ON{|W ========= ======================= ========== $[TSO\ONW ON{|W r` ========= ======================= ========== ====== [TSO\ONW ON{|W ========= ======================= ========== t %1!-31s!  ]  ]e_  *g~b0R  ]b~ 4<-> %1!-48s!%0 4<- %1!-48s!%0 4 -> %1!-48s!%0 4 %1!-48s!%0 0]bR %1 T %2 KNvON (%1 T %2 KNvONeHe ${:g r` ======== ====== %1!-32s!%0 X Oc Tek P *g Tek \*g cgq\Ջv͑}T Td\O͑n BDC %1 vOo`0 {:gYN NNvr`0 <)R(u "NETDOM HELP" SfYOo`0 |YgW] NX[(Wb/fN*N^ Windows Kerberos W `OSNO(u /FORCE h_ RdON[a0 LON N Rd! ُ/fN*NR'`v6r-P[ON0 N RdON0 <ON N Rd! ُ/f6r-P[ON0 NT| 6rW0 ON N Rd! ُ/fN*N6r-P[ON0YgP[W] NX[(W `Onx[ Rddk6r-P[ ON RQ!kЏL}TNv^c[ /FORCE h_0 8]bR͑nT %1 T %2 KNvON 0͑n %1 T %2 KNvON[x Lel͑nON[x$N*NW_{/f Windows 2000 W0 T(WW %1 N:NvQ[W %2 v ^ Windows ONnON[x H]bR:N[W %1 v^ Windows ONn ON[x <ُ/f^ Windows Kerberos WON (ONy(u(ONeTn:N) LWc6RhV %1 NvONW %2 [hQS1Y% Y N: |\ՋT|Wc6RhV %1 Nv NetLogon gR NgbLONW %2 v[hQSg d\O1Y% Y N: LWc6RhV %1 NvONW %2 [hQS͑n1Y% Y N: |\ՋT|Wc6RhV %1 Nv NetLogon gR NgbLONW %2 v[hQS͑n d\O1Y% Y N: l\Ջ(WWc6RhV %1 NۏL~g~b NSONWf %2 vW{tXT~ d\O1Y% Y N: XKerberos OS(WW %2 -Nv gRhV N bRW %1 -Nv[7bz W %2 -Nv(u7bel ǏW %1 -Nv Kerberos OSۏLN0 %2 _{ON %1 FO NO(u Kerberos OSON SV/f ON NS O0 ONS O0 \ONn:NS O0 \ONn:N NS O0 ON]S O0 ON] NS O0 D_{O(u /PasswordT }TNLSpec[ON[x0 /OneSide SpecOvSpeW[&{2N0[_{ /f "trusted" b "trusting"( NS+T_S)0 elޏcW %1 X`O]N %1 ^zNޏc0e_ޏc 6qT ͑eЏL netdom }TN0 0]bR͑n,g0W{:gv{:g^7b[x0 0el͑n,g0W{:gv{:g^7b[x0 8.eQN{:gvHQMRW(u7bvsQTv[x: %0 {:g]ReQ0RW %1 c %0 dl g:NdkON/T(u SID [{ R0dkWvNBl-N cOv@b g SID \eHe0 ]:NdkON/T(u SID [{ R0NgԏVvcCgpenc \ScSegSOWv SID0 vQNWv SID \ Rd0 $\ONn:N[{ SID0 (\ONn:N N[{ SID0 ,]:NdkON/T(u SID [{ R0 0l g:NdkON/T(u SID [{ R0 \S[vc0QzON/T(u SID [{ R0[ %1 vON/f NeQz ON0 (]:NdkON/T(u SID SS0 (]:NdkONy(u SID SS0 (]:NdkON/T(u SID SS0 (:NdkON/T(u SID SS0 (:NdkONy(u SID SS0 (]:NdkONy(u SID SS0 (dkON]h:N Sg O 0 (dkONl gh:N Sg O 0 (dkON]h:N Sg O 0 (\dkONh:N Sg O 0 (\dkONh:N NSg O 0 (dkON]h:N NSg O 0 (dkON]h:N NS~~ 0 (dkONl gh:N NS~~ 0 (dkON]h:N NS~~ 0 (\dkONh:N NS~~ 0 (\dkONh:N NNS~~ 0 (dkON]h:N NNS~~ 0 p NETDOM RENAMECOMPUTER machine /NewName:new-name [/UserD:user [/PasswordD:[password | *]]] [/UserO:user [/PasswordO:[password | *]]] [/Force] [/REBoot[:Time in seconds]] [/SecurePasswordPrompt] NETDOM RENAMECOMPUTER ͑}T T{:g0Yg{:gReQW R؏͑}T TW-Nv {:g[a0gN gR(OYfNS:gg)OVV[v{:g T0 YgNUOُy{|Wv gRЏL(Wvh{:g N R{:g Tf9eONu N)Rq_T0 dk}TN N^(uN͑}T TWc6RhV0 machine /f͑}T Tv]\OzbbXT gRhVv Ty /NewName c[{:gve Ty0DNS ;N:gh~{T NetBIOS Tyf9e:Ne Ty0 Yge Ty NN 15 *NW[&{ R NetBIOS Ty/fNMR 15 *NW[&{>mu eg /UserD (uNNW^zޏcv(u7b^7b0 SN\Wc[:N "/ud:domain\user"0YgWweu RǑ(u{:gvW0 /PasswordD /UserD c[v(u7b^7bv[x0* h:yc:y`OeQ[x /UserO (uNN͑}T Tv{:g^zޏcv(u7b^7b0Ygweu RO(uS_MR{vU_(u7bv^7b0SN\(u7bvWc[:N "/uo:domain\user"0YgWweu RǑ(u,g0W{:g^7b0 /PasswordO /UserO c[v(u7b^7bv[x0* h:yc:y`OeQ[x /Force Y N@b dk}TNO[{:g NЏLvgN gRNu N)Rq_T0 d^c[N /FORCE _sQ &TR\c:y(u7bNNnx0 /REBoot c[{:g^(W ͑}T T d\O[bKNTsQv^ꁨR͑e/TR0 ؏SNcOꁨRsQKNMRvype0؞

| /Remove:<alternate-DNS-name> | /MakePrimary:<computer-dns-name> | /Enumerate[:{AlternateNames | PrimaryName | AllNames}] | /Verify NETDOM COMPUTERNAME {t{:gv;N TyTfbc Ty0 dk}TNSN[hQ0W͑}T TWc6RhVb gRhV0 machine {tvQ Tyv{:gv Ty0 /UserO (uNN{t{:g^zޏcv (u7b^7b /PasswordO /UserO c[v(u7b^7b[x0* a`/f c:yeQ[x /UserD (uNN{t{:gvW^zޏcv (u7b^7b /PasswordD /UserD c[v(u7b^7b[x0* a`/f c:yeQ[x /Add c[^mRevfbc Ty0e Ty_{ /f[hQP[v DNS Ty(FQDN - {:g T Tߍ;N DNS T Y comp1.example.com)0 /REMove c[^ Rds gvfbc Ty0 Rdv Ty_{/f[hQP[v DNS Ty (FQDN - {:g TTߍ;N DNS T Y comp1.example.com)0 /MakePrimary c[^\s gfbc Tylbc:N;N Ty0 lbc:N;N Tyv Ty_{/f[hQ P[v DNS Ty(FQDN - {:g TTߍ ;N DNS T Y comp1.example.com)0 /ENUMerate RQc[v Ty0؞:N AllNames0 /Verify hgk*N{:g T/f&TX[(W DNS A U_ T SPN /SecurePasswordPrompt O(u[hQQnc9_QzSc[Qnc0 (Wc[zfaSQnce^O(udk y0 dk yN(WN * b__cO[x + = ; , ? T * l{:gv NetBIOS TPN %1!d! *NW[0NetBIOS T \)w:N %2 0 4dkd\O\{:g %1 ͑}T T:N %20 gN gR(YfNS:gg)OVNV[v{:g T0 Ygdk{|WvNUO gR(W %1 NЏL R{:g Tf9e\Nubq_T0 lck(WُS{:g N[ňb Rd Active Directory W gR0 dkeelf9e{:g T0 |N[ňb Rd Active Directory W gRT dk{:g؏l g͑e/TRǏ0 dkeelf9e{:g T0 xdk{:g/fN*Nck(WGS~vWc6RhV0 _{[b Active Directory [ňT[Mbf9e{:g T0 Pdk{:g N][ňfNS:gg gR0 _{ Rddk gRMbf9e{:g T0 t\Ջ(W %1 NSb_ gRc6R{thV1Y% Qs %2!d!0elnx[/f&T[ňN fNS:gg gR0 \Ջ(W %1 NS{:g҉rOo`1Y% Qs %2!d!0elnx[{:g/f&T(W ҉rf9ebWc6RhVGS~Ǐ z-N0 <elޏc0R{:g %1 Nx/f %2!d!0 @1uN %1 /TRN{:g Tf9e {:gck(WsQ:g0%0 P_{O(u /ToggleSuffix }TNLSpec[ TyT"}_0 O(u /ToggleSuffix }TNLSpec[v TyT"}_ QN /ListSuffixes RQv Ty"}_V0 dk}TN(W adprop.dll -N[s0 ^v,g0WHr,g Ncknxv^N NS+Tdk}TN0 [ň adprop.dll vcknxHr,g0 dk}TN(W netapi32.dll -N[s0elR}dkeN0 nxOeN netapi32.dll (W|~eN9Y-NX[(W0 dk}TN(W netapi32.dll -N[s0 dk^v,g0WHr,g NS+Tdk}TN0 dk{:g Nv^Hr,g Ncknx bdk}TN *gЏLNdkd\O@bv Windows XP b Windows Server 2003 bfؚHr,g N0 |dk}TN(W dnsapi.dll -N[s0elR}dkeN0 nxOeN dnsapi.dll (W|~eN9Y-NX[(W0 dk}TN(W dnsapi32.dll -N[s0 dk^v,g0WHr,g NS+Tdk}TN0 dk{:g Nv^Hr,g Ncknx bdk}TN*gЏLNdkd\O@bv Windows XP b Windows Server 2003 bfؚHr,g N0 Active Directory W gR]~S+Tc[ Ty:N %1 v{:g^7b b gRhV[a0 YgُN[aNW-Nvs g{:gsQT R N\dk Ty:N;N Ty0 YgُN[aNW-Nvs g{:g NsQT RS]͑}T TbNW-N Rd0 N Active Directory W gR-N Rd[Nv^͑Ջ:N;N Tyd\O0 SNO(u Nbv]wQ~b0Rv^ RdُN[a: [N{:g^7b - Active Directory (u7bT{:g0 [N gRhV[a - Active Directory zpT gR0 {:gv;N Ty/f: {:gvfbc Ty/f: {:gv@b g Ty/f: 4]bR\ %1 mR:N{:gvfbc Ty0 @el\ %1 mR:N{:gvfbc Ty0 /f: 4]\O:N{:gv fbc TybR Rd %10 @el\O:N{:gv fbc Ty Rd %10 /f: ]bR\ %1 :N{:gv;N Ty0 _{͑e/TR{:gMbOdk Tyf9euHe0 (WdkKNMR dk{:gSel (u7bTvQN{:g v^Nelg-NvvQN{:g0 c[ve Ty]N{:gfbc TyRh-N Rd0 (W͑e/TRT ;N{:g T\n:Nc[ve Ty0 <el\ %1 :N{:gv;N Ty0 /f: c[vON N/f^ Windows WON0mRT Rd TLN T TLN cdNS^ Windows WON/ec0 pc[vON N/f^ Windows WON0f9edkON^\'` NS^ Windows WON/ec0 ,͑e/TR{:gMb[bdkd\O0 /Quarantine N[s gvvcQzON gHe0 nbndWy^\'`0؞

f:yS_MRr`0 /NameSuffixes N[gONbSg Ov^ Windows WON gHe0 RQ1u trusting_domain_name }T TvW-N trust_name v1u TyT0 /UserO T /PasswordO f:yS_MRr`0 /ForestTRANsitive N[^ Windows WON gHe v^NS(Wgv9hW-NgbL0 c[ "yes" \dkONh:NSg O0 c[ "no" \dkONh:N NSg O0 c[ /ForestTRANsitive v^N N&^ yes b no \>f:ydkON^\'`vS_MRr`0 /SelectiveAUTH N[QzgTYON gHe0 c[ "yes" \(Wte*NON-N /T(u b'`vN0 c[ "no" \(Wte*NON-N y(u b'`vN0 c[ /SelectiveAUTH v^N N&^ yes b no \>f:ydkON^\'`vS_MRr`0 /AddTLN N[Sg Ov^ Windows WON gHe v^NS(Wgv9hW-NgbL0 \c[vvB\ T(DNS TyT)mR0R c[ONvgONOo`-N0 SSRQ TyTv /NameSuffixes d\O0 /AddTLNEX N[Sg Ov^ Windows WON gHe v^NS(Wgv9hW NgbL0 \c[vvB\ Tcd(DNS TyT)mR0R c[ONvgONOo`-N0 SSRQ TyTv /NameSuffixes d\O0 /RemoveTLN N[Sg Ov^ Windows WON gHe v^NS(Wgv9hW NgbL0 Nc[ONvgONOo`-N Rd c[vvB\ T(DNS TyT)0 SSRQ TyTv /NameSuffixes d\O0 /RemoveTLNEX N[Sg Ov^ Windows WON gHe v^NS(Wgv9hW-NgbL0 Nc[ONvgONOo`-N Rd c[vvB\ Tcd(DNS TyT)0 SSRQ TyTv /NameSuffixes d\O0 /SecurePasswordPrompt O(u[hQQnc9_QzSc[Qnc0 (Wc[zfaSQnce^O(udk y0 NS_\O:N * cO[xm0 ُ\;bkvQNg-Nv gRc6elSv TGT0 fJT: Ǐ\ EnableTgtDelegation n:N "no" vQNg-NMnN ONdk{:g/(u7begY>mNUO gR v gR\elO(u Kerberos [hQY>m dkg-N vNUO^7b\elO(uNUO gR0 (ck(Wg~bW %1 vWc6RhV <ck(W:N OU %2 -Nv %1 R^{:g^7b (ck(W:N %1 R^{:g^7b ck(WN %1 ^zO݋ $ck(W RdN %1 vO݋ (ck(W Rd %1 v{:g^7b 0ck(W %1 Nn LSA WV{euOo` ck(W/TR gR %1 ck(W\Pbk gR %1 ck(WMn gR %1 (ck(WT,g0W~ %1 mRW^7b (ck(WN,g0W~ %1 RdW^7b ck(WReQW %1 $*g^zN %1 vO݋ (*g Rd %1 v{:g^7b (ck(W^zN %1 v[hQS l1uN gRhV N/ec}T TWc6RhV \[hQS͑n:N %1 1Y%0 ck(W^zN %2 v[hQS0 Lel\[hQS͑n:N}T Tv gRhV %10 ] bvQNWc6RhV0 (ck(WNW %1 v[hQޏc $ck(W Rd %1 vON^7b (ck(WSb_SONWv[a %1 $ck(W Rd %1 vON[a ck(WSb_:g[[a %1 ck(W Rd:g[[a %1 $ck(W:N %1 mRON^7b ck(WR^:g[ %1 $ck(WR^NW %1 vON (ck(WS LSA WV{euOo` (ck(WN %1 SSOWOo` (ck(W %1 NnSOWOo` $ck(W:N %1 n:g[

m]/T(u0 TGT Y>m]y(u0 $ck(W/T(u TGT Y>m0 $ck(Wy(u TGT Y>m0 TGT Y>m]~/T(u0 TGT Y>m]~y(u0 @S g^ Windows b荗gON{|WMbgbLdkd\O0 4VS_VERSION_INFO@%@%?StringFileInfo080404B0LCompanyNameMicrosoft Corporation8FileDescriptionNETDOM5r)FileVersion6.3.9600.16384 (winblue_rtm.130821-1623)6 InternalNameNETDOM.EXE.LegalCopyright Microsoft Corporation. All rights reserved.FOriginalFilenameNETDOM.EXE.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.3.9600.16384DVarFileInfo$TranslationPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADD